Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- University of Michigan Law School (4)
- Georgetown University Law Center (3)
- Seattle University School of Law (2)
- University of Washington School of Law (2)
- Boston University School of Law (1)
-
- New York Law School (1)
- Northwestern Pritzker School of Law (1)
- Roger Williams University (1)
- Schulich School of Law, Dalhousie University (1)
- University of Baltimore Law (1)
- University of Miami Law School (1)
- University of Pittsburgh School of Law (1)
- University of Richmond (1)
- University of South Carolina (1)
- Publication Year
- Publication
-
- Articles (3)
- Georgetown Law Faculty Publications and Other Works (3)
- Michigan Journal of Gender & Law (2)
- All Faculty Scholarship (1)
- Articles & Chapters (1)
-
- Dalhousie Law Journal (1)
- Faculty Scholarship (1)
- Law Library Newsletters/Blog (1)
- Michigan Law Review (1)
- Northwestern Journal of Technology and Intellectual Property (1)
- Seattle Journal of Technology, Environmental & Innovation Law (1)
- Seattle University Law Review (1)
- South Carolina Law Review (1)
- University of Michigan Journal of Law Reform (1)
- University of Richmond Law Review (1)
- Washington Law Review (1)
- Publication Type
Articles 1 - 21 of 21
Full-Text Articles in Law
Speaking Back To Sexual Privacy Invasions, Brenda Dvoskin
Speaking Back To Sexual Privacy Invasions, Brenda Dvoskin
Washington Law Review
Many big players in the internet ecosystem do not like hosting sexual expression. They often justify these bans as a protection of sexual privacy. For example, Meta states that it removes sexual imagery to prevent the nonconsensual distribution of sexual images. In response, this Article argues that banning digital sexual expression is counterproductive if the aim is to alleviate the harms inflicted by sexual privacy losses.
Contemporary sexual privacy theory, however, lacks analytical tools to explain why nudity bans harm the interests they intend to protect. This Article aims at building those tools. The main contribution is an invitation to …
Open Source Perfume, Amanda Levendowski
Open Source Perfume, Amanda Levendowski
Georgetown Law Faculty Publications and Other Works
ABRIDGED ABSTRACT: Perfume is a powerful art and technology, but its secrets are closely held by a privileged few - by some counts, there are more astronauts than there are perfumers. As critics have noted increasingly since 2020, those select few perfumers often share similar backgrounds. As interviews with American, British, and French perfumemakers reveal, intellectual property (IP) also plays a gatekeeping role in perfumery. Drawing on work by perfumer and educator Saskia Wilson-Brown, this Article suggests that perfumery is overdue for a transformation. One is emerging: open source perfume. For those seeking ways to share scents and signal commitment …
Defragging Feminist Cyberlaw, Amanda Levendowski
Defragging Feminist Cyberlaw, Amanda Levendowski
Georgetown Law Faculty Publications and Other Works
In 1996, Judge Frank Easterbrook famously observed that any effort to create a field called cyberlaw would be “doomed to be shallow and miss unifying principles.” He was wrong, but not for the reason other scholars have stated. Feminism is a unifying principle of cyberlaw, which alternately amplifies and abridges the feminist values of consent, safety, and accessibility. Cyberlaw simply hasn’t been understood that way—until now.
In computer science, “defragging” means bringing together disparate pieces of data so they are easier to access. Inspired by that process, this Article offers a new approach to cyberlaw that illustrates how feminist values …
Startup Biases, Jennifer S. Fan
Startup Biases, Jennifer S. Fan
Articles
This Article provides an original descriptive account of bias in the startup context and explains why litigation is eschewed and what happens when it is used as a mechanism to combat bias in the venture capital ecosystem. Further, this Article identifies two particular phenomena in the startup context that exacerbate gender and racial bias. First, homophily—the idea that like attracts like—abounds and has been part of the DNA of venture capital since its inception. The thick networks that developed as venture capital made its way from the East Coast to the West Coast were limited to an elite group that …
The World Moved On Without Me: Redefining Contraband In A Technology-Driven World For Youth Detained In Washington State, Stephanie A. Lowry
The World Moved On Without Me: Redefining Contraband In A Technology-Driven World For Youth Detained In Washington State, Stephanie A. Lowry
Seattle University Law Review
If you ask a teenager in the United States to show you one of their favorite memories, they will likely show you a picture or video on their cell phone. This is because Americans, especially teenagers, love cell phones. Ninety-seven percent of all Americans own a cell phone according to a continuously updated survey by the Pew Research Center. For teenagers aged thirteen to seventeen, the number is roughly 95%. For eighteen to twenty-nine-year-olds, the number grows to 100%. On average, eight to twelve-year-old’s use roughly five and a half hours of screen media per day, in comparison to thirteen …
The First Amendment And Online Access To Information About Abortion: The Constitutional And Technological Problems With Censorship, John Villasenor
The First Amendment And Online Access To Information About Abortion: The Constitutional And Technological Problems With Censorship, John Villasenor
Northwestern Journal of Technology and Intellectual Property
To what extent could an abortion-restrictive state impede access to online information about abortion? After Dobbs, this question is no longer theoretical. This essay engages with this issue from both a legal and technological perspective, analyzing First Amendment jurisprudence as well as the technological implications of state-level online censorship. It concludes that the weight of Supreme Court precedent indicates that state attempts to censor information regarding out-of-state abortion services would violate the First Amendment. That said, the essay also recognizes that as Dobbs itself upended precedent, it is unclear what Supreme Court would do when ruling on questions regarding …
Racialized, Judaized, Feminized: Identity-Based Attacks On The Press, Lili Levi
Racialized, Judaized, Feminized: Identity-Based Attacks On The Press, Lili Levi
Articles
No abstract provided.
Handle With Care: Domestic Violence Safety Planning In The Age Of Data Privacy Laws, Jenny Wu
Handle With Care: Domestic Violence Safety Planning In The Age Of Data Privacy Laws, Jenny Wu
Seattle Journal of Technology, Environmental & Innovation Law
The United States has been patiently waiting for a comprehensive federal data privacy law to protect consumers. However, strong data privacy laws can also protect a less thought-about group: survivors of domestic violence and intimate partner violence. As new technology proliferates into our daily lives, technology-based abuse is quickly becoming a common form of intimate partner abuse. Domestic violence survivors and advocates have to stay extra vigilant about who has access to their internet data. Needing to understand technology-specific safety measures and learn technology-literacy skills adds more work to already overwhelmed domestic violence advocates and survivors. Could the law serve …
Periods For Profit And The Rise Of Menstrual Surveillance, Michele E. Gilman
Periods For Profit And The Rise Of Menstrual Surveillance, Michele E. Gilman
All Faculty Scholarship
Menstruation is being monetized and surveilled, with the voluntary participation of millions of women. Thousands of downloadable apps promise to help women monitor their periods and manage their fertility. These apps are part of the broader, multi-billion dollar, Femtech industry, which sells technology to help women understand and improve their health. Femtech is marketed with the language of female autonomy and feminist empowerment. Despite this rhetoric, Femtech is part of a broader business strategy of data extraction, in which companies are extracting people’s personal data for profit, typically without their knowledge or meaningful consent. Femtech can oppress menstruators in several …
Diversity As A Trade Secret, Jamillah Bowman Williams
Diversity As A Trade Secret, Jamillah Bowman Williams
Georgetown Law Faculty Publications and Other Works
When we think of trade secrets, we often think of famous examples such as the Coca-Cola formula, Google’s algorithm, or McDonald’s special sauce used on the Big Mac. However, companies have increasingly made the novel argument that diversity data and strategies are protected trade secrets. This may sound like an unusual, even suspicious, legal argument. Many of the industries that dominate the economy in wealth, status, and power continue to struggle with a lack of diversity. Various stakeholders have mobilized to improve access and equity, but there is an information asymmetry that makes this pursuit daunting. When potential plaintiffs and …
The Fuzz(Y) Lines Of Consent: Police Sexual Misconduct With Detainees, Katherine A. Heil
The Fuzz(Y) Lines Of Consent: Police Sexual Misconduct With Detainees, Katherine A. Heil
South Carolina Law Review
No abstract provided.
A "Reasonable" Expectation Of Sexual Privacy Inthe Digital Age, Moira Aikenhead
A "Reasonable" Expectation Of Sexual Privacy Inthe Digital Age, Moira Aikenhead
Dalhousie Law Journal
Two Criminal Code offences, voyeurism, and the publication of intimate images without consent, were enacted toprotect Canadians' right to sexual privacy in light of invasive digital technologies. Women and girls are overwhelmingly targeted as victims for both of these offences, given the higher value placed on their non-consensual, sexualised images in an unequal society.Both offences require an analysis ofwhether the complainant was in circumstances giving rise to a reasonable expectation of privacy, and the use of this standard is potentially problematic both from a feminist standpoint and in light of the rapidly evolving technological realities of the digital age. This …
Law Library Blog (January 2018): Legal Beagle's Blog Archive, Roger Williams University School Of Law
Law Library Blog (January 2018): Legal Beagle's Blog Archive, Roger Williams University School Of Law
Law Library Newsletters/Blog
No abstract provided.
Are Anti-Bullying Laws Effective?, Ari Ezra Waldman
Are Anti-Bullying Laws Effective?, Ari Ezra Waldman
Articles & Chapters
Since 2010, when several high profile bullying-related suicides brought bullying and cyberharassment into the national consciousness, all 50 states have passed laws that address bullying among the nation’s youth. This essay is the first in a series of three projects on federal, state, municipal, and individual school approaches to bullying. There are only 4 published studies on the relationships between law and bullying rates. This Essay adds several features to the discourse. It offers a comprehensive analysis of the contents of state anti-bullying laws, using a 16-item list of guidelines from the United States Department of Education as a frame. …
Abortion And The Constitutional Right (Not) To Procreate, Mary Ziegler
Abortion And The Constitutional Right (Not) To Procreate, Mary Ziegler
University of Richmond Law Review
No abstract provided.
Does The Constitution Protect Abortions Based On Fetal Anomaly?: Examining The Potential For Disability-Selective Abortion Bans In The Age Of Prenatal Whole Genome Sequencing, Greer Donley
Michigan Journal of Gender & Law
This Note examines whether the state or federal government has the power to enact a law that prevents women from obtaining abortions based on their fetus’s genetic abnormality. Such a ban has already been enacted in North Dakota and introduced in Indiana and Missouri. I argue below that this law presents a novel state intrusion on a woman’s right to obtain a pre-viability abortion. Moreover, these pieces of legislation contain an outdated understanding of prenatal genetic testing—-the landscape of which is quickly evolving as a result of a new technology: prenatal whole genome sequencing. This Note argues that the incorporation …
Limiting The Affirmative Defense In The Digital Workplace , Daniel B. Garrie
Limiting The Affirmative Defense In The Digital Workplace , Daniel B. Garrie
Michigan Journal of Gender & Law
From 2009 to 2011, there were more than 30,000 sexual harassment claims filed in the United States. The ubiquitous availability of digital technology devices has facilitated many instances of sexual harassment. Such sexual harassment occurs through unprovoked and offensive e-mails, messages posted on electronic bulletin boards, and other means available on the Internet. To date, courts remain silent on this issue. Should this type of sexual harassment be treated differently from physical sexual harassment? The surprising answer is yes. This Article suggests a new judicial framework for addressing sexual harassment perpetrated through digital communications. This framework accounts for the real-world …
Sexual Harassment: Limiting The Affirmative Defense In The Digital Workplace, Donald P. Harris, Daniel B. Garrie, Matthew J. Armstrong
Sexual Harassment: Limiting The Affirmative Defense In The Digital Workplace, Donald P. Harris, Daniel B. Garrie, Matthew J. Armstrong
University of Michigan Journal of Law Reform
Digital communications sexual harassment is on the rise. Such harassment occurs through sexually offensive and unwarranted e-mails, placing harassing messages on electronic bulletin boards, and other forms of harassment that occur through the Internet. To date, courts have remained silent on the issue of sexual harassment by digital communications. Should this type of harassment be treated any differently than harassment that occurs in the physical space? The somewhat surprising answer is yes.
This Article advocates applying a new judicial framework for addressing digital communications sexual harassment. This new framework accounts for the real-world technology in the digital workplace and the …
Dimensions Of Equality In Regulating Assisted Reproductive Technologies, Mary Crossley
Dimensions Of Equality In Regulating Assisted Reproductive Technologies, Mary Crossley
Articles
Although concerns about individual liberty and the nature and extent of reproductive freedom have tended to dominate discussions regarding the proliferation of and access to reproductive technologies, questions about the implications of assisted reproductive technologies (ARTs) for equality have also arisen. Despite the high number of invocations of equality in the literature regarding ARTs, to date little effort has been made to comprehensively examine the implications of ARTs for equality. This short Article seeks to highlight the variety of equality issues that ARTs present and to develop a framework for classifying different types of equality issues. Specifically, I suggest that …
Constitutional Misconceptions, Radhika Rao
Constitutional Misconceptions, Radhika Rao
Michigan Law Review
A Review of Children of Choice: Freedom and the New Reproductive Technologies by John A. Robertson
The Impact Of Medical Technology On The Pregnant Woman's Right To Privacy, George J. Annas
The Impact Of Medical Technology On The Pregnant Woman's Right To Privacy, George J. Annas
Faculty Scholarship
In the context of the bicentennial of the Constitution and science's relationship to society, it has been argued that "the advance of science and technology in the West has changed not only the relation of man to nature but of man to man."' This seemingly immodest statement may soon prove an understatement. In the arena of human reproduction, the marriage of science and technology in medicine may change not only the relationship of man to nature and man to man, but more significantly, the very concept of what it means to be human. This, in turn, will directly affect how …