Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 10 of 10
Full-Text Articles in Law
Responding To Mass, Computer-Generated, And Malattributed Comments, Steven J. Balla, Reeve Bull, Bridget C.E. Dooling, Emily Hammond, Michael A. Livermore, Michael Herz, Beth Simone Noveck
Responding To Mass, Computer-Generated, And Malattributed Comments, Steven J. Balla, Reeve Bull, Bridget C.E. Dooling, Emily Hammond, Michael A. Livermore, Michael Herz, Beth Simone Noveck
Articles
A number of technological and political forces have transformed the once staid and insider dominated notice-and-comment process into a forum for large scale, sometimes messy, participation in regulatory decisionmaking. It is not unheard of for agencies to receive millions of comments on rulemakings; often these comments are received as part of organized mass comment campaigns. In some rulemakings, questions have been raised about whether public comments were submitted under false names, or were automatically generated by computer “bot” programs. In this Article, we examine whether and to what extent such submissions are problematic and make recommendations for how rulemaking agencies …
Fraudulent Malattributed Comments In Agency Rulemaking, Michael Herz
Fraudulent Malattributed Comments In Agency Rulemaking, Michael Herz
Articles
A specter is haunting notice-and-comment rulemaking—the specter of fraudulent comments. The stand-out example—the apotheosis—was the Federal Communications Commission’s (FCC) net neutrality rulemaking in 2017. Well over twenty million comments were submitted, but millions of those were highly suspect. It turns out only about 800,000 of those comments were unique—that is, not written by a computer and not a pre-written form letter or variation thereof. And of the rest, perhaps half were submitted by computers (bots) using fictitious names or the names of real people, living and dead, who had no connection to the comment.
Taking Data, Michael C. Pollack
Taking Data, Michael C. Pollack
Articles
Technological development has created new forms of information, altered expectations of privacy, and given law enforcement more tools to examine that information and intrude on that privacy. One crucial facet of these changes involves internet service providers (ISPs): as people expose more of their lives to their ISPs—all the websites they visit, people they communicate with, emails they send, files they store, and more—law enforcement efforts to access that data become more and more common. But scholars and policymakers alike recognize that the existing statutory frameworks governing those efforts are based on obsolete technology and strike balances that are difficult …
Data Collection And The Regulatory State, Hillary Green, James Cooper, Ahmed Ghappour, Felix Wu
Data Collection And The Regulatory State, Hillary Green, James Cooper, Ahmed Ghappour, Felix Wu
Articles
The following remarks were given on January 27, 2017 during the Connecticut Law Review's symposium, "Privacy, Security & Power: The State of Digital Surveillance."
The Commercial Difference, Felix T. Wu
The Commercial Difference, Felix T. Wu
Articles
When it comes to the First Amendment, commerciality does, and should, matter. This Article develops the view that the key distinguishing characteristic of corporate or commercial speech is that the interest at stake is “derivative,” in the sense that we care about the speech interest for reasons other than caring about the rights of the entity directly asserting a claim under the First Amendment. To say that the interest is derivative is not to say that it is unimportant, and one could find corporate and commercial speech interests to be both derivative and strong enough to apply heightened scrutiny to …
Defining Privacy And Utility In Data Sets, Felix T. Wu
Defining Privacy And Utility In Data Sets, Felix T. Wu
Articles
Is it possible to release useful data while preserving the privacy of the individuals whose information is in the database? This question has been the subject of considerable controversy, particularly in the wake of well-publicized instances in which researchers showed how to re-identify individuals in supposedly anonymous data. Some have argued that privacy and utility are fundamentally incompatible, while others have suggested that simple steps can be taken to achieve both simultaneously. Both sides have looked to the computer science literature for support.
What the existing debate has overlooked, however, is that the relationship between privacy and utility depends crucially …
The Constitutionality Of Consumer Privacy Regulation, Felix T. Wu
The Constitutionality Of Consumer Privacy Regulation, Felix T. Wu
Articles
No abstract provided.
Collateral Censorship And The Limits Of Intermediary Immunity, Felix T. Wu
Collateral Censorship And The Limits Of Intermediary Immunity, Felix T. Wu
Articles
The law often limits the liability of an intermediary for the speech it carries. And rightly so, because imposing liability on intermediaries can induce them to filter out questionable content and this “collateral censorship” risks suppressing much lawful, even highly beneficial, speech. The “collateral censorship” rationale has its limits, though, and correspondingly, so should the applicability of intermediary immunity. The worry with collateral censorship is not just that intermediaries censor, but that they censor more than an original speaker would in the face of potential liability. Increased censorship, in turn, is the product of applying liability targeted at original speakers …
Created Facts And The Flawed Ontology Of Copyright Law, Justin Hughes
Created Facts And The Flawed Ontology Of Copyright Law, Justin Hughes
Articles
It is black letter doctrine that facts are not copyrightable: facts are discovered, not created—so they will always lack the originality needed for copyright protection. As straightforward as this reasoning seems, it is fundamentally flawed. Using the “social facts” theory of philosopher John Searle, this Article explores a variety of “created facts” cases—designation systems, systematic evaluations, and privately written laws—in which original expression from private individuals is adopted by social convention and generates facts in our social reality. In the course of this discussion, the paper places facts in their historical and philosophical context, explores how courts conflate facts with …
Stupid Lawyer Tricks: An Essay On Discovery Abuse, Charles M. Yablon
Stupid Lawyer Tricks: An Essay On Discovery Abuse, Charles M. Yablon
Articles
No abstract provided.