Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 31

Full-Text Articles in Law

A Matter Of Facts: The Evolution Of Copyright’S Fact-Exclusion And Its Implications For Disinformation And Democracy, Jessica Silbey Jan 2024

A Matter Of Facts: The Evolution Of Copyright’S Fact-Exclusion And Its Implications For Disinformation And Democracy, Jessica Silbey

Faculty Scholarship

The Article begins with a puzzle: the curious absence of an express fact-exclusion from copyright protection in both the Copyright Act and its legislative history despite it being a well-founded legal principle. It traces arguments in the foundational Supreme Court case (Feist Publications v. Rural Telephone Service) and in the Copyright Act’s legislative history to discern a basis for the fact-exclusion. That research trail produces a legal genealogy of the fact-exclusion based in early copyright common law anchored by canonical cases, Baker v. Selden, Burrow-Giles v. Sarony, and Wheaton v. Peters. Surprisingly, none of them …


Questions Of Intellectual Property And Fundamental Values In The Digital Age, Jessica Silbey Jan 2023

Questions Of Intellectual Property And Fundamental Values In The Digital Age, Jessica Silbey

Faculty Scholarship

Today's intellectual property debates, in both law and the larger society, are a bellwether of changing justice needs in the twenty-first century. As the digital age democratizes technological opportunities, it brings intellectual property law into mainstream everyday culture. This generates debates about the relationship between the constitutional interest in "the progress of science and useful arts" and other fundamental values, such as equality, privacy, and distributive justice. These values, which were not explicitly part of intellectual property regimes in prior eras, are especially challenged in today's internet world.

The article (which was presented as the annual Nies Lecture in April …


The Surprising Virtues Of Data Loyalty, Woodrow Hartzog, Neil M. Richards Jan 2022

The Surprising Virtues Of Data Loyalty, Woodrow Hartzog, Neil M. Richards

Faculty Scholarship

Lawmakers in the United States and Europe are seriously considering imposing duties of data loyalty that implement ideas from privacy law scholarship, but critics claim such duties are unnecessary, unworkable, overly individualistic, and indeterminately vague. This paper takes those criticisms seriously, and its analysis of them reveals that duties of data loyalty have surprising virtues. Loyalty, it turns out, can support collective well-being by embracing privacy’s relational turn; it can be a powerful state of mind for reenergizing privacy reform; it prioritizes human values rather than potentially empty formalism; and it offers solutions that are flexible and clear rather than …


Legislating Data Loyalty, Woodrow Hartzog, Neil Richards Jan 2022

Legislating Data Loyalty, Woodrow Hartzog, Neil Richards

Faculty Scholarship

Lawmakers looking to embolden privacy law have begun to consider imposing duties of loyalty on organizations trusted with people’s data and online experiences. The idea behind loyalty is simple: organizations should not process data or design technologies that conflict with the best interests of trusting parties. But the logistics and implementation of data loyalty need to be developed if the concept is going to be capable of moving privacy law beyond its “notice and consent” roots to confront people’s vulnerabilities in their relationship with powerful data collectors.

In this short Essay, we propose a model for legislating data loyalty. Our …


The Covid-19 Pandemic And The Technology Trust Gap, Johanna Gunawan, David Choffnes, Woodrow Hartzog, Christo Wilson Jan 2021

The Covid-19 Pandemic And The Technology Trust Gap, Johanna Gunawan, David Choffnes, Woodrow Hartzog, Christo Wilson

Faculty Scholarship

Industry and government tried to use information technologies to respond to the COVID-19 pandemic, but using the internet as a tool for disease surveillance, public health messaging, and testing logistics turned out to be a disappointment. Why weren’t these efforts more effective? This Essay argues that industry and government efforts to leverage technology were doomed to fail because tech platforms have failed over the past few decades to make their tools trustworthy, and lawmakers have done little to hold these companies accountable. People cannot trust the interfaces they interact with, the devices they use, and the systems that power tech …


A Duty Of Loyalty For Privacy Law, Neil M. Richards, Woodrow Hartzog Jan 2021

A Duty Of Loyalty For Privacy Law, Neil M. Richards, Woodrow Hartzog

Faculty Scholarship

Data privacy law fails to stop companies from engaging in self-serving, opportunistic behavior at the expense of those who trust them with their data. This is a problem. Modern tech companies are so entrenched in our lives and have so much control over what we see and click that the self-dealing exploitation of people has become a major element of the internet’s business model.

Academics and policymakers have recently proposed a possible solution: require those entrusted with people’s data and online experiences to be loyal to those who trust them. But many have concerns about a duty of loyalty. What, …


The Internet As A Speech Machine And Other Myths Confounding Section 230 Reform, Danielle K. Citron, Mary Anne Franks Jan 2020

The Internet As A Speech Machine And Other Myths Confounding Section 230 Reform, Danielle K. Citron, Mary Anne Franks

Faculty Scholarship

A robust public debate is currently underway about the responsibility of online platforms. We have long called for this discussion, but only recently has it been seriously taken up by legislators and the public. The debate begins with a basic question: should platforms should be responsible for user-generated content? If so, under what circumstances? What exactly would such responsibility look like? Under consideration is Section 230 of the Communications Decency Act—a provision originally designed to encourage tech companies to clean up “offensive” online content. The public discourse around Section 230, however, is riddled with misconceptions. As an initial matter, many …


Digitizing Brandenburg: Common Law Drift Toward A Causal Theory Of Imminence, J. Remy Green Jan 2019

Digitizing Brandenburg: Common Law Drift Toward A Causal Theory Of Imminence, J. Remy Green

Faculty Scholarship

The Supreme Court’s Brandenburg v. Ohio test provides an exception to the First Amendment’s broad guarantee of freedom of speech. Where speech is (1) directed to inciting or producing imminent lawless action, and (2) is likely to incite or produce such action, the First Amendment withdraws its promise of protection. Thus, where the “imminence” of lawless action cannot be shown, free speech cannot be restricted. Since Brandenburg, Courts have applied a test for imminence that turns on proximity in space and in time — that is, the test evaluates how spatiotemporally imminent lawless activity is. In this Article, I argue …


Control Over Contemporary Photography: A Tangle Of Copyright, Right Of Publicity, And The First Amendment, Jessica Silbey Jan 2019

Control Over Contemporary Photography: A Tangle Of Copyright, Right Of Publicity, And The First Amendment, Jessica Silbey

Faculty Scholarship

Professional photographers who make photographs of people negotiate a tense relationship between their own creative freedoms and the right of their subjects to control their images. This negotiation formally takes place over the terrain of copyright, right of publicity, and the First Amendment. Informally, photographers describe implied understandings and practice norms guiding their relationship with subjects, infrequently memorialized in short, boilerplate contractual releases. This short essay explores these formal and informal practices described by contemporary professional photographers. Although the evidence for this essay comes from professional photographic practice culled from interviews with contemporary photographers, the analysis of the evidence speaks …


Humans Forget, Machines Remember: Artificial Intelligence And The Right To Be Forgotten, Tiffany Li, Eduard Fosch Villaronga, Peter Kieseberg Apr 2018

Humans Forget, Machines Remember: Artificial Intelligence And The Right To Be Forgotten, Tiffany Li, Eduard Fosch Villaronga, Peter Kieseberg

Faculty Scholarship

To understand the Right to be Forgotten in context of artificial intelligence, it is necessary to first delve into an overview of the concepts of human and AI memory and forgetting. Our current law appears to treat human and machine memory alike – supporting a fictitious understanding of memory and forgetting that does not comport with reality. (Some authors have already highlighted the concerns on the perfect remembering.) This Article will examine the problem of AI memory and the Right to be Forgotten, using this example as a model for understanding the failures of current privacy law to reflect the …


Rise Of The Digital Regulator, Rory Van Loo Mar 2017

Rise Of The Digital Regulator, Rory Van Loo

Faculty Scholarship

The administrative state is leveraging algorithms to influence individuals’ private decisions. Agencies have begun to write rules to shape for-profit websites such as Expedia and have launched their own online tools such as the Consumer Financial Protection Bureau’s mortgage calculator. These digital intermediaries aim to guide people toward better schools, healthier food, and more savings. But enthusiasm for this regulatory paradigm rests on two questionable assumptions. First, digital intermediaries effectively police consumer markets. Second, they require minimal government involvement. Instead, some for-profit online advisers such as travel websites have become what many mortgage brokers were before the 2008 financial crisis. …


The Corporation As Courthouse, Rory Van Loo Jan 2016

The Corporation As Courthouse, Rory Van Loo

Faculty Scholarship

Despite the considerable attention paid to mandatory arbitration, few consumer disputes ever reach arbitration. By contrast, institutions such as Apple’s customer service department handle hundreds of millions of disputes annually. This Article argues that understanding businesses’ internal dispute processes is crucial to diagnosing consumers’ procedural needs. Moreover, businesses’ internal processes interact with a larger system of private actors. These actors include ratings websites that mete out reputational sanctions. The system also includes other corporations linked to the transaction, such as when American Express adjudicates a contested sale between a shopper and Home Depot. This vast private order offers promise to …


Reviving Implied Confidentiality, Woodrow Hartzog Jan 2014

Reviving Implied Confidentiality, Woodrow Hartzog

Faculty Scholarship

The law of online relationships has a significant flaw-it regularly fails to account for the possibility of an implied confidence. The established doctrine of implied confidentiality is, without explanation, almost entirely absent from online jurisprudence in environments where it has traditionally been applied offline, such as with sensitive data sets and intimate social interactions.

Courts' abandonment of implied confidentiality in online environments should have been foreseen. The concept has not been developed enough to be consistently applied in environments such as the Internet that lack obvious physical or contextual cues of confidence. This absence is significant because implied confidentiality could …


Rethinking Online Privacy In Canada: Commentary On Voltage Pictures V. John And Jane Doe, Ngozi Okidegbe Jan 2014

Rethinking Online Privacy In Canada: Commentary On Voltage Pictures V. John And Jane Doe, Ngozi Okidegbe

Faculty Scholarship

This article problematizes the use of the bona fide case standard as the legal standard for a court to order a third party Internet Service Provider ("ISP") to disclose subscriber information to a copyright owner in online piracy cases. It argues that ISP account holders have a reasonable expectation of privacy in their subscriber information. It contends that the current bona fide case standard affords a relatively low threshold of protection for Internet users’ subscriber information. The reason for which the article takes this position is that the bona fide case standard can be met solely by IP address evidence, …


A Fork In The Stream: The Unjustified Failure Of The Concurrence In J. Mcintyre Machinery Ltd. V. Nicastro To Clarify The Stream Of Commerce Doctrine, Cody Jacobs Jan 2013

A Fork In The Stream: The Unjustified Failure Of The Concurrence In J. Mcintyre Machinery Ltd. V. Nicastro To Clarify The Stream Of Commerce Doctrine, Cody Jacobs

Faculty Scholarship

This article critiques the concurring opinion in the recent United States Supreme Court personal jurisdiction decision in J. McIntyre Machinery Ltd. v. Nicastro. That opinion declined to choose between the competing approaches to the stream of commerce doctrine because of perceived flaws in those approaches and because the facts of Nicastro did not involve modern technology.

Consumer products are increasingly distributed through international distribution chains. Whether foreign manufacturers who utilize such chains are amenable to personal jurisdiction in states where their products are distributed has become a hotly litigated issue because of the Supreme Court’s 4-4-1 split decision over 20 …


Chain-Link Confidentiality, Woodrow Hartzog Jan 2012

Chain-Link Confidentiality, Woodrow Hartzog

Faculty Scholarship

Disclosing personal information online often feels like losing control over one’s data forever; but this loss is not inevitable. This essay proposes a “chain-link confidentiality” approach to protecting online privacy. One of the most difficult challenges to guarding privacy in the digital age is the protection of information once it is exposed to other people. A chain-link confidentiality regime would contractually link the disclosure of personal information to obligations to protect that information as the information moves downstream. The system would focus on the relationships not only between the discloser of information and the initial recipient, but also between the …


Patent Litigation And The Internet, Samantha Zyontz, John R. Allison, Emerson H. Tiller, Tristan Bligh Jan 2012

Patent Litigation And The Internet, Samantha Zyontz, John R. Allison, Emerson H. Tiller, Tristan Bligh

Faculty Scholarship

Patent infringement litigation has not only increased dramatically in frequency over the past few decades,1 but also has also seen striking growth in both stakes and cost.2 Although a relatively rich literature has added much to our understanding of the nature, causes, and consequences of patent litigation during the past two decades,3 many interesting questions remain inadequately addressed. The nuances of and trends in patent litigation in different technology fields and industries, for example, are still understudied.4 Litigation of patents on new technologies has likewise received a dearth of attention. Here we seek to help begin …


Website Design As Contract, Woodrow Hartzog Jan 2011

Website Design As Contract, Woodrow Hartzog

Faculty Scholarship

Few website users actually read or rely upon terms of use or privacy policies. Yet users regularly take advantage of and rely upon website design features like privacy settings. To reconcile the disparity between boilerplate legalese and website design, this article develops a theory of website design as contract. The ability to choose privacy settings, un-tag photos, and delete information is part of the negotiation between websites and users regarding their privacy. Yet courts invariably recognize only the boilerplate terms when analyzing online agreements. In this article, I propose that if significant website features are incorporated into the terms of …


The In Rem Forfeiture Of Copyright-Infringing Domain Names, Andrew Sellars Jan 2011

The In Rem Forfeiture Of Copyright-Infringing Domain Names, Andrew Sellars

Faculty Scholarship

In the summer of 2010, the Immigration and Customs Enforcement Division of the Department of Homeland Security began "Operation In Our Sites," an enforcement sweep targeted towards websites allegedly dealing in counterfeit goods and copyright-infringing files. The operation targeted the websites by proceeding in rem against their respective domain names. For websites targeted for copyright infringement, ICE Agents used recently-expanded copyright forfeiture remedies passed under the 2008 PRO-IP Act, providing no adversarial hearing prior to the websites being removed, and only a probable cause standard of proof.

This Paper examines three specific harms resulting from Operation In Our Sites, and …


Virtual Intermediaries: Consumption Tax Problems In Japan, Europe, And The United States - The Case Of The Virtual Travel Agent, Richard Thompson Ainsworth Mar 2010

Virtual Intermediaries: Consumption Tax Problems In Japan, Europe, And The United States - The Case Of The Virtual Travel Agent, Richard Thompson Ainsworth

Faculty Scholarship

Marketplace technology is (inadvertently) chipping away at the effectiveness of consumption taxes – the Japanese Consumption Tax (CT), the European value added tax (VAT), and the American sales tax (ST) are all affected. Frequently a technology-patch or a law change can repair the tax-damage, but sometimes even though a patch or a change is known the design of the levy (or the politics behind the design) impedes application. This paper assesses these consumption taxes by considering the impact that virtual travel agents have had on revenue yields. The paper draws specific conclusions for the Japanese CT, because this consumption tax …


Defending Disclosure In Software Licensing, Maureen A. O'Rourke Jan 2010

Defending Disclosure In Software Licensing, Maureen A. O'Rourke

Faculty Scholarship

For lack of our imagination, this article does not have the most scintillating title. However, the subject matter is critically important. We survey prominent kinds of disclosures in law and show why the disclosure tool, though subject to substantial criticism, is central to the legitimacy of any legal regime. Our working example is the American Law Institute’s “Principles of the Law of Software Contracts” (hereinafter “ALI Principles”).

The ALI Principles include three kinds of disclosure: disclosure of facts (concerning the quality of software),disclosure of terms (of standard forms), and disclosure of post-contract intentions (to pursue remote disablement of software). We …


Virtual Intermediaries Ii - Canadian Solutions (Drop Shipments) Compared With Us, Japanese & Eu Approaches, Richard Thompson Ainsworth Dec 2009

Virtual Intermediaries Ii - Canadian Solutions (Drop Shipments) Compared With Us, Japanese & Eu Approaches, Richard Thompson Ainsworth

Faculty Scholarship

Virtual travel agents are opportunistic internet-based travel agents. They are intermediary businesses that create mutually beneficial three-party transactions that secure accommodations for a traveler that: (a) meet the basic needs of the traveler (at a discount), (b) fills vacant room for accommodation retailers with guests that pay below market, but above standard costs, and (c) profit from the extra cash, the margin in the transaction.

The virtual intermediary’s eye is always on the discount and the cash flow. One of the things that catches their attention are the accommodation taxes which they collect from the traveler in advance and remit …


Governing By Negotiation: The Internet Naming System, Tamar Frankel Oct 2004

Governing By Negotiation: The Internet Naming System, Tamar Frankel

Faculty Scholarship

This Article is about the governance of the Internet naming system. The subject is fascinating, not simply because the naming system is an important system affecting the Internet, although it is; and not because the Internet is important, although it is. The subject is fascinating because it offers a rare opportunity to examine and learn from the evolution of an incoherent governance structure. The naming system is special in that it is the product of a new technology; it reflects the changes and pressures brought by the new technology, and involves the interests of government and private entities, domestic and …


Fire, Metaphor, And Constitutional Myth-Making, Robert L. Tsai Jan 2004

Fire, Metaphor, And Constitutional Myth-Making, Robert L. Tsai

Faculty Scholarship

From the standpoint of traditional legal thought, metaphor is at best a dash of poetry adorning lawyerly analysis, and at worst an unjustifiable distraction from what is actually at stake in a legal contest. By contrast, in the eyes of those who view law as a close relative of ordinary language, metaphor is a basic building block of human understanding. This article accepts that metaphor helps us to comprehend a court's decision. At the same time, it argues that metaphor plays a special role in the realm of constitutional discourse. Metaphor in constitutional law not only reinforces doctrinal categories, but …


The Managing Lawmaker In Cyberspace: A Power Model, Tamar Frankel Jan 2002

The Managing Lawmaker In Cyberspace: A Power Model, Tamar Frankel

Faculty Scholarship

This Article is about power - the ability to gain obedience whether by captivating followers, persuading skeptics or awarding and withdrawing economic benefits. The purpose of this Article is to analyze how the power of the Internet Corporation for Names and Numbers ("ICANN") was created, augmented, strengthened and reined in. Many controversies surround ICANN, including the very foundation of its existence - the need for a single "root" in the Internet naming infrastructure - its organizational form and accountability, and the utterances, policies and actions of its management.

The purpose of this Article is not to argue and prescribe but …


What The Future Holds: Policy Choices In A Global Marketplace, Maureen A. O'Rourke Jan 2001

What The Future Holds: Policy Choices In A Global Marketplace, Maureen A. O'Rourke

Faculty Scholarship

This essay's title is a misnomer. No one knows "What the Future Holds" in the global marketplace. We can, however, make some educated guesses about the issues that will assume particular importance in the next year or so. Thus, the essay might be more accurately titled, "What May or May Not Be the Important Issues in Internet Commerce in the Next Year or So'"-less catchy, admittedly, but closer to the truth.


Researching International Environmental Law, Ronald E. Wheeler Jan 2001

Researching International Environmental Law, Ronald E. Wheeler

Faculty Scholarship

Question: I would like to use the Internet to research issues involving international law, specifically international environmental law. How can I access relevant information quickly if I have very little information to begin with?


Shaping Competition On The Internet: Who Owns Product And Pricing Information, Maureen A. O'Rourke Jan 2000

Shaping Competition On The Internet: Who Owns Product And Pricing Information, Maureen A. O'Rourke

Faculty Scholarship

Historically, markets have almost always fallen short of satisfying the conditions for and providing consumers with the benefits of perfect competition. Certain characteristics of electronic markets, however, enhance the possibility that e-commercel will be conducted in an environment that comes closer to attaining the perfectly competitive ideal than that of most conventional markets.


Progressing Towards A Uniform Commercial Code For Electronic Commerce Or Racing Toward Nonuniformity?, Maureen A. O'Rourke Jan 1999

Progressing Towards A Uniform Commercial Code For Electronic Commerce Or Racing Toward Nonuniformity?, Maureen A. O'Rourke

Faculty Scholarship

The Magaziner Report encourages the development of a consistent commercial law environment against which electronic commerce transactions may take place. The author considers the current legal landscape, noting that while many efforts are underway to codify aspects of electronic commerce, these efforts are piecemeal in nature and may lead to the very lack of uniformity against which the Magaziner Report counsels. The author then briefly considers what lessons may be learned from the drafting history of the original U.C.C. as well as proposed Article 2B (now the Uniform Computer Information Transactions Act) governing transactions in computer information. She argues that …


The Internet, Securities Regulation, And Theory Of Law, Tamar Frankel Jan 1999

The Internet, Securities Regulation, And Theory Of Law, Tamar Frankel

Faculty Scholarship

Rarely has a change in the environment affected society as dramatically as the Internet. It has transformed the way we retain, transfer, and exchange information. At minimal cost, the Internet offers us far more information at a faster pace than ever before. It enables us to interact around the globe with more people than at any time in the past. When such dramatic environmental changes occur, drastic changes in the law often follow. 1 The Internet affects the environment in which securities markets operate, and the laws that govern them. 2 The use of the Internet has already begun to …