Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 31 - 57 of 57

Full-Text Articles in Law

Criminalizing Revenge Porn, Danielle K. Citron, Mary Anne Franks Jul 2014

Criminalizing Revenge Porn, Danielle K. Citron, Mary Anne Franks

Faculty Scholarship

Violations of sexual privacy, notably the non-consensual publication of sexually graphic images in violation of someone's trust, deserve criminal punishment. They deny subjects' ability to decide if and when they are sexually exposed to the public and undermine trust needed for intimate relationships. Then too they produce grave emotional and dignitary harms, exact steep financial costs, and increase the risks of physical assault. A narrowly and carefully crafted criminal statute can comport with the First Amendment. The criminalization of revenge porn is necessary to protect against devastating privacy invasions that chill self-expression and ruin lives.


Rethinking Online Privacy In Canada: Commentary On Voltage Pictures V. John And Jane Doe, Ngozi Okidegbe Jan 2014

Rethinking Online Privacy In Canada: Commentary On Voltage Pictures V. John And Jane Doe, Ngozi Okidegbe

Faculty Scholarship

This article problematizes the use of the bona fide case standard as the legal standard for a court to order a third party Internet Service Provider ("ISP") to disclose subscriber information to a copyright owner in online piracy cases. It argues that ISP account holders have a reasonable expectation of privacy in their subscriber information. It contends that the current bona fide case standard affords a relatively low threshold of protection for Internet users’ subscriber information. The reason for which the article takes this position is that the bona fide case standard can be met solely by IP address evidence, …


A Fork In The Stream: The Unjustified Failure Of The Concurrence In J. Mcintyre Machinery Ltd. V. Nicastro To Clarify The Stream Of Commerce Doctrine, Cody Jacobs Jan 2013

A Fork In The Stream: The Unjustified Failure Of The Concurrence In J. Mcintyre Machinery Ltd. V. Nicastro To Clarify The Stream Of Commerce Doctrine, Cody Jacobs

Faculty Scholarship

This article critiques the concurring opinion in the recent United States Supreme Court personal jurisdiction decision in J. McIntyre Machinery Ltd. v. Nicastro. That opinion declined to choose between the competing approaches to the stream of commerce doctrine because of perceived flaws in those approaches and because the facts of Nicastro did not involve modern technology.

Consumer products are increasingly distributed through international distribution chains. Whether foreign manufacturers who utilize such chains are amenable to personal jurisdiction in states where their products are distributed has become a hotly litigated issue because of the Supreme Court’s 4-4-1 split decision over 20 …


An American Look At Zappers: A Paper For The Physikalisch-Technische Bundesanstalt, Revisionssicheres System Zur Aufzeichnung Von Kassenvorgängen Und Messinformationenthe, Richard Thompson Ainsworth Mar 2012

An American Look At Zappers: A Paper For The Physikalisch-Technische Bundesanstalt, Revisionssicheres System Zur Aufzeichnung Von Kassenvorgängen Und Messinformationenthe, Richard Thompson Ainsworth

Faculty Scholarship

The common observation in the U.S. is that enforcement against technology-facilitated sales suppression has fallen through an intra-jurisdictional crack. Neither federal nor state auditors systemically target this area. But this is changing, and the change is coming from the state side.

This paper has two main parts. First, it summarizes the current state of sales suppression enforcement in the U.S. Secondly, it reviews the international solutions that are attracting the most U.S. attention. A conclusion indicates likely directions for U.S. enforcement.

Georgia is the first state to take action. On May 3, 2011 Georgia added code section 16-9-62 to Georgia …


Patent Litigation And The Internet, Samantha Zyontz, John R. Allison, Emerson H. Tiller, Tristan Bligh Jan 2012

Patent Litigation And The Internet, Samantha Zyontz, John R. Allison, Emerson H. Tiller, Tristan Bligh

Faculty Scholarship

Patent infringement litigation has not only increased dramatically in frequency over the past few decades,1 but also has also seen striking growth in both stakes and cost.2 Although a relatively rich literature has added much to our understanding of the nature, causes, and consequences of patent litigation during the past two decades,3 many interesting questions remain inadequately addressed. The nuances of and trends in patent litigation in different technology fields and industries, for example, are still understudied.4 Litigation of patents on new technologies has likewise received a dearth of attention. Here we seek to help begin …


Intermediaries And Hate Speech: Fostering Digital Citizenship For Our Information Age, Danielle K. Citron, Helen Norton Jul 2011

Intermediaries And Hate Speech: Fostering Digital Citizenship For Our Information Age, Danielle K. Citron, Helen Norton

Faculty Scholarship

No longer confined to isolated corners of the web, cyber hate now enjoys a major presence on popular social media sites. The Facebook group “Kill a Jew Day,” for instance, acquired thousands of friends within days of its formation, while YouTube has hosted videos with names like “How to Kill Beaners,” “Execute the Gays,” and “Murder Muslim Scum.” The mainstreaming of cyber hate has the troubling potential to shape public expectations of online discourse.

Internet intermediaries have the freedom and influence to seize this defining moment in cyber hate’s history. We believe that a thoughtful and nuanced intermediary-based approach to …


Network Accountability For The Domestic Intelligence Apparatus, Danielle K. Citron, Frank Pasquale Jan 2011

Network Accountability For The Domestic Intelligence Apparatus, Danielle K. Citron, Frank Pasquale

Faculty Scholarship

A new domestic intelligence network has made vast amounts of data available to federal and state agencies and law enforcement officials. The network is anchored by “fusion centers,” novel sites of intergovernmental collaboration that generate and share intelligence and information. Several fusion centers have generated controversy for engaging in extraordinary measures that place citizens on watch lists, invade citizens’ privacy, and chill free expression. In addition to eroding civil liberties, fusion center overreach has resulted in wasted resources without concomitant gains in security.

While many scholars have assumed that this network represents a trade-off between security and civil liberties, our …


The In Rem Forfeiture Of Copyright-Infringing Domain Names, Andrew Sellars Jan 2011

The In Rem Forfeiture Of Copyright-Infringing Domain Names, Andrew Sellars

Faculty Scholarship

In the summer of 2010, the Immigration and Customs Enforcement Division of the Department of Homeland Security began "Operation In Our Sites," an enforcement sweep targeted towards websites allegedly dealing in counterfeit goods and copyright-infringing files. The operation targeted the websites by proceeding in rem against their respective domain names. For websites targeted for copyright infringement, ICE Agents used recently-expanded copyright forfeiture remedies passed under the 2008 PRO-IP Act, providing no adversarial hearing prior to the websites being removed, and only a probable cause standard of proof.

This Paper examines three specific harms resulting from Operation In Our Sites, and …


Fulfilling Government 2.0'S Promise With Robust Privacy Protections, Danielle K. Citron Jun 2010

Fulfilling Government 2.0'S Promise With Robust Privacy Protections, Danielle K. Citron

Faculty Scholarship

The public can now “friend” the White House and scores of agencies on social networks, virtual worlds, and video-sharing sites. The Obama Administration sees this trend as crucial to enhancing governmental transparency, public participation, and collaboration. As the President has underscored, government needs to tap into the public’s expertise because it doesn’t have all of the answers.

To be sure, Government 2.0 might improve civic engagement. But it also might produce privacy vulnerabilities because agencies often gain access to individuals’ social network profiles, photographs, videos, and contact lists when interacting with individuals online. Little would prevent agencies from using and …


Defending Disclosure In Software Licensing, Maureen A. O'Rourke Jan 2010

Defending Disclosure In Software Licensing, Maureen A. O'Rourke

Faculty Scholarship

For lack of our imagination, this article does not have the most scintillating title. However, the subject matter is critically important. We survey prominent kinds of disclosures in law and show why the disclosure tool, though subject to substantial criticism, is central to the legitimacy of any legal regime. Our working example is the American Law Institute’s “Principles of the Law of Software Contracts” (hereinafter “ALI Principles”).

The ALI Principles include three kinds of disclosure: disclosure of facts (concerning the quality of software),disclosure of terms (of standard forms), and disclosure of post-contract intentions (to pursue remote disablement of software). We …


Government Speech 2.0, Danielle K. Citron, Helen Norton Jan 2010

Government Speech 2.0, Danielle K. Citron, Helen Norton

Faculty Scholarship

New expressive technologies continue to transform the ways in which members of the public speak to one another. Not surprisingly, emerging technologies have changed the ways in which government speaks as well. Despite substantial shifts in how the government and other parties actually communicate, however, the Supreme Court to date has developed its government speech doctrine – which recognizes “government speech” as a defense to First Amendment challenges by plaintiffs who claim that the government has impermissibly excluded their expression based on viewpoint – only in the context of disputes involving fairly traditional forms of expression. In none of these …


Principles Of The Law Of Software Contracts: Some Highlights, Robert A. Hillman, Maureen A. O'Rourke Jan 2010

Principles Of The Law Of Software Contracts: Some Highlights, Robert A. Hillman, Maureen A. O'Rourke

Faculty Scholarship

The final draft of the Principles of the Law of Software Contracts ("Principles") was unanimously approved bythe American Law Institute membership in May of 2009. The goal of the project is to “clarify and unify thelaw of software transactions.” However, the Principles will not become law in any jurisdiction unless and until a court adopts them, so only time will tell whether the project will accomplish this goal. Nevertheless, one thing is certain. The current law of software transactions, a mish-mash of common law, Article 2 of theUniform Commercial Code, and federal intellectual property law, among other things, is in …


Law's Expressive Value In Combating Cyber Gender Harassment, Danielle K. Citron Dec 2009

Law's Expressive Value In Combating Cyber Gender Harassment, Danielle K. Citron

Faculty Scholarship

The online harassment of women exemplifies twenty-first century behavior that profoundly harms women yet too often remains overlooked and even trivialized. This harassment includes rape threats, doctored photographs portraying women being strangled, postings of women’s home addresses alongside suggestions that they should be sexually assaulted and technological attacks that shut down blogs and websites. It impedes women’s full participation in online life, often driving them offline, and undermines their autonomy, identity, dignity, and well-being. But the public and law enforcement routinely marginalize women’s experience, deeming it harmless teasing that women should expect, and tolerate, given the Internet’s Wild West norms …


Cyber Civil Rights, Danielle K. Citron Feb 2009

Cyber Civil Rights, Danielle K. Citron

Faculty Scholarship

Social networking sites and blogs have increasingly become breeding grounds for anonymous online groups that attack women, people of color, and members of other traditionally disadvantaged groups. These destructive groups target individuals with defamation, threats of violence, and technology-based attacks that silence victims and concomitantly destroy their privacy. Victims go offline or assume pseudonyms to prevent future attacks, impoverishing online dialogue and depriving victims of the social and economic opportunities associated with a vibrant online presence. Attackers manipulate search engines to reproduce their lies and threats for employers and clients to see, creating digital "scarlet letters" that ruin reputations. Today's …


Rethinking Consideration In The Electronic Age, Maureen A. O'Rourke Jan 2009

Rethinking Consideration In The Electronic Age, Maureen A. O'Rourke

Faculty Scholarship

Our fast-paced age of electronic agreements that ostensibly govern transactions as diverse as downloading software, ordering goods, and engaging in collaborative development projects raises questions regarding thesuitability of contract law as the appropriate legal framework. While this question arises in many settings, we focus here on the free and open source software (FOSS) movement because of the maturity and success of its model and the ubiquity of its software. We explore in particular whether open source licenses are supported by consideration, and argue that they are, and that open source licenses are contracts. We further argue that a contractual framework …


Technological Due Process, Danielle K. Citron Jan 2008

Technological Due Process, Danielle K. Citron

Faculty Scholarship

Distinct and complementary procedures for adjudications and rulemaking lie at the heart of twentieth-century administrative law. Due process required agencies to provide individuals notice and an opportunity to be heard. Agencies could foreclose policy issues that individuals might otherwise raise in adjudications through public rulemaking. One system allowed focused advocacy; the other featured broad participation. Each procedural regime compensated for the normative limits of the other. Both depended on clear statements of reason.

The dichotomy between these procedural regimes has become outmoded. This century's automated decision-making systems collapse individual adjudications into rulemaking while adhering to the procedural safeguards of neither. …


Open Code Governance, Danielle K. Citron Jan 2008

Open Code Governance, Danielle K. Citron

Faculty Scholarship

Automated information systems offer an opportunity to improve the democratic legitimacy of the administrative state. Today, agencies transfer crucial responsibilities to computer systems. Computers gather and interpret important information. For instance, electronic machines record and calculate votes. Automated systems execute policy and render decisions about important individual rights, such as a person's eligibility for public benefits. Computer systems store sensitive personal information. These systems' closed architecture, however, shields vital agency decisions from view. No one can see how a system operates without a software program's source code. Closed code hides programming errors that disenfranchise voters, under-count communities for the census, …


Reservoirs Of Danger: The Evolution Of Public And Private Law At The Dawn Of The Information Age, Danielle K. Citron Jan 2007

Reservoirs Of Danger: The Evolution Of Public And Private Law At The Dawn Of The Information Age, Danielle K. Citron

Faculty Scholarship

A defining problem at the dawn of the Information Age will be securing computer databases of ultra-sensitive personal information. These reservoirs of data fuel our Internet economy but endanger individuals when their information escapes into the hands of cyber-criminals. This juxtaposition of opportunities for rapid economic growth and novel dangers recalls similar challenges society and law faced at the outset of the Industrial Age. Then, reservoirs collected water to power textile mills: the water was harmless in repose but wrought havoc when it escaped. After initially resisting Rylands v. Fletcher's strict liability standard as undermining economic development, American courts and …


Governing By Negotiation: The Internet Naming System, Tamar Frankel Oct 2004

Governing By Negotiation: The Internet Naming System, Tamar Frankel

Faculty Scholarship

This Article is about the governance of the Internet naming system. The subject is fascinating, not simply because the naming system is an important system affecting the Internet, although it is; and not because the Internet is important, although it is. The subject is fascinating because it offers a rare opportunity to examine and learn from the evolution of an incoherent governance structure. The naming system is special in that it is the product of a new technology; it reflects the changes and pressures brought by the new technology, and involves the interests of government and private entities, domestic and …


Governing By Negotiation: The Internet Naming System, Tamar Frankel Jan 2004

Governing By Negotiation: The Internet Naming System, Tamar Frankel

Faculty Scholarship

This Article is about the governance of the Internet naming system. The subject is fascinating, not simply because the naming system is an important system affecting the Internet, although it is; and not because the Internet is important, although it is. The subject is fascinating because it offers a rare opportunity to examine and learn from the evolution of an incoherent governance structure. The naming system is special in that it is the product of a new technology; it reflects the changes and pressures brought by the new technology, and involves the interests of government and private entities, domestic and …


The Managing Lawmaker In Cyberspace: A Power Model, Tamar Frankel Jan 2002

The Managing Lawmaker In Cyberspace: A Power Model, Tamar Frankel

Faculty Scholarship

This Article is about power - the ability to gain obedience whether by captivating followers, persuading skeptics or awarding and withdrawing economic benefits. The purpose of this Article is to analyze how the power of the Internet Corporation for Names and Numbers ("ICANN") was created, augmented, strengthened and reined in. Many controversies surround ICANN, including the very foundation of its existence - the need for a single "root" in the Internet naming infrastructure - its organizational form and accountability, and the utterances, policies and actions of its management.

The purpose of this Article is not to argue and prescribe but …


Trusting And Non-Trusting On The Internet Symposium: Trust Relationships, Tamar Frankel Apr 2001

Trusting And Non-Trusting On The Internet Symposium: Trust Relationships, Tamar Frankel

Faculty Scholarship

The Puzzle: The Internet is a wonderful innovation, allowing people around the world to communicate, trade, and obtain services. Convenient and rich in choices and opportunities, the Internet is tremendously attractive to buyers. Naturally, businesses are flocking to the Internet. The warning has been sounded that those who do not stake a claim in this incredible new communication medium will be left behind to perish. Yet, with all the enthusiasm, many buyers hesitate to take a serious plunge. Businesses are told repeatedly that they must obtain their customers' trust, yet find it more difficult to gain this trust in cyberspace …


Is Napster A Vcr? The Implications Of Sony For Napster And Other Internet Technologies, Stacey Dogan Jan 2001

Is Napster A Vcr? The Implications Of Sony For Napster And Other Internet Technologies, Stacey Dogan

Faculty Scholarship

The staple article of commerce doctrine must strike a balance between a copyright holder's legitimate demand for effective-not merely symbolic-protection of the statutory monopoly, and the rights of others freely to engage in substantially unrelated areas of commerce.

In Sony Corp. of America v. Universal City Studios, the Supreme Court created the copyright version of the so-called "staple article of commerce doctrine."'2 Its stated objective was to strike a balance between the incentive objectives of copyright3 and the interests of the public in access to new technology.4 As defined by the Court, the doctrine prevents copyright holders from interfering with …


Progressing Towards A Uniform Commercial Code For Electronic Commerce Or Racing Toward Nonuniformity?, Maureen A. O'Rourke Jan 1999

Progressing Towards A Uniform Commercial Code For Electronic Commerce Or Racing Toward Nonuniformity?, Maureen A. O'Rourke

Faculty Scholarship

The Magaziner Report encourages the development of a consistent commercial law environment against which electronic commerce transactions may take place. The author considers the current legal landscape, noting that while many efforts are underway to codify aspects of electronic commerce, these efforts are piecemeal in nature and may lead to the very lack of uniformity against which the Magaziner Report counsels. The author then briefly considers what lessons may be learned from the drafting history of the original U.C.C. as well as proposed Article 2B (now the Uniform Computer Information Transactions Act) governing transactions in computer information. She argues that …


The Internet, Securities Regulation, And Theory Of Law, Tamar Frankel Jan 1999

The Internet, Securities Regulation, And Theory Of Law, Tamar Frankel

Faculty Scholarship

Rarely has a change in the environment affected society as dramatically as the Internet. It has transformed the way we retain, transfer, and exchange information. At minimal cost, the Internet offers us far more information at a faster pace than ever before. It enables us to interact around the globe with more people than at any time in the past. When such dramatic environmental changes occur, drastic changes in the law often follow. 1 The Internet affects the environment in which securities markets operate, and the laws that govern them. 2 The use of the Internet has already begun to …


Internet Entrepreneurs, New Traffic Patterns, And Policy Issues, Michael S. Baram, Marv Goldschmitt, Richard J. Testa, Thomas C. Siekman Feb 1997

Internet Entrepreneurs, New Traffic Patterns, And Policy Issues, Michael S. Baram, Marv Goldschmitt, Richard J. Testa, Thomas C. Siekman

Faculty Scholarship

Welcome to the first session of the Internet Law Symposium co-sponsored by the Center for Law and Technology2 at Boston University School of Law and the law firm of Testa, Hurwitz & Thibeault.3 This session will focus on a variety of Internet 4 law and public policy issues and their implications for business.


Copyright Liability Of Bulletin Board Operators For Infringement By Subscribers, Maureen A. O'Rourke Jan 1995

Copyright Liability Of Bulletin Board Operators For Infringement By Subscribers, Maureen A. O'Rourke

Faculty Scholarship

As people move onto the Information superhighway in increasing numbers, novel legal Issues arise that challenge the adequacy of existing common law and statutory authority to address new uses of Information technologies. In particular, legal actions involving the liability of electronic bulletin board system operators for acts of their subscribers have begun to proliferate.