Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 36

Full-Text Articles in Law

Technological 'Disruption' Of The Law's Imagined Scene: Some Lessons From Lex Informatica, Margot Kaminski Jan 2022

Technological 'Disruption' Of The Law's Imagined Scene: Some Lessons From Lex Informatica, Margot Kaminski

Publications

Joel Reidenberg in his 1998 Article Lex Informatica observed that technology can be a distinct regulatory force in its own right and claimed that law would arise in response to human needs. Today, law and technology scholarship continues to ask: does technology ever disrupt the law? This Article articulates one particular kind of “legal disruption”: how technology (or really, the social use of technology) can alter the imagined setting around which policy conversations take place—what Jack Balkin and Reva Siegal call the “imagined regulatory scene.” Sociotechnical change can alter the imagined regulatory scene’s architecture, upsetting a policy balance and undermining …


A Regulatory Roadmap For Financial Innovation, Cristie Ford Jan 2021

A Regulatory Roadmap For Financial Innovation, Cristie Ford

All Faculty Publications

Private sector innovation – whether it is fintech, biotechnology, the platformisation of the economy, or other developments – is the single most profound challenge that regulators confront today. Financial innovations, which are intangible and fast-moving, are especially challenging. Financial regulators are at the operational front line of making sense of the promise and the risks associated with fintech, and helping to ensure it operates for public benefit.

Faced with such a changeable and fast-moving problem, how can regulators “future proof” themselves?

This chapter outlines a roadmap for financial regulators who confront fast-moving and profound change in their sectors. It argues …


Cryptocurrencies And Code Before The Courts, Vincent Ooi, Kian Peng Soh Nov 2019

Cryptocurrencies And Code Before The Courts, Vincent Ooi, Kian Peng Soh

Research Collection Yong Pung How School Of Law

In the rapidly developing cyber sphere dominated by cryptocurrencies and code, it is perhaps not uncommon for firms to focus on cutting-edge technological developments leaving the law behind as an afterthought. B2C2 Ltd v Quoine Pte Ltd (‘B2C2’)1 may serve as a timely reminder of the importance of the legal principles supporting e-commerce and Fintech. In the first case of its kind, B2C2 raised several key questions before the Singapore International Commercial Court (‘SICC’), seeking clarification on how the established legal concepts of breach of trust, mistake and unjust enrichment might apply in the context where an automated contract-forming software …


Contracts Formed By Software: An Approach From The Law Of Mistake, Vincent Ooi Feb 2019

Contracts Formed By Software: An Approach From The Law Of Mistake, Vincent Ooi

Centre for AI & Data Governance

A ‘Contracting Problem’ arises when software is used to autonomously enter into contracts without human input. Questions arise as to how and whether there can be an expression of an objective intention to be legally bound. This article considers three leading solutions to the Contracting Problem. The ‘Mere Tools Theory’, which views software as ‘mere tools’ of communication, is too harsh as it binds users to any software malfunction. The Agency Approach, which treats software as Electronic Agents, capable of contracting on behalf of their users, is untenable as it ascribes unrealistic characteristics to software. The article submits that the …


Modularity Theory And Internet Regulation, Christopher S. Yoo Jan 2016

Modularity Theory And Internet Regulation, Christopher S. Yoo

All Faculty Scholarship

Modularity is often cited as one of the foundations for the Internet’s success. Unfortunately, academic discussions about modularity appearing in the literature on Internet policy are undertheorized. The persistence of nonmodular architectures for some technologies underscores the need for some theoretical basis for determining when modularity is the preferred approach. Even when modularity is desirable, theory must provide some basis for making key design decisions, such as the number of modules, the location of the interfaces between the modules, and the information included in those interfaces.

The literature on innovation indicates that modules should be determined by the nature of …


Moving Beyond Bitcoin To An Endogenous Theory Of Decentralized Ledger Technology Regulation: An Initial Proposal, Carla L. Reyes Jan 2016

Moving Beyond Bitcoin To An Endogenous Theory Of Decentralized Ledger Technology Regulation: An Initial Proposal, Carla L. Reyes

Faculty Journal Articles and Book Chapters

Current regulation of decentralized ledger technology leaves industry actors in confusion, facing high risk, and confronting significant disincentives to innovate. This Article argues that an endogenous regulatory approach offers an avenue for alleviating these obstacles while still providing sufficient tools for government oversight. In particular, this Article proposes regulation that is endogenous at two levels: first, in that it is created through an iterative, cooperative process involving both regulators and industry actors, and second, that it is implemented as regulation-through-code, that is, regulation written into the code itself. In so doing, this Article also investigates whether successful implementation of such …


One Centimeter Over My Back Yard: Where Does Federal Preemption Of State Drone Regulation Start?, Henry H. Perritt Jr. Oct 2015

One Centimeter Over My Back Yard: Where Does Federal Preemption Of State Drone Regulation Start?, Henry H. Perritt Jr.

All Faculty Scholarship

The proliferation of cheap civilian drones and their obvious utility for precision agriculture, motion picture and television production, aerial surveying, newsgathering, utility infrastructure inspection, and disaster relief has accelerated the FAA’s sluggish effort to develop a proposal for generally applicable rules and caused it to grant more than 600 “section 333 exemptions” permitting commercial drone flight before its rules are finalized.

Federal preemption in the field of aviation safety regulation is generally assumed, but political pressure on states and municipalities to regulate drones and the ability of this revolutionary aviation technology to open up space close to the ground for …


The Self, The Stasi, The Nsa: Privacy, Knowledge, And Complicity In The Surveillance State, Richard Warner, Robert H. Sloan Jan 2015

The Self, The Stasi, The Nsa: Privacy, Knowledge, And Complicity In The Surveillance State, Richard Warner, Robert H. Sloan

All Faculty Scholarship

We focus on privacy in public. The notion dates back over a century, at least to the work of the German sociologist, Georg Simmel. Simmel observed that people voluntarily limit their knowledge of each other as they interact in a wide variety of social and commercial roles, thereby making certain information private relative to the interaction even if it is otherwise publicly available. Current governmental surveillance in the US (and elsewhere) reduces privacy in public. But to what extent?

The question matters because adequate self-realization requires adequate privacy in public. That in turn depends on informational norms, social norms that …


Sharing Public Safety Helicopters, Henry H. Perritt Jr. Apr 2014

Sharing Public Safety Helicopters, Henry H. Perritt Jr.

All Faculty Scholarship

No abstract provided.


Drones, Henry H. Perritt Jr., Eliot O. Sprague Apr 2014

Drones, Henry H. Perritt Jr., Eliot O. Sprague

All Faculty Scholarship

Abstract

Drone technology is evolving rapidly. Microdrones—what the FAA calls “sUAS”—already on the market at the $1,000 level, have the capability to supplement manned helicopters in support of public safety operations, news reporting, and powerline and pipeline patrol, when manned helicopter support is infeasible, untimely, or unsafe.

Larger drones–"machodrones”–are not yet available outside battlefield and counterterrorism spaces. Approximating the size of manned helicopters, but without pilots, or with human pilots being optional, their design is still in its infancy as designers await greater clarity in the regulatory requirements that will drive airworthiness certification.

This article evaluates drone technology and design …


Beyond Notice And Choice: Privacy, Norms, And Consent, Richard Warner, Robert Sloan Jan 2013

Beyond Notice And Choice: Privacy, Norms, And Consent, Richard Warner, Robert Sloan

All Faculty Scholarship

Informational privacy is the ability to determine for yourself when and how others may collect and use your information. Adequate informational privacy requires a sufficiently broad ability to give or withhold free and informed consent to proposed uses.

Notice and Choice (sometimes also called “notice and consent”) is the current paradigm for consent online. The Notice is a presentation of terms, typically in a privacy policy or terms of use agreement. The Choice is an action signifying acceptance of the terms, typically clicking on an “I agree” button, or simply using the website. Recent reports by the Federal Trade Commission …


The Normativity Of Copying In Copyright Law, Shyamkrishna Balganesh Nov 2012

The Normativity Of Copying In Copyright Law, Shyamkrishna Balganesh

All Faculty Scholarship

Not all copying constitutes copyright infringement. Quite independent of fair use, copyright law requires that an act of copying be qualitatively and quantitatively significant enough or “substantially similar” for it to be actionable. Originating in the nineteenth century, and entirely the creation of courts, copyright’s requirement of “substantial similarity” has thus far received little attention as an independently meaningful normative dimension of the copyright entitlement. This Article offers a novel theory for copyright’s substantial-similarity requirement by placing it firmly at the center of the institution and its various goals and purposes. As a common-law-style device that mirrors the functioning of …


Enhancing Public Access To Online Rulemaking Information, Cary Coglianese Oct 2012

Enhancing Public Access To Online Rulemaking Information, Cary Coglianese

All Faculty Scholarship

One of the most significant powers exercised by federal agencies is their power to make rules. Given the importance of agency rulemaking, the process by which agencies develop rules has long been subject to procedural requirements aiming to advance democratic values of openness and public participation. With the advent of the digital age, government agencies have engaged in increasing efforts to make rulemaking information available online as well as to elicit public participation via electronic means of communication. How successful are these efforts? How might they be improved? In this article, I investigate agencies’ efforts to make rulemaking information available …


Behavioral Advertising: From One-Sided Chicken To Informational Norms, Richard Warner, Robert Sloan Jan 2012

Behavioral Advertising: From One-Sided Chicken To Informational Norms, Richard Warner, Robert Sloan

All Faculty Scholarship

When you download the free audio recording software from Audacity, you agree that Audacity may collect your information and use it to send you advertising. Billions of such pay-with-data exchanges feed information daily to a massive advertising ecosystem that tailors web site advertising as closely as possible to individual interests. The vast majority want considerably more control over our information. We nonetheless routinely enter pay-with-data exchanges when we visit CNN.com, use Gmail, or visit any of a vast number of other websites. Why? And, what, if anything, should we do about it? We answer both questions by describing pay-with-data exchanges …


The Obligatory Structure Of Copyright Law: Unbundling The Wrong Of Copying, Shyamkrishna Balganesh Jan 2012

The Obligatory Structure Of Copyright Law: Unbundling The Wrong Of Copying, Shyamkrishna Balganesh

All Faculty Scholarship

No abstract provided.


Does Legalzoom Have First Amendment Rights? Some Thoughts About Freedom Of Speech And The Unauthorized Practice Of Law, Catherine J. Lanctot Aug 2011

Does Legalzoom Have First Amendment Rights? Some Thoughts About Freedom Of Speech And The Unauthorized Practice Of Law, Catherine J. Lanctot

Working Paper Series

At a time of economic dislocation in the legal profession, it is likely that bar regulators will turn their attention to pursuing lay entities that appear to be engaged in the unauthorized practice of law. One prominent target of these efforts is LegalZoom, an online document preparer that has come under increasing pressure from the organized bar for its marketing and sale of basic legal documents. As regulatory pressure against LegalZoom and similar companies continues to mount, it is worth considering whether there may be unanticipated consequences from pursuing these unauthorized practice claims. In several well-known instances, lay people have …


Cyberclinics: Law Schools, Technology And Justice, Ronald W. Staudt Jan 2011

Cyberclinics: Law Schools, Technology And Justice, Ronald W. Staudt

All Faculty Scholarship

No abstract provided.


"Hot News": The Enduring Myth Of Property In News, Shyamkrishna Balganesh Jan 2011

"Hot News": The Enduring Myth Of Property In News, Shyamkrishna Balganesh

All Faculty Scholarship

No abstract provided.


Are Those Who Ignore History Doomed To Repeat It?, Peter Decherney, Nathan Ensmenger, Christopher S. Yoo Jan 2011

Are Those Who Ignore History Doomed To Repeat It?, Peter Decherney, Nathan Ensmenger, Christopher S. Yoo

All Faculty Scholarship

In The Master Switch, Tim Wu argues that four leading communications industries have historically followed a single pattern that he calls “the Cycle.” Because Wu’s argument is almost entirely historical, the cogency of its claims and the force of its policy recommendations depends entirely on the accuracy and completeness of its treatment of the historical record. Specifically, he believes that industries begin as open, only to be transformed into closed systems by a great corporate mogul until some new form of ingenuity restarts the Cycle anew. Interestingly, even taken at face value, many of the episodes described in the …


Undermined Norms: The Corrosive Effect Of Information Processing Technology On Informational Privacy, Richard Warner Mar 2010

Undermined Norms: The Corrosive Effect Of Information Processing Technology On Informational Privacy, Richard Warner

All Faculty Scholarship

Informational privacy is a matter of control; it consists in the ability to control when one’s personal information is collected, how it is used, and to whom it is distributed. The degree of control we once enjoyed has vanished. Advances in information processing technology now give others considerable power to determine when personal information is collected, how it is used, and to it is whom distributed. Privacy advocates sound the alarm in regard to both the governmental and private sectors. I focus exclusively on the later. Relying on the extensive privacy advocate literature, I assume we should try to regain …


Rethinking Consideration In The Electronic Age, Robert A. Hillman, Maureen O'Rourke Feb 2009

Rethinking Consideration In The Electronic Age, Robert A. Hillman, Maureen O'Rourke

Cornell Law Faculty Working Papers

Our fast-paced age of electronic agreements that ostensibly govern transactions as diverse as downloading software, ordering goods, and engaging in collaborative development projects raises questions regarding the suitability of contract law as the appropriate legal framework. While this question arises in many settings, we focus here on the free and open source software (FOSS) movement because of the maturity and success of its model and the ubiquity of its software. We explore in particular whether open source licenses are supported by consideration, and argue that they are, and that open source licenses are contracts. We further argue that a contractual …


A Discourse On The Public Nature Of Research In Contemporary Life Science: A Law-Policy Proposal To Promote The Public Nature Of Science In An Era Of Academia-Industry Integration, Michael J. Malinowski Jan 2009

A Discourse On The Public Nature Of Research In Contemporary Life Science: A Law-Policy Proposal To Promote The Public Nature Of Science In An Era Of Academia-Industry Integration, Michael J. Malinowski

Journal Articles

This article addresses the impact of integration of academia, industry, and government on the public nature of research. The article concludes that, while the integration has benefited science immensely, regulatory measures should be taken to restore the public nature of research in an age of integration.


The Problem Of Social Cost In A Genetically Modified Age, Paul J. Heald, James C. Smith Nov 2006

The Problem Of Social Cost In A Genetically Modified Age, Paul J. Heald, James C. Smith

Scholarly Works

In Part I of this Article, we apply the Coase Theorem and its most useful corollary to the problem of pollen drift. We conclude that the liability of pollen polluters should be governed by balancing rules against nuisance law, to be applied on a case-by-case basis, rather than by a blanket liability or immunity rule. We also conclude that truly bystanding non-GMO farmers should have a viable defense to patent infringement because liability would result in the application of a reverse Pigovian tax that cannot be justified under accepted economic theory. Only a contextual approach can account for the wide …


Citizen Participation In Rulemaking: Past, Present, And Future, Cary Coglianese Jan 2006

Citizen Participation In Rulemaking: Past, Present, And Future, Cary Coglianese

All Faculty Scholarship

Administrative law scholars and governmental reformers argue that advances in information technology will greatly expand public participation in regulatory policy making. They claim that e-rulemaking, or the application of new technology to administrative rulemaking, promises to transform a previously insulated process into one in which ordinary citizens regularly provide input. With the federal government having implemented several e-rulemaking initiatives in recent years, we can now begin to assess whether such a transformation is in the works—or even on the horizon. This paper compares empirical observations on citizen participation in the past, before e-rulemaking, with more recent data on citizen participation …


Turning Gold Into Epg: Lessons From Low-Tech Democratic Experimentalism For Electronic Rulemaking And Other Ventures In Cyberdemocracy , Peter M. Shane May 2005

Turning Gold Into Epg: Lessons From Low-Tech Democratic Experimentalism For Electronic Rulemaking And Other Ventures In Cyberdemocracy , Peter M. Shane

The Ohio State University Moritz College of Law Working Paper Series

Empowered Participatory Governance, or EPG, is a model of governance developed by Archon Fung and Erik Olin Wright that seeks to connect a set of normative commitments for strengthening democracy with a set of institutional design prescriptions intended to meet that objective. It is derived partly from democratic theory and partly from the study of real-world attempts to institutionalize transformative strategies for democratizing social and political decision making. This paper reviews Fung and Wright's recent volume, Deepening Democracy: Institutional Innovations in Empowered Participatory Governance, and considers the relevance of the authors' and other contributors' insights for the future of a …


Surveillance And The Self: Privacy, Identity, And Technology, Richard Warner Mar 2005

Surveillance And The Self: Privacy, Identity, And Technology, Richard Warner

All Faculty Scholarship

No abstract provided.


Cross-Examining The Brain: A Legal Analysis Of Neural Imaging For Credibility Impeachment, Charles N. W. Keckler Feb 2005

Cross-Examining The Brain: A Legal Analysis Of Neural Imaging For Credibility Impeachment, Charles N. W. Keckler

George Mason University School of Law Working Papers Series

The last decade has seen remarkable process in understanding ongoing psychological processes at the neurobiological level, progress that has been driven technologically by the spread of functional neuroimaging devices, especially magnetic resonance imaging, that have become the research tools of a theoretically sophisticated cognitive neuroscience. As this research turns to specification of the mental processes involved in interpersonal deception, the potential evidentiary use of material produced by devices for detecting deception, long stymied by the conceptual and legal limitations of the polygraph, must be re-examined. Although studies in this area are preliminary, and I conclude they have not yet satisfied …


Shifting Sands: The Limits Of Science In Setting Risk Standards, Cary Coglianese, Gary E. Marchant Apr 2004

Shifting Sands: The Limits Of Science In Setting Risk Standards, Cary Coglianese, Gary E. Marchant

All Faculty Scholarship

Regulators need to rely on science to understand problems and predict the consequences of regulatory actions, but over reliance on science can actually contribute to, or at least deflect attention from, incoherent policymaking. In this article, we explore the problems with using science to justify policy decisions by analyzing the Environmental Protection Agency's recently revised air quality standards for ground-level ozone and particulate matter, some of the most significant regulations ever issued. In revising these standards, EPA mistakenly invoked science as the exclusive basis for its decisions and deflected attention from a remarkable series of inconsistencies. For example, even though …


Border Disputes: Trespass To Chattels On The Internet, Richard Warner Mar 2002

Border Disputes: Trespass To Chattels On The Internet, Richard Warner

All Faculty Scholarship

No abstract provided.


A Roundtable Discussion With Lawrence Lessig, David G. Post & Jeffrey Rosen, Thomas E. Baker Jan 2001

A Roundtable Discussion With Lawrence Lessig, David G. Post & Jeffrey Rosen, Thomas E. Baker

Faculty Publications

This article is a transcript of a discussion between Lawrence Lessig, David G. Post and Jeffrey Rosen on a variety of issues surrounding law, technology and the Internet. The moderator was Thomas E. Baker and the discussion was part of a Drake University Law School symposium in February of 2001.