Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 4 of 4
Full-Text Articles in Law
From Lex Informatica To The Control Revolution, Julie E. Cohen
From Lex Informatica To The Control Revolution, Julie E. Cohen
Georgetown Law Faculty Publications and Other Works
Legal scholarship on the encounter between networked digital technologies and law has focused principally on how legal and policy processes should respond to new technological developments and has spent much less time considering what that encounter might signify for the shape of legal institutions themselves. This essay focuses on the latter question. Within fields like technology studies, labor history, and economic sociology, there is a well-developed tradition of studying the ways that new information technologies and the “control revolution” they enabled—in brief, a quantum leap in the capacity for highly granular oversight and management—have elicited long-term, enduring changes in the …
Tailoring Election Regulation: The Platform Is The Frame, Julie E. Cohen
Tailoring Election Regulation: The Platform Is The Frame, Julie E. Cohen
Georgetown Law Faculty Publications and Other Works
According to conventional wisdom, legislative efforts to limit platform-based electoral manipulation—including especially laws that go beyond simply mandating additional disclosure about advertising expenditures—are most likely doomed to swift judicial invalidation. In this Essay, I bracket questions about baseline First Amendment coverage and focus on the prediction of inevitable fatality following strict scrutiny. Legislation aimed at electoral manipulation rightly confronts serious concerns about censorship and chilling effects, but the ways that both legislators and courts approach such legislation will also be powerfully influenced by framing choices that inform assessment of whether challenged legislation is responsive to claimed harms and appropriately tailored …
Using Copyright To Combat Revenge Porn, Amanda Levendowski
Using Copyright To Combat Revenge Porn, Amanda Levendowski
Georgetown Law Faculty Publications and Other Works
Over the past several years, the phenomenon of “revenge porn” – defined as sexually explicit images that are publicly shared online, without the consent of the pictured individual – has attracted national attention. Victims of revenge porn often suffer devastating consequences, including losing their jobs, but have had limited success using tort laws to prevent the spread of their images. Victims need a remedy that provides takedown procedures, civil liability for uploaders and websites, and the threat of money damages. Copyright law provides all of these remedies. Because an estimated 80 percent of revenge porn images are “selfies,” meaning that …
Copy This Essay: How Fair Use Doctrine Harms Free Speech And How Copying Serves It, Rebecca Tushnet
Copy This Essay: How Fair Use Doctrine Harms Free Speech And How Copying Serves It, Rebecca Tushnet
Georgetown Law Faculty Publications and Other Works
Defenders of transformative uses have invoked the First Amendment to bolster claims that such uses should not be subject to the copyright owner’s permission. But this focus on transformation is critically incomplete, leaving unchallenged much of copyright’s scope, despite the large number of nontransformative copying activities that are also instances of free speech. The current debate leaves the way open for expansions of copyright that, while not targeted at dissenting viewpoints, nonetheless may have a profoundly negative effect on freedom of speech. In other words, transformation has limited our thinking about the free speech interests implicated by copying. This essay …