Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 57

Full-Text Articles in Law

Europe's Digital Constitution, Anu Bradford Jan 2023

Europe's Digital Constitution, Anu Bradford

Faculty Scholarship

This Article uncovers the fundamental values underlying the European Union’s expansive set of digital regulations, which in aggregate can be viewed as Europe’s “digital constitution.” This constitution engrains Europe’s human-centric, rights-preserving, democracy-enhancing, and redistributive vision for the digital economy into binding law. This vision stands in stark contrast to the United States, which has traditionally placed its faith in markets and tech companies’ self-regulation. As a result, American tech companies today are regulated primarily by Brussels and not by Washington. By highlighting the distinctiveness and the global reach of the European digital constitution, this Article challenges the common narrative that …


Conundra Of The Berne Convention Concept Of The Country Of Origin, Jane C. Ginsburg Jan 2021

Conundra Of The Berne Convention Concept Of The Country Of Origin, Jane C. Ginsburg

Faculty Scholarship

This essay explores one of the most important, but occasionally intractable, issues under the Berne Convention, the concept of Country of Origin. Article 5(4) of that treaty defines a work’s country of origin, but leaves out several situations, leaving those who interpret and apply the treaty without guidance in ascertaining the country of origin. I will call those situations the “Conundra of the country of origin,” and will explore two of them here. First, what is the country of origin of an unpublished work whose authors are nationals of different countries? Second, what is the country of origin of a …


Nascent Competitors, C. Scott Hemphill, Tim Wu Jan 2020

Nascent Competitors, C. Scott Hemphill, Tim Wu

Faculty Scholarship

A nascent competitor is a firm whose prospective innovation represents a serious threat to an incumbent. Protecting such competition is a critical mission for antitrust law, given the outsized role of unproven outsiders as innovators and the uniquely potent threat they often pose to powerful entrenched firms. In this Article, we identify nascent competition as a distinct analytical category and outline a program of antitrust enforcement to protect it. We make the case for enforcement even where the ultimate competitive significance of the target is uncertain, and explain why a contrary view is mistaken as a matter of policy and …


The Promise And Limits Of Cyber Power In International Law: Remarks, Monica Hakimi, Ann Väljataga, Zhixiong Huang, Charles Allen, Sue Robertson, Doug Wilson Jan 2020

The Promise And Limits Of Cyber Power In International Law: Remarks, Monica Hakimi, Ann Väljataga, Zhixiong Huang, Charles Allen, Sue Robertson, Doug Wilson

Faculty Scholarship

Hi, everyone. I am Monica Hakimi from the University of Michigan Law School, and I would like to welcome you to our panel on cyber power and its limits. The topic almost does not need an introduction. We all know just from reading the news that our collective dependence on cyberspace is also a huge vulnerability, and state and non-state actors exploit this vulnerability to do one another harm. They use cyber technologies not just to spy on one another, but also, for example, to interfere in national elections, to steal trade secrets or other valuable information, to disrupt the …


A United States Perspective On Digital Single Market Directive Art. 17, Jane C. Ginsburg Jan 2020

A United States Perspective On Digital Single Market Directive Art. 17, Jane C. Ginsburg

Faculty Scholarship

To a US appraiser, article 17 of the Digital Single Market Directive suggests the EU has learned from American mistakes (and from its own) in the allocation of internet intermediaries’ liability for hosting and communicating user-posted content. Before the DSM Directive, art. 14 of the 2000 eCommerce Directive set out a notice-and-takedown system very similar to the regime provided in 17 U.S.C. section 512(c). Both regimes replaced the normal copyright default, which requires authorization to exploit works, with a limitation on the liability of service providers who complied with statutory prerequisites. Because the limitation ensured that service providers would not …


Cyberattacks And The Constitution, Matthew C. Waxman Jan 2020

Cyberattacks And The Constitution, Matthew C. Waxman

Faculty Scholarship

Contrary to popular view, cyberattacks alone are rarely exercises of constitutional war powers – and they might never be. They are often instead best understood as exercises of other powers pertaining to nonwar military, foreign affairs, intelligence, and foreign commerce, for example. Although this more fine-grained, fact-specific conception of cyberattacks leaves room for broad executive leeway in some contexts, it also contains a strong constitutional basis for legislative regulation of cyber operations.


Introduction To The Symposium On Cyber Attribution, Monica Hakimi Jan 2019

Introduction To The Symposium On Cyber Attribution, Monica Hakimi

Faculty Scholarship

This symposium explores some of the legal issues surrounding the attribution of cyber conduct to states. Relative to states’ other activities, cyber conduct poses particularly thorny attribution challenges. States that engage in such conduct often use technology to obscure their identities or the full effects of their operations. The attribution challenges in turn raise difficult questions about how victim states should be allowed to respond — whether in kind, with other retorsions or countermeasures, with kinetic force, or by doing nothing at all. For example, how confident must a victim state be that it has correctly identified the source of …


Informed Trading And Cybersecurity Breaches, Joshua Mitts, Eric L. Talley Jan 2019

Informed Trading And Cybersecurity Breaches, Joshua Mitts, Eric L. Talley

Faculty Scholarship

Cybersecurity has become a significant concern in corporate and commercial settings, and for good reason: a threatened or realized cybersecurity breach can materially affect firm value for capital investors. This paper explores whether market arbitrageurs appear systematically to exploit advance knowledge of such vulnerabilities. We make use of a novel data set tracking cybersecurity breach announcements among public companies to study trading patterns in the derivatives market preceding the announcement of a breach. Using a matched sample of unaffected control firms, we find significant trading abnormalities for hacked targets, measured in terms of both open interest and volume. Our results …


Sources Of Tech Platform Power, Lina M. Khan Jan 2018

Sources Of Tech Platform Power, Lina M. Khan

Faculty Scholarship

A handful of tech platforms mediate a large and growing share of our commerce and communications. Over the last year, the public has come to realize that the power these firms wield may pose significant hazards. Elected leaders ranging from Senator Elizabeth Warren (D-MA) to Senator Ted Cruz (R-TX) have expressed alarm at the level of control that firms like Amazon, Alphabet (Google’s parent company), and Facebook enjoy. In a recent poll, a majority of Americans voiced concern that the government wouldn’t do enough to regulate U.S. tech companies. As the editor of BuzzFeed observed, a “major trend in American …


Liability For Providing Hyperlinks To Copyright-Infringing Content: International And Comparative Law Perspectives, Jane C. Ginsburg, Luke Ali Budiardjo Jan 2018

Liability For Providing Hyperlinks To Copyright-Infringing Content: International And Comparative Law Perspectives, Jane C. Ginsburg, Luke Ali Budiardjo

Faculty Scholarship

Hyperlinking, at once an essential means of navigating the Internet, but also a frequent means to enable infringement of copyright, challenges courts to articulate the legal norms that underpin domestic and international copyright law, in order to ensure effective enforcement of exclusive rights on the one hand, while preserving open communication on the Internet on the other. Several recent cases, primarily in the European Union, demonstrate the difficulties of enforcing the right of communication to the public (or, in U.S. copyright parlance, the right of public performance by transmission) against those who provide hyperlinks that effectively deliver infringing content to …


Whither (Not Wither) Copyleft, Eben Moglen Jan 2017

Whither (Not Wither) Copyleft, Eben Moglen

Faculty Scholarship

This article contains an edited version of Professor Eben Moglen’s speech at the SFLC Fall Conference 2016. It explores the topic of Copyleft, enforcement and community engagement from the perspective of one of the key individuals in the rise of Free and Open Source Software from interesting idea to a central pillar of the global technology industry.


Euro-Yearnings? Moving Toward A "Substantive" Registration-Based Trademark Regime, Jane C. Ginsburg Jan 2017

Euro-Yearnings? Moving Toward A "Substantive" Registration-Based Trademark Regime, Jane C. Ginsburg

Faculty Scholarship

In Alan Jay Lerner’s lyric, Professor Henry Higgins laments: "Why can’t a woman be more like a man?" Professor Rebecca Tushnet’s provocative article in effect urges that a U.S. trademark should be more like a European Union trademark, at least with respect to the relationship of registration to substantive protection. The article convincingly exposes the current incoherence in U.S. trademark law – a hybrid between “procedural” and “substantive” registration regimes, in which the traditional emphasis on use-based trademark rights undermines the business-planning benefits that flow from registration.

Before elaborating on the similarities between Tushnet’s suggested reforms of U.S. trademark law …


Strategic Law Avoidance Using The Internet: A Short History, Tim Wu Jan 2017

Strategic Law Avoidance Using The Internet: A Short History, Tim Wu

Faculty Scholarship

We are now some twenty years into the story of the Internet's bold challenge to law and the legal system. In the early 2000s, Jack Goldsmith and I wrote Who Controls the Internet, a book that might be understood as a chronicle of some the early and more outlandish stages of the story. Professors Pollman and Barry's excellent article, Regulatory Entrepreneurship, adds to and updates that story with subsequent chapters and a sophisticated analysis of the strategies more recently employed to avoid law using the Internet in some way. While Pollman and Barry's article stands on its own, …


Cyber Strategy & Policy: International Law Dimensions, Matthew C. Waxman Jan 2017

Cyber Strategy & Policy: International Law Dimensions, Matthew C. Waxman

Faculty Scholarship

Important international law questions for formulating cyber strategy and policy include whether and when a cyber-attack amounts to an “act of war,” or, more precisely, an “armed attack” triggering a right of self-defense, and how the international legal principle of “sovereignty” could apply to cyber activities. International law in this area is not settled. There is, however, ample room within existing international law to support a strong cyber strategy, including a powerful deterrent. The answers to many international law questions discussed below depend on specific, case-by-case facts, and are likely to be highly contested for a long time to come. …


Intellectual Property In News? Why Not?, Sam Ricketson, Jane C. Ginsburg Jan 2016

Intellectual Property In News? Why Not?, Sam Ricketson, Jane C. Ginsburg

Faculty Scholarship

This Chapter addresses arguments for and against property rights in news, from the outset of national law efforts to safeguard the efforts of newsgathers, through the various unsuccessful attempts during the early part of the last century to fashion some form of international protection within the Berne Convention on literary and artistic works and the Paris Convention on industrial property. The Chapter next turns to contemporary endeavors to protect newsgatherers against “news aggregation” by online platforms. It considers the extent to which the aggregated content might be copyrightable, and whether, even if the content is protected, various exceptions set out …


"Section 5 And 'Unfair Methods Of Competition': Protecting Competition Or Increasing Uncertainty?", Tim Wu Jan 2016

"Section 5 And 'Unfair Methods Of Competition': Protecting Competition Or Increasing Uncertainty?", Tim Wu

Faculty Scholarship

Since the late 1980s, Section 5 of the FTC Act has come to center on a certain kind of case, the so-called anticompetitive “scheme” featuring extraordinary and nefarious conduct – like gaming a standards process, rigging industry tests, that sort of thing. Deception, fraud, bad-faith and oppressive action are typical. This kind of self-restraint has, to its credit, yielded a focus on cases where the conduct is extraordinary, an anticompetitive intent is obvious and the harm is substantial. At this point, the self-imposed limits on Section 5 enforcement are extensive enough that a critic could fairly accuse the agency of …


Does Google Content Degrade Google Search? Experimental Evidence, Michael Luca, Tim Wu, Sebastian Couvidat, Daniel Frank Jan 2015

Does Google Content Degrade Google Search? Experimental Evidence, Michael Luca, Tim Wu, Sebastian Couvidat, Daniel Frank

Faculty Scholarship

While Google is known primarily as a search engine, it has increasingly developed and promoted its own content as an alternative to results from other websites. By prominently displaying Google content in response to search queries, Google is able to use its dominance in search to gain customers for this content. This may reduce consumer welfare if the internal content is inferior to organic search results. In this paper, we provide a legal and empirical analysis of this practice in the domain of online reviews. We first identify the conditions under which universal search would be considered anticompetitive. We then …


Rethinking Privacy, William H. Simon Jan 2014

Rethinking Privacy, William H. Simon

Faculty Scholarship

Anxiety about surveillance and data mining has led many to embrace implausibly expansive and rigid conceptions of privacy. The premises of some current privacy arguments do not fit well with the broader political commitments of those who make them. In particular, liberals seem to have lost touch with the reservations about privacy expressed in the social criticism of some decades ago. They seem unable to imagine that preoccupation with privacy might amount to a “pursuit of loneliness” or how “eyes on the street” might have reassuring connotations. Without denying the importance of the effort to define and secure privacy values, …


Governing, Exchanging, Securing: Big Data And The Production Of Digital Knowledge, Bernard E. Harcourt Jan 2014

Governing, Exchanging, Securing: Big Data And The Production Of Digital Knowledge, Bernard E. Harcourt

Faculty Scholarship

The emergence of Big Data challenges the conventional boundaries between governing, exchange, and security. It ambiguates the lines between commerce and surveillance, between governing and exchanging, between democracy and the police state. The new digital knowledge reproduces consuming subjects who wittingly or unwittingly allow themselves to be watched, tracked, linked and predicted in a blurred amalgam of commercial and governmental projects. Linking back and forth from consumer data to government information to social media, these new webs of information become available to anyone who can purchase the information. How is it that governmental, commercial and security interests have converged, coincided, …


Sender Side Transmission Rules For The Internet, Tejas N. Narechania, Tim Wu Jan 2014

Sender Side Transmission Rules For The Internet, Tejas N. Narechania, Tim Wu

Faculty Scholarship

Since 1966, the Federal Communications Commission has, one way or another, protected businesses that deliver services over the nation’s communications infrastructure. But in January 2014, the U.S. Court of Appeals for the D.C. Circuit struck down the FCC’s net neutrality rules contained in its 2010 Open Internet Order. FCC Chairman Tom Wheeler has since indicated that he will take up the D.C. Circuit’s invitation to implement rules that, consistent with historic practice, “will meet the court’s test for preventing improper blocking of and discrimination among Internet traffic.”

Chairman Wheeler’s statement invites an obvious question: presuming that the FCC wants …


Self-Defensive Force Against Cyber Attacks: Legal, Strategic And Political Dimensions, Matthew C. Waxman Jan 2013

Self-Defensive Force Against Cyber Attacks: Legal, Strategic And Political Dimensions, Matthew C. Waxman

Faculty Scholarship

When does a cyber attack (or threat of cyber attack) give rise to a right of self-defense – including armed self-defense – and when should it? By "cyber attack" I mean the use of malicious computer code or electronic signals to alter, disrupt, degrade or destroy computer systems or networks or the information or programs on them. It is widely believed that sophisticated cyber attacks could cause massive harm – whether to military capabilities, economic and financial systems, or social functioning – because of modern reliance on system interconnectivity, though it is highly contested how vulnerable the United States and …


Copyright 1992-2012: The Most Significant Development?, Jane C. Ginsburg Jan 2013

Copyright 1992-2012: The Most Significant Development?, Jane C. Ginsburg

Faculty Scholarship

On the occasion of the twentieth anniversary of the Fordham Intellectual Property Law & Policy Conference, its organizer, Professor Hugh Hansen, planned a session on “U.S. Copyright Law: Where Has It Been? Where Is It Going?” and asked me to look back over the twenty years since the conference’s inception in order to identify the most important development in copyright during that period. Of course, the obvious answer is “the Internet,” or “digital media,” whose effect on copyright law has been pervasive. I want to propose a less obvious response, but first acknowledge that digital media and communications have presented …


Speaking Of Moral Rights: A Conversation Between Eva E. Subotnik And Jane C. Ginsburg, Jane C. Ginsburg, Eva E. Subotnik Jan 2012

Speaking Of Moral Rights: A Conversation Between Eva E. Subotnik And Jane C. Ginsburg, Jane C. Ginsburg, Eva E. Subotnik

Faculty Scholarship

A transcribed conversation about moral rights in the digital age — in respect of some of the legal and technological developments that have occurred since Professor Jane Ginsburg's 2001 essay, Have Moral Rights Come of (Digital) Age in the United States?, 19 Cardozo Arts & Ent. L. J. 9 (2001).


Cyber Attacks As "Force" Under Un Charter Article 2(4), Matthew C. Waxman Jan 2011

Cyber Attacks As "Force" Under Un Charter Article 2(4), Matthew C. Waxman

Faculty Scholarship

In a 2010 article in Foreign Affairs, Deputy Secretary of Defense William Lynn revealed that in 2008 the Department of Defense suffered "the most significant breach of U.S. military computers ever" when a flash drive inserted into a US military laptop surreptitiously introduced malicious software into US Central Command's classified and unclassified computer systems. Lynn explains that the US government is developing defensive systems to protect military and civilian electronic infrastructure from intrusions and, potentially worse, disruptions and destruction, and it is developing its own cyber-strategy "to defend the United States in the digital age."

To what extent is …


Is Internet Exceptionalism Dead?, Tim Wu Jan 2011

Is Internet Exceptionalism Dead?, Tim Wu

Faculty Scholarship

Is there such a thing as Internet exceptionalism? If so, just what is the Internet an exception to? It may appear technical, but this is actually one of the big questions of our generation, for the Internet has shaped the United States and the world over the last twenty years in ways people still struggle to understand. The question is not merely academic. The greatest Internet firms can be succinctly defined as those that have best understood what makes the Internet different.


International Issues: Which Country's Law Applies When Works Are Made Available Over The Internet, Jane C. Ginsburg Jan 2010

International Issues: Which Country's Law Applies When Works Are Made Available Over The Internet, Jane C. Ginsburg

Faculty Scholarship

My topic is International Implications, a topic that would not exist but for the Internet. When access to archival materials was on a physical basis, patrons came to the archive and consulted the material on site; the material did not leave the archive, much less get sent overseas. Even digitized materials, if consulted on site, do not present the problems that arise if the archives puts this material on a website, which is accessible around the world, that ubiquity being the default condition ofthe Internet.

Let us consider some problems that might arise and which have international consequences. First of …


Implications Of The Internet For Quasi-Legislative Instruments Of Regulation, Peter L. Strauss Jan 2010

Implications Of The Internet For Quasi-Legislative Instruments Of Regulation, Peter L. Strauss

Faculty Scholarship

It is a quarter century since I began telling my Administrative Law students that they had better be watching the Internet and how agencies of interest to them were using it, as they entered an Information Age career. The changes since then have been remarkable. Rulemaking, where the pace has perhaps been slowest, is now accelerating into the Internet, driven by a President committed to openness and consultation. This paper seeks little more than to point the reader toward the places where she can find the changes and watch them for herself.


Subsidizing Creativity Through Network Design: Zero Pricing And Net Neutrality, Robin S. Lee, Tim Wu Jan 2009

Subsidizing Creativity Through Network Design: Zero Pricing And Net Neutrality, Robin S. Lee, Tim Wu

Faculty Scholarship

Today, through historical practice, there exists a de facto ban on termination fees – also referred to as a “zero-price” rule (Hemphill, 2008) – which forbids an Internet service provider from charging an additional fee to a content provider who wishes to reach that ISP’s customers. The question is whether this zero-pricing structure should be preserved, or whether carriers should be allowed to charge termination fees and engage in other practices that have the effect of requiring payment to reach users. This paper begins with a defense of the de facto zero-price rule currently in existence. We point out that …


Just One Click: The Reality Of Internet Retail Contracting, Ronald J. Mann, Travis Siebeneicher Jan 2008

Just One Click: The Reality Of Internet Retail Contracting, Ronald J. Mann, Travis Siebeneicher

Faculty Scholarship

This Essay explores the enforceability and presence of pro-seller contract terms in internet retail contracts. Analyzing case law on internet contract enforceability and a survey of 500 firms'websites, it demonstrates that even the enforceability of many internet contracts is questionable. It then presents new data that suggest that the prevalence of pro-seller contract terms is far less than usually assumed. It suggests that the benefit of making these terms enforceable is outweighed by the loss of user friendliness required for the necessary interface changes. Finally, it uses fresh statistical analyses to determine what relationship, if any, exists between enforceability, pro-seller …


Recent Developments In Us Copyright Law – Part Ii, Caselaw: Exclusive Rights On The Ebb?, Jane C. Ginsburg Jan 2008

Recent Developments In Us Copyright Law – Part Ii, Caselaw: Exclusive Rights On The Ebb?, Jane C. Ginsburg

Faculty Scholarship

The 1976 Act announces broad exclusive rights, offset by a myriad of specific exemptions, and one wide exception for "fair use." In words and intent, the exclusive rights are capacious, but new technologies may have caused some of the general phrases to become more constraining than might have been expected from a text whose drafters took pains to make forward-looking. Thus, the scope of the reproduction right turns on the meaning of "copy;" the reach of the distribution right on "distribute copies" and "transfer of ownership;" the range of the public performance right on "public" and "perform." Entrepreneurs and users …