Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 35

Full-Text Articles in Law

Online Disinhibited Contracts, Wayne R. Barnes Feb 2024

Online Disinhibited Contracts, Wayne R. Barnes

Faculty Scholarship

There have been at least two dominant forces at work in the realm of consumer contracting over the past several decades. One has been the rise and domination of the standard form contract (whereby merchants contract with consumers via the use of standardized, boilerplate terms and conditions that consumers do not read or understand). The second force has been the rise of e-commerce and the purchase of goods and services via websites and other online platforms, and the use of “wrap” formation methodology (whereby merchants obtain consumer assent to the online terms and conditions via the consumer’s informal click, scroll, …


Legislating Data Loyalty, Woodrow Hartzog, Neil Richards Jan 2022

Legislating Data Loyalty, Woodrow Hartzog, Neil Richards

Faculty Scholarship

Lawmakers looking to embolden privacy law have begun to consider imposing duties of loyalty on organizations trusted with people’s data and online experiences. The idea behind loyalty is simple: organizations should not process data or design technologies that conflict with the best interests of trusting parties. But the logistics and implementation of data loyalty need to be developed if the concept is going to be capable of moving privacy law beyond its “notice and consent” roots to confront people’s vulnerabilities in their relationship with powerful data collectors.

In this short Essay, we propose a model for legislating data loyalty. Our …


The Internet As A Speech Machine And Other Myths Confounding Section 230 Reform, Danielle K. Citron, Mary Anne Franks Jan 2020

The Internet As A Speech Machine And Other Myths Confounding Section 230 Reform, Danielle K. Citron, Mary Anne Franks

Faculty Scholarship

A robust public debate is currently underway about the responsibility of online platforms. We have long called for this discussion, but only recently has it been seriously taken up by legislators and the public. The debate begins with a basic question: should platforms should be responsible for user-generated content? If so, under what circumstances? What exactly would such responsibility look like? Under consideration is Section 230 of the Communications Decency Act—a provision originally designed to encourage tech companies to clean up “offensive” online content. The public discourse around Section 230, however, is riddled with misconceptions. As an initial matter, many …


Humans Forget, Machines Remember: Artificial Intelligence And The Right To Be Forgotten, Tiffany Li, Eduard Fosch Villaronga, Peter Kieseberg Apr 2018

Humans Forget, Machines Remember: Artificial Intelligence And The Right To Be Forgotten, Tiffany Li, Eduard Fosch Villaronga, Peter Kieseberg

Faculty Scholarship

To understand the Right to be Forgotten in context of artificial intelligence, it is necessary to first delve into an overview of the concepts of human and AI memory and forgetting. Our current law appears to treat human and machine memory alike – supporting a fictitious understanding of memory and forgetting that does not comport with reality. (Some authors have already highlighted the concerns on the perfect remembering.) This Article will examine the problem of AI memory and the Right to be Forgotten, using this example as a model for understanding the failures of current privacy law to reflect the …


The New Territorialism In The Not-So-New Frontier Of Cyberspace, William L. Reynolds, Juliet M. Moringiello Jan 2014

The New Territorialism In The Not-So-New Frontier Of Cyberspace, William L. Reynolds, Juliet M. Moringiello

Faculty Scholarship

This Essay addresses the following questions: What jurisdictions should govern cyberspace problems? Are cyberspace problems different from those in the tangible world? If so, what are the implications for governance? We conclude that the judicial response to cyberspace governance has been mostly correct. After some adaptation problems (an early learning curve), courts have generally followed common law analogs to cyberspace problems. In other words, those problems are not treated as unique unless there is something special about the internet that suggests different resolutions are needed. There certainly is nothing to suggest that American courts or legislatures are trying to occupy …


Failing Expectations: Fourth Amendment Doctrine In The Era Of Total Surveillance, Olivier Sylvain Jan 2014

Failing Expectations: Fourth Amendment Doctrine In The Era Of Total Surveillance, Olivier Sylvain

Faculty Scholarship

Today’s reasonable expectation test and the third-party doctrine have little to nothing to offer by way of privacy protection if users today are at least conflicted about whether transactional noncontent data should be shared with third parties, including law enforcement officials. This uncertainty about how to define public expectation as a descriptive matter has compelled courts to defer to legislatures to find out what public expectation ought to be more as a matter of prudence than doctrine. Courts and others presume that legislatures are far better than courts at defining public expectations about emergent technologies.This Essay argues that the reasonable …


Rethinking Online Privacy In Canada: Commentary On Voltage Pictures V. John And Jane Doe, Ngozi Okidegbe Jan 2014

Rethinking Online Privacy In Canada: Commentary On Voltage Pictures V. John And Jane Doe, Ngozi Okidegbe

Faculty Scholarship

This article problematizes the use of the bona fide case standard as the legal standard for a court to order a third party Internet Service Provider ("ISP") to disclose subscriber information to a copyright owner in online piracy cases. It argues that ISP account holders have a reasonable expectation of privacy in their subscriber information. It contends that the current bona fide case standard affords a relatively low threshold of protection for Internet users’ subscriber information. The reason for which the article takes this position is that the bona fide case standard can be met solely by IP address evidence, …


A Fork In The Stream: The Unjustified Failure Of The Concurrence In J. Mcintyre Machinery Ltd. V. Nicastro To Clarify The Stream Of Commerce Doctrine, Cody Jacobs Jan 2013

A Fork In The Stream: The Unjustified Failure Of The Concurrence In J. Mcintyre Machinery Ltd. V. Nicastro To Clarify The Stream Of Commerce Doctrine, Cody Jacobs

Faculty Scholarship

This article critiques the concurring opinion in the recent United States Supreme Court personal jurisdiction decision in J. McIntyre Machinery Ltd. v. Nicastro. That opinion declined to choose between the competing approaches to the stream of commerce doctrine because of perceived flaws in those approaches and because the facts of Nicastro did not involve modern technology.

Consumer products are increasingly distributed through international distribution chains. Whether foreign manufacturers who utilize such chains are amenable to personal jurisdiction in states where their products are distributed has become a hotly litigated issue because of the Supreme Court’s 4-4-1 split decision over 20 …


Patent Litigation And The Internet, Samantha Zyontz, John R. Allison, Emerson H. Tiller, Tristan Bligh Jan 2012

Patent Litigation And The Internet, Samantha Zyontz, John R. Allison, Emerson H. Tiller, Tristan Bligh

Faculty Scholarship

Patent infringement litigation has not only increased dramatically in frequency over the past few decades,1 but also has also seen striking growth in both stakes and cost.2 Although a relatively rich literature has added much to our understanding of the nature, causes, and consequences of patent litigation during the past two decades,3 many interesting questions remain inadequately addressed. The nuances of and trends in patent litigation in different technology fields and industries, for example, are still understudied.4 Litigation of patents on new technologies has likewise received a dearth of attention. Here we seek to help begin …


The In Rem Forfeiture Of Copyright-Infringing Domain Names, Andrew Sellars Jan 2011

The In Rem Forfeiture Of Copyright-Infringing Domain Names, Andrew Sellars

Faculty Scholarship

In the summer of 2010, the Immigration and Customs Enforcement Division of the Department of Homeland Security began "Operation In Our Sites," an enforcement sweep targeted towards websites allegedly dealing in counterfeit goods and copyright-infringing files. The operation targeted the websites by proceeding in rem against their respective domain names. For websites targeted for copyright infringement, ICE Agents used recently-expanded copyright forfeiture remedies passed under the 2008 PRO-IP Act, providing no adversarial hearing prior to the websites being removed, and only a probable cause standard of proof.

This Paper examines three specific harms resulting from Operation In Our Sites, and …


Implications Of The Internet For Quasi-Legislative Instruments Of Regulation, Peter L. Strauss Jan 2010

Implications Of The Internet For Quasi-Legislative Instruments Of Regulation, Peter L. Strauss

Faculty Scholarship

It is a quarter century since I began telling my Administrative Law students that they had better be watching the Internet and how agencies of interest to them were using it, as they entered an Information Age career. The changes since then have been remarkable. Rulemaking, where the pace has perhaps been slowest, is now accelerating into the Internet, driven by a President committed to openness and consultation. This paper seeks little more than to point the reader toward the places where she can find the changes and watch them for herself.


Defending Disclosure In Software Licensing, Maureen A. O'Rourke Jan 2010

Defending Disclosure In Software Licensing, Maureen A. O'Rourke

Faculty Scholarship

For lack of our imagination, this article does not have the most scintillating title. However, the subject matter is critically important. We survey prominent kinds of disclosures in law and show why the disclosure tool, though subject to substantial criticism, is central to the legitimacy of any legal regime. Our working example is the American Law Institute’s “Principles of the Law of Software Contracts” (hereinafter “ALI Principles”).

The ALI Principles include three kinds of disclosure: disclosure of facts (concerning the quality of software),disclosure of terms (of standard forms), and disclosure of post-contract intentions (to pursue remote disablement of software). We …


Federal Search Commission? Access, Fairness, And Accountability In The Law Of Search, Oren Bracha, Frank Pasquale Jan 2008

Federal Search Commission? Access, Fairness, And Accountability In The Law Of Search, Oren Bracha, Frank Pasquale

Faculty Scholarship

Should search engines be subject to the types of regulation now applied to personal data collectors, cable networks, or phone books? In this article, we make the case for some regulation of the ability of search engines to manipulate and structure their results. We demonstrate that the First Amendment, properly understood, does not prohibit such regulation. Nor will such interventions inevitably lead to the disclosure of important trade secrets.

After setting forth normative foundations for evaluating search engine manipulation, we explain how neither market discipline nor technological advance is likely to stop it. Though savvy users and personalized search may …


Just One Click: The Reality Of Internet Retail Contracting, Ronald J. Mann, Travis Siebeneicher Jan 2008

Just One Click: The Reality Of Internet Retail Contracting, Ronald J. Mann, Travis Siebeneicher

Faculty Scholarship

This Essay explores the enforceability and presence of pro-seller contract terms in internet retail contracts. Analyzing case law on internet contract enforceability and a survey of 500 firms'websites, it demonstrates that even the enforceability of many internet contracts is questionable. It then presents new data that suggest that the prevalence of pro-seller contract terms is far less than usually assumed. It suggests that the benefit of making these terms enforceable is outweighed by the loss of user friendliness required for the necessary interface changes. Finally, it uses fresh statistical analyses to determine what relationship, if any, exists between enforceability, pro-seller …


China's Network Justice, Benjamin L. Liebman, Tim Wu Jan 2007

China's Network Justice, Benjamin L. Liebman, Tim Wu

Faculty Scholarship

China's Internet revolution has set off a furious debate in the West. Optimists from Thomas Friedman to Bill Clinton have predicted the crumbling of the Chinese Party-state ("Party-state"), while pessimists suggest even greater state control. But a far less discussed and researched subject is the effect of China's Internet revolution on its domestic institutions. This Article, the product of extensive interviews across China, asks a new and different question. What has China's Internet revolution meant for its legal system? What does cheaper, if not free, speech mean for Chinese judges?

The broader goal of this Article is to better understand …


A Tale Of Two Platforms, Tim Wu Jan 2007

A Tale Of Two Platforms, Tim Wu

Faculty Scholarship

This paper discusses future competitions between cellular and computer platforms, in the context of a discussion of Jonathan Zittrain, The Generative Internet, 119 Harv. L. Rev. 1974 (2006).


Rethinking Spyware: Questioning The Propriety Of Contractual Consent To Online Surveillance, Wayne R. Barnes Apr 2006

Rethinking Spyware: Questioning The Propriety Of Contractual Consent To Online Surveillance, Wayne R. Barnes

Faculty Scholarship

The spyware epidemic has reached new heights on the Internet. Computer users are increasingly burdened with programs they did not knowingly or consciously install, which place strains on their computers' performance, and which also trigger annoying "pop-up" advertisements of products or services which have been determined to match the users' preferences. The users' purported preferences are determined, in turn, by the software continuously monitoring every move the consumer makes as she "surfs the Internet." The public overwhelmingly disapproves of spyware which is surreptitiously placed on computers in this manner, and also largely disapproves of the pop-up advertising paradigm. As a …


The World Trade Law Of Censorship And Internet Filtering, Tim Wu Jan 2006

The World Trade Law Of Censorship And Internet Filtering, Tim Wu

Faculty Scholarship

Consider the following events, all from the last five years: (1) An American newsmagazine, Barron's, posts an unflattering profile of an Australian billionaire named Joseph Gutnick on its web site – the publisher, Dow Jones, Inc., is sued in Australia and forced to settle; (2) Mexico's incumbent telephone company, Telmex, blocks Mexicans from reaching the web site of the Voice-over-IP firm Skype; (3) the United States begins a major crackdown on web gambling services, causing serious economic damage to several small Caribbean economies; (4) the Chinese government prevents its citizens from using various foreign Internet services, including foreign e-mail and …


Network Neutrality: Competition, Innovation, And Nondiscriminatory Access, Tim Wu Jan 2006

Network Neutrality: Competition, Innovation, And Nondiscriminatory Access, Tim Wu

Faculty Scholarship

The best proposals for network neutrality rules are simple. They ban abusive behavior like tollboothing and outright blocking and degradation. And they leave open legitimate network services that the Bells and Cable operators want to provide, such as offering cable television services and voice services along with a neutral internet offering. They are in line with a tradition of protecting consumer's rights on networks whose instinct is just this: let customers use the network as they please. No one wants to deny companies the right to charge for their services and charge consumers more if they use more. But what …


The Promise Of Internet Intermediary Liability, Ronald J. Mann, Seth R. Belzley Jan 2005

The Promise Of Internet Intermediary Liability, Ronald J. Mann, Seth R. Belzley

Faculty Scholarship

The Internet has transformed the economics of communication, creating a spirited debate about the proper role of federal, state, and international governments in regulating conduct related to the Internet. Many argue that Internet communications should be entirely self-regulated because such communications cannot or should not be the subject of government regulation. The advocates of that approach would prefer a no-regulation zone around Internet communications, based largely on the unexamined view that Internet activity is fundamentally different in a way that justifies broad regulatory exemption. At the same time, some kinds of activity that the Internet facilitates undisputedly violate widely shared …


Governing By Negotiation: The Internet Naming System, Tamar Frankel Oct 2004

Governing By Negotiation: The Internet Naming System, Tamar Frankel

Faculty Scholarship

This Article is about the governance of the Internet naming system. The subject is fascinating, not simply because the naming system is an important system affecting the Internet, although it is; and not because the Internet is important, although it is. The subject is fascinating because it offers a rare opportunity to examine and learn from the evolution of an incoherent governance structure. The naming system is special in that it is the product of a new technology; it reflects the changes and pressures brought by the new technology, and involves the interests of government and private entities, domestic and …


The International Privacy Regime, Tim Wu Jan 2004

The International Privacy Regime, Tim Wu

Faculty Scholarship

Privacy has joined one of many areas of law understandable only by reference to the results of overlapping and conflicting national agendas. What has emerged as the de facto international regime is complex. Yet based on a few simplifying principles, we can nonetheless do much to understand it and predict its operation.

First, the idea that self-regulation by the internet community will be the driving force in privacy protection must be laid to rest. The experience of the last decade shows that nation-states, powerful nation-states in particular, drive the system of international privacy. The final mix of privacy protection that …


Tolls On The Information Superhighway: Entitlement Defaults For Clickstream Data, Lee B. Kovarsky Jan 2003

Tolls On The Information Superhighway: Entitlement Defaults For Clickstream Data, Lee B. Kovarsky

Faculty Scholarship

This paper addresses the collection of "clickstream data," and sets forth a theory about the legal rules that should govern it. At the outset, I propose a typology for categorizing privacy invasions. A given state of informational privacy may be represented by: the observed behavior, the collecting agent, and the searching agent. Using this typology, I identify the specific sources of concern about collection of clickstream data. Then, based on expected levels of utility and expected transaction costs of "flipping" to a different rule, I argue for a particular set of privacy defaults for data mining.


States And Internet Enforcement, Joel R. Reidenberg Jan 2003

States And Internet Enforcement, Joel R. Reidenberg

Faculty Scholarship

This essay addresses the enforcement of decisions through internet instruments. The starting point is a brief justification of internet enforcement as the obligation of democratic states. Next, the essay argues that the movement to re-engineer the internet infrastructure by public and private actions also facilitates state enforcement of legal and policy decisions. The essay maintains that states will increasingly try to use network intermediaries such as payment systems and Internet Service Providers as enforcement instruments. Finally, and most importantly, the essay focuses on ways that states may harness the power of technological instruments such as worms, filters and packet interceptors …


Network Neutrality, Broadband Discrimination, Tim Wu Jan 2003

Network Neutrality, Broadband Discrimination, Tim Wu

Faculty Scholarship

Communications regulators over the next decade will spend increasing time on conflicts between the private interests of broadband providers and the public's interest in a competitive innovation environment centered on the Internet. As the policy questions this conflict raises are basic to communications policy, they are likely to reappear in many different forms. So far, the first major appearance has come in the "open access" (or "multiple access") debate, over the desirability of allowing vertical integration between Internet Service Providers and cable operators. Proponents of open access see it as a structural remedy to guard against an erosion of the …


The First International Competition For Online Dispute Resolution: Is This Big, Different And New?, Benjamin G. Davis, Franklin G. Snyder, Kay Elkins Elliott, Peter B. Manzo, Alan Gaitenby, David Allen Larson Aug 2002

The First International Competition For Online Dispute Resolution: Is This Big, Different And New?, Benjamin G. Davis, Franklin G. Snyder, Kay Elkins Elliott, Peter B. Manzo, Alan Gaitenby, David Allen Larson

Faculty Scholarship

In February of 2002, the International Competition for Online Dispute Resolution (ICODR) was held to address the issue of new uses of technology is dispute resolution. This article describes the competition with individual presentations from the perspectives of a problem drafter, a coach, a participant, the evaluators, and an organizer. In the conclusion, the author presents some observations on why this International Competition for Online Dispute Resolution is big, different, and new.


The Managing Lawmaker In Cyberspace: A Power Model, Tamar Frankel Jan 2002

The Managing Lawmaker In Cyberspace: A Power Model, Tamar Frankel

Faculty Scholarship

This Article is about power - the ability to gain obedience whether by captivating followers, persuading skeptics or awarding and withdrawing economic benefits. The purpose of this Article is to analyze how the power of the Internet Corporation for Names and Numbers ("ICANN") was created, augmented, strengthened and reined in. Many controversies surround ICANN, including the very foundation of its existence - the need for a single "root" in the Internet naming infrastructure - its organizational form and accountability, and the utterances, policies and actions of its management.

The purpose of this Article is not to argue and prescribe but …


E-Commerce And Trans-Atlantic Privacy, Joel R. Reidenberg Jan 2001

E-Commerce And Trans-Atlantic Privacy, Joel R. Reidenberg

Faculty Scholarship

For almost a decade, the United States and Europe have anticipated a clash over the protection of personal information. Between the implementation in Europe of comprehensive legal protections pursuant to the directive on data protection and the continued reliance on industry self-regulation in the United States, trans-Atlantic privacy policies have been at odds with each other. The rapid growth in e-commerce is now sparking the long-anticipated trans-Atlantic privacy clash. This Article will first look at the context of American e-commerce and the disjuncture between citizens' privacy and business practices. The Article will then turn to the international context and explore …


Yahoo And Democracy On The Internet, Joel R. Reidenberg Jan 2001

Yahoo And Democracy On The Internet, Joel R. Reidenberg

Faculty Scholarship

This article examines the French court order requiring Yahoo to prevent French Internet users from accessing images of Nazi memorabilia available for auction on the company's American web site. The article uses the French case to challenge the popular belief that an entirely borderless Internet favors democratic values. The article starts from the premise that while the Internet enables actors to reach a geographically dispersed audience, the Internet should not change the accountability of those actors for their conduct within national borders. The article shows that Yahoo's extensive business in France justifies the application of France's democratically chosen law and …


Resolving Conflicting International Data Privacy Rules In Cyberspace, Joel R. Reidenberg Jan 1999

Resolving Conflicting International Data Privacy Rules In Cyberspace, Joel R. Reidenberg

Faculty Scholarship

While core principles for the fair treatment of personal information are common to democracies, privacy rights vary considerably across national borders. This article explores the divergences in approach and substance of data privacy between Europe and the United States. It argues that the specific privacy rules adopted in a country have a governance function. The article shows that national differences support two distinct political choices for the roles in democratic society assigned to the state, the market and the individual: either liberal, market-based governance or socially-protective, rights-based governance. These structural divergences make international cooperation imperative for effective data protection in …