Syllabus

1. Introduction to Information Law and Policy (1/21)

Moore, James, "What is computer ethics?"

Clark, D. D., Wroclawski, J., Sollins, K. R., and Braden, R. 2005. Tussle in cyberspace: defining tomorrow's internet. IEEE/ACM Trans. Netw. 13, 3 (Jun. 2005), 462-475.

Lessig, Larry, Code, chapters 4 & 5

Supplemental Reading

Privacy Forum Digest Volume 09 Issue 15: RealNetworks Returns: The "Spy" in "Download Demon," Lauren Weinstein (May, 18 2000) http://www.vortex.com/privacy/priv.09.15

H. Nissenbaum, "Privacy as Contextual Integrity," Washington Law Review Vol 79, No. 1, February 2004: 119-158. http://crypto.stanford.edu/portia/papers/RevnissenbaumDTP31.pdf

Intellectual property/ Digital rights management (Samuelson Clinic) link

Mulligan, Han, Burstein - How DRM disrupts expectations of personal use link

Breathalyzer source code (CNET article) link

Bowen letter on voting link

30 Ohio N.U.L. Rev. 389: "Privacy, Technology and Data Mining," by Lee Tien link

2. Freedom of Expression (1/28)

Relationship between architecture and state regulation

Berman, J. and Weitzner, D.J., "Abundance and User Control: Renewing the Democratic Heart of the First Amendment in the Age of Interactive Media," 104 Yale Law Journal 1619, (1995).

ACLU v. Reno findings of fact (§ II), 929 F. Supp. 824 (1996) skim

Reno v. ACLU, 521 U.S. 844 (1997)

Supplemental Reading

Volkh, Eugene, "Crime facilitating speech" 57 Stanford Law Review 1095 (2005) http://www.law.ucla.edu/volokh/facilitating.pdf (shorter version: http://www.law.ucla.edu/volokh/facilitatingshorter.pdf)

Speech and acts

Universal City Studios, Inc. v. Reimerdes, 111 F. Supp. 2d 294 (2000)

RIAA/SDMI letter to Ed Felten

Felten Complaint

DOJ Motion to Dismiss p16-25

Supplemental Reading

US v. ALA, 539 U.S. 194 (2003) http://supct.law.cornell.edu/supct/html/02-361.ZS.html

3. Facts (2/4)

Copyright

Feist v. Rural, 499 U.S. 340 (1991)

Hot news

NBA v. Motorola, 105 F.3d 841 (1997) (§§I and II)

Relation to Contract and TOS

Pro-CD v. Zeidenberg, 86 F.3d 1447 (1996)

Privacy

Mills, E, "Would Google maps street view be legal in Canada?

Letter from Privacy Commissioner of Canada, Jennifer Stoddart to Mr. David C. Drummond, Senior Vice President, Corporate Development and Chief Legal Officer, Google, regarding 3D online mapping technology

UK Information Commissioner's Office statements on Google maps

Supplemental Reading

Register.com, Inc. v. Verio, Inc., 356 F.3d 393 (2d Cir. N.Y. 2004)

Warren v. Microdos, 115 F.3d 1509 (1997)

http://www.meganslaw.ca.gov/disclaimer.htm

Does v. Munoz, 507 F.3d 961, 2007 U.S. (6th Cir. Mich. 2007) (§ II B)

http://supct.law.cornell.edu/supct/html/01-729.ZO.html

4. Reusing other peoples "works": Fair Use and Personal Use (2/11)

17 U.S.C.§§ 102, 103, 106, 107, 117 (definitions of works eligible for copyright)

Perfect 10 v. Google

OPG v. Diebold 337 F.Supp.2d 1195 (N.D. Cal. 2004)

Band, J., "The Google Library Project: Both Sides of the Story," 2 Plagiary 1 (2006)

Supplemental Reading

Mulligan, Han, Burstein, "How DRM content systems disrupt expectations of ‘personal use'

Lee, "Warming up to User-Generated Content"

Cohen, Copyright and the Perfect Curve

5. Liability for content created and/or posted by others (2/18)

47 USC §230 (protection for blocking/screening)

Barret v. Rosenthal, 40 Cal.4th 33 (Cal. Sup. Ct., Nov. 20, 2006)

17 USC § 512 (safe harbors)

chillingeffects.org FAQ on DMCA Safe Harbor Provisions http://www.chillingeffects.org/dmca512/faq.cgi#QID125

Supplemental Reading

Reichman, Jerome H., Dinwoodie, Graeme B. and Samuelson, Pamela, "A Reverse Notice and Takedown Regime to Enable Public Interest Uses of Technically Protected Copyrighted Works" http://ssrn.com/abstract=1007817

Urban, J., Quilter, L., "Efficient Process or "Chilling Effects"? Takedown Notices Under Section 512 of the Digital Millennium Copyright Act http://mylaw.usc.edu/documents/512Rep/

6. Liability, Licensing, and Terms of Service (2/25)

Defective Information

Cardozo v. True, 342 So. 2d 1053 (1977);

Aetna v. Jeppesen, 642 F.2d 339 (1981);

Samuelson, "Liability for Defective Information"

Information Licensing

Mortenson v. Timberline, 140 Wn.2d 568 (2000)

TOS

Williams v. AOL, 43 U.C.C. Rep. Serv. 2d. 1101 (2001);

Supplemental Reading

Braucher, "New Basics: 12 Principles for Fair Commerce in Mass-Market Software and Other Digital Products." http://papers.ssrn.com/sol3/papers.cfm?abstract_id=730907

7. Technology design and liability (3/4)

Copyright

Sony Corp. of America v. Universal City Studios, Inc., 464 U.S. 417 (1984)

MGM Studios, Inc. v. Grokster, Ltd. 545 U.S. 913 (2005)

Privacy

18 USC 2512 (electronic communication interception devices)

United States v. Spy Factory, 951 F. Supp. 450, 1997 (S.D.N.Y. 1997) Background and § II

FTC v. Cyberspy software

Ohm, Paul The Myth of the Superuser: Fear, Risk, and Harm Online, 41 U.C. Davis L. Rev. 1327 (2008) p. 1399-1402

Supplemental Reading

EPIC complaint to the FTC In the Matter of Awarenesstech.com, RemotePCSpy.com, Covert Spy.com, RemoteSpy.com, and Spy-guide.net.

8. Consumer Protection, Privacy (3/11) slides

FTC statement on deception

http://www.ftc.gov/bcp/policystmt/ad-decept.htm

FTC statement on unfairness

http://www.ftc.gov/bcp/policystmt/ad-unfair.htm

FTC FIPPS

In the matter of Sony BMG

Antispyware Coalition Best Practices http://www.antispywarecoalition.org/documents/BestPracticesFinal.htm

Supplemental Reading

Mulligan, D. and Perzanowski, A., "The Magnificence of the Disaster: Reconstructing the Sony BMG Rootkit Incident," http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1072229

9. Consumer Protection and Security (3/18)

FTC v. TJX Companies, Inc.

Agreement Containing Consent Order; Complaint; Analysis of Proposed Consent Order to Aid Public Comment

CDT, "Rise of Telecommuting Poses Unique Privacy and Security Threats to Company Networks," November 26, 2008.

Supplemental Reading

Smedinghoff, Thomas J. ,The State of Information Security Law: A Focus on the Key Legal Trends(May 2008). http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1114246

SPRING BREAK (3/23 - 3/27)

10. In-class exercise (4/1)

11. Privacy, Surveillance and the Government (4/8)

Technology and service design and 4th Amendment protections

Schwartz,A., Mulligan, D. and Mondal, I., "Storing Our Lives Online: Expanded Email Storage Raises Complex Policy Issues," I/S Journal of Law and Policy for the Information Society, Vol. 1 (2005).

Kerr, Orin S.,A User's Guide to the Stored Communications Act, and a Legislator's Guide to Amending It. George Washington Law Review, 2004.

Gonzales v. Google, Inc., 234 F.R.D. 674 (N.D.Cal, 2006)

DOJ brief p 20-25

Google brief p 18-21

CDT brief

International

Shi Tao entry Wikipedia http://en.wikipedia.org/wiki/Shi_Tao#cite_note-4

Skype Accused of Complying with Chinese Spying Program http://opennet.net/node/997

Supplemental Reading

Susan Crawford's blog, "CALEA roundup 2005-2007) http://scrawford.blogware.com/blog/_archives/2007/8/16/3162684.html

Overview of CALEA (read intro and skim – no need to look at links unless you want to) http://www.cdt.org/wiretap/calea/

Deirdre K. Mulligan, "Reasonable Expectations in Electronic Communications: a Critical Perspective on the Electronic Communications Privacy Act, 72 Geo. Wash. L.Rev. 1557 (2004)

Elizabeth Dunbar, "Citing privacy, MySpace won't give names of sex offenders," Associated Press, May 16, 2007. http://www.usatoday.com/tech/news/2007-05-16-myspace-sex-offenders_N.htm

Supplemental Readings on Privacy

Privacy as contextually appropriate information flows Helen Nissenbaum, Privacy as Contextual Integrity" link

Privacy as concerns about accessibility to others: Privacy and the Limits of Law Ruth Gavison The Yale Law Journal, Volume 89, Number 3 link

Privacy as dignity Edward Bloustein, "Privacy as an aspect of human dignity" link

Privacy as boundary control Altman link

Presentation of self Erving Goffman, The presentation of self in everyday life" ch 1

Cohen, Julie E., "Privacy, Visibility, Transparency, and Exposure," University of Chicago Law Review, Vol. 75, No. 1, 2008 pages 12-19; Georgetown Public Law Research Paper No. 1012068. link

Very Descriptive piece on how some aspects of privacy are challenged by internet Privacy in the Digital Age: Work in Progress Jerry Berman & Deirdre Mulligan Nova Law Review, Volume 23, Number 2, Winter 1999. The Internet and Law link

12. Net Neutrality (4/15) slides

Network Neutrality versus Internet Trustworthiness - Fred Schneider link

The Economics of Net Neutrality - Robert Hahn and Scott Wallsten link

Network Neutrality Nuances - Barbara van Schewick, David Farber link

Comcast Bit Torrent Discriminationlink

13. Professional Ethics and Approaches (4/22)

ACM Code of Ethics http://www.acm.org/about/code-of-ethics

Collins, W. R. and Miller, K. W. 1992. Paramedic ethics for computer professionals. J. Syst. Softw. 17, 1 (Jan. 1992), 23-38. http://dx.doi.org/10.1016/0164-1212(92)90077-W

John Morris and Alan Davidson, "Policy Impact Assessments: Considering the Public Interest in Internet Standards Development," August 2003 Sections III- VI and appendixes http://www.cdt.org/publications/articles.php

14. Informing Public Policy /
Privacy in the Workplace (4/29)

Informing Public Policy

Samuelson, 5 Challenges for Regulating the Global Information Society link

Aviel D. Rubin, United States Election Assistance Commission, Hearing on Voluntary Voting Systems Guidelines, Panel on Voter Verified Paper Audit Trail, Washington D.C. (June 30, 2005). link

Mulligan Comments on Electronic Passports link

Privacy in the Workplace

Jane Doe v XYC Corp (2005) link

Jeff Quon v Arch Wireless (2008) link

Supplemental Readings

http://www.privacyrights.org/fs/fs7-work.htm

15. Copyright & Patent / Trade Secrecy (5/6)

Copyright & Patent Default Rules

Wexler v. Greenberg, 399 Pa. 569 (1959)

Whyte v. Schlage, 101 Cal. App. 4th 1443 (2002)

Trade Secrecy Law, Restrictive Covenants

Aymes v. Bonelli, 980 F.2d 857 (1992)

Aetna-Standard v. Rowland, 343 Pa. Super. 64 (1985)


Edwards v Andersen 44 Cal. 4th 937 (2008) link