Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Columbia Law School (3)
- Singapore Management University (3)
- University of Maryland Francis King Carey School of Law (3)
- University of Pennsylvania Carey Law School (3)
- Florida A&M University College of Law (2)
-
- Roger Williams University (2)
- University at Buffalo School of Law (2)
- University of Colorado Law School (2)
- University of Pittsburgh School of Law (2)
- Boise State University (1)
- Boston University School of Law (1)
- Brigham Young University Law School (1)
- Brooklyn Law School (1)
- Chicago-Kent College of Law (1)
- Cornell University Law School (1)
- Fordham Law School (1)
- Georgetown University Law Center (1)
- Maurer School of Law: Indiana University (1)
- New York Law School (1)
- Pace University (1)
- Penn State Law (1)
- Seton Hall University (1)
- Touro University Jacob D. Fuchsberg Law Center (1)
- UIC School of Law (1)
- University of Baltimore Law (1)
- University of Richmond (1)
- William & Mary Law School (1)
- Keyword
-
- Internet (6)
- Privacy (6)
- Antitrust (3)
- Copyright (3)
- First Amendment (3)
-
- Competition (2)
- Contracts (2)
- FISA (2)
- Fourth Amendment (2)
- NSA (2)
- Surveillance (2)
- 17 U.S.C. § 110(1) (1)
- Accredited investor (1)
- Agreements (1)
- Allocative efficiency (1)
- Amazon (1)
- Anonymity (1)
- Armed attack (1)
- Asahi (1)
- Behavioral remedies (1)
- Biometric identification (1)
- Biometric identification laws (1)
- Biometrics (1)
- Bonds (1)
- CFAA (1)
- CROWDFUND Act (1)
- Cell phones (1)
- Censorship (1)
- Child pornography (1)
- Children (1)
- Publication
-
- Faculty Scholarship (9)
- All Faculty Scholarship (5)
- Journal Articles (3)
- Research Collection Yong Pung How School Of Law (3)
- Articles (2)
-
- Journal Publications (2)
- Law Faculty Scholarship (2)
- Publications (2)
- Articles & Chapters (1)
- Articles by Maurer Faculty (1)
- Cornell Law Faculty Publications (1)
- Elisabeth Haub School of Law Faculty Publications (1)
- Faculty Publications (1)
- Georgetown Law Faculty Publications and Other Works (1)
- Law Faculty Publications (1)
- Management Faculty Publications and Presentations (1)
- National Security Law Program (1)
- Scholarly Works (1)
- Student Works (1)
- UIC Law Open Access Faculty Scholarship (1)
Articles 1 - 30 of 40
Full-Text Articles in Law
Judge Pauley’S Opinion In Clapper: Reset Button For Bulk Collection Debate?, Peter Margulies
Judge Pauley’S Opinion In Clapper: Reset Button For Bulk Collection Debate?, Peter Margulies
Law Faculty Scholarship
This article was originally found in Lawfare, available here: https://www.lawfareblog.com/judge-pauleys-opinion-clapper-reset-button-bulk-collection-debate
Desperately Seeking Substance (Not Slogans) In Review Group Report On Nsa Surveillance, Peter Margulies
Desperately Seeking Substance (Not Slogans) In Review Group Report On Nsa Surveillance, Peter Margulies
Law Faculty Scholarship
No abstract provided.
E-Commerce Regulation: Necessity, Futility, Disconnect, Eliza Mik
E-Commerce Regulation: Necessity, Futility, Disconnect, Eliza Mik
Research Collection Yong Pung How School Of Law
Existing e-commerce regulations constitute a premature and unnecessary interference in the natural evolution of commercial practices and technologies. I question not just their quality, mainly attributable to the technological ignorance of the regulator, but their very necessity. I observe the practical futility of drafting effective regulatory instruments in areas subject to continuous and unpredictable technological change. I criticize the overly homogenous approach to "everything Internet" (i.e. everything involving the Internet requires new law) as well as the creation of new regulatory spheres and legal categories. Some might claim that it is too early for a critical retrospective of this subject. …
Biometric Id Cybersurveillance, Margaret Hu
Biometric Id Cybersurveillance, Margaret Hu
Faculty Publications
The implementation of a universal digitalized biometric ID system risks normalizing and integrating mass cybersurveillance into the daily lives of ordinary citizens. ID documents such as driver’s licenses in some states and all U.S. passports are now implanted with radio frequency identification (RFID) technology. In recent proposals, Congress has considered implementing a digitalized biometric identification card—such as a biometric-based, “high-tech” Social Security Card—which may eventually lead to the development of a universal multimodal biometric database (e.g., the collection of the digital photos, fingerprints, iris scans, and/or DNA of all citizens and noncitizens). Such “hightech” IDs, once merged with GPS-RFID tracking …
Is The Invocation Of Inherent Jurisdiction The Same As The Exercise Of Inherent Powers? Re Nalpon Zero Geraldo Mario [Case Note], Siyuan Chen
Research Collection Yong Pung How School Of Law
In Re McC (A Minor), Lord Bridge of Harwich remarked that few words have been ‘used with so many different shades of meaning in different contexts’ and ‘have so freely acquired new meanings’ as the word ‘jurisdiction’. The definitional conundrum deepens when ‘jurisdiction’ is combined with the adjective ‘inherent,’ yet common law courts around the world routinely claim to invoke inherent jurisdiction for a wide array of purposes in civil and criminal matters, ranging from the reception of evidence to the ensuring of a fair trial, and this necessarily raises questions about the limits of such an exercise.
Should The Internet Exempt The Media Sector From The Antitrust Laws?, Thomas J. Horton, Robert H. Lande
Should The Internet Exempt The Media Sector From The Antitrust Laws?, Thomas J. Horton, Robert H. Lande
All Faculty Scholarship
This article examines whether the "old media" and the "new media", including the Internet, should be considered to be within the same relevant market for antitrust purposes. To do this the article first demonstrates that proper antitrust consideration of the role of non-price competition necessitates that “news” and “journalism” be analyzed in two distinct ways. First, every part of the operations of a newspaper (or other type of media source), including its investigative reporting and local coverage, should be assessed separately. We present empirical evidence collected for this study which demonstrates that the old media continues to win the vast …
Privacy, Antitrust, And Power, Frank Pasquale
Privacy, Antitrust, And Power, Frank Pasquale
Faculty Scholarship
No abstract provided.
Unauthorized Televised Debate Footage In Political Campaign Advertising: Fair Use And The Dmca, Susan Park
Unauthorized Televised Debate Footage In Political Campaign Advertising: Fair Use And The Dmca, Susan Park
Management Faculty Publications and Presentations
No abstract provided.
A Case For The Public Domain, Clark Asay
A Case For The Public Domain, Clark Asay
Faculty Scholarship
Over the past several decades open license movements have proven highly successful in the software and content worlds. Such movements rely in part on the belief that greater freedom of use triggers innovative activity that is superior to what a restrictive IP approach produces. Ironically, such open license movements also rely on IP rights to promote their vision of freedom and openness. They do so through IP licenses that, while granting significant freedoms, also impose certain conditions on users such as the “copyleft” requirement in the software world. Such movements rely on this IP-based approach due to fears that, without …
Hackback: Permitting Retaliatory Hacking By Non-State Actors As Proportionate Countermeasures To Transboundary Cyberharm, Jan E. Messerschmidt
Hackback: Permitting Retaliatory Hacking By Non-State Actors As Proportionate Countermeasures To Transboundary Cyberharm, Jan E. Messerschmidt
National Security Law Program
Cyberespionage has received even greater attention in the wake of reports of persistent and brazen cyberexploitation of U.S. and Canadian firms by the Chinese military. But the recent disclosures about NSA surveillance programs have made clear that a national program of cyberdefense of private firms' intellectual property is politically infeasible. Following the lead
of companies like Google, private corporations may increasingly resort to the use of self-defense, hacking back against cross-border incursions on the Internet. Most scholarship, however, has surprisingly viewed such actions as outside the ambit of international law. This Note provides a novel account of how international law …
Striking A Balance Between Privacy And Online Commerce, Mark Bartholomew
Striking A Balance Between Privacy And Online Commerce, Mark Bartholomew
Journal Articles
It is becoming commonplace to note that privacy and online commerce are on a collision course. Corporate entities archive and monetize more and more personal information. Citizens increasingly resent the intrusive nature of such data collection and use. Just noticing this conflict, however, tells us little. In "Informing and Reforming the Marketplace of Ideas: The Public-Private Model for Data Production and the First Amendment" Professor Shubha Ghosh not only notes the tension between the costs and benefits of data commercialization, but suggests three normative perspectives for balancing privacy and commercial speech. This is valuable because without a rich theoretical framework …
News In Cyberspace: The Creation Of The New Ignorance, Ronald Charles Griffin
News In Cyberspace: The Creation Of The New Ignorance, Ronald Charles Griffin
Journal Publications
Computers are dummying us down. Book learning has given way to computer speak. Modern technology overwhelms us. Users are enthralled with gadgets to the point where they have lost themselves in them. We have abandoned, perhaps mislaid, our sense for ignorance; what it means to be illiterate in the 21st century; and working definitions for truth. In this environment a dab of education (enough to make somebody lethal), a sprinkle of bigotry, and fear produce people with ideas that are bad for us. This essay cautions against trucking with those folk; it marks what they do in the media that …
Beyond Notice And Choice: Privacy, Norms, And Consent, Richard Warner, Robert Sloan
Beyond Notice And Choice: Privacy, Norms, And Consent, Richard Warner, Robert Sloan
All Faculty Scholarship
Informational privacy is the ability to determine for yourself when and how others may collect and use your information. Adequate informational privacy requires a sufficiently broad ability to give or withhold free and informed consent to proposed uses.
Notice and Choice (sometimes also called “notice and consent”) is the current paradigm for consent online. The Notice is a presentation of terms, typically in a privacy policy or terms of use agreement. The Choice is an action signifying acceptance of the terms, typically clicking on an “I agree” button, or simply using the website. Recent reports by the Federal Trade Commission …
The Illegal Process: Basic Problems In The Making And Application Of Censorship, James Grimmelmann
The Illegal Process: Basic Problems In The Making And Application Of Censorship, James Grimmelmann
Cornell Law Faculty Publications
This essay is a response to Derek Bambauer's article Orwell's Armchair, which proposes "[a] statute enabling censorship of Internet material." Bambauer's theory is process-oriented: it focuses on the institutions that engage in censorship and the procedures that they follow. Accordingly, the essay examines his arguments through the lens of the canonical Legal Process text: Hart and Sacks' The Legal Process. A series of notes and queries inquire whether his proposed statute would limit censorship, regularize it, or legitimate it.
From Lord Coke To Internet Privacy: The Past, Present, And Future Of Electronic Contracting, Juliet M. Moringiello, William L. Reynolds
From Lord Coke To Internet Privacy: The Past, Present, And Future Of Electronic Contracting, Juliet M. Moringiello, William L. Reynolds
Faculty Scholarship
Contract law is applied countless times every day, in every manner of transaction large or small. Rarely are those transactions reflected in an agreement produced by a lawyer; quite the contrary, almost all contracts are concluded by persons with no legal training and often by persons who do not have a great deal of education. In recent years, moreover, technological advances have provided novel methods of creating contracts. Those facts present practitioners of contract law with an interesting conundrum: The law must be sensible and stable if parties are to have confidence in the security of their arrangements; but contract …
Addressing The Harm Of Total Surveillance: A Reply To Professor Neil Richards, Danielle Keats Citron, David C. Gray
Addressing The Harm Of Total Surveillance: A Reply To Professor Neil Richards, Danielle Keats Citron, David C. Gray
Faculty Scholarship
In his insightful article The Dangers of Surveillance, 126 HARV. L. REV. 1934 (2013), Neil Richards offers a framework for evaluating the implications of government surveillance programs that is centered on protecting "intellectual privacy." Although we share his interest in recognizing and protecting privacy as a condition of personal and intellectual development, we worry in this essay that, as an organizing principle for policy, "intellectual privacy" is too narrow and politically fraught. Drawing on other work, we therefore recommend that judges, legislators, and executives focus instead on limiting the potential of surveillance technologies to effect programs of broad and indiscriminate …
Pass Parallel Privacy Standards Or Privacy Perishes, Anne T. Mckenna
Pass Parallel Privacy Standards Or Privacy Perishes, Anne T. Mckenna
Journal Articles
No abstract provided.
The Law And Science Of Video Game Violence: What Was Lost In Translation?, 31 Cardozo Arts & Ent. L.J. 297 (2013), William K. Ford
The Law And Science Of Video Game Violence: What Was Lost In Translation?, 31 Cardozo Arts & Ent. L.J. 297 (2013), William K. Ford
UIC Law Open Access Faculty Scholarship
"[A]s a general rule," writes Pulitzer Prize-winning journalist Edward Humes, "courts don't do science very well."' Susan Haack, a professor of law and philosophy, elaborates on why this may be true, offering several reasons for "deep tensions" between science and law. The reasons offered by Haack may be less of a concern where the dispute involves litigation against the government on significant questions of public policy. Recent decisions assessing the constitutionality of laws restricting minors' access to violent video games therefore offer an opportunity to examine how well the courts handled scientific evidence in a situation lacking some of the …
The Internet Is Not A Super Highway: Using Metaphors To Communicate Information And Communications Policy, Kristen Jakobsen Osenga
The Internet Is Not A Super Highway: Using Metaphors To Communicate Information And Communications Policy, Kristen Jakobsen Osenga
Law Faculty Publications
Do metaphors influence our information policy preferences? Professor Osenga thinks so, which makes it especially important to choose the right one, as a metaphor is often the primary tool the general public uses to understand information policy. Using a five-point rubric, she evaluates, among others, understanding the Internet as “tubes,” “highway,” “space (cyberspace),” “coffee shop/bar” and “cloud.” Osenga finds them all lacking in important ways. However, she believes the metaphor of the Internet as “ecosystem” is very promising and deserves to be further developed.
Antitrust, The Internet, And The Economics Of Networks, Christopher S. Yoo, Daniel F. Spulber
Antitrust, The Internet, And The Economics Of Networks, Christopher S. Yoo, Daniel F. Spulber
All Faculty Scholarship
Network industries, including the Internet, have shown significant growth, substantial competition, and rapid innovation. This Chapter examines antitrust policy towards network industries. The discussion considers the policy implications of various concepts in the economics of networks: natural monopoly, network economic effects, vertical exclusion, and dynamic efficiency. Our analysis finds that antitrust policy makers should not presume that network industries are more subject to monopolization than other industries. We find that deregulation and the strength of competition in network industries have removed justifications for structural separation as a remedy. Also, we argue that that deregulation and competition have effectively eliminated support …
Competition In Information Technologies: Standards-Essential Patents, Non-Practicing Entities And Frand Bidding, Herbert J. Hovenkamp
Competition In Information Technologies: Standards-Essential Patents, Non-Practicing Entities And Frand Bidding, Herbert J. Hovenkamp
All Faculty Scholarship
Standard Setting is omnipresent in networked information technologies. Virtually every cellular phone, computer, digital camera or similar device contains technologies governed by a collaboratively developed standard. If these technologies are to perform competitively, the processes by which standards are developed and implemented must be competitive. In this case attaining competitive results requires a mixture of antitrust and non-antitrust legal tools.
FRAND refers to a firm’s ex ante commitment to make its technology available at a “fair, reasonable and nondiscriminatory royalty.” The FRAND commitment results from bidding to have one’s own technology selected as a standard. Typically the FRAND commitment is …
Crowdfunding Securities, Andrew A. Schwartz
Crowdfunding Securities, Andrew A. Schwartz
Publications
A new federal statute authorizes the online "crowdfunding" of securities, a new idea based on the concept of "reward" crowdfunding practiced on Kickstarter and other websites. This method of selling securities had previously been banned by federal securities law but the new CROWDFUND Act overturns that prohibition.
This Article introduces the CROWDFUND Act and explains that it can be expected to have two primary effects on securities law and capital markets. First, it will liberate startup companies to use peer networks and the Internet to obtain modest amounts of capital at low cost. Second, it will help democratize the market …
From Peer-To-Peer Networks To Cloud Computing: How Technology Is Redefining Child Pornography Laws, Audrey Rogers
From Peer-To-Peer Networks To Cloud Computing: How Technology Is Redefining Child Pornography Laws, Audrey Rogers
Elisabeth Haub School of Law Faculty Publications
This Article traces the history of the child pornography laws and sentencing policy in Part I. Part II explains the technologies that have caused some of the current controversies, and then Part III describes how these technologies have blurred the offenses. Finally, Part IV makes suggestions as to how the law could better reflect technology and comport with a refined harm rationale. Courts, legal scholars, and medical experts have explained the harm includes the sexual abuse captured in the images and the psychological injury the victim endures knowing the images are being viewed. This Article further develops the harm rationale …
An Intersystemic View Of Intellectual Property And Free Speech, Mark Bartholomew, John Tehranian
An Intersystemic View Of Intellectual Property And Free Speech, Mark Bartholomew, John Tehranian
Journal Articles
Intellectual property regimes operate in the shadow of the First Amendment. By deeming a particular activity as infringing, the law of copyright, trademark, and the right of publicity all limit communication. As a result, judges and lawmakers must delicately balance intellectual property rights with expressive freedoms. Interestingly, each intellectual property regime strikes the balance between ownership rights and free speech in a dramatically different way. Despite a large volume of scholarship on intellectual property rights and free speech considerations, this Article represents the first systematic effort to detail, analyze, and explain the divergent evolution of expression-based defenses in copyright, trademark, …
Self-Defensive Force Against Cyber Attacks: Legal, Strategic And Political Dimensions, Matthew C. Waxman
Self-Defensive Force Against Cyber Attacks: Legal, Strategic And Political Dimensions, Matthew C. Waxman
Faculty Scholarship
When does a cyber attack (or threat of cyber attack) give rise to a right of self-defense – including armed self-defense – and when should it? By "cyber attack" I mean the use of malicious computer code or electronic signals to alter, disrupt, degrade or destroy computer systems or networks or the information or programs on them. It is widely believed that sophisticated cyber attacks could cause massive harm – whether to military capabilities, economic and financial systems, or social functioning – because of modern reliance on system interconnectivity, though it is highly contested how vulnerable the United States and …
Certainty At Last?: A "New" Framework For Electronic Contracting In Singapore, Eliza Mik
Certainty At Last?: A "New" Framework For Electronic Contracting In Singapore, Eliza Mik
Research Collection Yong Pung How School Of Law
Singapore is the first Asian country to accede to the UNCITRAL Convention on the Use of Electronic Communications in International Contracts (“CUECIC” or “Convention”). Upon accession, the Singaporean Electronic Transactions Act (“ETA” or “Act”) was repealed and re-enacted in a modified version, with effect from 1 July 2010. The modified ETA retains the framework of the original ETA but adds or amends certain provisions dealing with electronic contracting to align domestic e-commerce regulations with the Convention. Accordingly, Singapore is not only the first Asian nation to accede to the CUECIC but also the first nation to implement some of its …
Book Review -- William Patry, How To Fix Copyright, Michael J. Madison
Book Review -- William Patry, How To Fix Copyright, Michael J. Madison
Articles
I review William Patry’s book How to Fix Copyright. The book is noteworthy for its ambitious yet measured effort to diagnose where copyright law has gone astray in recent years. It is less successful with respect to proposing possible changes to the law. Most interesting are parallels between How to Fix Copyright and an earlier comprehensive look at copyright law in the digital era: Paul Goldstein’s Copyright’s Highway: From Gutenberg to the Celestial Jukebox. William Patry and Paul Goldstein each have a lot of faith in the power of consumer choice in the cultural marketplace. That faith leads …
Real Masks And Real Name Policies: Applying Anti-Mask Case Law To Anonymous Online Speech, Margot E. Kaminski
Real Masks And Real Name Policies: Applying Anti-Mask Case Law To Anonymous Online Speech, Margot E. Kaminski
Publications
The First Amendment protects anonymous speech, but the scope of that protection has been the subject of much debate. This Article adds to the discussion of anonymous speech by examining anti-mask statutes and cases as an analogue for the regulation of anonymous speech online. Anti-mask case law answers a number of questions left open by the Supreme Court. It shows that courts have used the First Amendment to protect anonymity beyond core political speech, when mask-wearing is expressive conduct or shows a nexus with free expression. This Article explores what the anti-mask cases teach us about anonymity online, including proposed …
Head In The Clouds, Feet Firmly Grounded In Physical Proof: Emphasis On The Tangible In Actions Against Internet Search Engines And Aggregators, Briehan Moran
Student Works
No abstract provided.
Wireless Localism: Beyond The Shroud Of Objectivity In Federal Spectrum Administration, Olivier Sylvain
Wireless Localism: Beyond The Shroud Of Objectivity In Federal Spectrum Administration, Olivier Sylvain
Faculty Scholarship
Recent innovations in mobile wireless technology have instigated a debate between two camps of legal scholars about how policymakers should structure federal administration of the electromagnetic spectrum. The first argues that the Federal Communications Commission should define spectrum use rights more clearly and give spectrum licensees near fee-simple property rights in frequencies that they can use and sell in secondary markets as they wish. The second camp argues that, rather than award exclusive licenses to the highest bidder, the FCC ought to open much if not most of the spectrum to unlicensed use by smartphones and tablets equipped with the …