Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Boston University School of Law (5)
- Selected Works (4)
- University of Colorado Law School (4)
- University of Kentucky (3)
- Notre Dame Law School (2)
-
- SelectedWorks (2)
- Vanderbilt University Law School (2)
- American University Washington College of Law (1)
- Barry University School of Law (1)
- Georgetown University Law Center (1)
- Northwestern Pritzker School of Law (1)
- Osgoode Hall Law School of York University (1)
- Pace University (1)
- Penn State Dickinson Law (1)
- Pepperdine University (1)
- St. Mary's University (1)
- St. Thomas University College of Law (1)
- Touro University Jacob D. Fuchsberg Law Center (1)
- University of Georgia School of Law (1)
- University of Maryland Francis King Carey School of Law (1)
- University of Missouri School of Law (1)
- University of Nevada, Las Vegas -- William S. Boyd School of Law (1)
- Publication Year
- Publication
-
- Faculty Scholarship (5)
- Publications (4)
- Law Faculty Scholarly Articles (3)
- Journal Articles (2)
- Patricia L. Bellia (2)
-
- Scholarly Works (2)
- Vanderbilt Journal of Transnational Law (2)
- Articles in Law Reviews & Other Academic Journals (1)
- Barry Law Review (1)
- Dickinson Law Review (2017-Present) (1)
- Erez Reuveni (1)
- Faculty Articles (1)
- Georgetown Law Faculty Publications and Other Works (1)
- Ira Steven Nathenson (1)
- James Grimmelmann (1)
- Maryland Law Review (1)
- Northwestern University Law Review (1)
- Pace International Law Review (1)
- PhD Dissertations (1)
- St. Mary's Law Journal (1)
- The Business, Entrepreneurship & Tax Law Review (1)
- The Journal of Business, Entrepreneurship & the Law (1)
- Tim Iglesias (1)
- Touro Law Review (1)
- Publication Type
- File Type
Articles 1 - 30 of 37
Full-Text Articles in Law
Beyond Social Media Analogues, Gregory M. Dickinson
Beyond Social Media Analogues, Gregory M. Dickinson
Faculty Articles
The steady flow of social-media cases toward the Supreme Court shows a nation reworking its fundamental relationship with technology. The cases raise a host of questions ranging from difficult to impossible: how to nurture a vibrant public square when a few tech giants dominate the flow of information, how social media can be at the same time free from conformist groupthink and also protected against harmful disinformation campaigns, and how government and industry can cooperate on such problems without devolving toward censorship.
To such profound questions, this Essay offers a comparatively modest contribution—what not to do. Always the lawyer’s instinct …
Brokered Abuse, Thomas E. Kadri
Brokered Abuse, Thomas E. Kadri
Scholarly Works
Data brokers are abuse enablers. These companies, which traffic information about people for profit, facilitate interpersonal abuse by making it easier to find and contact people. By thwarting people’s obscurity, brokers expose them to physical, psychological, financial, and reputational harm. To date, there have been four common legal responses to this situation: prohibiting abusive acts, mandating broker transparency, limiting data collection, and restricting data disclosure. Though these measures each have some merit, none is adequate, and several recent privacy laws have even made matters worse. Put simply, the current legal landscape is neither effective nor empathetic.
This Essay explores the …
Sovereignty 2.0, Anupam Chander, Haochen Sun
Sovereignty 2.0, Anupam Chander, Haochen Sun
Vanderbilt Journal of Transnational Law
Digital sovereignty-the exercise of control over the internet-is the ambition of the world's leaders, from Australia to Zimbabwe, seen as a bulwark against both foreign states and foreign corporations. Governments have resoundingly answered first-generation internet law questions of who, if anyone, should regulate the internet. The answer: they all will. Governments now confront second-generation questions--not whether, but how to regulate the internet. This Article argues that digital sovereignty is simultaneously a necessary incident of democratic governance and democracy's dreaded antagonist. As international law scholar Louis Henkin taught, sovereignty can insulate a government's worst ills from foreign intrusion. Assertions of digital …
The Dangers Of Doxing And Swatting: Why Texas Should Criminalize These Malicious Forms Of Cyberharassment, Hannah Mery
The Dangers Of Doxing And Swatting: Why Texas Should Criminalize These Malicious Forms Of Cyberharassment, Hannah Mery
St. Mary's Law Journal
Abstract forthcoming.
A False Sense Of Security: How Congress And The Sec Are Dropping The Ball On Cryptocurrency, Tessa E. Shurr
A False Sense Of Security: How Congress And The Sec Are Dropping The Ball On Cryptocurrency, Tessa E. Shurr
Dickinson Law Review (2017-Present)
Today, companies use blockchain technology and digital assets for a variety of purposes. This Comment analyzes the digital token. If the Securities and Exchange Commission (SEC) views a digital token as a security, then the issuer of the digital token must comply with the registration and extensive disclosure requirements of federal securities laws.
To determine whether a digital asset is a security, the SEC relies on the test that the Supreme Court established in SEC v. W.J. Howey Co. Rather than enforcing a statute or agency rule, the SEC enforces securities laws by applying the Howey test on a fact-intensive …
Crash Goes Icann's Multistakeholder Model, Kathryn Kleiman
Crash Goes Icann's Multistakeholder Model, Kathryn Kleiman
Articles in Law Reviews & Other Academic Journals
In 1995, the Internet was becoming a global phenomenon and users needed "domain names"--the street signs of Internet addresses--for an array of commercial and noncommercial speech. A small community of "multistakeholders"--business, civil society, governments, technologists, intellectual property and non-government organization representations--began to write rules for Internet addresses largely on behalf of a global population that had yet to be connected to the Internet. I had the privilege of being part of that group. Since then, Internet use has skyrocketed from 70 million users (1.7% of the world population) in 1995 to over 4.5 billion users (58.8% of the world population) …
Internet Architecture And Disability, Blake E. Reid
Internet Architecture And Disability, Blake E. Reid
Publications
The Internet is essential for education, employment, information, and cultural and democratic participation. For tens of millions of people with disabilities in the United States, barriers to accessing the Internet—including the visual presentation of information to people who are blind or visually impaired, the aural presentation of information to people who are deaf or hard of hearing, and the persistence of Internet technology, interfaces, and content without regard to prohibitive cognitive load for people with cognitive and intellectual disabilities—collectively pose one of the most significant civil rights issues of the information age. Yet disability law lacks a comprehensive theoretical approach …
Intermediaries And Private Speech Regulation: A Transatlantic Dialogue - Workshop Report, Tiffany Li
Intermediaries And Private Speech Regulation: A Transatlantic Dialogue - Workshop Report, Tiffany Li
Faculty Scholarship
The Wikimedia/Yale Law School Initiative on Intermediaries and Information (WIII) at Yale Law School has released a comprehensive report synthesizing key insights from intermediary liability and online speech and expression experts in Europe and the United States.
The report focuses on the critical but complicated issue of private speech regulation on the internet and the connections between platform liability laws and fundamental rights, including free expression. The report reflects discussions held at “Intermediaries & Private Speech Regulation: A Transatlantic Dialogue,” an invitation-only workshop convened by WIII, featuring leading internet law experts from the United States and Europe.
This report highlights …
Beyond Intermediary Liability: The Future Of Information Platforms - Workshop Report, Tiffany Li
Beyond Intermediary Liability: The Future Of Information Platforms - Workshop Report, Tiffany Li
Faculty Scholarship
On February 13, 2018, WIII hosted the workshop, “Beyond Intermediary Liability: The Future of Information Platforms.” Leading experts from industry, civil society, and academia convened at Yale Law School for a series of non-public, guided discussions. The roundtable of experts considered pressing questions related to intermediary liability and the rights, roles, and responsibilities of information platforms in society. Based on conversations from the workshop, WIII published a free, publicly available report detailing the most critical issues necessary for understanding the role of information platforms, such as Facebook and Google, in law and society today. The report highlights insights and questions …
Four Principles For Digital Expression (You Won't Believe #3!), Danielle K. Citron, Neil Richards
Four Principles For Digital Expression (You Won't Believe #3!), Danielle K. Citron, Neil Richards
Faculty Scholarship
At the dawn of the Internet’s emergence, the Supreme Court rhapsodized about its potential as a tool for free expression and political liberation. In ACLU v. Reno (1997), the Supreme Court adopted a bold vision of Internet expression to strike down a federal law - the Communications Decency Act - that restricted digital expression to forms that were merely “decent.” Far more than the printing press, the Court explained, the mid-90s Internet enabled anyone to become a town crier. Communication no longer required the permission of powerful entities. With a network connection, the powerless had as much luck reaching a …
Three Strikes For Copyright, Jessica Silbey
Three Strikes For Copyright, Jessica Silbey
Faculty Scholarship
How should copyright law change to take account of the internet? Should copyright expand to plug the internet’s leakiness and protect content that the internet would otherwise make more freely available? Or, should copyright relax its strict liability regime given diverse and productive reuses in the internet age and the benefits networked diffusion provides users and second-generation creators? Answering these questions depends on what we think copyright is for and how it is used and confronted by creators and audiences. In a new article studying these questions in the very focused setting of Wikipedia articles about baseball and baseball players …
Netflix And No Chill: The Criminal Ramification Of Password Sharing, Benjamin Kweskin
Netflix And No Chill: The Criminal Ramification Of Password Sharing, Benjamin Kweskin
The Business, Entrepreneurship & Tax Law Review
Password sharing is a unique issue because it requires two actors: the person who accesses the information, and the sharer. Sharing your password and logging on could easily be seen as trespassing on Netflix’s website to provide you with content you should have otherwise paid for, thus it has value. All other elements aside, the question of whether or not the sharer of information could be criminally liable remains unanswered. Under Nosal, there is strong evidence to suggest liability. It is clear that the person who accesses this information is liable, but what about the password sharer?
Disruptive Platforms, Margot Kaminski
Anonymous Armies: Modern “Cyber-Combatants” And Their Prospective Rights Under International Humanitarian Law, Jake B. Sher
Anonymous Armies: Modern “Cyber-Combatants” And Their Prospective Rights Under International Humanitarian Law, Jake B. Sher
Pace International Law Review
Cyber-attacks take many forms, only some of which are applicable to the law of war. This Comment discusses only those attacks sponsored by a government or non-state entity that have the goal of affecting morale or gaining political advantage, or those attacks amounting to tactical strikes on state or civilian infrastructure. In that vein, this Comment proposes the adoption of a new legal framework for determining the threshold that marks a participant in such a cyber-attack as a “cyber-combatant” by adapting the framework set by the Geneva Conventions and existing custom. This definition should encompass cyber-attacks perpetrated by states, unrecognized …
Geoblocking, Technical Standards And The Law, Marketa Trimble
Geoblocking, Technical Standards And The Law, Marketa Trimble
Scholarly Works
The idea that geoblocking could be used as a compliance tool is one part of the development of the relationship between geoblocking and legal compliance. This chapter outlines the three stages through which this development will proceed. In the first stage, geoblocking will be accepted as a tool of regulation and enforcement. While acceptance has already occurred in some countries in some contexts, this acceptance is certainly not yet general or widespread. In the second stage, minimum standards for geoblocking will be promulgated because the use of geoblocking for purposes of legal compliance necessarily calls for minimum technological standards that …
Note: A Series Of (Inseparable) Tubes? “New Media” Streaming And The Impact Of In Re. Pandora Media, Related Decisions, And Performance Licensing In The Internet Era, Ross Coker
The Journal of Business, Entrepreneurship & the Law
No abstract provided.
Reputational Privacy And The Internet: A Matter For Law?, Elizabeth Anne Kirley
Reputational Privacy And The Internet: A Matter For Law?, Elizabeth Anne Kirley
PhD Dissertations
Reputation - we all have one. We do not completely comprehend its workings and are mostly unaware of its import until it is gone. When we lose it, our traditional laws of defamation, privacy, and breach of confidence rarely deliver the vindication and respite we seek due, primarily, to legal systems that cobble new media methods of personal injury onto pre-Internet laws. This dissertation conducts an exploratory study of the relevance of law to loss of individual reputation perpetuated on the Internet. It deals with three interrelated concepts: reputation, privacy, and memory. They are related in that the increasing lack …
Doma's Ghost And Copyright Reversionary Interests, Brad A. Greenberg
Doma's Ghost And Copyright Reversionary Interests, Brad A. Greenberg
Northwestern University Law Review
No abstract provided.
Cyberharassment And Workplace Law, Helen Norton
Cookie Monster: Balancing Internet Privacy With Commerce, Technology And Terrorism, Nichoel Forrett
Cookie Monster: Balancing Internet Privacy With Commerce, Technology And Terrorism, Nichoel Forrett
Touro Law Review
No abstract provided.
Federalization In Information Privacy Law, Patricia L. Bellia
Federalization In Information Privacy Law, Patricia L. Bellia
Patricia L. Bellia
In Preemption and Privacy, Professor Paul Schwartz argues that it would be unwise for Congress to adopt a unitary federal information privacy statute that both eliminates the sector-specific distinctions in federal information privacy law and blocks the development of stronger state regulation. That conclusion, though narrow, rests on descriptive and normative claims with broad implications for the state-federal balance in information privacy law. Descriptively, Professor Schwartz sees the current information privacy law landscape as the product of successful experimentation at the state level. That account, in turn, fuels his normative claims, and in particular his sympathy with theories of competitive …
Spyware And The Limits Of Surveillance Law, Patricia L. Bellia
Spyware And The Limits Of Surveillance Law, Patricia L. Bellia
Patricia L. Bellia
For policymakers, litigants, and commentators seeking to address the threats digital technology poses for privacy, electronic surveillance law remains a weapon of choice. The debate over how best to respond to the spyware problem provides only the most recent illustration of that fact. Although there is much controversy over how to define spyware, that label encompasses at least some software that monitors a computer user's electronic communications. Federal surveillance statutes thus present an intuitive fit for responding to the regulatory challenges of spyware, because those statutes bar the unauthorized acquisition of electronic communications and related data in some circumstances. Indeed, …
Internet Law: Cases And Problems 4.0, James Grimmelmann
Internet Law: Cases And Problems 4.0, James Grimmelmann
James Grimmelmann
In this casebook author James Grimmelmann provides tightly edited cases, focused questions, and topical problems to direct students' attention to critical issues. Mini-essays provide students with the technical background they need to make sense of computer and Internet technologies. Where doctrine has historical roots, the casebook gives students the necessary context.The book covers essential topics but is still short enough that it can be taught in a 3-credit course. The casebook responds to the "law of the horse" critique by embracing the doctrinal diversity of Internet Law. It prepares students for complex, real-life practice by showing how actual Internet cases …
Personal Jurisdiction And Choice Of Law In The Cloud, Damon C. Andrews, John M. Newman
Personal Jurisdiction And Choice Of Law In The Cloud, Damon C. Andrews, John M. Newman
Maryland Law Review
No abstract provided.
The Electronic Silk Road: How The Web Binds The World In Commerce, Anupam Chander
The Electronic Silk Road: How The Web Binds The World In Commerce, Anupam Chander
Georgetown Law Faculty Publications and Other Works
On the ancient Silk Road, treasure-laden caravans made their arduous way through deserts and mountain passes, establishing trade between Asia and the civilizations of Europe and the Mediterranean. Today’s electronic Silk Roads ferry information across continents, enabling individuals and corporations anywhere to provide or receive services without obtaining a visa. But the legal infrastructure for such trade is yet rudimentary and uncertain. If an event in cyberspace occurs at once everywhere and nowhere, what law applies? How can consumers be protected when engaging with companies across the world?
In this accessible book, cyber-law expert Anupam Chander provides the first thorough …
Navigating The Uncharted Waters Of Teaching Law With Online Simulations, Ira Steven Nathenson
Navigating The Uncharted Waters Of Teaching Law With Online Simulations, Ira Steven Nathenson
Ira Steven Nathenson
The Internet is more than a place where the Millennial Generation communicates, plays, and shops. It is also a medium that raises issues central to nearly every existing field of legal doctrine, whether basic (such as Torts, Property, or Contracts) or advanced (such as Intellectual Property, Criminal Procedure, or Securities Regulation). This creates tremendous opportunities for legal educators interested in using the live Internet for experiential education. This Article examines how live websites can be used to create engaging and holistic simulations that tie together doctrine, theory, skills, and values in ways impossible to achieve with the case method. In …
Regulating Cyberharassment: Some Thoughts On Sexual Harassment 2.0, Helen Norton
Regulating Cyberharassment: Some Thoughts On Sexual Harassment 2.0, Helen Norton
Publications
No abstract provided.
Communication Indecency: Why The Communications Decency Act, And The Judicial Interpretation Of It, Has Led To A Lawless Internet In The Area Of Defamation, Colby Ferris
Barry Law Review
First, this article explores how law of defamation has been applied in the brick and mortar world, and how those same principles were applied to the cyber world. Next it looks at Congress’s legislation of defamation law on the Internet, and how that legislation has been applied in court. Finally, it evaluates the changing attitude toward that legislation, and changes Congress should consider making.
Fhaa & The Internet: The Prospects For Self-Regulation, Tim Iglesias
Fhaa & The Internet: The Prospects For Self-Regulation, Tim Iglesias
Tim Iglesias
This presentation argues that the internet offers both great promise and possible peril for anti-discrimination in housing. The potential for self-regulation is mixed but ultimately weak. The presentation concludes with a call for federal regulatory reform.
Federalization In Information Privacy Law, Patricia L. Bellia
Federalization In Information Privacy Law, Patricia L. Bellia
Journal Articles
In Preemption and Privacy, Professor Paul Schwartz argues that it would be unwise for Congress to adopt a unitary federal information privacy statute that both eliminates the sector-specific distinctions in federal information privacy law and blocks the development of stronger state regulation. That conclusion, though narrow, rests on descriptive and normative claims with broad implications for the state-federal balance in information privacy law. Descriptively, Professor Schwartz sees the current information privacy law landscape as the product of successful experimentation at the state level. That account, in turn, fuels his normative claims, and in particular his sympathy with theories of competitive …