Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 50

Full-Text Articles in Law

Table Of Contents Jan 2022

Table Of Contents

Seattle University Law Review

Table of Contents


Administrative Truth: Comments On Cortez’S Information Mischief, David Thaw Jan 2019

Administrative Truth: Comments On Cortez’S Information Mischief, David Thaw

Articles

This short essay responds to Professor Nathan Cortez’s argument describing an emerging “information policy” reflecting on the practices of President Donald J. Trump’s executive administration (the “Trump Administration”) regarding the development, release, and management of official information. Professor Cortez argues that viewed holistically, this information policy suggests a shift toward the use of information practices by administrative agencies for purposes other than “neutral principles” and rather focusing on a “more cynical [use] of government information.”

This argument may be well-founded, and the Trump Administration certainly has been criticized widely for the relationship between its public statements and widespread media interpretation …


Gandhi’S Prophecy: Corporate Violence And A Mindful Law For Bhopal, Nehal A. Patel Dec 2015

Gandhi’S Prophecy: Corporate Violence And A Mindful Law For Bhopal, Nehal A. Patel

Nehal A. Patel

AbstractOver thirty years have passed since the Bhopal chemical disaster began,and in that time scholars of corporate social responsibility (CSR) havediscussed and debated several frameworks for improving corporate responseto social and environmental problems. However, CSR discourse rarelydelves into the fundamental architecture of legal thought that oftenbuttresses corporate dominance in the global economy. Moreover, CSRdiscourse does little to challenge the ontological and epistemologicalassumptions that form the foundation for modern economics and the role ofcorporations in the world.I explore methods of transforming CSR by employing the thought ofMohandas Gandhi. I pay particular attention to Gandhi’s critique ofindustrialization and principle of swadeshi (self-sufficiency) …


Congressional Cybersecurity Oversight: Who’S Who And How It Works, Lawrence J. Trautman Sep 2015

Congressional Cybersecurity Oversight: Who’S Who And How It Works, Lawrence J. Trautman

Lawrence J. Trautman Sr.

Cybersecurity remains perhaps the greatest challenge to the economic and physical well being of governments, individuals, and business worldwide. During recent months the United States has witnessed many disruptive and expensive cyber breaches. No single U.S. governmental agency or congressional committee maintains primary responsibility for the numerous issues related to cybersecurity. Good oversight stands at the core of good government. Oversight is Congress’s way of making sure that the administration is carrying out federal law in the way Congress intended. So many aspects of cybersecurity have the potential for use by: terrorists; by foreign entities as a tool to conduct …


The Privacy Dilemma In Digital Arrestee Mug Shots Under The Foia 7(C) And State And Local Policy Recommendations, Ahad Syed Aug 2015

The Privacy Dilemma In Digital Arrestee Mug Shots Under The Foia 7(C) And State And Local Policy Recommendations, Ahad Syed

Ahad Syed

This Article examines the purpose and interpretation by courts of Freedom of Information Act’s 7(C) Exemption. Specifically, the Article sets out to unravel the current federal circuit court split over Exemption 7(C) by examining its application to the digital privacy dilemma as applied to arrestee photographs, commonly known as “mug shots.” Automated data-scraping programs continuously scour the internet, reaping, replicating, and reposting photographs of arrestees who may or may not have had charges dismissed in order to shame them into paying website owners for removal. While other commentators have argued for state law penalizing pay-to-remove mug shot websites only, this …


The Evolution Of Internet Service Providers From Partners To Adversaries: Tracking Shifts In Interconnection Goals And Strategies In The Internet’S Fifth Generation, Rob Frieden Jul 2015

The Evolution Of Internet Service Providers From Partners To Adversaries: Tracking Shifts In Interconnection Goals And Strategies In The Internet’S Fifth Generation, Rob Frieden

Rob Frieden

At the Internet’s inception, carriers providing the bit switching and transmission function largely embraced expanding connections and users as a primary service goal. These ventures refrained from metering traffic and charging for carriage based on the assumption that traffic volumes roughly matched, or that traffic measurement was not worth the bother in light of external funding from government grants. Most Internet Service Providers (“ISPs”) bartered network access through a process known as peering in lieu of metering traffic and billing for network use. As governments removed subsidies and commercial carriers invested substantial funds to build larger and faster networks, identifying …


Déjà Vu All Over Again: Questions And A Few Suggestions On How The Fcc Can Lawfully Regulate Internet Access, Rob Frieden Jul 2015

Déjà Vu All Over Again: Questions And A Few Suggestions On How The Fcc Can Lawfully Regulate Internet Access, Rob Frieden

Rob Frieden

This paper will examine the FCC’s March, 2015 Open Internet Order with an eye to assessing whether and how the Commission can successfully defend its decision in an appellate court. On two prior occasions, the FCC failed to convince a reviewing court that proposed regulatory safeguards do not unlawfully impose common carrier duties on private carriers. The Commission now has opted to reclassify broadband Internet access as common carriage, a decision sure to trigger a third court appeal. The FCC Open Internet Order offers several, possibly contradictory, justifications for its decision to apply Title II of the Communications Act, subject …


The New Wild West: Preventing Money Laundering In The Bitcoin Network, Kavid Singh Jan 2015

The New Wild West: Preventing Money Laundering In The Bitcoin Network, Kavid Singh

Kavid Singh

Bitcoin is the most popular online decentralized currency in the world. Created by an enigmatic figure, Satoshi Nakamoto, in 2009, its propagation and use has caused heated controversy. On the legal side of its use, businesses both large and small have started to accept bitcoins as a form of payment. On the illegal side of its use, large quantities of bitcoins worth hundreds of millions of dollars have been stolen from businesses and large Bitcoin currency exchanges. The aim of this article is to introduce workable federal regulation that will help deter money laundering, a pervasive problem in the world …


Law Abiding Drones, Henry H. Perritt Jr., Eliot O. Sprague Dec 2014

Law Abiding Drones, Henry H. Perritt Jr., Eliot O. Sprague

Henry H. Perritt, Jr.

Law Abiding Drones


One Hundred Nos: An Empirical Analysis Of The First 100 Denials Of Institution For Inter Partes And Covered Business Method Patent Reviews, Jonathan R. K. Stroud, Jarrad Wood Sep 2014

One Hundred Nos: An Empirical Analysis Of The First 100 Denials Of Institution For Inter Partes And Covered Business Method Patent Reviews, Jonathan R. K. Stroud, Jarrad Wood

Jonathan R. K. Stroud

Tasked in 2011 with creating three powerful new patent review trial regimes, the U.S. Patent and Trademark Office—through the efforts of their freshly empowered quasi-judicial body, the Patent Trial and Appeals Board—set to creating a fast-paced trial with minimal discovery and maximum efficiency. In the first two years of existence, the proceedings have proved potent, holding unpatentable many of the claims that reach decisions on the merits. Yet a small subsection of petitions never make it past the starting gate, resulting in wasted time and effort on the parts of petitioners—and likely sighs of relief from the rights-holders. Parties on …


Regulation Of Chemical Risks: Lessons For Tsca Reform From Canada And The European Union, Adam Abelkop, John D. Graham Sep 2014

Regulation Of Chemical Risks: Lessons For Tsca Reform From Canada And The European Union, Adam Abelkop, John D. Graham

Adam Abelkop

The United States Congress is considering reform of the Toxic Substances Control Act (TSCA) of 1976. This Article compares recent reforms in Europe and Canada in order to draw lessons for TSCA reform. In 2006, the European Union enacted the Registration, Evaluation, Authorization, and Restriction of Chemicals (REACH) regulation while Canada used existing authority under the Canadian Environmental Protection Act (CEPA) of 1999 to initiate the 2006 Chemicals Management Plan (CMP). Focusing on the tens of thousands of industrial chemicals now in use in the US, we offer several suggestions for TSCA reform based on the European and Canadian experiences. …


The Costs And Benefits Of Regulatory Intervention In Internet Service Provider Interconnection Disputes: Lessons From Broadcaster-Cable Retransmission Consent Negotiations, Rob Frieden Aug 2014

The Costs And Benefits Of Regulatory Intervention In Internet Service Provider Interconnection Disputes: Lessons From Broadcaster-Cable Retransmission Consent Negotiations, Rob Frieden

Rob Frieden

This paper considers what limited roles the FCC may lawfully assume to ensure timely and fair interconnection and compensation agreements in the Internet ecosystem. The paper examines the FCC’s limited role in broadcaster-cable television retransmission consent negotiations with an eye toward assessing the applicability of this model. The FCC explicitly states that it lacks jurisdiction to prescribe terms, or to mandate binding arbitration. However, it recently interpreted its statutory authority to ensure “good faith” negotiations as allowing it to constrain broadcaster negotiating leverage by prohibiting multiple operators, having the largest market share, from joining in collective negotiations with cable operators. …


Drones, Henry H. Perritt Jr., Eliot O. Sprague Apr 2014

Drones, Henry H. Perritt Jr., Eliot O. Sprague

All Faculty Scholarship

Abstract

Drone technology is evolving rapidly. Microdrones—what the FAA calls “sUAS”—already on the market at the $1,000 level, have the capability to supplement manned helicopters in support of public safety operations, news reporting, and powerline and pipeline patrol, when manned helicopter support is infeasible, untimely, or unsafe.

Larger drones–"machodrones”–are not yet available outside battlefield and counterterrorism spaces. Approximating the size of manned helicopters, but without pilots, or with human pilots being optional, their design is still in its infancy as designers await greater clarity in the regulatory requirements that will drive airworthiness certification.

This article evaluates drone technology and design …


Drones, Henry H. Perritt Jr., Eliot O. Sprague Apr 2014

Drones, Henry H. Perritt Jr., Eliot O. Sprague

Henry H. Perritt, Jr.

Abstract
Drone technology is evolving rapidly. Microdrones—what the FAA calls “sUAS”—already on the market at the $1,000 level, have the capability to supplement manned helicopters in support of public safety operations, news reporting, and powerline and pipeline patrol, when manned helicopter support is infeasible, untimely, or unsafe.
Larger drones–"machodrones”–are not yet available outside battlefield and counterterrorism spaces. Approximating the size of manned helicopters, but without pilots, or with human pilots being optional, their design is still in its infancy as designers await greater clarity in the regulatory requirements that will drive airworthiness certification.
This article evaluates drone technology and design …


Federal And State Authority For Network Neutrality And Broadband Regulation, Tejas N. Narechania Mar 2014

Federal And State Authority For Network Neutrality And Broadband Regulation, Tejas N. Narechania

Tejas N. Narechania

For the second time in less than four years, the D.C. Circuit has rebuffed the Federal Communications Commission’s attempt at imposing network neutrality rules on internet traffic. But in so doing, the D.C. Circuit affirmed the FCC’s theory of jurisdiction based on section 706 of the Telecommunications Act of 1996. This ruling has the significant effect of transforming a questionable source of authority into what may become the Commission’s most significant font of regulatory power.

Surprisingly, section 706 seems to give the Commission the power to implement a slightly revised set of network neutrality rules. By narrowing the scope of …


C(R)Ap And Trade: The Brave New World Of Non-Point Source Nutrient Trading And Using Lessons From Greenhouse Gas Markets To Make It Work, Victor B. Flatt Feb 2014

C(R)Ap And Trade: The Brave New World Of Non-Point Source Nutrient Trading And Using Lessons From Greenhouse Gas Markets To Make It Work, Victor B. Flatt

Victor B Flatt

After several decades of improvement, water quality in the United States is getting worse, and the problem is primarily caused by run-off from non-point sources, such as farms and urban development. These non-point sources have never had regulatory mandates in the Clean Water Act, and have proven very difficult to control. With little likelihood of comprehensive statutory changes, the EPA and the states that administer the Clean Water Act have looked to other regulatory means to address this problem. One of the most prominent has been the use of markets in pollution (particularly for nutrient pollution from run-off) to provide …


The Eye Of The Beholder: Participation And Impact In Telecommunications (De)Regulation, Dorit Reiss Jan 2014

The Eye Of The Beholder: Participation And Impact In Telecommunications (De)Regulation, Dorit Reiss

Dorit R. Reiss

The California Public Utilities Commission addressed both pricing deregulation and universal service in telecommunications during the last decade. Both decisions had a similar cast of characters, and similarly elaborate processes. In relation to price deregulation, the utilities positions were accepted on every issue addressed; in relation to universal service, consumer organizations’ positions were accepted in about 60% of the issues. This article tells the story of how those decisions were made, and examines the reasons for the difference in impact. The article examines and reject an explanation of capture; accepts in part a focus on the influence of the commissioner …


The Scored Society: Due Process For Automated Predictions, Danielle Keats Citron, Frank A. Pasquale Jan 2014

The Scored Society: Due Process For Automated Predictions, Danielle Keats Citron, Frank A. Pasquale

Danielle Keats Citron

Big Data is increasingly mined to rank and rate individuals. Predictive algorithms assess whether we are good credit risks, desirable employees, reliable tenants, valuable customers—or deadbeats, shirkers, menaces, and “wastes of time.” Crucial opportunities are on the line, including the ability to obtain loans, work, housing, and insurance. Though automated scoring is pervasive and consequential, it is also opaque and lacking oversight. In one area where regulation does prevail—credit—the law focuses on credit history, not the derivation of scores from data.

Procedural regularity is essential for those stigmatized by “artificially intelligent” scoring systems. The American due process tradition should inform …


Will More, Better, Cheaper, And Faster Monitoring Improve Environmental Management?, Ryan P. Kelly Jan 2014

Will More, Better, Cheaper, And Faster Monitoring Improve Environmental Management?, Ryan P. Kelly

Ryan P Kelly

Two critical problems in environmental management are a lack of primary data and the difficulty of assessing the environmental impacts of human activities. Producing the information necessary to address these twin challenges is often difficult and expensive, which impedes decisionmaking in environmental management. I focus here on the possibility of making data collection more powerful and more cost-effective with a suite of analyses made tractable by emerging technology for genetic analysis. More, better, cheaper, and faster information about the planet’s living resources promises to influence a wide range of legal and policy processes—from Clean Water Act compliance and related public …


Enlightened Regulatory Capture, David Thaw Jan 2014

Enlightened Regulatory Capture, David Thaw

Articles

Regulatory capture generally evokes negative images of private interests exerting excessive influence on government action to advance their own agendas at the expense of the public interest. There are some cases, however, where this conventional wisdom is exactly backwards. This Article explores the first verifiable case, taken from healthcare cybersecurity, where regulatory capture enabled regulators to harness private expertise to advance exclusively public goals. Comparing this example to other attempts at harnessing industry expertise reveals a set of characteristics under which regulatory capture can be used in the public interest. These include: 1) legislatively-mandated adoption of recommendations by an advisory …


Sender Side Transmission Rules For The Internet, Tejas N. Narechania, Tim Wu Dec 2013

Sender Side Transmission Rules For The Internet, Tejas N. Narechania, Tim Wu

Tejas N. Narechania

In January 2014, the U.S. Court of Appeals for the D.C. Circuit struck down the FCC's 2010 Open Internet Order, which contained the Commission's net neutrality rules. The Commission has since indicated that it will take up the D.C. Circuit's invitation to implement rules that, consistent with historic practice, meet the court’s test for preventing improper blocking and discrimination of Internet traffic. In this paper, we consider the Commission's options for a path forward under Title II of the Communications Act. We find that the FCC has at least two available paths. The first is predominantly legal: By adopting the …


U.S. Government Counterterrorism Asset Freezes: Regulatory Seizures In A Digital Age Of Terrorism, Adam S. Wallwork Aug 2013

U.S. Government Counterterrorism Asset Freezes: Regulatory Seizures In A Digital Age Of Terrorism, Adam S. Wallwork

Adam S Wallwork

This Article addresses the question of when, if ever, the Department of the Treasury’s counterterrorism asset freezes against US persons (US citizens, resident aliens, and US-based organizations) violate the Fourth Amendment. It addresses two questions that currently divide the federal courts: (1) whether OFAC blocking orders are seizures subject to the Fourth Amendment and (2) whether the Fourth Amendment’s warrant and probable-cause requirements apply to OFAC counterterrorism blocking orders if these orders are in fact seizures.

My Originalist analysis of OFAC counterterrorism blocking orders draws on evidence of the Framers’ original understanding of “unreasonable . . . seizures,” including the …


Throwing Dirt On Doctor Frankenstein’S Grave: Access To Experimental Treatments At The End Of Life, Michael J. Malinowski Jul 2013

Throwing Dirt On Doctor Frankenstein’S Grave: Access To Experimental Treatments At The End Of Life, Michael J. Malinowski

Michael J. Malinowski

All U.S. federal research funding triggers regulations to protect human subjects known as the Common Rule, a collaborative government effort that spans seventeen federal agencies. The Department of Health and Human Services has been in the process of re-evaluating the Common Rule comprehensively after decades of application and in response to the jolting advancement of biopharmaceutical science. The Common Rule designates specific groups as “vulnerable populations”—pregnant women, fetuses, children, prisoners, and those with serious mental comprehension challenges—and imposes heightened protections of them. This article addresses a question at the cornerstone of regulations to protect human subjects as biopharmaceutical research and …


After Privacy: The Rise Of Facebook, The Fall Of Wikileaks, And Singapore’S Personal Data Protection Act 2012, Simon Chesterman Dec 2012

After Privacy: The Rise Of Facebook, The Fall Of Wikileaks, And Singapore’S Personal Data Protection Act 2012, Simon Chesterman

Simon Chesterman

This article discusses the changing ways in which information is produced, stored, and shared — exemplified by the rise of social-networking sites like Facebook and controversies over the activities of WikiLeaks — and the implications for privacy and data protection. Legal protections of privacy have always been reactive, but the coherence of any legal regime has also been undermined by the lack of a strong theory of what privacy is. There is more promise in the narrower field of data protection. Singapore, which does not recognise a right to privacy, has positioned itself as an e-commerce hub but had no …


Enhancing Public Access To Online Rulemaking Information, Cary Coglianese Oct 2012

Enhancing Public Access To Online Rulemaking Information, Cary Coglianese

All Faculty Scholarship

One of the most significant powers exercised by federal agencies is their power to make rules. Given the importance of agency rulemaking, the process by which agencies develop rules has long been subject to procedural requirements aiming to advance democratic values of openness and public participation. With the advent of the digital age, government agencies have engaged in increasing efforts to make rulemaking information available online as well as to elicit public participation via electronic means of communication. How successful are these efforts? How might they be improved? In this article, I investigate agencies’ efforts to make rulemaking information available …


Disclosure's Effects: Wikileaks And Transparency, Mark Fenster Feb 2012

Disclosure's Effects: Wikileaks And Transparency, Mark Fenster

Mark Fenster

Constitutional, criminal, and administrative laws regulating government transparency, and the theories that support them, rest on the assumption that the disclosure of information has transformative effects: disclosure can inform, enlighten, and energize the public, or it can create great harm or stymie government operations. To resolve disputes over difficult cases, transparency laws and theories typically balance disclosure’s beneficial effects against its harmful ones. WikiLeaks and its vigilante approach to massive document leaks challenge the underlying assumption about disclosure’s effects in two ways. First, WikiLeaks’s ability to receive and distribute leaked information cheaply, quickly, and seemingly unstoppably enables it to bypass …


From Bad To Worst: Assessing The Long Term Consequences Of Four Very Bad Fcc Decisions, Rob M. Frieden Jan 2011

From Bad To Worst: Assessing The Long Term Consequences Of Four Very Bad Fcc Decisions, Rob M. Frieden

Rob Frieden

Far too many major decisions of the Federal Communications Commission (“FCC”) rely on flawed assumptions about the current and future telecommunications marketplace. If the FCC incorrectly overstates the current state of competition, it risks exacerbating its mistake going forward if actual competition proves unsustainable, or lackluster. In many key decisions the FCC cited robust competition in current and future markets as the basis for decisions that relax restrictions on incumbents, abandon strategies for promoting competition, or apply statutory definitions of services that trigger limited government oversight. The Commission ignores the secondary and tertiary consequences of decisions that deprive it of …


Fulfilling Government 2.0'S Promise With Robust Privacy Protections, Danielle Citron Oct 2009

Fulfilling Government 2.0'S Promise With Robust Privacy Protections, Danielle Citron

Danielle Keats Citron

The public can now “friend” the White House and scores of agencies on social networks, virtual worlds, and video-sharing sites. The Obama Administration sees this trend as crucial to enhancing governmental transparency, public participation, and collaboration. As the President has underscored, government needs to tap into the public’s expertise because it doesn’t have all of the answers. To be sure, Government 2.0 might improve civic engagement. But it also might produce privacy vulnerabilities because agencies often gain access to individuals’ social network profiles, photographs, videos, and contact lists when interacting with individuals online. Little would prevent agencies from using and …


Invoking And Avoiding The First Amendment: How Internet Service Providers Leverage Their Status As Both Content Creators And Neutral Conduits, Rob M. Frieden Jun 2009

Invoking And Avoiding The First Amendment: How Internet Service Providers Leverage Their Status As Both Content Creators And Neutral Conduits, Rob M. Frieden

Rob Frieden

Much of the policy debate and scholarly literature on network neutrality has addressed whether the Federal Communications Commission (“FCC”) has statutory authority to require Internet Service Providers (“ISPs”) to operate in a nondiscriminatory manner. Such analysis largely focuses on questions about jurisdiction, the scope of lawful regulation, and the balance of power between stakeholders, generally adverse to government oversight, and government agencies, apparently willing to overcome the same inclination. The public policy debate primarily considers micro-level issues, without much consideration of broader concerns such as First Amendment values. While professing to support marketplace resource allocation and a regulation-free Internet, the …


The Failure Of Adversary Process In The Administrative State, Bryan T. Camp Jan 2009

The Failure Of Adversary Process In The Administrative State, Bryan T. Camp

Bryan T Camp

In a series of hearings in 1997 and 1998, Congress heard allegations that the Internal Revenue Service (“IRS” or “Service”) was abusing taxpayers during the process of collecting taxes. The resulting distrust of the tax bureaucracy led Congress to create a special adversary proceeding providing for judicial review of IRS collection decisions. The proceeding is beguilingly titled “Collection Due Process” (and commonly referred to as “CDP”). My study of CDP’s structure, operation, and of 976 court decisions issued through the end of 2006 demonstrates that it has failed to fulfill its promise. Of the over 15 million collection decisions made …