Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 108

Full-Text Articles in Law

Sovereignty 2.0, Anupam Chander, Haochen Sun Mar 2022

Sovereignty 2.0, Anupam Chander, Haochen Sun

Vanderbilt Journal of Transnational Law

Digital sovereignty-the exercise of control over the internet-is the ambition of the world's leaders, from Australia to Zimbabwe, seen as a bulwark against both foreign states and foreign corporations. Governments have resoundingly answered first-generation internet law questions of who, if anyone, should regulate the internet. The answer: they all will. Governments now confront second-generation questions--not whether, but how to regulate the internet. This Article argues that digital sovereignty is simultaneously a necessary incident of democratic governance and democracy's dreaded antagonist. As international law scholar Louis Henkin taught, sovereignty can insulate a government's worst ills from foreign intrusion. Assertions of digital …


The Regulation Of Foreign Platforms, Ganesh Sitaraman Jan 2022

The Regulation Of Foreign Platforms, Ganesh Sitaraman

Vanderbilt Law School Faculty Publications

In August 2020, the Trump Administration issued twin executive orders banning tech platforms TikTok and WeChat from the United States. These were not the first actions taken by the Trump Administration against Chinese tech platforms. But more than any other, the ban on TikTok sparked immediate outrage, confusion, and criticism.

This Article offers a new framework for thinking about national security restrictions on foreign tech platforms. A growing body of scholarship draws on principles from regulated industries, infrastructure industries, and public utilities to show how the regulation of tech platforms is not only viable but also has significant precedent and …


Unilateral Cyber Sanctions: Between Questioned Legality And Normative Value, Iryna Bogdanova, Maria Vasquez Callo-Muller Oct 2021

Unilateral Cyber Sanctions: Between Questioned Legality And Normative Value, Iryna Bogdanova, Maria Vasquez Callo-Muller

Vanderbilt Journal of Transnational Law

The current legal vacuum regarding binding international norms regulating malicious conduct in cyberspace has paved the way for the emergence of a unilateral tool: cyber sanctions. They have already been introduced by the United States, the European Union, and the United Kingdom. Notwithstanding their obvious importance, their interrelations with international law- especially international economic law-have remained largely unexplored in academic research. This gap is perplexing given the fact that the existing unilateral cyber sanctions have been formulated in such a way as to be prone to misuse. In particular, they bear a significant potential to disrupt economic relations and undermine …


Data Autonomy, Cesare Fracassi, William Magnuson Mar 2021

Data Autonomy, Cesare Fracassi, William Magnuson

Vanderbilt Law Review

In recent years, “data privacy” has vaulted to the forefront of public attention. Scholars, policymakers, and the media have, nearly in unison, decried the lack of data privacy in the modern world. In response, they have put forth various proposals to remedy the situation, from the imposition of fiduciary obligations on technology platforms to the creation of rights to be forgotten for individuals. All these proposals, however, share one essential assumption: we must raise greater protective barriers around data. As a scholar of corporate finance and a scholar of corporate law, respectively, we find this assumption problematic. Data, after all, …


The New "Web-Stream" Of Commerce: Amazon And The Necessity Of Strict Products Liability For Online Marketplaces, Margaret E. Dillaway Jan 2021

The New "Web-Stream" Of Commerce: Amazon And The Necessity Of Strict Products Liability For Online Marketplaces, Margaret E. Dillaway

Vanderbilt Law Review

Technology company Amazon has actively transformed into an e-commerce giant over the last two decades. Once a simple online bookstore, Amazon now boasts an ever-expanding identity as global cloud computing provider, major player in artificial intelligence, brick-and-mortar grocery store, and producer of original video content. At its roots, the company remains focused on e-commerce—its multibillion-dollar online marketplace hosts a massive digital space for commerce worldwide where customers can order “anything, with a capital A.”

Amazon derives many of its sales from third-party vendors who list products on the company’s website, Amazon.com. In this broadening chain of distribution for online retail, …


Antitrust's High-Tech Exceptionalism, Rebecca H. Allensworth Jan 2021

Antitrust's High-Tech Exceptionalism, Rebecca H. Allensworth

Vanderbilt Law School Faculty Publications

American competition policy has four big problems: Amazon, Apple, Facebook, and Google. These companies each reign over a sector of the digital marketplace, controlling both the consumer experience and the possibility of competitive entry. This Essay argues that the conventional account of how antitrust law allowed this consolidation of market power - that it failed to evolve to address the market realities of the technology sector-is incomplete. Not only did courts fail to adapt antitrust law from its smoke-stack roots, but they gave big tech special dispensation under traditional antitrust doctrine. Swayed by prevailing utopic views about digital markets in …


Regulating Data Breaches: A Data Superfund Statute, Kyle Mckibbin Jan 2021

Regulating Data Breaches: A Data Superfund Statute, Kyle Mckibbin

Vanderbilt Journal of Entertainment & Technology Law

Collecting and processing large amounts of personal data has become a fundamental feature of the modern economy. Personal data, combined with good data analytics, are valuable to businesses as they can provide highly detailed information about individual preferences and behaviors. This data collection can also be valuable to the consumer as it generates innovative products and digital platforms. The era of big data promises great rewards, but it is not without its costs. Data breaches, or the release of personal data into unwanted hands, are pervasive and increasingly massive in scale. Despite the personal privacy harm caused by data breaches, …


Data Imperialism: The Gdpr's Disastrous Impact On Africa's E-Commerce Markets, Cara Mannion Jan 2020

Data Imperialism: The Gdpr's Disastrous Impact On Africa's E-Commerce Markets, Cara Mannion

Vanderbilt Journal of Transnational Law

The European Union (EU) recently passed the General Data Protection Regulation--a sweeping regulatory framework that sets a new global standard for the collection, storage, and use of personal data. To ensure far-reaching compliance with the GDPR, the EU has adopted a strict take-it-or-leave-it approach--countries that wish to engage with digital users in the EU must either comply with the GDPR's expansive data obligations or risk losing access to the world's largest trading block.

This presents significant obstacles for several African nations. Notably, no African country currently has domestic laws that comply with the GDPR. Even if they did, several African …


People V. Robots: A Roadmap For Enforcing California's New Online Bot Disclosure Act, Barry Stricke Jan 2020

People V. Robots: A Roadmap For Enforcing California's New Online Bot Disclosure Act, Barry Stricke

Vanderbilt Journal of Entertainment & Technology Law

Bots are software applications that complete tasks automatically. A bot's communication is disembodied, so humans can mistake it for a real person, and their misbelief can be exploited by the bot owner to deploy malware or phish personal data. Bots also pose as consumers posting online product reviews or spread (often fake) news, and a bot owner can coordinate multiple social-network accounts to trick a network's "trending" algorithms, boosting the visibility of specific content, sowing and exacerbating controversy, or fabricating an impression of mass individual consensus. California's 2019 Bolstering Online Transparency Act (the "CA Bot Act') imposes conspicuous disclosure requirements …


The Price Of Closing The Value Gap: How The Music Industry Hacked Eu Copyright Reform, Annemarie Bridy Jan 2020

The Price Of Closing The Value Gap: How The Music Industry Hacked Eu Copyright Reform, Annemarie Bridy

Vanderbilt Journal of Entertainment & Technology Law

Sweeping changes are coming to copyright law in the European Union. Following four years of negotiations, the European Parliament in April 2019 approved the final text of the Digital Single Market (DSM) Directive. The new directive contains provisions for enhancing cross-border access to content available through digital subscription services, enabling new uses of copyrighted works for education and research, and, most controversially, "clarifying" the role of online services in the distribution of copyrighted works.

Article 17 of the DSM Directive is directed to the last of these goals. It was designed to address the so-called value gap-the music industry's longstanding …


The Very Brief History Of Decentralized Blockchain Governance, Michael Abramowicz Jan 2020

The Very Brief History Of Decentralized Blockchain Governance, Michael Abramowicz

Vanderbilt Journal of Entertainment & Technology Law

A new form of blockchain governance involving the use of formal games that incentivize participants to identify focal resolutions to normative questions is emerging. This symposium contribution provides a brief survey of the literature proposing and critiquing the use of such mechanisms of decentralized decision-making, and it evaluates early laboratory and real-world experiments with this approach.


Building Bridges: International Trade Law, Internet Governance, And The Regulation Of Data Flows, Neha Mishra Jan 2019

Building Bridges: International Trade Law, Internet Governance, And The Regulation Of Data Flows, Neha Mishra

Vanderbilt Journal of Transnational Law

The regulation of internet data flows touches upon various distinct disciplines including internet governance and international trade law. In internet governance, three fundamental principles, namely, internet openness, internet security, and internet privacy apply to regulation of internet data flows. This Article argues that internet privacy and security, when implemented in a reasoned and transparent manner by different stakeholders, enable internet openness--thus, challenging the dominant perspective that cybersecurity and privacy requirements constrain the free flow of data. Further, this Article introduces a unique perspective by arguing that these three principles (notwithstanding their nonbinding nature) play an important role in applying trade …


Service Of Process Via Social Media: Exploring The Use Of Social Media Platforms To Provide Notice To Defendants In Civil Cases In Belgium, Cedric Vanleenhove Jan 2019

Service Of Process Via Social Media: Exploring The Use Of Social Media Platforms To Provide Notice To Defendants In Civil Cases In Belgium, Cedric Vanleenhove

Vanderbilt Journal of Entertainment & Technology Law

In common law systems, there has recently been a trend to permit plaintiffs to serve process on defendants through social media networks. This trend raises the following question: Is this form of service also beneficial in civil law countries-in particular, Belgium? To answer this question, this Article analyzes the conditions under which this type of service has been allowed by US courts, where most of the new development has occurred. This Article concludes that social media service may be a valuable additional means of notice when the defendant does not have a known address. In such circumstances, Belgian law currently …


Data At The Docks: Modernizing International Trade Law For The Digital Economy, Andrew D. Mitchell, Neha Mishra Jan 2018

Data At The Docks: Modernizing International Trade Law For The Digital Economy, Andrew D. Mitchell, Neha Mishra

Vanderbilt Journal of Entertainment & Technology Law

The World Trade Organization (WTO) has been slow so far in responding to the various challenges arising from the integration of electronic commerce into cross-border trading activities. This slow response in the multilateral system is largely attributable to the complex, multifaceted nature of digital trade or electronic commerce, coupled with the conflict among countries on issues of Internet regulation and digital development. Nonetheless, international trade agreements, particularly at the WTO, play an important role in the creation of a secure, predictable, and trustworthy global regulatory framework for digital trade, and therefore, need to be reformed in a timely and meaningful …


Virtual Reality Exceptionalism, Gilad Yadin Jan 2018

Virtual Reality Exceptionalism, Gilad Yadin

Vanderbilt Journal of Entertainment & Technology Law

Virtual reality is here. In just a few years, the technology moved from science fiction to the Internet, from specialized research facilities to living rooms. These new virtual reality environments are connected, collaborative, and social-built to deliver a subjective psychological effect that believably simulates spatial physical reality. Cognitive research shows that this effect is powerful enough that virtual reality users act and interact in ways that mirror real-world social and moral norms and behavior.

Contemporary cyberlaw theory is largely based on the notion that cyberspace is exceptional enough to warrant its own specific rules. This premise, a descendant of early …


The Bot Legal Code: Developing A Legally Compliant Artificial Intelligence, Edmund Mokhtarian Jan 2018

The Bot Legal Code: Developing A Legally Compliant Artificial Intelligence, Edmund Mokhtarian

Vanderbilt Journal of Entertainment & Technology Law

The advent of sophisticated artificial intelligence (AI) agents, or bots, raises the question: How do we ensure that these bots act appropriately? Within a decade, AI will be ubiquitous, with billions of active bots influencing nearly every industry and daily activity. Given the extensiveness of AI activity, it will be nearly impossible to explicitly program bots with detailed instructions on permitted and prohibited actions, particularly as they face unpredictable, novel situations. Rather, if risks to humans are to be mitigated, bots must have some overriding moral or legal compass--a set of "AI Laws"--to allow them to adapt to whatever scenarios …


Flagging The Middle Ground Of The Right To Be Forgotten: Combatting Old News With Search Engine Flags, Hannah L. Cook Jan 2017

Flagging The Middle Ground Of The Right To Be Forgotten: Combatting Old News With Search Engine Flags, Hannah L. Cook

Vanderbilt Journal of Entertainment & Technology Law

Incomplete and outdated news articles present an increasing problem for individuals who find themselves stigmatized on the basis of truthful but misleading reports. This Article proposes a moderate solution between the European right to be forgotten and the protectionless status quo in the United States. It proposes a flagging system, administered through Federal Trade Commission adjudications, where links to articles whose private harms outweigh their public benefits are flagged in the search results of an individual. This flag will help combat psychological biases that may cause decisionmakers to place an irrational weight on these articles while preserving the ability of …


Reshaping Ability Grouping Through Big Data, Yoni H. Carmel, Tammy H. Ben-Shahar Jan 2017

Reshaping Ability Grouping Through Big Data, Yoni H. Carmel, Tammy H. Ben-Shahar

Vanderbilt Journal of Entertainment & Technology Law

This Article examines whether incorporating data mining technologies in education can promote equality. Following many other spheres in life, big data technologies that include creating, collecting, and analyzing vast amounts of data about individuals are increasingly being used in schools. This process has already elicited widespread interest among scholars, parents, and the public at large. However, this attention has largely focused on aspects of student privacy and data protection and has overlooked the profound effects data mining may have on educational equality. This Article analyzes the effects of data mining on education equality by focusing on one educational practice--ability grouping--that …


Taming The Internet Pitchfork Mob: Online Public Shaming, The Viral Media Age, And The Communications Decency Act, Kristine L. Gallardo Jan 2017

Taming The Internet Pitchfork Mob: Online Public Shaming, The Viral Media Age, And The Communications Decency Act, Kristine L. Gallardo

Vanderbilt Journal of Entertainment & Technology Law

Accompanying the explosive growth of the Internet, one lamentable trend is the rise of online public shaming. While online public shaming may positively incentivize individuals to modify their behavior in accordance with socially acceptable norms, there has also been the emergence of an online "pitchfork mob" that can have a real impact on individuals' livelihoods and overall well being. Due to the lack of legal remedies available to victims of certain types of online shaming, this Note suggests that web hosts are empowered by the expansive protections of the Communications Decency Act to develop and implement policies to curb the …


The Shaky Ground Of The Right To Be Delisted, Miquel Peguera Jan 2016

The Shaky Ground Of The Right To Be Delisted, Miquel Peguera

Vanderbilt Journal of Entertainment & Technology Law

It has long been discussed whether individuals should have a "right to be forgotten" online to suppress old information that could seriously interfere with their privacy and data protection rights. In the landmark case of Google Spain v. Agencia Espafiola de Proteccion de Datos, the Court of Justice of the European Union (CJEU) addressed the particular question of whether, under EU Data Protection Law, individuals have a right to have links delisted from the list of search results in searches made on the basis of their name. It found that they do have this right--which can be best described as …


The Lost Precedent Of The Reverse Doctrine Of Equivalents, Samuel F. Ernst Jan 2016

The Lost Precedent Of The Reverse Doctrine Of Equivalents, Samuel F. Ernst

Vanderbilt Journal of Entertainment & Technology Law

Proponents of legislative patent reform argue that the current patent system perversely impedes true innovation in the name of protecting a vast web of patented inventions, the majority of which are never even commercialized for the benefit of the public. Opponents of such legislation argue that comprehensive, prospective patent reform legislation would harm the incentive to innovate more than it would curb the vexatious practices of non-practicing entities. But while the" Innovation Act" wallows in Congress, there is a common law tool to protect innovation from the patent thicket lying right under our noses: the reverse doctrine of equivalents. Properly …


Lenz V. Universal: A Call To Reform Section 512(F) Of The Dmca And To Strengthen Fair Use, Marc J. Randazza Jan 2016

Lenz V. Universal: A Call To Reform Section 512(F) Of The Dmca And To Strengthen Fair Use, Marc J. Randazza

Vanderbilt Journal of Entertainment & Technology Law

Under 17 U.S.C. § 512(f) of the Digital Millennium Copyright Act (DMCA), those who issue materially false takedown notices are liable for damages. However, Section 512(f) has not effectively protected fair use. Currently, the DMCA issuer only has to prove he considered fair use before issuing a takedown notice, but faces no liability for actually taking action against fair use. The outcome of the recent Ninth Circuit Court of Appeals case Lenz v. Universal shows the flaws in the language of the DMCA. This Article calls for a mild adjustment to Section 512(f) for the purpose of protecting fair use …


The Supreme Court Performs The Right Notes For Dish In Aereo, Lee B. Burgunder Jan 2015

The Supreme Court Performs The Right Notes For Dish In Aereo, Lee B. Burgunder

Vanderbilt Journal of Entertainment & Technology Law

In American Broadcasting Companies, Inc. v. Aereo, Inc., the Supreme Court addressed whether a company publicly performs copyrighted works when it allocates separate antennas on its property to customers who individually decide what shows they each want to watch. This case was hotly debated because it provided a new opportunity for the Court to identify the responsible actors when copyrighted materials are transmitted over the Internet. Unfortunately, the Court ruled against Aereo without clearly articulating governing standards that might inform future decisions, relying instead on what the dissent called a "looks-like-cable-TV" approach. The deficiency has already provided additional ammunition for …


Initial Interest Confusion "Internet Troika" Abandoned? A Critical Look At Initial Interest Confusion As Applied Online, Connie D. Nichols Jan 2015

Initial Interest Confusion "Internet Troika" Abandoned? A Critical Look At Initial Interest Confusion As Applied Online, Connie D. Nichols

Vanderbilt Journal of Entertainment & Technology Law

The Ninth Circuit's opinion in Brookfield Communications, Inc. v. West Coast Entertainment Corp. seemingly created a standard to be applied in trademark infringement cases on the Internet. Despite the cautions contained within the Ninth Circuit's holding, Brookfield ushered in an era in which many courts placed emphasis on three factors of the "likelihood of confusion" test finding initial interest confusion in many online infringement cases based solely on these three factors. For over a decade, inconsistent application within the Ninth Circuit and other jurisdictions created a disjointed body of case law on initial interest confusion online. The Ninth Circuit's opinion …


Domain Name Allocation And Government Super-Prioritization, Heather A. Forrest Jan 2015

Domain Name Allocation And Government Super-Prioritization, Heather A. Forrest

Vanderbilt Journal of Entertainment & Technology Law

Governments' growing awareness of the Domain Name System (DNS), the Internet Corporation for Assigned Names and Numbers (ICANN), and its stewardship of DNS policy development fuel recent attempts to steer Internet domain name allocation toward policies that prioritize government interests ahead of all other rights and interests, including trademark rights. As the DNS expands, the top level in its hierarchical structure (the level of domains such as ".com" and ".uk") assumes the characteristics and attributes, and therefore also the conflicts and challenges, of its second level (the level of public-registered names). This Article argues that these developments necessitate a new, …


Who Is Reading Whom Now: Privacy In Education From Books To Moocs, Jules Polonetsky, Omer Tene Jan 2015

Who Is Reading Whom Now: Privacy In Education From Books To Moocs, Jules Polonetsky, Omer Tene

Vanderbilt Journal of Entertainment & Technology Law

This Article is the most comprehensive study to date of the policy issues and privacy concerns arising from the surge of ed tech innovation. It surveys the burgeoning market of ed tech solutions, which range from free Android and iPhone apps to comprehensive learning management systems and digitized curricula delivered via the Internet. It discusses the deployment of big data analytics by education institutions to enhance student performance, evaluate teachers, improve education techniques, customize programs, and better leverage scarce resources to optimize education results.

This Article seeks to untangle ed tech privacy concerns from the broader policy debates surrounding standardization, …


Authors, Online, Daniel J. Gervais Jan 2015

Authors, Online, Daniel J. Gervais

Vanderbilt Law School Faculty Publications

The fate of professional creators is a major cultural issue. While specific copyright rules are obviously contingent and should be adapted to the new realities of online distribution and easy reuse, professional authorship remains necessary. I also believe that to be a professional author, creators need time, which, in turn, does require some form of payment. We need healthy financial flows to allow professional authors to make a decent, market-based living. This requires a move away from one-size-fits-all copyright and the resulting "tug of norms" that requires a shift of the entire policy package to the benefit of one category …


Invisible Labor, Invisible Play: Online Gold Farming And The Boundary Between Jobs And Games, Julian Dibbell Jan 2015

Invisible Labor, Invisible Play: Online Gold Farming And The Boundary Between Jobs And Games, Julian Dibbell

Vanderbilt Journal of Entertainment & Technology Law

When does work become play and play become work? Court shave considered the question in a variety of economic contexts, from student athletes seeking recognition as employees to professional blackjack players seeking to be treated by casinos just like casual players. Here, this question is applied to a relatively novel context: that of online gold farming, a gray-market industry in which wage-earning workers, largely based in China, are paid to play fantasy massively multiplayer online games (MMOs) that reward them with virtual items that their employers sell for profit to the same games' casual players. Gold farming is clearly a …


Legal Phantoms In Cyberspace: The Problematic Status Of Information As A Weapon And A Target Under International Humanitarian Law, Jack M. Beard Jan 2014

Legal Phantoms In Cyberspace: The Problematic Status Of Information As A Weapon And A Target Under International Humanitarian Law, Jack M. Beard

Vanderbilt Journal of Transnational Law

Reports of state-sponsored harmful cyber intrusions abound. The prevailing view among academics holds that if the effects or consequences of such intrusions are sufficiently damaging, international humanitarian law (IHL) should generally govern them--and recourse to armed force may also be justified against states responsible for these actions under the jus ad bellum. This Article argues, however, that there are serious problems and perils in relying on analogies with physical armed force to extend these legal regimes to most events in cyberspace. Armed conflict models applied to the use of information as a weapon and a target are instead likely to …


Trading Rabbit Ears For Wi-Fi: Aereo, The Public Performance Right, And How Broadcasters Want To Control The Business Of Internet Tv, Jacob Marshall Jan 2014

Trading Rabbit Ears For Wi-Fi: Aereo, The Public Performance Right, And How Broadcasters Want To Control The Business Of Internet Tv, Jacob Marshall

Vanderbilt Journal of Entertainment & Technology Law

Aereo, a start-up company that allows consumers to stream free, over-the-air broadcasts to their phones and computers, seems rather innocuous. Yet the major broadcasting networks have attempted to shut Aereo down since its inception, claiming that Aereo infringes on their copyright. Aereo claims that its unique technology--where each user is assigned their own, individual antenna--ensures that Aereo does not infringe on the broadcasters' public performance rights. The United States Supreme Court has granted certiorari on the matter. The broadcasters are approaching the case as an existential battle, claiming that Aereo threatens retransmission fees, licensing fees broadcasters collect from cable companies. …