Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 72

Full-Text Articles in Law

Online Disinhibited Contracts, Wayne R. Barnes Feb 2024

Online Disinhibited Contracts, Wayne R. Barnes

Faculty Scholarship

There have been at least two dominant forces at work in the realm of consumer contracting over the past several decades. One has been the rise and domination of the standard form contract (whereby merchants contract with consumers via the use of standardized, boilerplate terms and conditions that consumers do not read or understand). The second force has been the rise of e-commerce and the purchase of goods and services via websites and other online platforms, and the use of “wrap” formation methodology (whereby merchants obtain consumer assent to the online terms and conditions via the consumer’s informal click, scroll, …


A Matter Of Facts: The Evolution Of Copyright’S Fact-Exclusion And Its Implications For Disinformation And Democracy, Jessica Silbey Jan 2024

A Matter Of Facts: The Evolution Of Copyright’S Fact-Exclusion And Its Implications For Disinformation And Democracy, Jessica Silbey

Faculty Scholarship

The Article begins with a puzzle: the curious absence of an express fact-exclusion from copyright protection in both the Copyright Act and its legislative history despite it being a well-founded legal principle. It traces arguments in the foundational Supreme Court case (Feist Publications v. Rural Telephone Service) and in the Copyright Act’s legislative history to discern a basis for the fact-exclusion. That research trail produces a legal genealogy of the fact-exclusion based in early copyright common law anchored by canonical cases, Baker v. Selden, Burrow-Giles v. Sarony, and Wheaton v. Peters. Surprisingly, none of them …


Questions Of Intellectual Property And Fundamental Values In The Digital Age, Jessica Silbey Jan 2023

Questions Of Intellectual Property And Fundamental Values In The Digital Age, Jessica Silbey

Faculty Scholarship

Today's intellectual property debates, in both law and the larger society, are a bellwether of changing justice needs in the twenty-first century. As the digital age democratizes technological opportunities, it brings intellectual property law into mainstream everyday culture. This generates debates about the relationship between the constitutional interest in "the progress of science and useful arts" and other fundamental values, such as equality, privacy, and distributive justice. These values, which were not explicitly part of intellectual property regimes in prior eras, are especially challenged in today's internet world.

The article (which was presented as the annual Nies Lecture in April …


Legislating Data Loyalty, Woodrow Hartzog, Neil Richards Jan 2022

Legislating Data Loyalty, Woodrow Hartzog, Neil Richards

Faculty Scholarship

Lawmakers looking to embolden privacy law have begun to consider imposing duties of loyalty on organizations trusted with people’s data and online experiences. The idea behind loyalty is simple: organizations should not process data or design technologies that conflict with the best interests of trusting parties. But the logistics and implementation of data loyalty need to be developed if the concept is going to be capable of moving privacy law beyond its “notice and consent” roots to confront people’s vulnerabilities in their relationship with powerful data collectors.

In this short Essay, we propose a model for legislating data loyalty. Our …


The Surprising Virtues Of Data Loyalty, Woodrow Hartzog, Neil M. Richards Jan 2022

The Surprising Virtues Of Data Loyalty, Woodrow Hartzog, Neil M. Richards

Faculty Scholarship

Lawmakers in the United States and Europe are seriously considering imposing duties of data loyalty that implement ideas from privacy law scholarship, but critics claim such duties are unnecessary, unworkable, overly individualistic, and indeterminately vague. This paper takes those criticisms seriously, and its analysis of them reveals that duties of data loyalty have surprising virtues. Loyalty, it turns out, can support collective well-being by embracing privacy’s relational turn; it can be a powerful state of mind for reenergizing privacy reform; it prioritizes human values rather than potentially empty formalism; and it offers solutions that are flexible and clear rather than …


The Covid-19 Pandemic And The Technology Trust Gap, Johanna Gunawan, David Choffnes, Woodrow Hartzog, Christo Wilson Jan 2021

The Covid-19 Pandemic And The Technology Trust Gap, Johanna Gunawan, David Choffnes, Woodrow Hartzog, Christo Wilson

Faculty Scholarship

Industry and government tried to use information technologies to respond to the COVID-19 pandemic, but using the internet as a tool for disease surveillance, public health messaging, and testing logistics turned out to be a disappointment. Why weren’t these efforts more effective? This Essay argues that industry and government efforts to leverage technology were doomed to fail because tech platforms have failed over the past few decades to make their tools trustworthy, and lawmakers have done little to hold these companies accountable. People cannot trust the interfaces they interact with, the devices they use, and the systems that power tech …


A Duty Of Loyalty For Privacy Law, Neil M. Richards, Woodrow Hartzog Jan 2021

A Duty Of Loyalty For Privacy Law, Neil M. Richards, Woodrow Hartzog

Faculty Scholarship

Data privacy law fails to stop companies from engaging in self-serving, opportunistic behavior at the expense of those who trust them with their data. This is a problem. Modern tech companies are so entrenched in our lives and have so much control over what we see and click that the self-dealing exploitation of people has become a major element of the internet’s business model.

Academics and policymakers have recently proposed a possible solution: require those entrusted with people’s data and online experiences to be loyal to those who trust them. But many have concerns about a duty of loyalty. What, …


The Internet As A Speech Machine And Other Myths Confounding Section 230 Reform, Danielle K. Citron, Mary Anne Franks Jan 2020

The Internet As A Speech Machine And Other Myths Confounding Section 230 Reform, Danielle K. Citron, Mary Anne Franks

Faculty Scholarship

A robust public debate is currently underway about the responsibility of online platforms. We have long called for this discussion, but only recently has it been seriously taken up by legislators and the public. The debate begins with a basic question: should platforms should be responsible for user-generated content? If so, under what circumstances? What exactly would such responsibility look like? Under consideration is Section 230 of the Communications Decency Act—a provision originally designed to encourage tech companies to clean up “offensive” online content. The public discourse around Section 230, however, is riddled with misconceptions. As an initial matter, many …


The Problems With Decision-Making, Joanna K. Sax Jan 2020

The Problems With Decision-Making, Joanna K. Sax

Faculty Scholarship

Our society faces major challenges in numerous areas, including climate change and healthcare. Addressing these problems with technological advances are of great importance. Increasingly, however, consumers are resisting or rejecting such technological interventions based on inappropriate assignment of risk. In other words, the consumer assessment of risk is not in line with evidence-based assessment of risk. This article focuses on two controversial areas, vaccines and genetically engineered food, as examples in which consumers assign a high risk despite an evidence-based assessment of low risk. This article describes how empirically tested decision-making theories explain why consumers inappropriately assign risk. While these …


Embedding Content Or Interring Copyright: Does The Internet Need The "Server Rule"?, Jane C. Ginsburg, Luke Ali Budiardjo Jan 2019

Embedding Content Or Interring Copyright: Does The Internet Need The "Server Rule"?, Jane C. Ginsburg, Luke Ali Budiardjo

Faculty Scholarship

The “server rule” holds that online displays or performances of copyrighted content accomplished through “in-line” or “framing” hyperlinks do not trigger the exclusive rights of public display or performance unless the linker also possesses a copy of the underlying work. As a result, the rule shields a vast array of online activities from claims of direct copyright infringement, effectively exempting those activities from the reach of the Copyright Act. While the server rule has enjoyed relatively consistent adherence since its adoption in 2007, some courts have recently suggested a departure from that precedent, noting the doctrinal and statutory inconsistencies underlying …


Control Over Contemporary Photography: A Tangle Of Copyright, Right Of Publicity, And The First Amendment, Jessica Silbey Jan 2019

Control Over Contemporary Photography: A Tangle Of Copyright, Right Of Publicity, And The First Amendment, Jessica Silbey

Faculty Scholarship

Professional photographers who make photographs of people negotiate a tense relationship between their own creative freedoms and the right of their subjects to control their images. This negotiation formally takes place over the terrain of copyright, right of publicity, and the First Amendment. Informally, photographers describe implied understandings and practice norms guiding their relationship with subjects, infrequently memorialized in short, boilerplate contractual releases. This short essay explores these formal and informal practices described by contemporary professional photographers. Although the evidence for this essay comes from professional photographic practice culled from interviews with contemporary photographers, the analysis of the evidence speaks …


Digitizing Brandenburg: Common Law Drift Toward A Causal Theory Of Imminence, J. Remy Green Jan 2019

Digitizing Brandenburg: Common Law Drift Toward A Causal Theory Of Imminence, J. Remy Green

Faculty Scholarship

The Supreme Court’s Brandenburg v. Ohio test provides an exception to the First Amendment’s broad guarantee of freedom of speech. Where speech is (1) directed to inciting or producing imminent lawless action, and (2) is likely to incite or produce such action, the First Amendment withdraws its promise of protection. Thus, where the “imminence” of lawless action cannot be shown, free speech cannot be restricted. Since Brandenburg, Courts have applied a test for imminence that turns on proximity in space and in time — that is, the test evaluates how spatiotemporally imminent lawless activity is. In this Article, I argue …


Humans Forget, Machines Remember: Artificial Intelligence And The Right To Be Forgotten, Tiffany Li, Eduard Fosch Villaronga, Peter Kieseberg Apr 2018

Humans Forget, Machines Remember: Artificial Intelligence And The Right To Be Forgotten, Tiffany Li, Eduard Fosch Villaronga, Peter Kieseberg

Faculty Scholarship

To understand the Right to be Forgotten in context of artificial intelligence, it is necessary to first delve into an overview of the concepts of human and AI memory and forgetting. Our current law appears to treat human and machine memory alike – supporting a fictitious understanding of memory and forgetting that does not comport with reality. (Some authors have already highlighted the concerns on the perfect remembering.) This Article will examine the problem of AI memory and the Right to be Forgotten, using this example as a model for understanding the failures of current privacy law to reflect the …


"Beyond The New Economy: The Other Technology Revolution" From The Entrepreneur’S Intellectual Property & Business Handbook, Jon Garon Jan 2018

"Beyond The New Economy: The Other Technology Revolution" From The Entrepreneur’S Intellectual Property & Business Handbook, Jon Garon

Faculty Scholarship

This article is part of a series of book excerpts from The Entrepreneur’s Intellectual Property & Business Handbook, which provides the business, strategy, and legal reference guide for start-ups and small businesses. While the book refers to the Internet as perhaps the most significant technological change in the 21st century, computer technology, microbiology, and many other fields have undergone similar explosions in innovation.


Rise Of The Digital Regulator, Rory Van Loo Mar 2017

Rise Of The Digital Regulator, Rory Van Loo

Faculty Scholarship

The administrative state is leveraging algorithms to influence individuals’ private decisions. Agencies have begun to write rules to shape for-profit websites such as Expedia and have launched their own online tools such as the Consumer Financial Protection Bureau’s mortgage calculator. These digital intermediaries aim to guide people toward better schools, healthier food, and more savings. But enthusiasm for this regulatory paradigm rests on two questionable assumptions. First, digital intermediaries effectively police consumer markets. Second, they require minimal government involvement. Instead, some for-profit online advisers such as travel websites have become what many mortgage brokers were before the 2008 financial crisis. …


The Corporation As Courthouse, Rory Van Loo Jan 2016

The Corporation As Courthouse, Rory Van Loo

Faculty Scholarship

Despite the considerable attention paid to mandatory arbitration, few consumer disputes ever reach arbitration. By contrast, institutions such as Apple’s customer service department handle hundreds of millions of disputes annually. This Article argues that understanding businesses’ internal dispute processes is crucial to diagnosing consumers’ procedural needs. Moreover, businesses’ internal processes interact with a larger system of private actors. These actors include ratings websites that mete out reputational sanctions. The system also includes other corporations linked to the transaction, such as when American Express adjudicates a contested sale between a shopper and Home Depot. This vast private order offers promise to …


Internet Giants As Quasi-Governmental Actors And The Limits Of Contractual Consent, Nancy Kim, D.A. Jeremy Telman Jan 2015

Internet Giants As Quasi-Governmental Actors And The Limits Of Contractual Consent, Nancy Kim, D.A. Jeremy Telman

Faculty Scholarship

Although the government’s data-mining program relied heavily on information and technology that the government received from private companies, relatively little of the public outrage generated by Edward Snowden’s revelations was directed at those private companies. We argue that the mystique of the Internet giants and the myth of contractual consent combine to mute criticisms that otherwise might be directed at the real data-mining masterminds. As a result, consumers are deemed to have consented to the use of their private information in ways that they would not agree to had they known the purposes to which their information would be put …


Interview On The Black Box Society, Lawrence Joseph, Frank A. Pasquale Sep 2014

Interview On The Black Box Society, Lawrence Joseph, Frank A. Pasquale

Faculty Scholarship

Hidden algorithms drive decisions at major Silicon Valley and Wall Street firms. Thanks to automation, those firms can approve credit, rank websites, and make myriad other decisions instantaneously. But what are the costs of their methods? And what exactly are they doing with their digital profiles of us?

Leaks, whistleblowers, and legal disputes have shed new light on corporate surveillance and the automated judgments it enables. Self-serving and reckless behavior is surprisingly common, and easy to hide in code protected by legal and real secrecy. Even after billions of dollars of fines have been levied, underfunded regulators may have only …


Meatspace, The Internet, And The Cloud: How Changes In Document Storage And Transfer Can Affect Ip Rights, Sharon Sandeen Jan 2014

Meatspace, The Internet, And The Cloud: How Changes In Document Storage And Transfer Can Affect Ip Rights, Sharon Sandeen

Faculty Scholarship

This article discusses the intellectual property issues from "meatspace" to online services and the Internet. It further explores intellectual property issues from the Internet to the Cloud. Finally, it discusses the implications of cloud computing for trade secret protection.


The New Territorialism In The Not-So-New Frontier Of Cyberspace, William L. Reynolds, Juliet M. Moringiello Jan 2014

The New Territorialism In The Not-So-New Frontier Of Cyberspace, William L. Reynolds, Juliet M. Moringiello

Faculty Scholarship

This Essay addresses the following questions: What jurisdictions should govern cyberspace problems? Are cyberspace problems different from those in the tangible world? If so, what are the implications for governance? We conclude that the judicial response to cyberspace governance has been mostly correct. After some adaptation problems (an early learning curve), courts have generally followed common law analogs to cyberspace problems. In other words, those problems are not treated as unique unless there is something special about the internet that suggests different resolutions are needed. There certainly is nothing to suggest that American courts or legislatures are trying to occupy …


Reviving Implied Confidentiality, Woodrow Hartzog Jan 2014

Reviving Implied Confidentiality, Woodrow Hartzog

Faculty Scholarship

The law of online relationships has a significant flaw-it regularly fails to account for the possibility of an implied confidence. The established doctrine of implied confidentiality is, without explanation, almost entirely absent from online jurisprudence in environments where it has traditionally been applied offline, such as with sensitive data sets and intimate social interactions.

Courts' abandonment of implied confidentiality in online environments should have been foreseen. The concept has not been developed enough to be consistently applied in environments such as the Internet that lack obvious physical or contextual cues of confidence. This absence is significant because implied confidentiality could …


Failing Expectations: Fourth Amendment Doctrine In The Era Of Total Surveillance, Olivier Sylvain Jan 2014

Failing Expectations: Fourth Amendment Doctrine In The Era Of Total Surveillance, Olivier Sylvain

Faculty Scholarship

Today’s reasonable expectation test and the third-party doctrine have little to nothing to offer by way of privacy protection if users today are at least conflicted about whether transactional noncontent data should be shared with third parties, including law enforcement officials. This uncertainty about how to define public expectation as a descriptive matter has compelled courts to defer to legislatures to find out what public expectation ought to be more as a matter of prudence than doctrine. Courts and others presume that legislatures are far better than courts at defining public expectations about emergent technologies.This Essay argues that the reasonable …


Rethinking Online Privacy In Canada: Commentary On Voltage Pictures V. John And Jane Doe, Ngozi Okidegbe Jan 2014

Rethinking Online Privacy In Canada: Commentary On Voltage Pictures V. John And Jane Doe, Ngozi Okidegbe

Faculty Scholarship

This article problematizes the use of the bona fide case standard as the legal standard for a court to order a third party Internet Service Provider ("ISP") to disclose subscriber information to a copyright owner in online piracy cases. It argues that ISP account holders have a reasonable expectation of privacy in their subscriber information. It contends that the current bona fide case standard affords a relatively low threshold of protection for Internet users’ subscriber information. The reason for which the article takes this position is that the bona fide case standard can be met solely by IP address evidence, …


Privacy, Antitrust, And Power, Frank Pasquale Jan 2013

Privacy, Antitrust, And Power, Frank Pasquale

Faculty Scholarship

When a dominant internet service collects information about its users, the situation is so far from the usual arm’s-length market transaction that neoclassical economic analysis is misleading. “Lack of surveillance” is not a product that individuals have varying preferences for and purchase accordingly. Rather, surveillance is an inevitable concomitant of life online. We need to tame the power that surveillance entails, rather than continuing to pursue illusory, surveillance-free alternatives on the platform level.

To the extent a company creates profiles of individuals and collects data on them, a third party ought to be collecting reports from the company on how …


A Fork In The Stream: The Unjustified Failure Of The Concurrence In J. Mcintyre Machinery Ltd. V. Nicastro To Clarify The Stream Of Commerce Doctrine, Cody Jacobs Jan 2013

A Fork In The Stream: The Unjustified Failure Of The Concurrence In J. Mcintyre Machinery Ltd. V. Nicastro To Clarify The Stream Of Commerce Doctrine, Cody Jacobs

Faculty Scholarship

This article critiques the concurring opinion in the recent United States Supreme Court personal jurisdiction decision in J. McIntyre Machinery Ltd. v. Nicastro. That opinion declined to choose between the competing approaches to the stream of commerce doctrine because of perceived flaws in those approaches and because the facts of Nicastro did not involve modern technology.

Consumer products are increasingly distributed through international distribution chains. Whether foreign manufacturers who utilize such chains are amenable to personal jurisdiction in states where their products are distributed has become a hotly litigated issue because of the Supreme Court’s 4-4-1 split decision over 20 …


Chain-Link Confidentiality, Woodrow Hartzog Jan 2012

Chain-Link Confidentiality, Woodrow Hartzog

Faculty Scholarship

Disclosing personal information online often feels like losing control over one’s data forever; but this loss is not inevitable. This essay proposes a “chain-link confidentiality” approach to protecting online privacy. One of the most difficult challenges to guarding privacy in the digital age is the protection of information once it is exposed to other people. A chain-link confidentiality regime would contractually link the disclosure of personal information to obligations to protect that information as the information moves downstream. The system would focus on the relationships not only between the discloser of information and the initial recipient, but also between the …


Patent Litigation And The Internet, Samantha Zyontz, John R. Allison, Emerson H. Tiller, Tristan Bligh Jan 2012

Patent Litigation And The Internet, Samantha Zyontz, John R. Allison, Emerson H. Tiller, Tristan Bligh

Faculty Scholarship

Patent infringement litigation has not only increased dramatically in frequency over the past few decades,1 but also has also seen striking growth in both stakes and cost.2 Although a relatively rich literature has added much to our understanding of the nature, causes, and consequences of patent litigation during the past two decades,3 many interesting questions remain inadequately addressed. The nuances of and trends in patent litigation in different technology fields and industries, for example, are still understudied.4 Litigation of patents on new technologies has likewise received a dearth of attention. Here we seek to help begin …


Misogynistic Cyber Hate Speech, Danielle Keats Citron Oct 2011

Misogynistic Cyber Hate Speech, Danielle Keats Citron

Faculty Scholarship

In her testimony, Professor Citron provided a picture of misogynistic cyber hate, from the very worst abuses involving the harassment of individuals to less virulent forms of misogyny.


Restoring Transparency To Automated Authority, Frank Pasquale Jan 2011

Restoring Transparency To Automated Authority, Frank Pasquale

Faculty Scholarship

Leading finance, health care, and internet firms shroud key operations in secrecy. Our markets, research, and life online are increasingly mediated by institutions that suffer serious transparency deficits. When a private entity grows important enough, it should be subject to transparency requirements that reflect its centrality. The increasing intertwining of governmental, business, and academic entities should provide some leverage for public-spirited appropriators and policymakers to insist on more general openness.

However well an "invisible hand" coordinates economic activity generally, markets depend on reliable information about the practices of core firms that finance, rank, and rate entities in the rest of …


Website Design As Contract, Woodrow Hartzog Jan 2011

Website Design As Contract, Woodrow Hartzog

Faculty Scholarship

Few website users actually read or rely upon terms of use or privacy policies. Yet users regularly take advantage of and rely upon website design features like privacy settings. To reconcile the disparity between boilerplate legalese and website design, this article develops a theory of website design as contract. The ability to choose privacy settings, un-tag photos, and delete information is part of the negotiation between websites and users regarding their privacy. Yet courts invariably recognize only the boilerplate terms when analyzing online agreements. In this article, I propose that if significant website features are incorporated into the terms of …