Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 55

Full-Text Articles in Law

Bipa: What Does It Stand For?, Paige Smith Apr 2021

Bipa: What Does It Stand For?, Paige Smith

Chicago-Kent Law Review

No abstract provided.


Making Civilian Drones Safe: Performance Standards, Self-Certification, And Post-Sale Data Collection, Henry Perritt, Albert Plawinski Jan 2016

Making Civilian Drones Safe: Performance Standards, Self-Certification, And Post-Sale Data Collection, Henry Perritt, Albert Plawinski

All Faculty Scholarship

With millions of small drones in private hands, the FAA continues its struggle to develop an effective regulatory regime to comply with Congress’s mandate to integrate them into the national airspace system. Thousands of individuals and small businesses have obtained authorization from the FAA—"section 333 exemptions"—allowing them to fly their drones commercially. Farmers, TV stations, surveyors, construction-site supervisors, real estate agents, people selling their properties, and managers seeking cheaper and safer ways to inspect their facilities, want to hire the exemption holders, but many are holding back until the FAA clarifies the groundrules.The FAA understands that its traditional approach for …


One Centimeter Over My Back Yard: Where Does Federal Preemption Of State Drone Regulation Start?, Henry H. Perritt Jr. Oct 2015

One Centimeter Over My Back Yard: Where Does Federal Preemption Of State Drone Regulation Start?, Henry H. Perritt Jr.

All Faculty Scholarship

The proliferation of cheap civilian drones and their obvious utility for precision agriculture, motion picture and television production, aerial surveying, newsgathering, utility infrastructure inspection, and disaster relief has accelerated the FAA’s sluggish effort to develop a proposal for generally applicable rules and caused it to grant more than 600 “section 333 exemptions” permitting commercial drone flight before its rules are finalized.

Federal preemption in the field of aviation safety regulation is generally assumed, but political pressure on states and municipalities to regulate drones and the ability of this revolutionary aviation technology to open up space close to the ground for …


Preventing Juror Misconduct In A Digital World, Thaddeus Hoffmeister Jun 2015

Preventing Juror Misconduct In A Digital World, Thaddeus Hoffmeister

Chicago-Kent Law Review

This article examines the reform efforts employed by common law countries to address internet-related juror misconduct, which generally arises when jurors use technology to improperly research or discuss a case. The three specific areas of reform are (1) punishment, (2) oversight, and (3) education. The first measure can take various forms ranging from fines to public embarrassment to incarceration. The common theme with all punishments is that once imposed, they make citizens less inclined to want to serve as jurors. Therefore, penalties should be a last resort in preventing juror misconduct.

The second reform measure is oversight, which occurs in …


The Self, The Stasi, The Nsa: Privacy, Knowledge, And Complicity In The Surveillance State, Richard Warner, Robert H. Sloan Jan 2015

The Self, The Stasi, The Nsa: Privacy, Knowledge, And Complicity In The Surveillance State, Richard Warner, Robert H. Sloan

All Faculty Scholarship

We focus on privacy in public. The notion dates back over a century, at least to the work of the German sociologist, Georg Simmel. Simmel observed that people voluntarily limit their knowledge of each other as they interact in a wide variety of social and commercial roles, thereby making certain information private relative to the interaction even if it is otherwise publicly available. Current governmental surveillance in the US (and elsewhere) reduces privacy in public. But to what extent?

The question matters because adequate self-realization requires adequate privacy in public. That in turn depends on informational norms, social norms that …


Self, Privacy, And Power: Is It All Over?, Richard Warner, Robert H. Sloan Oct 2014

Self, Privacy, And Power: Is It All Over?, Richard Warner, Robert H. Sloan

All Faculty Scholarship

The realization of a multifaceted self is an ideal one strives to realize. One realizes such a self in large part through interaction with others in various social roles. Such realization requires a significant degree of informational privacy. Informational privacy is the ability to determine for yourself when others may collect and how they may use your information. The realization of multifaceted selves requires informational privacy in public. There is no contradiction here: informational privacy is a matter of control, and you can have such control in public. Current information processing practices greatly reduce privacy in public thereby threatening the …


Sharing Public Safety Helicopters, Henry H. Perritt Jr. Apr 2014

Sharing Public Safety Helicopters, Henry H. Perritt Jr.

All Faculty Scholarship

No abstract provided.


Drones, Henry H. Perritt Jr., Eliot O. Sprague Apr 2014

Drones, Henry H. Perritt Jr., Eliot O. Sprague

All Faculty Scholarship

Abstract

Drone technology is evolving rapidly. Microdrones—what the FAA calls “sUAS”—already on the market at the $1,000 level, have the capability to supplement manned helicopters in support of public safety operations, news reporting, and powerline and pipeline patrol, when manned helicopter support is infeasible, untimely, or unsafe.

Larger drones–"machodrones”–are not yet available outside battlefield and counterterrorism spaces. Approximating the size of manned helicopters, but without pilots, or with human pilots being optional, their design is still in its infancy as designers await greater clarity in the regulatory requirements that will drive airworthiness certification.

This article evaluates drone technology and design …


Beyond Notice And Choice: Privacy, Norms, And Consent, Richard Warner, Robert Sloan Jan 2013

Beyond Notice And Choice: Privacy, Norms, And Consent, Richard Warner, Robert Sloan

All Faculty Scholarship

Informational privacy is the ability to determine for yourself when and how others may collect and use your information. Adequate informational privacy requires a sufficiently broad ability to give or withhold free and informed consent to proposed uses.

Notice and Choice (sometimes also called “notice and consent”) is the current paradigm for consent online. The Notice is a presentation of terms, typically in a privacy policy or terms of use agreement. The Choice is an action signifying acceptance of the terms, typically clicking on an “I agree” button, or simply using the website. Recent reports by the Federal Trade Commission …


Dueling Values: The Clash Of Cyber Suicide Speech And The First Amendment, Thea E. Potanos Apr 2012

Dueling Values: The Clash Of Cyber Suicide Speech And The First Amendment, Thea E. Potanos

Chicago-Kent Law Review

On March 15, 2011, William Melchert-Dinkel, a Minnesota nurse, was convicted of two counts of assisted suicide, based solely on things he said in emails and online chat rooms. This note examines whether cyber speech encouraging suicide, such as Melchert-Dinkel's, should be protected by the First Amendment. States have compelling interests in preserving life, preventing suicide, and protecting vulnerable persons from abuse, and the majority of them have assisted suicide statutes that could be applied to cyber-suicide speech. However, because cyber- suicide speech does not fit neatly into recognized categories of "low-value" or unprotected speech, punishment may be foreclosed by …


Digital Originality, Edward Lee Jan 2012

Digital Originality, Edward Lee

All Faculty Scholarship

This Article examines the doctrine of originality in U.S. copyright law and proposes a reconfigured, three-part test that can better analyze issues of first impression involving works created with new digital technologies. The proposed test, encapsulated by the concept of digital originality, provides much needed guidance to courts to address the increasing complexities of digital creations in the twenty-first century.


The Conundrum Of Cameras In The Courtroom, Nancy S. Marder Jan 2012

The Conundrum Of Cameras In The Courtroom, Nancy S. Marder

All Faculty Scholarship

In spite of a communications revolution that has given the public access to new media in new places, the revolution has been stopped cold at the steps to the U.S. federal courthouse. The question whether to allow television cameras in federal courtrooms has aroused strong passions on both sides, and Congress keeps threatening to settle the debate and permit cameras in federal courts. Proponents of cameras in federal courtrooms focus mainly on the need to educate the public and to make judges accountable, whereas opponents focus predominantly on the ways in which cameras can affect participants’ behavior and compromise the …


The Internet At 20: Evolution Of A Constitution For Cyberspace, Henry H. Perritt Jr. Jan 2012

The Internet At 20: Evolution Of A Constitution For Cyberspace, Henry H. Perritt Jr.

All Faculty Scholarship

This Article looks back over the Internet’s first twenty years, highlighting the crucial legal decisions by the executive, legislative, and judicial branches that have led to the Internet’s success, and which now frame its constitution. I participated in many of these decisions and wrote more than a dozen law review articles and reports suggesting directions for public policy and law. This Article uses this foundation to consider the future, focusing on major legal controversies, the resolution of which will define the Internet’s third decade—either strengthening or undermining its constitution.


Twittering Away The Right Of Publicity: Personality Rights And Celebrity Impersonation On Social Networking Websites, Andrew M. Jung Dec 2010

Twittering Away The Right Of Publicity: Personality Rights And Celebrity Impersonation On Social Networking Websites, Andrew M. Jung

Chicago-Kent Law Review

Within the past couple of years, social networking websites have become an immensely popular destination for people from all walks of life. Websites like Facebook and Twitter now count tens of millions of worldwide users, including world leaders and a number of celebrities. Eventually, users realized that social networking websites lent themselves to the quick and easy impersonation of celebrities through the creation of fake social networking accounts, often as a form of parody. One subject of such impersonation was professional baseball manager Tony La Russa, who took the then-unprecedented step of suing his impersonators and Twitter over the incident. …


Remixing Lessig (Reviewing Lawrence Lessig, Remix (2008)), Edward Lee Jan 2010

Remixing Lessig (Reviewing Lawrence Lessig, Remix (2008)), Edward Lee

All Faculty Scholarship

This book review analyzes - and remixes - Lawrence Lessig's last copyright-related book, "Remix." It takes the central ideas, including some quotations, from Remix, and transforms them with some new examples and commentary of my own. Part I summarizes and critiques Lessig’s discussion of (1) the remix and read-write (RW) culture, and (2) its relationship to the sharing, commercial, and hybrid economies. Part II discusses some of Lessig’s reform proposals for our copyright system to foster a remix culture.


Reasons Why We Should Amend The Constitution To Protect Privacy, Deborah Pierce Jun 2009

Reasons Why We Should Amend The Constitution To Protect Privacy, Deborah Pierce

Chicago-Kent Law Review

Threats to consumer privacy are many, and varied. Some threats come from corporate entities such as data aggregators and social networking sites; while others come from panoptics government surveillance systems such as Secure Flight. Not only can the data be compromised, but consumers may be adversely affected by incorrect information in their files. The time may be right to explicitly protect privacy via a constitutional amendment to the U.S. Constitution.


Coding Privacy, Lilian Edwards Jun 2009

Coding Privacy, Lilian Edwards

Chicago-Kent Law Review

Lawrence Lessig famously and usefully argues that cyberspace is regulated not just by law but also by norms, markets and architecture or "code." His insightful work might also lead the unwary to conclude, however, that code is inherently anti-privacy, and thus that an increasingly digital world must therefore also be increasingly devoid of privacy. This paper argues briefly that since technology is a neutral tool, code can be designed as much to fight for privacy as against it, and that what matters now is to look at what incentivizes the creation of pro- rather than anti-privacy code in the mainstream …


Peer-To-Peering Beyond The Horizon: Can A P2p Network Avoid Liability By Adapting Its Technological Structure?, Matthew G. Minder Jun 2009

Peer-To-Peering Beyond The Horizon: Can A P2p Network Avoid Liability By Adapting Its Technological Structure?, Matthew G. Minder

Chicago-Kent Law Review

Peer-to-peer networks are often used to infringe copyrights, but they also serve some legitimate purposes consistent with copyright law. In attempting to find a satisfactor solution, this note develops and analyzes two models that future peer-to-peer networks could employ to attempt to avoid liability for copyright infringement. The note then analyzes the law, applies the two models to the relevant legal tests, and analyzes whether a peer-to-peer network operating on each model could avoid liability for copyright infringement. It concludes that modifying their technological structure may help peer-to-peer networks avoid liability, but that some risks remain.


Cyberjuries: A New Role As Online Mock Juries, Nancy S. Marder Feb 2006

Cyberjuries: A New Role As Online Mock Juries, Nancy S. Marder

All Faculty Scholarship

No abstract provided.


The Speech-Enhancing Effect Of Internet Regulation, Emily Buss Apr 2004

The Speech-Enhancing Effect Of Internet Regulation, Emily Buss

Chicago-Kent Law Review

In this Article, the author suggests that certain speech-reducing regulations will, in fact, be speech-enhancing for children. This is because children are vulnerable to far greater censorship at the hands of their parents than at the hands of Internet regulators. Regulations that inspire parents to relax their grip on their children's access to information are likely to produce significant net speech gains for children. Viewed this way, regulations designed to protect children can be conceived as pitting the speech interests of adults against the speech interests of children. The Article suggests a number of reasons we might value the children's …


When Well-Being Trumps Liberty: Political Theory, Jurisprudence, And Children's Rights, William Galston Apr 2004

When Well-Being Trumps Liberty: Political Theory, Jurisprudence, And Children's Rights, William Galston

Chicago-Kent Law Review

Compared to most adults, children are dependent and vulnerable and therefore require special protection. Efforts to safeguard their well-being often collide with one or more of the liberty guarantees of the First Amendment. Professor Etzioni fears that current jurisprudence has tipped the balance too far towards individual liberty, making it difficult to extend children the legal protection they need. Drawing on a theoretical account of constitutionalism as well as existing case law, the author argues that mainstream jurisprudence is up to the task of balancing the well-being of children against the liberty of adults. The Supreme Court's recent decision in …


On Protecting Children From Speech, Amitai Etzioni Apr 2004

On Protecting Children From Speech, Amitai Etzioni

Chicago-Kent Law Review

Are children entitled to the same First Amendment rights as adults? This Article explores the constitutionality of limiting children's access to objectionable materials assuming that both free speech rights and the protection of children are two core values that, like all other social values, must be balanced. When used to assess specific court cases and public policies, the balancing principle is a helpful guide in determining whether voluntary or incentives-based programs are sufficient to remedy the problems at hand or whether government regulation of free speech is necessary. The Article analyzes five court cases involving Internet filters in libraries, the …


The Liberal Theory Of Freedom Of Expression For Children, Colin M. Macleod Apr 2004

The Liberal Theory Of Freedom Of Expression For Children, Colin M. Macleod

Chicago-Kent Law Review

This Article develops a liberal theory of freedom of expression which is sensitive to the interests of children as distinct, vulnerable but developing members of society. I argue that children have, in addition to welfare interests, interests in the development and exercise of basic moral powers. In virtue of such interests, children acquire, well before they become adults, nontrivial rights of free expression. Respecting children's rights to free expression entails limits on the prerogatives of parents and others to determine the sorts of cultural materials children should be permitted access. Nonetheless children's rights are importantly different from those of adults. …


Free Speech And Children's Interests, David Archard Apr 2004

Free Speech And Children's Interests, David Archard

Chicago-Kent Law Review

This Article endorses the conclusion of Etzioni's article that the First Amendment right of free speech should not trump the interests of children. However the picture is more complicated once we recognize that parents have a "basic" right to bring up their children as they see fit that may conflict with the state's duty to protect children in its jurisdiction.

Moreover there is an important difference between protecting children now from harms and safeguarding the interests of the adults they will grow into. Society has an interest in protecting children based upon its fundamental interest in ensuring the conditions of …


Toward A Constitutional Regulation Of Minors' Access To Harmful Internet Speech, Dawn C. Nunziato Apr 2004

Toward A Constitutional Regulation Of Minors' Access To Harmful Internet Speech, Dawn C. Nunziato

Chicago-Kent Law Review

In this Article, Prof. Nunziato scrutinizes Congress's recent efforts to regulate access to sexually-themed Internet speech. The first such effort, embodied in the Communications Decency Act, failed to take into account the Supreme Court's carefully-honed obscenity and obscenity-for-minors jurisprudence. The second, embodied in the Child Online Protection Act, attended carefully to Supreme Court precedent, but failed to account for the geographic variability in definitions of obscene speech. Finally, the recently-enacted Children's Internet Protection Act apparently remedies the constitutional deficiencies identified in these two prior legislative efforts, but runs the risk of being implemented in a manner that fails to protect …


Shielding Children: The European Way, Michael D. Birnhack, Jacob H. Rowbottom Apr 2004

Shielding Children: The European Way, Michael D. Birnhack, Jacob H. Rowbottom

Chicago-Kent Law Review

The Internet crosses physical borders, and carries with it both its promises and its harms to many different countries and societies. These countries thus share the same technology, but they do not necessarily share the same set of values or legal system. This Article compares the legal response in the United States and in Europe to one important issue: the exposure of children to certain materials, which are deemed harmful to them but not harmful to adults.

This US-European comparison, in which the experience in the United Kingdom serves as a leading example, illustrates the traits of various kinds of …


On Protecting Children—From Censorship: A Reply To Amitai Etzioni, Marjorie Heins Apr 2004

On Protecting Children—From Censorship: A Reply To Amitai Etzioni, Marjorie Heins

Chicago-Kent Law Review

Etzioni's argument for censorship of minors ignores the fundamental problem with Internet filters, misstates the results of media-effects research, and uses emotional terms like "protection" and "harm" to mask moral judgments about what is appropriate for youth.

Given the size and constantly changing character of the Internet, filters necessarily rely on key words and phrases. As a result, thousands of valuable Web pages are mistakenly blocked by filters, even at their narrowest settings. The problem is inherent in the system.

Most media-effects studies do not show a causal link between violent content and violent (or "aggressive") behavior. The studies that …


The Need For A Two (Or More) Tiered First Amendment To Provide For The Protection Of Children, Kevin W. Saunders Apr 2004

The Need For A Two (Or More) Tiered First Amendment To Provide For The Protection Of Children, Kevin W. Saunders

Chicago-Kent Law Review

This Article addresses the two sorts of problems raised by Professor Etzioni, while also responding to the earlier articles in this Symposium. With regard to the spillover effect, the author argues that there are ways to limit the effect on adults of restrictions designed to protect children, even on the Internet. Furthermore, some spillover effect is allowed and may leave open the possibility of protecting children from tobacco or alcohol advertisements. The Article also addresses areas in which material has been seen as protected even for children. While agreeing that depictions of violence pose an important problem, the Article also …


Response, Amitai Etzioni Apr 2004

Response, Amitai Etzioni

Chicago-Kent Law Review

No abstract provided.


Towards A Hybrid Regulatory Scheme For The Internet, Henry H. Perritt Jr. Mar 2001

Towards A Hybrid Regulatory Scheme For The Internet, Henry H. Perritt Jr.

All Faculty Scholarship

No abstract provided.