Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Privacy (2)
- And International Economic Law (1)
- Artificial Intelligence (1)
- Civil rights (1)
- Computational complexity (1)
-
- Computer security (1)
- Cyberlaw (1)
- Data Localization (1)
- Data sovereignty (1)
- Digital sovereignty (1)
- E-commerce (1)
- Electronic commerce (1)
- Extraterritoriality (1)
- GATS (1)
- Globalization (1)
- International Trade (1)
- International trade law (1)
- Internet freedom (1)
- Internet governance (1)
- Internet law (1)
- Law and economics (1)
- NP-hard (1)
- Negligence (1)
- Right of privacy (1)
- Sovereignty (1)
- Strict liability (1)
- Supermodularity (1)
- Telecommunications (1)
- Tort law (1)
Articles 1 - 7 of 7
Full-Text Articles in Law
Computational Complexity And Tort Deterrence, Joshua C. Teitelbaum
Computational Complexity And Tort Deterrence, Joshua C. Teitelbaum
Georgetown Law Faculty Publications and Other Works
Standard formulations of the economic model of tort deterrence constitute the injurer as the unboundedly rational bad man. Unbounded rationality implies that the injurer can always compute the solution to his care-taking problem. This in turn implies that optimal liability rules can provide robust deterrence, for they can always induce the injurer to take socially optimal care. In this paper I examine the computational complexity of the injurer's care-taking problem. I show that the injurer's problem is computationally tractable when the precaution set is unidimensional or convex, but that it is computationally intractable when the precaution set is multidimensional and …
Sovereignty 2.0, Anupam Chander, Haochen Sun
Sovereignty 2.0, Anupam Chander, Haochen Sun
Georgetown Law Faculty Publications and Other Works
Digital sovereignty—the exercise of control over the internet—is the ambition of the world’s leaders, from Australia to Zimbabwe, a bulwark against both foreign state and foreign corporation. Governments have resoundingly answered first-generation internet law questions of who if anyone should regulate the internet—they all will. We now confront second generation questions—not whether, but how to regulate the internet. We argue that digital sovereignty is simultaneously a necessary incident of democratic governance and democracy’s dreaded antagonist. As international law scholar Louis Henkin taught us, sovereignty can insulate a government’s worst ills from foreign intrusion. Assertions of digital sovereignty, in particular, …
Artificial Intelligence And Trade, Anupam Chander
Artificial Intelligence And Trade, Anupam Chander
Georgetown Law Faculty Publications and Other Works
Artificial Intelligence is already powering trade today. It is crossing borders, learning, making decisions, and operating cyber-physical systems. It underlies many of the services that are offered today – from customer service chatbots to customer relations software to business processes. The chapter considers AI regulation from the perspective of international trade law. It argues that foreign AI should be regulated by governments – indeed that AI must be ‘locally responsible’. The chapter refutes arguments that trade law should not apply to AI and shows how the WTO agreements might apply to AI using two hypothetical cases . The analysis reveals …
Is Data Localization A Solution For Schrems Ii?, Anupam Chander
Is Data Localization A Solution For Schrems Ii?, Anupam Chander
Georgetown Law Faculty Publications and Other Works
For the second time this decade, the Court of Justice of the European Union has struck a blow against the principal mechanisms for personal data transfer to the United States. In Data Protection Commissioner v Facebook Ireland, Maximillian Schrems, the Court declared the EU-US Privacy Shield invalid and placed significant hurdles to the process of transferring personal data from the European Union to the United States via the mechanism of Standard Contractual Clauses. Many have begun to suggest data localization as the solution to the problem of data transfer; that is, don’t transfer the data at all. I argue …
The Electronic Silk Road: How The Web Binds The World In Commerce, Anupam Chander
The Electronic Silk Road: How The Web Binds The World In Commerce, Anupam Chander
Georgetown Law Faculty Publications and Other Works
On the ancient Silk Road, treasure-laden caravans made their arduous way through deserts and mountain passes, establishing trade between Asia and the civilizations of Europe and the Mediterranean. Today’s electronic Silk Roads ferry information across continents, enabling individuals and corporations anywhere to provide or receive services without obtaining a visa. But the legal infrastructure for such trade is yet rudimentary and uncertain. If an event in cyberspace occurs at once everywhere and nowhere, what law applies? How can consumers be protected when engaging with companies across the world?
In this accessible book, cyber-law expert Anupam Chander provides the first thorough …
Electronic Communications Privacy Act And The Revolution In Cloud Computing : Hearing Before The Subcomm. On The Constitution, Civil Rights, And Civil Liberties Of The H. Comm. On The Judiciary, 111th Cong., Sept. 23, 2010 (Statement By Adjunct Professor Marc J. Zwillinger, Geo. U. L. Center), Marc J. Zwillinger
Testimony Before Congress
ECPA has functioned fairly well during its first 20 years in striking the right balance between law enforcement needs and the privacy expectation of U.S. citizens. But when it was initially passed in 1986, Congress recognized that the “law must advance with the technology to ensure the continued vitality of the fourth amendment.” Based on my experience as an ECPA practitioner for the past 13 years, I believe the time is ripe for another advancement. I hope you will consider these perspectives in crafting legislation that balances law enforcement needs and user privacy in a manner that reflects the reality …
Digital Architecture As Crime Control, Neal K. Katyal
Digital Architecture As Crime Control, Neal K. Katyal
Georgetown Law Faculty Publications and Other Works
This paper explains how theories of realspace architecture inform the prevention of computer crime. Despite the prevalence of the metaphor, architects in realspace and cyberspace have not talked to one another. There is a dearth of literature about digital architecture and crime altogether, and the realspace architectural literature on crime prevention is often far too soft for many software engineers. This paper will suggest the broad brushstrokes of potential design solutions to cybercrime, and in the course of so doing, will pose severe criticisms of the White House's recent proposals on cybersecurity.
The paper begins by introducing four concepts of …