Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 19 of 19

Full-Text Articles in Law

Spyware Vs. Spyware: Software Conflicts And User Autonomy, James Grimmelmann Jan 2020

Spyware Vs. Spyware: Software Conflicts And User Autonomy, James Grimmelmann

Cornell Law Faculty Publications

No abstract provided.


Bone Crusher 2.0: The Fourth Annual Greg Lastowka Memorial Lecture, James Grimmelmann Apr 2019

Bone Crusher 2.0: The Fourth Annual Greg Lastowka Memorial Lecture, James Grimmelmann

Cornell Law Faculty Publications

No abstract provided.


Did Russian Cyber Interference In The 2016 Election Violate International Law?, Jens David Ohlin Jun 2017

Did Russian Cyber Interference In The 2016 Election Violate International Law?, Jens David Ohlin

Cornell Law Faculty Publications

When it was revealed that the Russian government interfered in the 2016 U.S. presidential election by hacking into the email system of the Democratic National Committee and releasing its emails, international lawyers were divided over whether the cyber-attack violated international law. President Obama seemingly went out of his way to describe the attack as a mere violation of “established international norms of behavior,” though some international lawyers were more willing to describe the cyber-attack as a violation of international law. However, identifying the exact legal norm that was contravened turns out to be harder than it might otherwise appear. To …


Consenting To Computer Use, James Grimmelmann Dec 2016

Consenting To Computer Use, James Grimmelmann

Cornell Law Faculty Publications

The federal Computer Fraud and Abuse Act (CFAA) makes it a crime to “access a computer without authorization or exceed authorized access.” Courts and commentators have struggled to explain what types of conduct by a computer user are “without authorization.” But this approach is backwards; authorization is not so much a question of what a computer user does, as it is a question of what a computer owner allows.

In other words, authorization under the CFAA is an issue of consent, not conduct; to understand authorization, we need to understand consent. Building on Peter Westen’s taxonomy of consent, I argue …


Data Institutionalism: A Reply To Andrew Woods, Zachary D. Clopton Jul 2016

Data Institutionalism: A Reply To Andrew Woods, Zachary D. Clopton

Cornell Law Faculty Publications

In "Against Data Exceptionalism," Andrew K. Woods explores “one of the greatest societal and technological shifts in recent years,” which manifests in the “same old” questions about government power. The global cloud is an important feature of modern technological life that has significant consequences for individual privacy, law enforcement, and governance. Yet, as Woods suggests, the legal challenges presented by the cloud have analogies in age-old puzzles of public and private international law.

Identifying these connections is a conceptual advance, and this contribution should not be understated. But, to my mind, the most telling statement in Woods’s excellent article comes …


There's No Such Thing As A Computer-Authored Work - And It's A Good Thing, Too, James Grimmelmann Jan 2016

There's No Such Thing As A Computer-Authored Work - And It's A Good Thing, Too, James Grimmelmann

Cornell Law Faculty Publications

Treating computers as authors for copyright purposes is a non-solution to a non-problem. It is a non-solution because unless and until computer programs can qualify as persons in life and law, it does no practical good to call them "authors" when someone else will end up owning the copyright anyway. And it responds to a non-problem because there is nothing actually distinctive about computer-generated works.

There are five plausible ways in which computer-generated works might be considered meaningfully different from human-generated works: (1) they are embedded in digital copies, (2) people create them using computers rather than by hand, (3) …


Territoriality, Technology, And National Security, Zachary D. Clopton Jan 2016

Territoriality, Technology, And National Security, Zachary D. Clopton

Cornell Law Faculty Publications

Across various contexts, parties and courts have pressed for territorial rules in cases implicating technology and national security. This Essay suggests that presumptively territorial approaches to these questions are misguided. Territorial rules do not track the division of authority or capacity among the branches, nor are they effective proxies for the important interests of regulators or regulatees. On issues of technology and national security, territorial rules seem particularly ill suited: territorial rules aspire to certainty, but technology makes it harder to define “territoriality” in a consistent and predictable way; technology weakens territoriality as a proxy for policy goals because data …


Copyright For Literate Robots, James Grimmelmann Jan 2016

Copyright For Literate Robots, James Grimmelmann

Cornell Law Faculty Publications

Almost by accident, copyright has concluded that copyright law is for humans only: reading performed by computers doesn't count as infringement. Conceptually, this makes sense: copyright's ideal of romantic readership involves humans writing for other humans. But in an age when more and more manipulation of copyrighted works is carried out by automated processes, this split between human reading (infringement) and robotic reading (exempt) has odd consequences and creates its own tendencies toward a copyright system in which humans occupy a surprisingly peripheral place. This essay describes the shifts in fair use law that brought us here and reflects on …


Future Of Ai And Law, Abby Cessna Apr 2015

Future Of Ai And Law, Abby Cessna

Cornell Law School J.D. Student Research Papers

Technology has already transformed the way that law is practiced. The use of computers and digital legal resources, such as LexisNexis and Westlaw have been around for decades, but these are just some of the major technological advancements that have transformed law. For instance, it was groundbreaking for a law firm as prestigious as Orrick, Herrington & Sutcliffe to have a website in the late 1990's, which was getting around 5000 visits a week. Now law firms not only have websites but also use a variety of social media services to promote their firm and services. In addition to promoting …


Data Breaches And Privacy Law: Lawyers’ Challenges In Handling Personal Information, Charlotte Duc-Bragues Apr 2015

Data Breaches And Privacy Law: Lawyers’ Challenges In Handling Personal Information, Charlotte Duc-Bragues

Cornell Law School J.D. Student Research Papers

Sharing personal information with a lawyer potentially represents the greatest source of vulnerability for an individual. Since the first major security breach in 2005, law firms have been pressed both by public authorities and clients to take action in order to protect confidential information from potential harmful breaches.

This paper seeks to provide an overview of the challenges faced by lawyers in handling personal information with regard to potential security breaches. The aim is to analyze this issue through the focal of privacy law; statistics on security breaches and tools to prevent this phenomenon, extensively studied in class, are given …


First-Class Objects, James Grimmelmann Apr 2011

First-Class Objects, James Grimmelmann

Cornell Law Faculty Publications

What is the difference between "James Grimmelmann" and "@grimmelm" and why should we care? Some computer systems, like Facebook and credit reporting agencies, are inherently "about" people. Others are not. This essay argues that the key technical difference is whether they use unique identifiers to refer to people in their databases. From this single distinction, a host of social and humanistic consequences follow. The essay taxonomizes them and teases out some of their implications for privacy law.


Name Calling On The Internet: The Problems Faced By Victims Of Defamatory Content In Cyberspace, Sarudzai Chitsa Apr 2011

Name Calling On The Internet: The Problems Faced By Victims Of Defamatory Content In Cyberspace, Sarudzai Chitsa

Cornell Law School Inter-University Graduate Student Conference Papers

In the past decade or so, internet libel has become one of the hot topics in internet law. Internationally, courts have dealt with an enormous amount of cases brought by both the suppliers and consumers of the internet services. Although the advent of the World Wide Web has come with many legal problems; this paper will only focus at the problems that are being faced by the victims of defamatory speech on the internet in trying to seek compensation through the courts. These problems include, inter alia, the reluctance of the courts in unmasking the identity of the authors of …


Defending Disclosure In Software Licensing, Robert A. Hillman, Maureen O'Rourke Jan 2011

Defending Disclosure In Software Licensing, Robert A. Hillman, Maureen O'Rourke

Cornell Law Faculty Publications

This Article surveys prominent kinds of disclosures in contract law-of facts, contract terms, and performance intentions. We show why the disclosure tool, although subject to substantial criticism, promotes important social values and goals, including efficiency, autonomy, corrective justice, fairness, and the legitimacy of the contract process. Further, proposals to replace disclosure with other alternatives are unrealistic because they are too expensive or complex. Our working example is the American Law Institute's Principles of the Law of Software Contracts.


Principles Of The Law Of Software Contracts: Some Highlights, Robert A. Hillman, Maureen O'Rourke Jun 2010

Principles Of The Law Of Software Contracts: Some Highlights, Robert A. Hillman, Maureen O'Rourke

Cornell Law Faculty Publications

The final draft of the Principles of the Law of Software Contracts ("Principles") was unanimously approved by the American Law Institute membership in May of 2009. The goal of the project is to “clarify and unify the law of software transactions.” However, the Principles will not become law in any jurisdiction unless and until a court adopts them, so only time will tell whether the project will accomplish this goal. Nevertheless, one thing is certain. The current law of software transactions, a mish-mash of common law, Article 2 of the Uniform Commercial Code, and federal intellectual property law, among other …


Contract Law In Context: The Case Of Software Contracts, Robert A. Hillman Jan 2010

Contract Law In Context: The Case Of Software Contracts, Robert A. Hillman

Cornell Law Faculty Publications

The membership of The American Law Institute unanimously approved the “Principles of the Law of Software Contracts” in May of 2009. In this essay for a symposium in the Wake Forest Law Review, I draw on my experience as Reporter on the ALI project to add my perspective on an interesting general question: Is specialization of contract law wise and, if so, in what contexts? I certainly cannot definitively answer the question of whether in the abstract society is better off with general or specialized law, but my experience in drafting the software rules, along with Associate Reporter, Maureen O'Rourke, …


Rethinking Consideration In The Electronic Age, Robert A. Hillman, Maureen O'Rourke Feb 2009

Rethinking Consideration In The Electronic Age, Robert A. Hillman, Maureen O'Rourke

Cornell Law Faculty Working Papers

Our fast-paced age of electronic agreements that ostensibly govern transactions as diverse as downloading software, ordering goods, and engaging in collaborative development projects raises questions regarding the suitability of contract law as the appropriate legal framework. While this question arises in many settings, we focus here on the free and open source software (FOSS) movement because of the maturity and success of its model and the ubiquity of its software. We explore in particular whether open source licenses are supported by consideration, and argue that they are, and that open source licenses are contracts. We further argue that a contractual …


Warranties And Disclaimers In The Electronic Age, Robert A. Hillman, Ibrahim Barakat Jan 2009

Warranties And Disclaimers In The Electronic Age, Robert A. Hillman, Ibrahim Barakat

Cornell Law Faculty Publications

This paper reports on software-licensor express warranty and disclaimer practices on the Internet. Our data show that virtually all of the websites and End User License Agreements (EULAs) we sampled include express warranties on the website and disclaimers of the warranties in the EULAs that may erase all or much of the quality protection. Next, the paper reviews the reasons why consumers generally do not read their e-standard forms despite the prevalence of disclaimers and other adverse terms. We then argue that e-commerce exacerbates the problem of warranties and disclaimers and that lawmakers should address this issue. We contend that …


Neutral Citation, Court Web Sites, And Access To Authoritative Case Law, Peter W. Martin Apr 2007

Neutral Citation, Court Web Sites, And Access To Authoritative Case Law, Peter W. Martin

Cornell Law Faculty Publications

In 1994, the Wisconsin Bar and the Wisconsin Judicial Council together urged the state’s supreme court to take two dramatic steps with the combined aim of improving access to state case law: adopt a new system of neutral format citation and establish a digital archive of decisions directly available to all publishers and the public. The recommendations set off a firestorm, and the court deferred decision on the package. In the dozen or so years since those events, the background conditions have shifted dramatically. Neutral format citation has been endorsed by AALL and the ABA and formally adopted in a …


Online Boilerplate: Would Mandatory Website Disclosure Of E-Standard Terms Backfire?, Robert A. Hillman Mar 2006

Online Boilerplate: Would Mandatory Website Disclosure Of E-Standard Terms Backfire?, Robert A. Hillman

Cornell Law Faculty Publications

No abstract provided.