Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 9 of 9

Full-Text Articles in Law

Deep Fakes: A Looming Challenge For Privacy, Democracy, And National Security, Danielle K. Citron, Robert Chesney Dec 2019

Deep Fakes: A Looming Challenge For Privacy, Democracy, And National Security, Danielle K. Citron, Robert Chesney

Faculty Scholarship

Harmful lies are nothing new. But the ability to distort reality has taken an exponential leap forward with “deep fake” technology. This capability makes it possible to create audio and video of real people saying and doing things they never said or did. Machine learning techniques are escalating the technology’s sophistication, making deep fakes ever more realistic and increasingly resistant to detection. Deep-fake technology has characteristics that enable rapid and widespread diffusion, putting it into the hands of both sophisticated and unsophisticated actors. While deep-fake technology will bring with it certain benefits, it also will introduce many harms. The marketplace …


Online Legal Document Providers And The Public Interest: Using A Certification Approach To Balance Access To Justice And Public Protection, Susan Saab Fortney Oct 2019

Online Legal Document Providers And The Public Interest: Using A Certification Approach To Balance Access To Justice And Public Protection, Susan Saab Fortney

Faculty Scholarship

The Internet and electronic communications have revolutionized how consumers obtain legal information and assistance. The availability of legal forms and services has developed at lightning speed and countless consumers are using these forms, rather than consulting attorneys. At the same time, many regulators of the legal profession appear to be frozen in time. Some take the position that the provision of interactive forms amounts to the unauthorized practice of law and others question arrangements that appear to involve the sharing of legal fees with non-lawyers. Even for those interested in regulating the provision of on-line services, one complication to doing …


When Law Frees Us To Speak, Danielle K. Citron, Jonathon Penney May 2019

When Law Frees Us To Speak, Danielle K. Citron, Jonathon Penney

Faculty Scholarship

A central aim of online abuse is to silence victims. That effort is as regrettable as it is successful. In the face of cyber harassment and sexual privacy invasions, women and marginalized groups retreat from online engagement. These documented chilling effects, however, are not inevitable. Beyond its deterrent function, law has an equally important expressive role. In this article, we highlight law’s capacity to shape social norms and behavior through education. We focus on a neglected dimension of law’s expressive role—its capacity to empower victims to express their truths and engage with others. Our argument is theoretical and empirical. We …


Sexual Privacy, Danielle K. Citron May 2019

Sexual Privacy, Danielle K. Citron

Faculty Scholarship

Those who wish to control, expose, and damage the identities of individuals routinely do so by invading their privacy. People are secretly recorded in bedrooms and public bathrooms and “up their skirts.” Such images are used to coerce people into sharing nude photographs and filming sex acts under the threat of public disclosure. People’s nude images are posted online without permission. Machine-learning technology is used to create digitally manipulated “deep fake” sex videos that swap people’s faces into pornography.

Each of these abuses is an invasion of sexual privacy—the behaviors, expectations, and choices that manage access to and information about …


A Hater's Guide To Geoblocking, Peter K. Yu Mar 2019

A Hater's Guide To Geoblocking, Peter K. Yu

Faculty Scholarship

Geoblocking restricts access to online content based on the user's geographical location. Territorially based access control is strongly disliked, if not passionately hated, by those who travel abroad frequently as well as those who consume a considerable amount of foreign content. While the past has seen the use of geoblocking as technological self-help, such a technique has now received growing support from policymakers and judges.

Commissioned for a symposium on "Intellectual Property in a Globalized Economy: United States Extraterritoriality in International Business," this article begins by briefly recounting five sets of arguments against geoblocking. The article then draws on the …


Informed Trading And Cybersecurity Breaches, Joshua Mitts, Eric L. Talley Jan 2019

Informed Trading And Cybersecurity Breaches, Joshua Mitts, Eric L. Talley

Faculty Scholarship

Cybersecurity has become a significant concern in corporate and commercial settings, and for good reason: a threatened or realized cybersecurity breach can materially affect firm value for capital investors. This paper explores whether market arbitrageurs appear systematically to exploit advance knowledge of such vulnerabilities. We make use of a novel data set tracking cybersecurity breach announcements among public companies to study trading patterns in the derivatives market preceding the announcement of a breach. Using a matched sample of unaffected control firms, we find significant trading abnormalities for hacked targets, measured in terms of both open interest and volume. Our results …


Intermediaries And Private Speech Regulation: A Transatlantic Dialogue - Workshop Report, Tiffany Li Jan 2019

Intermediaries And Private Speech Regulation: A Transatlantic Dialogue - Workshop Report, Tiffany Li

Faculty Scholarship

The Wikimedia/Yale Law School Initiative on Intermediaries and Information (WIII) at Yale Law School has released a comprehensive report synthesizing key insights from intermediary liability and online speech and expression experts in Europe and the United States.

The report focuses on the critical but complicated issue of private speech regulation on the internet and the connections between platform liability laws and fundamental rights, including free expression. The report reflects discussions held at “Intermediaries & Private Speech Regulation: A Transatlantic Dialogue,” an invitation-only workshop convened by WIII, featuring leading internet law experts from the United States and Europe.

This report highlights …


Introduction To The Symposium On Cyber Attribution, Monica Hakimi Jan 2019

Introduction To The Symposium On Cyber Attribution, Monica Hakimi

Faculty Scholarship

This symposium explores some of the legal issues surrounding the attribution of cyber conduct to states. Relative to states’ other activities, cyber conduct poses particularly thorny attribution challenges. States that engage in such conduct often use technology to obscure their identities or the full effects of their operations. The attribution challenges in turn raise difficult questions about how victim states should be allowed to respond — whether in kind, with other retorsions or countermeasures, with kinetic force, or by doing nothing at all. For example, how confident must a victim state be that it has correctly identified the source of …


The Good, The Bad, And The Ugly Of Online Reviews: The Trouble With Trolls And A Role For Contract Law After The Consumer Review Fairness Act, Wayne Barnes Jan 2019

The Good, The Bad, And The Ugly Of Online Reviews: The Trouble With Trolls And A Role For Contract Law After The Consumer Review Fairness Act, Wayne Barnes

Faculty Scholarship

The advent of the Internet has brought innumerable innovations to our lives. Among the innovations is the meteoric rise in the volume of e-commerce conducted on the Internet. Correspondingly, consumer-posted information about merchants, goods, and services has also begun to be a rich source of information for consumers researching a purchase online. This information takes many forms, but a major category is the narrative review describing the purchase and experience. Such reviews are posted on websites such as Yelp, Amazon and TripAdvisor, on apps, and on social media such as Facebook and Twitter. The amount and volume of reviews has …