Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 31 - 60 of 80

Full-Text Articles in Law

The Efficacy Of Cybersecurity Regulation, David Thaw Jan 2014

The Efficacy Of Cybersecurity Regulation, David Thaw

Articles

Cybersecurity regulation presents an interesting quandary where, because private entities possess the best information about threats and defenses, legislatures do – and should – deliberately encode regulatory capture into the rulemaking process. This relatively uncommon approach to administrative law, which I describe as Management-Based Regulatory Delegation, involves the combination of two legislative approaches to engaging private entities' expertise. This Article explores the wisdom of those choices by comparing the efficacy of such private sector engaged regulation with that of a more traditional, directive mode of regulating cybersecurity adopted by the state legislatures. My analysis suggests that a blend of these …


Surveillance At The Source, David Thaw Jan 2014

Surveillance At The Source, David Thaw

Articles

Contemporary discussion concerning surveillance focuses predominantly on government activity. These discussions are important for a variety of reasons, but generally ignore a critical aspect of the surveillance-harm calculus – the source from which government entities derive the information they use. The source of surveillance data is the information "gathering" activity itself, which is where harms like "chilling" of speech and behavior begin.

Unlike the days where satellite imaging, communications intercepts, and other forms of information gathering were limited to advanced law enforcement, military, and intelligence activities, private corporations now play a dominant role in the collection of information about individuals' …


Enlightened Regulatory Capture, David Thaw Jan 2014

Enlightened Regulatory Capture, David Thaw

Articles

Regulatory capture generally evokes negative images of private interests exerting excessive influence on government action to advance their own agendas at the expense of the public interest. There are some cases, however, where this conventional wisdom is exactly backwards. This Article explores the first verifiable case, taken from healthcare cybersecurity, where regulatory capture enabled regulators to harness private expertise to advance exclusively public goals. Comparing this example to other attempts at harnessing industry expertise reveals a set of characteristics under which regulatory capture can be used in the public interest. These include: 1) legislatively-mandated adoption of recommendations by an advisory …


Communications Privacy For And By Whom?, Ryan Calo Jan 2014

Communications Privacy For And By Whom?, Ryan Calo

Articles

A response to Professor Orin Kerr's The Next Generation Communications Privacy Act, which makes a series of quiet assumptions, however, that readers may find controversial.

First, the Article reads as though ECPA exists only to protect citizens from public officials. According to its text and to case law, however, ECPA also protects private citizens from one another in ways any new act should revisit.

Second, the Article assumes that society should address communications privacy with a statute, whereas specific experiences with ECPA suggest that the courts may be better suited to address communications privacy—for reasons Professor Kerr himself offers. …


Zombies Among Us: Injunctions In Defamation Cases Come Back From The Dead, Jim Stewart, Leonard M. Niehoff Jan 2014

Zombies Among Us: Injunctions In Defamation Cases Come Back From The Dead, Jim Stewart, Leonard M. Niehoff

Articles

Here's a scary thought: an individual, unhappy with negative statements that have been made about him, sues for defamation and persuades the trial court to issue an injunction prohibiting the speaker from engaging in that speech again. An appellate court reviews the injunction and, in large measure, upholds it. This creepy scenario brings shudders to free speech and media advocates, who have long viewed such injunctions as prior restraints that the First Amendment forbids in all but the most extreme and extraordinary cases. As a recent decision from the Michigan Court of Appeals demonstrates, however, decades of United States Supreme …


Defining Privacy And Utility In Data Sets, Felix T. Wu Oct 2013

Defining Privacy And Utility In Data Sets, Felix T. Wu

Articles

Is it possible to release useful data while preserving the privacy of the individuals whose information is in the database? This question has been the subject of considerable controversy, particularly in the wake of well-publicized instances in which researchers showed how to re-identify individuals in supposedly anonymous data. Some have argued that privacy and utility are fundamentally incompatible, while others have suggested that simple steps can be taken to achieve both simultaneously. Both sides have looked to the computer science literature for support.

What the existing debate has overlooked, however, is that the relationship between privacy and utility depends crucially …


The Constitutionality Of Consumer Privacy Regulation, Felix T. Wu Jan 2013

The Constitutionality Of Consumer Privacy Regulation, Felix T. Wu

Articles

No abstract provided.


Three Puzzling Things About New York Times V. Sullivan: Beginning The Anniversary Conversation, Leonard M. Niehoff Jan 2013

Three Puzzling Things About New York Times V. Sullivan: Beginning The Anniversary Conversation, Leonard M. Niehoff

Articles

This is the 50th anniversary of a watershed year in the history of the civil rights movement. During that year, the Southern Christian Leadership Conference mounted its anti-segregation campaign in Alabama; Commissioner "Bull" Connor turned dogs and fire hoses on demonstrators; activists were attacked; riots flared; George Wallace blocked the doors of a public university to keep black students out; President Kennedy dispatched troops to Alabama and called for the passage of a civil rights bill; Medgar Evers was murdered; the then-largest human rights demonstration in U.S. history converged on Washington; Martin Luther King Jr. gave his historic speech at …


Tying And Consumer Harm, Daniel A. Crane Jan 2012

Tying And Consumer Harm, Daniel A. Crane

Articles

Brantley raises important issues of law, economics, and policy about tying arrangements. Under current legal principles, Brantley was on solid ground in distinguishing between anticompetitive ties and those that might harm consumer interests without impairing competition. As a matter of economics, the court was also right to reject the claim that the cable programmers forced consumers to pay for programs the customers didn’t want. The hardest question is a policy one - whether antitrust law should ever condemn the exploitation of market power in ways that extract surplus from consumers but do not create or enlarge market power. I shall …


Collateral Censorship And The Limits Of Intermediary Immunity, Felix T. Wu Nov 2011

Collateral Censorship And The Limits Of Intermediary Immunity, Felix T. Wu

Articles

The law often limits the liability of an intermediary for the speech it carries. And rightly so, because imposing liability on intermediaries can induce them to filter out questionable content and this “collateral censorship” risks suppressing much lawful, even highly beneficial, speech. The “collateral censorship” rationale has its limits, though, and correspondingly, so should the applicability of intermediary immunity. The worry with collateral censorship is not just that intermediaries censor, but that they censor more than an original speaker would in the face of potential liability. Increased censorship, in turn, is the product of applying liability targeted at original speakers …


Plan B For Campaign-Finance Reform: Can The Fcc Help Save American Politics After Citizens United?, Lili Levi Jan 2011

Plan B For Campaign-Finance Reform: Can The Fcc Help Save American Politics After Citizens United?, Lili Levi

Articles

No abstract provided.


When Machines Are Watching: How Warrantless Use Of Gps Surveillance Technology Violates The Fourth Amendment Right Against Unreasonable Searches, David Thaw, Priscilla Smith, Nabiha Syed, Albert Wong Jan 2011

When Machines Are Watching: How Warrantless Use Of Gps Surveillance Technology Violates The Fourth Amendment Right Against Unreasonable Searches, David Thaw, Priscilla Smith, Nabiha Syed, Albert Wong

Articles

Federal and state law enforcement officials throughout the nation are currently using Global Positioning System (GPS) technology for automated, prolonged surveillance without obtaining warrants. As a result, cases are proliferating in which criminal defendants are challenging law enforcement’s warrantless uses of GPS surveillance technology, and courts are looking for direction from the Supreme Court. Most recently, a split has emerged between the Ninth and D.C. Circuit Courts of Appeal on the issue. In United States v. Pineda-Moreno, the Ninth Circuit relied on United States v. Knotts — which approved the limited use of beeper technology without a warrant — to …


Opinions, Implications, And Confusions, Leonard M. Niehoff Jan 2011

Opinions, Implications, And Confusions, Leonard M. Niehoff

Articles

The law of defamation is haunted by ancient common law principles, such as the distinction between libel per se and libel per quad, that contribute nothing to our current jurisprudence beyond providing opportunities for misunderstanding and perplexity. Unfortunately, more contemporary doctrines have further complicated the field by sowing fresh confusions. This article explores two such doctrines-the principle that a defamation claim cannot rest upon an opinion and the principle that a defamation claim can rest upon unstated implications- and suggests that there are troublesome contradictions both within them and between them. In short, this article respectfully proposes that these two …


What Blogging Might Teach About Cybernorms, Jacqueline D. Lipton Jan 2010

What Blogging Might Teach About Cybernorms, Jacqueline D. Lipton

Articles

Since the dawn of the information age, scholars have debated the viability of regulating cyberspace. Early on, Professor Lawrence Lessig suggested that “code is law” online. Lessig and others also examined the respective regulatory functions of laws, code, market forces, and social norms. In recent years, with the rise of Web 2.0 interactive technologies, norms have taken center-stage as a regulatory modality online. The advantages of norms are that they can develop quickly by the communities that seek to enforce them, and they are not bound by geography. However, to date there has been scant literature dealing in any detail …


A "Pay Or Play" Experiment To Improve Children's Educational Television, Lili Levi Jan 2010

A "Pay Or Play" Experiment To Improve Children's Educational Television, Lili Levi

Articles

No abstract provided.


The Fcc's Affirmative Speech Obligations Promoting Child Welfare, Lili Levi Jan 2010

The Fcc's Affirmative Speech Obligations Promoting Child Welfare, Lili Levi

Articles

No abstract provided.


Wikipedia And The European Union Database Directive, Jacqueline D. Lipton Jan 2010

Wikipedia And The European Union Database Directive, Jacqueline D. Lipton

Articles

“Web 2.0" and "User Generated Content (UGC)" are the new buzzwords in cyberspace. In recent years, law and policy makers have struggled to keep pace with the needs of digital natives in terms of online content control in the new participatory web culture. Much of the discourse about intellectual property rights in this context revolves around copyright law: for example, who owns copyright in works generated by multiple people, and what happens when these joint authored works borrow from existing copyright works in terms of derivative works rights and the fair use defense. Many works compiled by groups are subject …


Bad Faith In Cyberspace: Grounding Domain Name Theory In Trademark, Property And Restitution, Jacqueline D. Lipton Jan 2010

Bad Faith In Cyberspace: Grounding Domain Name Theory In Trademark, Property And Restitution, Jacqueline D. Lipton

Articles

The year 2009 marks the tenth anniversary of domain name regulation under the Anti-Cybersquatting Consumer Protection Act (ACPA) and the Uniform Domain Name Dispute Resolution Policy (UDRP). Adopted to combat cybersquatting, these rules left a confused picture of domain name theory in their wake. Early cybersquatters registered Internet domain names corresponding with others’ trademarks to sell them for a profit. However, this practice was quickly and easily contained. New practices arose in domain name markets, not initially contemplated by the drafters of the ACPA and the UDRP. One example is clickfarming – using domain names to generate revenues from click-on …


Mapping Online Privacy, Jacqueline D. Lipton Jan 2010

Mapping Online Privacy, Jacqueline D. Lipton

Articles

Privacy scholars have recently outlined difficulties in applying existing concepts of personal privacy to the maturing Internet. With Web 2.0 technologies, more people have more opportunities to post information about themselves and others online, often with scant regard for individual privacy. Shifting notions of 'reasonable expectations of privacy' in the context of blogs, wikis, and online social networks create challenges for privacy regulation. Courts and commentators struggle with Web 2.0 privacy incursions without the benefit of a clear regulatory framework. This article offers a map of privacy that might help delineate at least the outer boundaries of Web 2.0 privacy. …


Toward A Broadband Public Interest Standard, Anthony E. Varona Jan 2009

Toward A Broadband Public Interest Standard, Anthony E. Varona

Articles

No abstract provided.


Linkline's Institutional Suspicions, Daniel A. Crane Jan 2009

Linkline's Institutional Suspicions, Daniel A. Crane

Articles

Antitrust scholars are having fun again. Not so long ago, they were the poor, redheaded stepchildren of the legal academy, either pining for the older days of rigorous antitrust enforcement or trying to kill off what was left of the enterprise. Other law professors felt sorry for them, ignored them, or both. But now antitrust is making a comeback of sorts. In one heady week in May of 2009, a front-page story in the New York Times reported the dramatic decision of Christine Varney-the Obama Administration's new Antitrust Division head at the Department of Justice-to jettison the entire report on …


Chairman Kevin Martin On Indecency: Enhancing Agency Power, Lili Levi Jan 2008

Chairman Kevin Martin On Indecency: Enhancing Agency Power, Lili Levi

Articles

No abstract provided.


The Four Eras Of Fcc Public Interest Regulation, Lili Levi Jan 2008

The Four Eras Of Fcc Public Interest Regulation, Lili Levi

Articles

No abstract provided.


A Winning Solution For Youtube And Utube? Corresponding Trademarks And Domain Name Sharing, Jacqueline D. Lipton Jan 2008

A Winning Solution For Youtube And Utube? Corresponding Trademarks And Domain Name Sharing, Jacqueline D. Lipton

Articles

In June of 2007, the United States District Court for the Northern District of Ohio ruled on a motion to dismiss various claims against the Youtube video-sharing service. The claimant was Universal Tube and Rollform Equipment Corp ("Universal"), a manufacturer of pipes and tubing products. Since 1996, Universal has used the domain name utube.com - phonetically the same as Youtube's domain name, youtube.com. Youtube.com was registered in 2005 and gained almost-immediate popularity as a video-sharing website. As a result, Universal experienced excessive web traffic by Internet users looking for youtube.com and mistakenly typing utube.com into their web browsers. Universal's servers …


Celebrity In Cyberspace: A Personality Rights Paradigm For Personal Domain Name Disputes, Jacqueline D. Lipton Jan 2008

Celebrity In Cyberspace: A Personality Rights Paradigm For Personal Domain Name Disputes, Jacqueline D. Lipton

Articles

When the Oscar-winning actress, Julia Roberts, fought for control of the domain name, what was her aim? Did she want to reap economic benefits from the name? Probably not, as she has not used the name since it was transferred to her. Or did she want to prevent others from using it on either an unjust enrichment or a privacy basis? Was she, in fact, protecting a trademark interest in her name? Personal domain name disputes, particularly those in the space, implicate unique aspects of an individual's persona in cyberspace. Nevertheless, most of the legal rules developed for these disputes …


Created Facts And The Flawed Ontology Of Copyright Law, Justin Hughes Nov 2007

Created Facts And The Flawed Ontology Of Copyright Law, Justin Hughes

Articles

It is black letter doctrine that facts are not copyrightable: facts are discovered, not created—so they will always lack the originality needed for copyright protection. As straightforward as this reasoning seems, it is fundamentally flawed. Using the “social facts” theory of philosopher John Searle, this Article explores a variety of “created facts” cases—designation systems, systematic evaluations, and privately written laws—in which original expression from private individuals is adopted by social convention and generates facts in our social reality. In the course of this discussion, the paper places facts in their historical and philosophical context, explores how courts conflate facts with …


Televising The Court: A Category Mistake (Symposium On Televising The Supreme Court), Christina B. Whitman Jan 2007

Televising The Court: A Category Mistake (Symposium On Televising The Supreme Court), Christina B. Whitman

Articles

The idea of televising Supreme Court oral arguments is undeniably appealing. Consequently, it is not surprising that reporters and politicians have been pressuring the Court to take this step. The other branches have been media-friendly for years, and Supreme Court arguments are already open to the public. Why should those of us who neither reside in Washington, D.C. nor have the time to attend Court proceedings be asked to depend on reporters for descriptions of the event? Even lower courts permit cameras. There is an understandable hunger for anything that will help us understand these nine individuals who have so …


In Search Of Regulatory Equilibrium, Lili Levi Jan 2007

In Search Of Regulatory Equilibrium, Lili Levi

Articles

No abstract provided.


Out Of Thin Air: Using First Amendment Public Forum Analysis To Redeem American Broadcasting Regulation, Anthony E. Varona Jan 2006

Out Of Thin Air: Using First Amendment Public Forum Analysis To Redeem American Broadcasting Regulation, Anthony E. Varona

Articles

American television and radio broadcasters are uniquely privileged among Federal Communications Commission (FCC) licensees. Exalted as public trustees by the 1934 Communications Act, broadcasters pay virtually nothing for the use of their channels of public radiofrequency spectrum, unlike many other FCC licensees who have paid billions of dollars for similar digital spectrum. Congress envisioned a social contract of sorts between broadcast licensees and the communities they served. In exchange for their free licenses, broadcast stations were charged with providing a platform for a "free marketplace of ideas" that would cultivate a democratically engaged and enlightened citizenry through the broadcasting of …


Relative Access To Corrective Speech: A New Test For Requiring Actual Malice, Aaron Perzanowski Jan 2006

Relative Access To Corrective Speech: A New Test For Requiring Actual Malice, Aaron Perzanowski

Articles

This Article reexamines the First Amendment protections provided by the public figure doctrine. It suggests that the doctrine is rooted in a set of out-dated assumptions regarding the media landscape and, as a result, has failed to adapt in a manner that accounts for our changing communications environment.

The public figure doctrine, which imposes the more rigorous actual malice standard of fault on defamation plaintiffs who enjoy greater access to mass media, was constructed in an era defined by one-to-many communications media. Newspapers, broadcasters, and traditional publishers exhausted the Court's understanding of the means of communicating with mass audiences. As …