Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 18 of 18

Full-Text Articles in Law

Comment On Part 4 Essays: Goodwin And Dailey And Rosenbury, Elizabeth S. Scott Jan 2024

Comment On Part 4 Essays: Goodwin And Dailey And Rosenbury, Elizabeth S. Scott

Faculty Scholarship

Professors Michelle Goodwin and Anne Dailey and President Laura Rosenbury have written two compelling essays on Part 4 of the Restatement of Children and the Law, dealing with Children in Society. Goodwin’s essay, She’s So Exceptional: Rape and Incest Exceptions Post-Dobbs, focuses on § 19.02 of the Restatement, dealing with the right of minors to reproductive health treatments. This Section was approved by the American Law Institute before the Supreme Court decided Dobbs v. Jackson Women’s Health Organization, overturning Roe v. Wade. In her essay, Goodwin explores the harms that will follow if minors’ right of access …


Platform Realism, Informational Inequality, And Section 230 Reform, Olivier Sylvain Jan 2022

Platform Realism, Informational Inequality, And Section 230 Reform, Olivier Sylvain

Faculty Scholarship

Online companies bear few duties under law to tend to the discrimination that they facilitate or the disinformation that they deliver. Consumers and members of historically marginalized groups are accordingly the likeliest to be harmed. These companies should bear the same, if not more, responsibility to guard against such inequalities.


“Cancel Culture” And Criminal Justice, Steven Arrigg Koh Jan 2022

“Cancel Culture” And Criminal Justice, Steven Arrigg Koh

Faculty Scholarship

This Article explores the relationship between two normative systems in modern society: “cancel culture” and criminal justice. It argues that cancel culture—a ubiquitous phenomenon in contemporary life—may rectify deficiencies of over- and under-enforcement in the U.S. criminal justice system. However, the downsides of cancel culture’s structure—imprecise factfinding, potentially disproportionate sanctions leading to collateral consequences, a “thin” conception of the wrongdoer as beyond rehabilitation, and a broader cultural anxiety that “chills” certain human conduct—reflect problematic U.S. punitive impulses that characterize our era of mass incarceration. This Article thus argues that social media reform proposals obscure a deeper necessity: transcendence of blame …


Federal Rules Of Platform Procedure, Rory Van Loo Jun 2021

Federal Rules Of Platform Procedure, Rory Van Loo

Faculty Scholarship

Tech platforms serve as private courthouses for disputes about speech, lodging, commerce, elections, and reputation. After receiving allegations of defamatory content in top search results, Google must decide between protecting one person's public image and another's profits or speech. Amazon adjudicates disputes between consumers and third-party merchants about defective or counterfeit items. For many small businesses, layoffs and bankruptcy hang in the balance. This Article begins to uncover the processes that these platforms use to resolve disputes and proposes reforms. Other important businesses that intermediate, such as credit card companies ruling on a disputed charge between a merchant and consumer, …


Deep Fakes: A Looming Challenge For Privacy, Democracy, And National Security, Danielle K. Citron, Robert Chesney Dec 2019

Deep Fakes: A Looming Challenge For Privacy, Democracy, And National Security, Danielle K. Citron, Robert Chesney

Faculty Scholarship

Harmful lies are nothing new. But the ability to distort reality has taken an exponential leap forward with “deep fake” technology. This capability makes it possible to create audio and video of real people saying and doing things they never said or did. Machine learning techniques are escalating the technology’s sophistication, making deep fakes ever more realistic and increasingly resistant to detection. Deep-fake technology has characteristics that enable rapid and widespread diffusion, putting it into the hands of both sophisticated and unsophisticated actors. While deep-fake technology will bring with it certain benefits, it also will introduce many harms. The marketplace …


Maps: Scaling Privacy Compliance Analysis To A Million Apps, Sebastian Zimmeck, Peter Story, Daniel Smullen, Abhilasha Ravichander, Ziqi Wang, Joel R. Reidenberg, N. Cameron Russell, Norman Sadeh Jan 2019

Maps: Scaling Privacy Compliance Analysis To A Million Apps, Sebastian Zimmeck, Peter Story, Daniel Smullen, Abhilasha Ravichander, Ziqi Wang, Joel R. Reidenberg, N. Cameron Russell, Norman Sadeh

Faculty Scholarship

The app economy is largely reliant on data collection as its primary revenue model. To comply with legal requirements, app developers are often obligated to notify users of their privacy practices in privacy policies. However, prior research has suggested that many developers are not accurately disclosing their apps’ privacy practices. Evaluating discrepancies between apps’ code and privacy policies enables the identification of potential compliance issues. In this study, we introduce the Mobile App Privacy System (MAPS) for conducting an extensive privacy census of Android apps. We designed a pipeline for retrieving and analyzing large app populations based on code analysis …


Apis And Your Privacy, N. Cameron Russell Jan 2019

Apis And Your Privacy, N. Cameron Russell

Faculty Scholarship

Application programming interfaces, or APIs, have been the topic of much recent discussion. Newsworthy events, including those involving Facebook’s API and Cambridge Analytica obtaining information about millions of Facebook users, have highlighted the technical capabilities of APIs for prominent websites and mobile applications. At the same time, media coverage of ways that APIs have been misused has sparked concern for potential privacy invasions and other issues of public policy. This paper seeks to educate consumers on how APIs work and how they are used within popular websites and mobile apps to gather, share, and utilize data.

APIs are used in …


A Skeptical View Of Information Fiduciaries, Lina M. Khan, David E. Pozen Jan 2019

A Skeptical View Of Information Fiduciaries, Lina M. Khan, David E. Pozen

Faculty Scholarship

The concept of “information fiduciaries” has surged to the forefront of debates on online-platform regulation. Developed by Professor Jack Balkin, the concept is meant to rebalance the relationship between ordinary individuals and the digital companies that accumulate, analyze, and sell their personal data for profit. Just as the law imposes special duties of care, confidentiality, and loyalty on doctors, lawyers, and accountants vis-à-vis their patients and clients, Balkin argues, so too should it impose special duties on corporations such as Facebook, Google, and Twitter vis-à-vis their end users. Over the past several years, this argument has garnered remarkably broad support …


Blind Spot: The Attention Economy And The Law, Tim Wu Jan 2019

Blind Spot: The Attention Economy And The Law, Tim Wu

Faculty Scholarship

Human attention, valuable and limited in supply, is a resource. It has become commonplace, especially in the media and technology industries, to speak of an "attention economy" and of competition in "attention markets.” There is even an attentional currency, the "basic attention token," which purports to serve as a medium of exchange for user attention. Firms like Facebook and Google, which have emerged as two of the most important firms in the global economy, depend nearly exclusively on attention markets as a business model.

Yet despite the well-recognized commercial importance of attention markets, antitrust and consumer protection authorities have struggled …


Extremist Speech, Compelled Conformity, And Censorship Creep, Danielle K. Citron Jan 2018

Extremist Speech, Compelled Conformity, And Censorship Creep, Danielle K. Citron

Faculty Scholarship

Silicon Valley has long been viewed as a full-throated champion of First Amendment values. The dominant online platforms, however, have recently adopted speech policies and processes that depart from the U.S. model. In an agreement with the European Commission, tech companies have pledged to respond to reports of hate speech within twenty-four hours, a hasty process that may trade valuable expression for speedy results. Plans have been announced for an industry database that will allow the same companies to share hashed images of banned extremist content for review and removal elsewhere.

These changes are less the result of voluntary market …


Digital Hollywood 2.0: Reimagining Film, Music, Television And Publishing Distribution As A Global Artist Collaborative, Jon M. Garon Jan 2013

Digital Hollywood 2.0: Reimagining Film, Music, Television And Publishing Distribution As A Global Artist Collaborative, Jon M. Garon

Faculty Scholarship

Jon M. Garon, Digital Hollywood 2.0: Reimagining Film, Music, Television and Publishing Distribution as a Global Artist Collaborative, 21 Mich. St. Int'l L. Rev. 563 (2013).

The seven largest U.S. motion picture distributors control as much as ninety percent of the U.S. domestic box office and the majority of the global theatrical box office revenues. This economic dominance in gross revenue, however, undervalues the success of financially and artistically successful works budgeted for smaller audiences. Similar economics also drive music and publishing economies. Measured solely from gross revenue, the Hollywood model of distribution dominates most markets around the world. …


Social Data, Woodrow Hartzog Jan 2013

Social Data, Woodrow Hartzog

Faculty Scholarship

As online social media grow, it is increasingly important to distinguish between the different threats to privacy that arise from the conversion of our social interactions into data. One well-recognized threat is from the robust concentrations of electronic information aggregated into colossal databases. Yet much of this same information is also consumed socially and dispersed through a user interface to hundreds, if not thousands, of peer users.

In order to distinguish relationally shared information from the threat of the electronic database, this essay identifies the massive amounts of personal information shared via the user interface of social technologies as “social …


Obscurity By Design, Woodrow Hartzog, Frederic D. Stutzman Jan 2013

Obscurity By Design, Woodrow Hartzog, Frederic D. Stutzman

Faculty Scholarship

Design-based solutions to confront technological privacy threats are becoming popular with regulators. However, these promising solutions have left the full potential of design untapped. With respect to online communication technologies, design-based solutions for privacy remain incomplete because they have yet to successfully address the trickiest aspect of the Internet — social interaction. This Article posits that privacy-protection strategies such as “Privacy by Design” face unique challenges with regard to social software and social technology due to their interactional nature.

This Article proposes that design-based solutions for social technologies benefit from increased attention to user interaction, with a focus on the …


Free Speech Versus Free Education: First Amendment Considerations In Limiting Student Athletes' Use Of Social Media, Mary Margaret Penrose Dec 2011

Free Speech Versus Free Education: First Amendment Considerations In Limiting Student Athletes' Use Of Social Media, Mary Margaret Penrose

Faculty Scholarship

This article considers the First Amendment implications regarding limitations placed on student athletes' use of social media. Schools have a vested interest in controlling their athletes' public expressions, whether such expressions are found in tattoos, public interviews or tweets. Like it or not, a great deal of damage can occur in "140 words or less." And, displeased student-athletes have choices. Twitter or touchdowns. Facebook from your dorm or facetime on television hitting three-pointers. While universities are generally places that encourage robust speech and debate, there are defensible, and arguably lawful, reasons why schools should limit student-athletes' use of social media. …


Fulfilling Government 2.0'S Promise With Robust Privacy Protections, Danielle K. Citron Jun 2010

Fulfilling Government 2.0'S Promise With Robust Privacy Protections, Danielle K. Citron

Faculty Scholarship

The public can now “friend” the White House and scores of agencies on social networks, virtual worlds, and video-sharing sites. The Obama Administration sees this trend as crucial to enhancing governmental transparency, public participation, and collaboration. As the President has underscored, government needs to tap into the public’s expertise because it doesn’t have all of the answers.

To be sure, Government 2.0 might improve civic engagement. But it also might produce privacy vulnerabilities because agencies often gain access to individuals’ social network profiles, photographs, videos, and contact lists when interacting with individuals online. Little would prevent agencies from using and …


Fulfilling Government 2.0'S Promise With Robust Privacy Protections, Danielle Keats Citron Jan 2010

Fulfilling Government 2.0'S Promise With Robust Privacy Protections, Danielle Keats Citron

Faculty Scholarship

The public can now “friend” the White House and scores of agencies on social networks, virtual worlds, and video-sharing sites. The Obama Administration sees this trend as crucial to enhancing governmental transparency, public participation, and collaboration. As the President has underscored, government needs to tap into the public’s expertise because it doesn’t have all of the answers. To be sure, Government 2.0 might improve civic engagement. But it also might produce privacy vulnerabilities because agencies often gain access to individuals’ social network profiles, photographs, videos, and contact lists when interacting with individuals online. Little would prevent agencies from using and …


Government Speech 2.0, Danielle K. Citron, Helen Norton Jan 2010

Government Speech 2.0, Danielle K. Citron, Helen Norton

Faculty Scholarship

New expressive technologies continue to transform the ways in which members of the public speak to one another. Not surprisingly, emerging technologies have changed the ways in which government speaks as well. Despite substantial shifts in how the government and other parties actually communicate, however, the Supreme Court to date has developed its government speech doctrine – which recognizes “government speech” as a defense to First Amendment challenges by plaintiffs who claim that the government has impermissibly excluded their expression based on viewpoint – only in the context of disputes involving fairly traditional forms of expression. In none of these …


About Facebook - Change At The Social-Networking Juggernaut Creates New Opportunities For Law Library Outreach, Jennifer L. Behrens Jan 2008

About Facebook - Change At The Social-Networking Juggernaut Creates New Opportunities For Law Library Outreach, Jennifer L. Behrens

Faculty Scholarship

No abstract provided.