Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Law

Consenting To Computer Use, James Grimmelmann Dec 2016

Consenting To Computer Use, James Grimmelmann

Cornell Law Faculty Publications

The federal Computer Fraud and Abuse Act (CFAA) makes it a crime to “access a computer without authorization or exceed authorized access.” Courts and commentators have struggled to explain what types of conduct by a computer user are “without authorization.” But this approach is backwards; authorization is not so much a question of what a computer user does, as it is a question of what a computer owner allows.

In other words, authorization under the CFAA is an issue of consent, not conduct; to understand authorization, we need to understand consent. Building on Peter Westen’s taxonomy of consent, I argue …


Data Institutionalism: A Reply To Andrew Woods, Zachary D. Clopton Jul 2016

Data Institutionalism: A Reply To Andrew Woods, Zachary D. Clopton

Cornell Law Faculty Publications

In "Against Data Exceptionalism," Andrew K. Woods explores “one of the greatest societal and technological shifts in recent years,” which manifests in the “same old” questions about government power. The global cloud is an important feature of modern technological life that has significant consequences for individual privacy, law enforcement, and governance. Yet, as Woods suggests, the legal challenges presented by the cloud have analogies in age-old puzzles of public and private international law.

Identifying these connections is a conceptual advance, and this contribution should not be understated. But, to my mind, the most telling statement in Woods’s excellent article comes …


There's No Such Thing As A Computer-Authored Work - And It's A Good Thing, Too, James Grimmelmann Jan 2016

There's No Such Thing As A Computer-Authored Work - And It's A Good Thing, Too, James Grimmelmann

Cornell Law Faculty Publications

Treating computers as authors for copyright purposes is a non-solution to a non-problem. It is a non-solution because unless and until computer programs can qualify as persons in life and law, it does no practical good to call them "authors" when someone else will end up owning the copyright anyway. And it responds to a non-problem because there is nothing actually distinctive about computer-generated works.

There are five plausible ways in which computer-generated works might be considered meaningfully different from human-generated works: (1) they are embedded in digital copies, (2) people create them using computers rather than by hand, (3) …


Territoriality, Technology, And National Security, Zachary D. Clopton Jan 2016

Territoriality, Technology, And National Security, Zachary D. Clopton

Cornell Law Faculty Publications

Across various contexts, parties and courts have pressed for territorial rules in cases implicating technology and national security. This Essay suggests that presumptively territorial approaches to these questions are misguided. Territorial rules do not track the division of authority or capacity among the branches, nor are they effective proxies for the important interests of regulators or regulatees. On issues of technology and national security, territorial rules seem particularly ill suited: territorial rules aspire to certainty, but technology makes it harder to define “territoriality” in a consistent and predictable way; technology weakens territoriality as a proxy for policy goals because data …


Copyright For Literate Robots, James Grimmelmann Jan 2016

Copyright For Literate Robots, James Grimmelmann

Cornell Law Faculty Publications

Almost by accident, copyright has concluded that copyright law is for humans only: reading performed by computers doesn't count as infringement. Conceptually, this makes sense: copyright's ideal of romantic readership involves humans writing for other humans. But in an age when more and more manipulation of copyrighted works is carried out by automated processes, this split between human reading (infringement) and robotic reading (exempt) has odd consequences and creates its own tendencies toward a copyright system in which humans occupy a surprisingly peripheral place. This essay describes the shifts in fair use law that brought us here and reflects on …