Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 16 of 16

Full-Text Articles in Law

Cyber Borders: Exercising State Sovereignty Online, Beth Simmons, Rachel Hulvey Jul 2023

Cyber Borders: Exercising State Sovereignty Online, Beth Simmons, Rachel Hulvey

All Faculty Scholarship

The internet brings challenges that threaten national identities and the foundations of what it means to be a state. Well-known challenges include difficulties maintaining important national values, competition threatening local economic plans, and even the inability to maintain a meaningful informational environment for self-governance. These influences are plausibly understood as challenges to some of the basic functions of a sovereign state. Despite these challenges, we identify the social practice of establishing control over mercurial mediums. States have responded by erecting cyberborders with a collection of laws, practices, and internet architecture designed to filter digital information within the territorial jurisdiction of …


Illuminating Regulatory Guidance, Cary Coglianese Jan 2020

Illuminating Regulatory Guidance, Cary Coglianese

All Faculty Scholarship

Administrative agencies issue many guidance documents each year in an effort to provide clarity and direction to the public about important programs, policies, and rules. But these guidance documents are only helpful to the public if they can be readily found by those who they will benefit. Unfortunately, too many agency guidance documents are inaccessible, reaching the point where some observers even worry that guidance has become a form of regulatory “dark matter.” This article identifies a series of measures for agencies to take to bring their guidance documents better into the light. It begins by explaining why, unlike the …


When Whispers Enter The Cloud, Heidi H. Liu Jan 2018

When Whispers Enter The Cloud, Heidi H. Liu

All Faculty Scholarship

With increased awareness of workplace harassment in recent years, the idea of enhanced reporting around sexual misconduct has gained traction. As a result, several technologies – from smartphone apps to well-publicized services – have been introduced with the goals of preventing, enabling reports of, and even predicting sexual misconduct at work, school and in public. But to what extent are these technologies secure and accessible to survivors? This Note documents the existing resources and proposes a framework focusing on privacy and participation for evaluating these tools intended to benefit survivors.


Legal Mechanisms For Governing The Transition Of Key Domain Name Functions To The Global Multi-Stakeholder Community, Christopher S. Yoo, Aaron Shull, Paul Twomey Jan 2017

Legal Mechanisms For Governing The Transition Of Key Domain Name Functions To The Global Multi-Stakeholder Community, Christopher S. Yoo, Aaron Shull, Paul Twomey

All Faculty Scholarship

This Chapter proposes an alternative approach to the IANA transition that migrates the existing core contractual requirements imposed by the US government to the existing IANA functions customers. It also advances modest internal accountability revisions that could be undertaken within ICANN’s existing structure. Specifically, it advocates that the Independent Review Tribunal charged with reviewing certain ICANN board of directors-related decisions be selected by a multi-stakeholder committee rather than being subject to approval by ICANN and expanding the grounds for review to cover all of the rubrics recommended by ICANN’s “Improving Institutional Confidence” process in 2008-2009, including fairness, fidelity to the …


Protecting One's Own Privacy In A Big Data Economy, Anita L. Allen Dec 2016

Protecting One's Own Privacy In A Big Data Economy, Anita L. Allen

All Faculty Scholarship

Big Data is the vast quantities of information amenable to large-scale collection, storage, and analysis. Using such data, companies and researchers can deploy complex algorithms and artificial intelligence technologies to reveal otherwise unascertained patterns, links, behaviors, trends, identities, and practical knowledge. The information that comprises Big Data arises from government and business practices, consumer transactions, and the digital applications sometimes referred to as the “Internet of Things.” Individuals invisibly contribute to Big Data whenever they live digital lifestyles or otherwise participate in the digital economy, such as when they shop with a credit card, get treated at a hospital, apply …


Telecommunications: Competition Policy In The Telecommunications Space, Gene Kimmelman, Maureen K. Ohlhausen, Michael O’Rielly, Christopher S. Yoo, Stephen F. Williams Jan 2016

Telecommunications: Competition Policy In The Telecommunications Space, Gene Kimmelman, Maureen K. Ohlhausen, Michael O’Rielly, Christopher S. Yoo, Stephen F. Williams

All Faculty Scholarship

In today’s rapidly evolving telecommunications landscape, the development of new technologies and distribution platforms are driving innovation and growth at a breakneck speed across the Internet ecosystem. Broadband connectivity is increasingly important to our civil discourse, our economy, and our future. What is the proper role of government in facilitating robust investment and competition in this critical sector? When technology companies constantly have to reinvent themselves and adapt to survive – what role should government play? This panel of experts at the Federalist Society’s 2014 National Lawyers Convention discussed the current regulatory environment and how government policies – particularly regarding …


U.S. Vs. European Broadband Deployment: What Do The Data Say?, Christopher S. Yoo Jun 2014

U.S. Vs. European Broadband Deployment: What Do The Data Say?, Christopher S. Yoo

All Faculty Scholarship

As the Internet becomes more important to the everyday lives of people around the world, commentators have tried to identify the best policies increasing the deployment and adoption of high-speed broadband technologies. Some claim that the European model of service-based competition, induced by telephone-style regulation, has outperformed the facilities-based competition underlying the US approach to promoting broadband deployment. The mapping studies conducted by the US and the EU for 2011 and 2012 reveal that the US led the EU in many broadband metrics.

• High-Speed Access: A far greater percentage of US households had access to Next Generation Access (NGA) …


Copyright’S Private Ordering And The 'Next Great Copyright Act', Jennifer E. Rothman Jan 2014

Copyright’S Private Ordering And The 'Next Great Copyright Act', Jennifer E. Rothman

All Faculty Scholarship

Private ordering plays a significant role in the application of intellectual property laws, especially in the context of copyright law. In this Article, I highlight some of the dominant modes of private ordering and consider what formal copyright law should do, if anything, to engage with private ordering in the copyright space. I conclude that there is not one single approach that copyright law should take with regard to private ordering, but instead several different approaches. In some instances, the best option is for the law to get out of the way and simply continue to provide room for various …


An Ethical Duty To Protect One’S Own Information Privacy?, Anita L. Allen Jan 2013

An Ethical Duty To Protect One’S Own Information Privacy?, Anita L. Allen

All Faculty Scholarship

People freely disclose vast quantities of personal and personally identifiable information. The central question of this Meador Lecture in Morality is whether they have a moral (or ethical) obligation (or duty) to withhold information about themselves or otherwise to protect information about themselves from disclosure. Moreover, could protecting one’s own information privacy be called for by important moral virtues, as well as obligations or duties? Safeguarding others’ privacy is widely understood to be a responsibility of government, business, and individuals. The “virtue” of fairness and the “duty” or “obligation” of respect for persons arguably ground other-regarding responsibilities of confidentiality and …


Free Speech And The Myth Of The Internet As An Unintermediated Experience, Christopher S. Yoo Sep 2010

Free Speech And The Myth Of The Internet As An Unintermediated Experience, Christopher S. Yoo

All Faculty Scholarship

In recent years, a growing number of commentators have raised concerns that the decisions made by Internet intermediaries — including last-mile network providers, search engines, social networking sites, and smartphones — are inhibiting free speech and have called for restrictions on their ability to prioritize or exclude content. Such calls ignore the fact that when mass communications are involved, intermediation helps end users to protect themselves from unwanted content and allows them to sift through the avalanche of desired content that grows ever larger every day. Intermediation also helps solve a number of classic economic problems associated with the Internet. …


The Convergence Of Broadcasting And Telephony: Legal And Regulatory Implications, Christopher S. Yoo Dec 2009

The Convergence Of Broadcasting And Telephony: Legal And Regulatory Implications, Christopher S. Yoo

All Faculty Scholarship

This article, written for the inaugural issue of a new journal, analyzes the extent to which the convergence of broadcasting and telephony induced by the digitization of communications technologies is forcing policymakers to rethink their basic approach to regulating these industries. Now that voice and video are becoming available through every transmission technology, policymakers can no longer define the scope of regulatory obligations in terms of the mode of transmission. In addition, jurisdictions that employ separate agencies to regulate broadcasting and telephony must reform their institutional structures to bring both within the ambit of a single regulatory agency. The emergence …


Network Neutrality After Comcast: Toward A Case-By-Case Approach To Reasonable Network Management, Christopher S. Yoo Feb 2009

Network Neutrality After Comcast: Toward A Case-By-Case Approach To Reasonable Network Management, Christopher S. Yoo

All Faculty Scholarship

The Federal Communications Commission’s recent Comcast decision has rejected categorical, ex ante restrictions on Internet providers’ ability to manage their networks in favor of a more flexible approach that examines each dispute on a case-by-case basis, as I have long advocated. This book chapter, written for a conference held in February 2009, discusses the considerations that a case-by-case approach should take into account. First, allowing the network to evolve will promote innovation by allowing the emergence of applications that depend on a fundamentally different network architecture. Indeed, as the universe of Internet users and applications becomes more heterogeneous, it is …


Demystifying The Right To Exclude: Of Property, Inviolability, And Automatic Injunctions, Shyamkrishna Balganesh Jan 2008

Demystifying The Right To Exclude: Of Property, Inviolability, And Automatic Injunctions, Shyamkrishna Balganesh

All Faculty Scholarship

The right to exclude has long been considered a central component of property. In focusing on the element of exclusion, courts and scholars have paid little attention to what an owner's right to exclude means and the forms in which this right might manifest itself in actual property practice. For some time now, the right to exclude has come to be understood as nothing but an entitlement to injunctive relief- that whenever an owner successfully establishes title and an interference with the same, an injunction will automatically follow. Such a view attributes to the right a distinctively consequentialist meaning, which …


Censorship By Proxy: The First Amendment, Internet Intermediaries, And The Problem Of The Weakest Link, Seth F. Kreimer Nov 2006

Censorship By Proxy: The First Amendment, Internet Intermediaries, And The Problem Of The Weakest Link, Seth F. Kreimer

All Faculty Scholarship

The rise of the Internet has changed the First Amendment drama, for governments confront technical and political obstacles to sanctioning either speakers or listeners in cyberspace. Faced with these challenges, regulators have fallen back on alternatives, predicated on the fact that, in contrast to the usual free expression scenario, the Internet is not dyadic. The Internet's resistance to direct regulation of speakers and listeners rests on a complex chain of connections, and emerging regulatory mechanisms have begun to focus on the weak links in that chain. Rather than attacking speakers or listeners directly, governments have sought to enlist private actors …


Common Law Property Metaphors On The Internet: The Real Problem With The Doctrine Of Cybertrespass, Shyamkrishna Balganesh Apr 2006

Common Law Property Metaphors On The Internet: The Real Problem With The Doctrine Of Cybertrespass, Shyamkrishna Balganesh

All Faculty Scholarship

The doctrine of cybertrespass represents one of the most recent attempts by courts to apply concepts and principles from the real world to the virtual world of the Internet. A creation of state common law, the doctrine essentially involved extending the tort of trespass to chattels to the electronic world. Consequently, unauthorized electronic interferences are deemed trespassory intrusions and rendered actionable. The present paper aims to undertake a conceptual study of the evolution of the doctrine, examining the doctrinal modifications courts were required to make to mould the doctrine to meet the specificities of cyberspace. It then uses cybertrespass to …


Initial Interest Confusion: Standing At The Crossroads Of Trademark Law, Jennifer E. Rothman Oct 2005

Initial Interest Confusion: Standing At The Crossroads Of Trademark Law, Jennifer E. Rothman

All Faculty Scholarship

While the benchmark of trademark infringement traditionally has been a demonstration that consumers are likely to be confused by the use of a similar or identical trademark to identify the goods or services of another, a court-created doctrine called initial interest confusion allows liability for trademark infringement solely on the basis that a consumer might initially be interested, attracted, or distracted by a competitor's, or even a non-competitor's, product or service. Initial interest confusion is being used with increasing frequency, especially on the Internet, to shut down speech critical of trademark holders and their products and services, to prevent comparative …