Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Law

Misogynistic Cyber Hate Speech, Danielle Keats Citron Oct 2011

Misogynistic Cyber Hate Speech, Danielle Keats Citron

Faculty Scholarship

In her testimony, Professor Citron provided a picture of misogynistic cyber hate, from the very worst abuses involving the harassment of individuals to less virulent forms of misogyny.


Restoring Transparency To Automated Authority, Frank Pasquale Jan 2011

Restoring Transparency To Automated Authority, Frank Pasquale

Faculty Scholarship

Leading finance, health care, and internet firms shroud key operations in secrecy. Our markets, research, and life online are increasingly mediated by institutions that suffer serious transparency deficits. When a private entity grows important enough, it should be subject to transparency requirements that reflect its centrality. The increasing intertwining of governmental, business, and academic entities should provide some leverage for public-spirited appropriators and policymakers to insist on more general openness.

However well an "invisible hand" coordinates economic activity generally, markets depend on reliable information about the practices of core firms that finance, rank, and rate entities in the rest of …


Website Design As Contract, Woodrow Hartzog Jan 2011

Website Design As Contract, Woodrow Hartzog

Faculty Scholarship

Few website users actually read or rely upon terms of use or privacy policies. Yet users regularly take advantage of and rely upon website design features like privacy settings. To reconcile the disparity between boilerplate legalese and website design, this article develops a theory of website design as contract. The ability to choose privacy settings, un-tag photos, and delete information is part of the negotiation between websites and users regarding their privacy. Yet courts invariably recognize only the boilerplate terms when analyzing online agreements. In this article, I propose that if significant website features are incorporated into the terms of …


The In Rem Forfeiture Of Copyright-Infringing Domain Names, Andrew Sellars Jan 2011

The In Rem Forfeiture Of Copyright-Infringing Domain Names, Andrew Sellars

Faculty Scholarship

In the summer of 2010, the Immigration and Customs Enforcement Division of the Department of Homeland Security began "Operation In Our Sites," an enforcement sweep targeted towards websites allegedly dealing in counterfeit goods and copyright-infringing files. The operation targeted the websites by proceeding in rem against their respective domain names. For websites targeted for copyright infringement, ICE Agents used recently-expanded copyright forfeiture remedies passed under the 2008 PRO-IP Act, providing no adversarial hearing prior to the websites being removed, and only a probable cause standard of proof.

This Paper examines three specific harms resulting from Operation In Our Sites, and …


Baum Lecture 2010, Lee C. Bollinger Jan 2011

Baum Lecture 2010, Lee C. Bollinger

Faculty Scholarship

As part of the Baum Lecture Series at the University of Illinois College of Law, Columbia University President Lee C. Bollinger delivered a lecture on September 14, 2010, on the essential role of a global free press in providing the information needed to understand the many problematic issues we face as a result of globalization. In this presentation, President Bollinger addressed the challenges of maintaining high-quality institutions of American journalism with an international reporting capacity in the face of rapidly changing market forces. He further discussed America’s interest in seeing the rise of a free and independent press in nations …