Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Free expression (4)
- Privacy (3)
- Internet law (2)
- Technology (2)
- Amnesty (1)
-
- Artificial intelligence (1)
- Backpage (1)
- Censorship creep (1)
- Clapper (1)
- Communications decency (1)
- Computer Fraud and Abuse Act (1)
- Computer law (1)
- Computers (1)
- Corporations (1)
- Counterterrorism (1)
- Cybercrime (1)
- Cyberlaw (1)
- Cybersecurity (1)
- Cyberspace (1)
- Data Breach (1)
- Data Security (1)
- Data protection (1)
- Digital security (1)
- ECR (1)
- ESS (1)
- EU (1)
- EU law (1)
- Electronic Sales Suppression (1)
- European Internet Forum (1)
- Fake news (1)
Articles 1 - 8 of 8
Full-Text Articles in Law
The Problem Isn't Just Backpage: Revising Section 230 Immunity, Danielle K. Citron, Benjamin Wittes
The Problem Isn't Just Backpage: Revising Section 230 Immunity, Danielle K. Citron, Benjamin Wittes
Faculty Scholarship
Backpage is a classifieds hub that hosts “80 percent of the online advertising for illegal commercial sex in the United States.” This is not by happenstance but rather by design. Evidence suggests that the advertising hub selectively removed postings discouraging sex trafficking. The site also tailored its rules to protect the practice from detection, including allowing anonymized email and photographs stripped of metadata. Under the prevailing interpretation of 47 U.S.C. § 230 (“Section 230”) of the CDA, however, Backpage would be immune from liability connected to sex trafficking even though it proactively helped sex traffickers from getting caught. No matter …
Humans Forget, Machines Remember: Artificial Intelligence And The Right To Be Forgotten, Tiffany Li, Eduard Fosch Villaronga, Peter Kieseberg
Humans Forget, Machines Remember: Artificial Intelligence And The Right To Be Forgotten, Tiffany Li, Eduard Fosch Villaronga, Peter Kieseberg
Faculty Scholarship
To understand the Right to be Forgotten in context of artificial intelligence, it is necessary to first delve into an overview of the concepts of human and AI memory and forgetting. Our current law appears to treat human and machine memory alike – supporting a fictitious understanding of memory and forgetting that does not comport with reality. (Some authors have already highlighted the concerns on the perfect remembering.) This Article will examine the problem of AI memory and the Right to be Forgotten, using this example as a model for understanding the failures of current privacy law to reflect the …
Zappers, Phantomware And Other Sales Suppression Software In The State Of Washington, Richard Thompson Ainsworth, Robert Chicoine
Zappers, Phantomware And Other Sales Suppression Software In The State Of Washington, Richard Thompson Ainsworth, Robert Chicoine
Faculty Scholarship
Electronic sales suppression (ESS) is a fraud that has been a (prominent) feature of the North American retail business since at least 1996. The first EES case in the US dates from 1981. ESS is a global problem. Depending on the jurisdiction, and the research study consulted, ESS is estimated to be present in 34% (of Canadian), 50% (of German – two studies), and 70% (of Swedish and Slovenian) businesses. It may be the case today, that “you cannot leave home without” encountering (or participating in) ESS.
The most common types of sales suppression technology are Zappers and Phantomware programming. …
Risk And Anxiety: A Theory Of Data Breach Harms, Danielle K. Citron, Daniel Solove
Risk And Anxiety: A Theory Of Data Breach Harms, Danielle K. Citron, Daniel Solove
Faculty Scholarship
In lawsuits about data breaches, the issue of harm has confounded courts. Harm is central to whether plaintiffs have standing to sue in federal court and whether their claims are viable. Plaintiffs have argued that data breaches create a risk of future injury from identity theft or fraud and that breaches cause them to experience anxiety about this risk. Courts have been reaching wildly inconsistent conclusions on the issue of harm, with most courts dismissing data breach lawsuits for failure to allege harm. A sound and principled approach to harm has yet to emerge, resulting in a lack of consensus …
Beyond Intermediary Liability: The Future Of Information Platforms - Workshop Report, Tiffany Li
Beyond Intermediary Liability: The Future Of Information Platforms - Workshop Report, Tiffany Li
Faculty Scholarship
On February 13, 2018, WIII hosted the workshop, “Beyond Intermediary Liability: The Future of Information Platforms.” Leading experts from industry, civil society, and academia convened at Yale Law School for a series of non-public, guided discussions. The roundtable of experts considered pressing questions related to intermediary liability and the rights, roles, and responsibilities of information platforms in society. Based on conversations from the workshop, WIII published a free, publicly available report detailing the most critical issues necessary for understanding the role of information platforms, such as Facebook and Google, in law and society today. The report highlights insights and questions …
Four Principles For Digital Expression (You Won't Believe #3!), Danielle K. Citron, Neil Richards
Four Principles For Digital Expression (You Won't Believe #3!), Danielle K. Citron, Neil Richards
Faculty Scholarship
At the dawn of the Internet’s emergence, the Supreme Court rhapsodized about its potential as a tool for free expression and political liberation. In ACLU v. Reno (1997), the Supreme Court adopted a bold vision of Internet expression to strike down a federal law - the Communications Decency Act - that restricted digital expression to forms that were merely “decent.” Far more than the printing press, the Court explained, the mid-90s Internet enabled anyone to become a town crier. Communication no longer required the permission of powerful entities. With a network connection, the powerless had as much luck reaching a …
Twenty Years Of Web Scraping And The Computer Fraud And Abuse Act, Andrew Sellars
Twenty Years Of Web Scraping And The Computer Fraud And Abuse Act, Andrew Sellars
Faculty Scholarship
"Web scraping" is a ubiquitous technique for extracting data from the World Wide Web, done through a computer script that will send tailored queries to websites to retrieve specific pieces of content. The technique has proliferated under the ever-expanding shadow of the Computer Fraud and Abuse Act (CFAA), which, among other things, prohibits obtaining information from a computer by accessing the computer without authorization or exceeding one's authorized access.
Unsurprisingly, many litigants have now turned to the CFAA in attempt to police against unwanted web scraping. Yet despite the rise in both web scraping and lawsuits about web scraping, practical …
Extremist Speech, Compelled Conformity, And Censorship Creep, Danielle K. Citron
Extremist Speech, Compelled Conformity, And Censorship Creep, Danielle K. Citron
Faculty Scholarship
Silicon Valley has long been viewed as a full-throated champion of First Amendment values. The dominant online platforms, however, have recently adopted speech policies and processes that depart from the U.S. model. In an agreement with the European Commission, tech companies have pledged to respond to reports of hate speech within twenty-four hours, a hasty process that may trade valuable expression for speedy results. Plans have been announced for an industry database that will allow the same companies to share hashed images of banned extremist content for review and removal elsewhere.
These changes are less the result of voluntary market …