Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 10 of 10

Full-Text Articles in Law

Responding To Mass, Computer-Generated, And Malattributed Comments, Steven J. Balla, Reeve Bull, Bridget C.E. Dooling, Emily Hammond, Michael A. Livermore, Michael Herz, Beth Simone Noveck Jan 2022

Responding To Mass, Computer-Generated, And Malattributed Comments, Steven J. Balla, Reeve Bull, Bridget C.E. Dooling, Emily Hammond, Michael A. Livermore, Michael Herz, Beth Simone Noveck

Articles

A number of technological and political forces have transformed the once staid and insider dominated notice-and-comment process into a forum for large scale, sometimes messy, participation in regulatory decisionmaking. It is not unheard of for agencies to receive millions of comments on rulemakings; often these comments are received as part of organized mass comment campaigns. In some rulemakings, questions have been raised about whether public comments were submitted under false names, or were automatically generated by computer “bot” programs. In this Article, we examine whether and to what extent such submissions are problematic and make recommendations for how rulemaking agencies …


Fraudulent Malattributed Comments In Agency Rulemaking, Michael Herz Nov 2020

Fraudulent Malattributed Comments In Agency Rulemaking, Michael Herz

Articles

A specter is haunting notice-and-comment rulemaking—the specter of fraudulent comments. The stand-out example—the apotheosis—was the Federal Communications Commission’s (FCC) net neutrality rulemaking in 2017. Well over twenty million comments were submitted, but millions of those were highly suspect. It turns out only about 800,000 of those comments were unique—that is, not written by a computer and not a pre-written form letter or variation thereof. And of the rest, perhaps half were submitted by computers (bots) using fictitious names or the names of real people, living and dead, who had no connection to the comment.


Taking Data, Michael C. Pollack Jan 2019

Taking Data, Michael C. Pollack

Articles

Technological development has created new forms of information, altered expectations of privacy, and given law enforcement more tools to examine that information and intrude on that privacy. One crucial facet of these changes involves internet service providers (ISPs): as people expose more of their lives to their ISPs—all the websites they visit, people they communicate with, emails they send, files they store, and more—law enforcement efforts to access that data become more and more common. But scholars and policymakers alike recognize that the existing statutory frameworks governing those efforts are based on obsolete technology and strike balances that are difficult …


Data Collection And The Regulatory State, Hillary Green, James Cooper, Ahmed Ghappour, Felix Wu Sep 2017

Data Collection And The Regulatory State, Hillary Green, James Cooper, Ahmed Ghappour, Felix Wu

Articles

The following remarks were given on January 27, 2017 during the Connecticut Law Review's symposium, "Privacy, Security & Power: The State of Digital Surveillance."


The Commercial Difference, Felix T. Wu May 2017

The Commercial Difference, Felix T. Wu

Articles

When it comes to the First Amendment, commerciality does, and should, matter. This Article develops the view that the key distinguishing characteristic of corporate or commercial speech is that the interest at stake is “derivative,” in the sense that we care about the speech interest for reasons other than caring about the rights of the entity directly asserting a claim under the First Amendment. To say that the interest is derivative is not to say that it is unimportant, and one could find corporate and commercial speech interests to be both derivative and strong enough to apply heightened scrutiny to …


Defining Privacy And Utility In Data Sets, Felix T. Wu Oct 2013

Defining Privacy And Utility In Data Sets, Felix T. Wu

Articles

Is it possible to release useful data while preserving the privacy of the individuals whose information is in the database? This question has been the subject of considerable controversy, particularly in the wake of well-publicized instances in which researchers showed how to re-identify individuals in supposedly anonymous data. Some have argued that privacy and utility are fundamentally incompatible, while others have suggested that simple steps can be taken to achieve both simultaneously. Both sides have looked to the computer science literature for support.

What the existing debate has overlooked, however, is that the relationship between privacy and utility depends crucially …


The Constitutionality Of Consumer Privacy Regulation, Felix T. Wu Jan 2013

The Constitutionality Of Consumer Privacy Regulation, Felix T. Wu

Articles

No abstract provided.


Collateral Censorship And The Limits Of Intermediary Immunity, Felix T. Wu Nov 2011

Collateral Censorship And The Limits Of Intermediary Immunity, Felix T. Wu

Articles

The law often limits the liability of an intermediary for the speech it carries. And rightly so, because imposing liability on intermediaries can induce them to filter out questionable content and this “collateral censorship” risks suppressing much lawful, even highly beneficial, speech. The “collateral censorship” rationale has its limits, though, and correspondingly, so should the applicability of intermediary immunity. The worry with collateral censorship is not just that intermediaries censor, but that they censor more than an original speaker would in the face of potential liability. Increased censorship, in turn, is the product of applying liability targeted at original speakers …


Created Facts And The Flawed Ontology Of Copyright Law, Justin Hughes Nov 2007

Created Facts And The Flawed Ontology Of Copyright Law, Justin Hughes

Articles

It is black letter doctrine that facts are not copyrightable: facts are discovered, not created—so they will always lack the originality needed for copyright protection. As straightforward as this reasoning seems, it is fundamentally flawed. Using the “social facts” theory of philosopher John Searle, this Article explores a variety of “created facts” cases—designation systems, systematic evaluations, and privately written laws—in which original expression from private individuals is adopted by social convention and generates facts in our social reality. In the course of this discussion, the paper places facts in their historical and philosophical context, explores how courts conflate facts with …


Stupid Lawyer Tricks: An Essay On Discovery Abuse, Charles M. Yablon Oct 1996

Stupid Lawyer Tricks: An Essay On Discovery Abuse, Charles M. Yablon

Articles

No abstract provided.