Syllabus
1. Introduction to Information Law and Policy (1/21)
Moore, James, "What is computer ethics?"
Clark, D. D., Wroclawski, J., Sollins, K. R., and Braden, R. 2005. Tussle in cyberspace: defining tomorrow's internet. IEEE/ACM Trans. Netw. 13, 3 (Jun. 2005), 462-475.
Lessig, Larry, Code, chapters 4 & 5
Supplemental Reading
Privacy Forum Digest Volume 09 Issue 15: RealNetworks Returns: The "Spy" in "Download Demon," Lauren Weinstein (May, 18 2000) http://www.vortex.com/privacy/priv.09.15
H. Nissenbaum, "Privacy as Contextual Integrity," Washington Law Review Vol 79, No. 1, February 2004: 119-158. http://crypto.stanford.edu/portia/papers/RevnissenbaumDTP31.pdf
Intellectual property/ Digital rights management (Samuelson Clinic) link
Mulligan, Han, Burstein - How DRM disrupts expectations of personal use link
Breathalyzer source code (CNET article) link
Bowen letter on voting link
30 Ohio N.U.L. Rev. 389: "Privacy, Technology and Data Mining," by Lee Tien link
2. Freedom of Expression (1/28)
Relationship between architecture and state regulation
Berman, J. and Weitzner, D.J., "Abundance and User Control: Renewing the Democratic Heart of the First Amendment in the Age of Interactive Media," 104 Yale Law Journal 1619, (1995).
ACLU v. Reno findings of fact (§ II), 929 F. Supp. 824 (1996) skim
Reno v. ACLU, 521 U.S. 844 (1997)
Supplemental Reading
Volkh, Eugene, "Crime facilitating speech" 57 Stanford Law Review 1095 (2005) http://www.law.ucla.edu/volokh/facilitating.pdf (shorter version: http://www.law.ucla.edu/volokh/facilitatingshorter.pdf)
Speech and acts
Universal City Studios, Inc. v. Reimerdes, 111 F. Supp. 2d 294 (2000)
RIAA/SDMI letter to Ed Felten
Felten Complaint
DOJ Motion to Dismiss p16-25
Supplemental Reading
US v. ALA, 539 U.S. 194 (2003) http://supct.law.cornell.edu/supct/html/02-361.ZS.html
3. Facts (2/4)
Copyright
Feist v. Rural, 499 U.S. 340 (1991)
Hot news
NBA v. Motorola, 105 F.3d 841 (1997) (§§I and II)
Relation to Contract and TOS
Pro-CD v. Zeidenberg, 86 F.3d 1447 (1996)
Privacy
Mills, E, "Would Google maps street view be legal in Canada?
Letter from Privacy Commissioner of Canada, Jennifer Stoddart to Mr. David C. Drummond, Senior Vice President, Corporate Development and Chief Legal Officer, Google, regarding 3D online mapping technology
UK Information Commissioner's Office statements on Google maps
Supplemental Reading
Register.com, Inc. v. Verio, Inc., 356 F.3d 393 (2d Cir. N.Y. 2004)
Warren v. Microdos, 115 F.3d 1509 (1997)
http://www.meganslaw.ca.gov/disclaimer.htm
Does v. Munoz, 507 F.3d 961, 2007 U.S. (6th Cir. Mich. 2007) (§ II B)
http://supct.law.cornell.edu/supct/html/01-729.ZO.html
4. Reusing other peoples "works": Fair Use and Personal Use (2/11)
17 U.S.C.§§ 102, 103, 106, 107, 117 (definitions of works eligible for copyright)
Perfect 10 v. Google
OPG v. Diebold 337 F.Supp.2d 1195 (N.D. Cal. 2004)
Band, J., "The Google Library Project: Both Sides of the Story," 2 Plagiary 1 (2006)
Supplemental Reading
Mulligan, Han, Burstein, "How DRM content systems disrupt expectations of ‘personal use'
Lee, "Warming up to User-Generated Content"
Cohen, Copyright and the Perfect Curve
5. Liability for content created and/or posted by others (2/18)
47 USC §230 (protection for blocking/screening)
Barret v. Rosenthal, 40 Cal.4th 33 (Cal. Sup. Ct., Nov. 20, 2006)
17 USC § 512 (safe harbors)
chillingeffects.org FAQ on DMCA Safe Harbor Provisions http://www.chillingeffects.org/dmca512/faq.cgi#QID125
Supplemental Reading
Reichman, Jerome H., Dinwoodie, Graeme B. and Samuelson, Pamela, "A Reverse Notice and Takedown Regime to Enable Public Interest Uses of Technically Protected Copyrighted Works" http://ssrn.com/abstract=1007817
Urban, J., Quilter, L., "Efficient Process or "Chilling Effects"? Takedown Notices Under Section 512 of the Digital Millennium Copyright Act http://mylaw.usc.edu/documents/512Rep/
6. Liability, Licensing, and Terms of Service (2/25)
Defective Information
Cardozo v. True, 342 So. 2d 1053 (1977);
Aetna v. Jeppesen, 642 F.2d 339 (1981);
Samuelson, "Liability for Defective Information"
Information Licensing
Mortenson v. Timberline, 140 Wn.2d 568 (2000)
TOS
Williams v. AOL, 43 U.C.C. Rep. Serv. 2d. 1101 (2001);
Supplemental Reading
Braucher, "New Basics: 12 Principles for Fair Commerce in Mass-Market Software and Other Digital Products." http://papers.ssrn.com/sol3/papers.cfm?abstract_id=730907
7. Technology design and liability (3/4)
Copyright
Sony Corp. of America v. Universal City Studios, Inc., 464 U.S. 417 (1984)
MGM Studios, Inc. v. Grokster, Ltd. 545 U.S. 913 (2005)
Privacy
18 USC 2512 (electronic communication interception devices)
United States v. Spy Factory, 951 F. Supp. 450, 1997 (S.D.N.Y. 1997) Background and § II
FTC v. Cyberspy software
Ohm, Paul The Myth of the Superuser: Fear, Risk, and Harm Online, 41 U.C. Davis L. Rev. 1327 (2008) p. 1399-1402
Supplemental Reading
EPIC complaint to the FTC In the Matter of Awarenesstech.com, RemotePCSpy.com, Covert Spy.com, RemoteSpy.com, and Spy-guide.net.
8. Consumer Protection, Privacy (3/11) slides
FTC statement on deception
http://www.ftc.gov/bcp/policystmt/ad-decept.htm
FTC statement on unfairness
http://www.ftc.gov/bcp/policystmt/ad-unfair.htm
FTC FIPPS
In the matter of Sony BMG
Antispyware Coalition Best Practices http://www.antispywarecoalition.org/documents/BestPracticesFinal.htm
Supplemental Reading
Mulligan, D. and Perzanowski, A., "The Magnificence of the Disaster: Reconstructing the Sony BMG Rootkit Incident," http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1072229
9. Consumer Protection and Security (3/18)
FTC v. TJX Companies, Inc.
Agreement Containing Consent Order; Complaint; Analysis of Proposed Consent Order to Aid Public Comment
CDT, "Rise of Telecommuting Poses Unique Privacy and Security Threats to Company Networks," November 26, 2008.
Supplemental Reading
Smedinghoff, Thomas J. ,The State of Information Security Law: A Focus on the Key Legal Trends(May 2008). http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1114246
SPRING BREAK (3/23 - 3/27)
10. In-class exercise (4/1)
11. Privacy, Surveillance and the Government (4/8)
Technology and service design and 4th Amendment protections
Schwartz,A., Mulligan, D. and Mondal, I., "Storing Our Lives Online: Expanded Email Storage Raises Complex Policy Issues," I/S Journal of Law and Policy for the Information Society, Vol. 1 (2005).
Kerr, Orin S.,A User's Guide to the Stored Communications Act, and a Legislator's Guide to Amending It. George Washington Law Review, 2004.
Gonzales v. Google, Inc., 234 F.R.D. 674 (N.D.Cal, 2006)
International
Shi Tao entry Wikipedia http://en.wikipedia.org/wiki/Shi_Tao#cite_note-4
Skype Accused of Complying with Chinese Spying Program http://opennet.net/node/997
Supplemental Reading
Susan Crawford's blog, "CALEA roundup 2005-2007) http://scrawford.blogware.com/blog/_archives/2007/8/16/3162684.html
Overview of CALEA (read intro and skim – no need to look at links unless you want to) http://www.cdt.org/wiretap/calea/
Deirdre K. Mulligan, "Reasonable Expectations in Electronic Communications: a Critical Perspective on the Electronic Communications Privacy Act, 72 Geo. Wash. L.Rev. 1557 (2004)
Elizabeth Dunbar, "Citing privacy, MySpace won't give names of sex offenders," Associated Press, May 16, 2007. http://www.usatoday.com/tech/news/2007-05-16-myspace-sex-offenders_N.htm
Supplemental Readings on Privacy
Privacy as contextually appropriate information flows Helen Nissenbaum, Privacy as Contextual Integrity" link
Privacy as concerns about accessibility to others: Privacy and the Limits of Law Ruth Gavison The Yale Law Journal, Volume 89, Number 3 link
Privacy as dignity Edward Bloustein, "Privacy as an aspect of human dignity" link
Privacy as boundary control Altman link
Presentation of self Erving Goffman, The presentation of self in everyday life" ch 1
Cohen, Julie E., "Privacy, Visibility, Transparency, and Exposure," University of Chicago Law Review, Vol. 75, No. 1, 2008 pages 12-19; Georgetown Public Law Research Paper No. 1012068. link
Very Descriptive piece on how some aspects of privacy are challenged by internet Privacy in the Digital Age: Work in Progress Jerry Berman & Deirdre Mulligan Nova Law Review, Volume 23, Number 2, Winter 1999. The Internet and Law link
12. Net Neutrality (4/15) slides
Network Neutrality versus Internet Trustworthiness - Fred Schneider link
The Economics of Net Neutrality - Robert Hahn and Scott Wallsten link
Network Neutrality Nuances - Barbara van Schewick, David Farber link
Comcast Bit Torrent Discriminationlink
13. Professional Ethics and Approaches (4/22)
ACM Code of Ethics http://www.acm.org/about/code-of-ethics
Collins, W. R. and Miller, K. W. 1992. Paramedic ethics for computer professionals. J. Syst. Softw. 17, 1 (Jan. 1992), 23-38. http://dx.doi.org/10.1016/0164-1212(92)90077-W
John Morris and Alan Davidson, "Policy Impact Assessments: Considering the Public Interest in Internet Standards Development," August 2003 Sections III- VI and appendixes http://www.cdt.org/publications/articles.php
14. Informing Public Policy /
Privacy in the Workplace (4/29)
Informing Public Policy
Samuelson, 5 Challenges for Regulating the Global Information Society link
Aviel D. Rubin, United States Election Assistance Commission, Hearing on Voluntary Voting Systems Guidelines, Panel on Voter Verified Paper Audit Trail, Washington D.C. (June 30, 2005). link
Mulligan Comments on Electronic Passports link
Privacy in the Workplace
Jane Doe v XYC Corp (2005) link
Jeff Quon v Arch Wireless (2008) link
Supplemental Readings
http://www.privacyrights.org/fs/fs7-work.htm
15. Copyright & Patent / Trade Secrecy (5/6)
Copyright & Patent Default Rules
Wexler v. Greenberg, 399 Pa. 569 (1959)
Whyte v. Schlage, 101 Cal. App. 4th 1443 (2002)
Trade Secrecy Law, Restrictive Covenants
Aymes v. Bonelli, 980 F.2d 857 (1992)
Aetna-Standard v. Rowland, 343 Pa. Super. 64 (1985)
Edwards v Andersen 44 Cal. 4th 937 (2008) link