Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Law

The Rule Of Law In Cyberspace, Mireille Hildebrandt Jun 2013

The Rule Of Law In Cyberspace, Mireille Hildebrandt

Mireille Hildebrandt

This is a translation of my inaugural lecture at Radboud University Nijmegen. The Dutch version has been published as a booklet, the English version in available on my bepress site.


Gouvernementalité Algorithmique Et Perspectives D'Émancipation : Le Disparate Comme Condition D'Individuation Par La Relation?, Antoinette Rouvroy, Thomas Berns Jan 2013

Gouvernementalité Algorithmique Et Perspectives D'Émancipation : Le Disparate Comme Condition D'Individuation Par La Relation?, Antoinette Rouvroy, Thomas Berns

Antoinette Rouvroy

La gouvernementalité algorithmique se caractérise notamment par le double mouvement suivant : a) l’abandon de toute forme d’« échelle », d’« étalon », de hiérarchie, au profit d’une normativité immanente et évolutive en temps réel, dont émerge un « double statistique » du monde et qui semble faire table rase des anciennes hiérarchies dessinée par l’homme normal ou l’homme moyen ; b) l’évitement de toute confrontation avec les individus dont les occasions de subjectivation se trouvent raréfiées. Ce double mouvement nous paraît le fruit de la focalisation de la statistique contemporaine sur les relations. Nous tentons d’évaluer dans quelle mesure …


Leashing The Internet Watchdog: Legislative Restraints On Electronic Surveillance In The U.S. And U.K., John P. Heekin Apr 2010

Leashing The Internet Watchdog: Legislative Restraints On Electronic Surveillance In The U.S. And U.K., John P. Heekin

John P. Heekin

This article examines the legislative approaches undertaken by the United States and the United Kingdom to regulate the surveillance and interception of electronic communications. Drawing from the recognition of individual privacy in each country, the author explores the development and impact of statutory provisions enacted to accomplish effective oversight of the respective intelligence services. In the U.S., the shifting purposes and provisions of the Foreign Intelligence Surveillance Act of 1978 are tracked from implementation to its revisions following the terrorist attacks of September 11, 2001. Along that timeline, a distinct trend toward greater deference to Executive authority for electronic surveillance …


The Meaning And The Mining Of Legal Texts, Mireille Hildebrandt Jan 2010

The Meaning And The Mining Of Legal Texts, Mireille Hildebrandt

Mireille Hildebrandt

Positive law, inscribed in legal texts, entails an authority not inherent in literary texts, generating legal consequences that can have real effects on a person’s life and liberty. The interpretation of legal texts, necessarily a normative undertaking, resists the mechanical application of rules, though still requiring a measure of predictability, coherence with other relevant legal norms and compliance with constitutional safeguards. The present proliferation of legal texts on the internet (codes, statutes, judgments, treaties, doctrinal treatises) renders the selection of relevant texts and cases next to impossible. We may expect that systems to mine these texts to find arguments that …


Just Click Submit: The Collection, Dissemination And Tagging Of Personally Identifying Information, Corey A. Ciocchetti Jan 2008

Just Click Submit: The Collection, Dissemination And Tagging Of Personally Identifying Information, Corey A. Ciocchetti

Corey A Ciocchetti

As the twenty-first century bustles forward, the e-commerce arena becomes an ever more dangerous place. On a daily basis, websites collect vast amounts of personally identifying information (PII) and mine it in sophisticated databases to discover consumer trends and desires. This process provides many benefits – such as tailored websites and relevant marketing – that few Web surfers would care to do without. However, serious threats lurk in cyberspace and are enhanced by consumers who continue to submit vast amounts of information in a state of relative unawareness. Not wanting to miss out on their Web surfing experience, visitors submit …


E-Commerce And Information Privacy: Privacy Policies As Personal Information Protectors, Corey A. Ciocchetti Jan 2007

E-Commerce And Information Privacy: Privacy Policies As Personal Information Protectors, Corey A. Ciocchetti

Corey A Ciocchetti

This article dives into the contemporary debate surrounding information privacy in the twenty-first century e-commerce environment through the lens of consumers submitting personally identifying information into the vast abyss of cyberspace. I argue that this information must be better protected and that United States law should emphasize electronic privacy policies as privacy-protecting devices. Currently, the United States operates under primarily a self-regulatory environment where the federal and state governments allow industry to regulate the use and content of their privacy policies. This article details current state of the United States legal regime, addresses its inefficiencies in this area and proposes …