
Jennifer Granick is the Director of Civil Liberties at the Stanford Center for Internet and Society. Jennifer returns to Stanford after stints as General Counsel of entertainment company Worldstar Hip Hop and as counsel with the internet boutique firm of Zwillgen PLLC. Before that, she was the Civil Liberties Director at the Electronic Frontier Foundation. Jennifer practices, speaks and writes about computer crime and security, electronic surveillance, consumer privacy, data protection, copyright, trademark and the Digital Millennium Copyright Act. From 2001 to 2007, Jennifer was Executive Director of CIS and taught Cyberlaw, Computer Crime Law, Internet intermediary liability, and Internet law and policy. Before teaching at Stanford, Jennifer spent almost a decade practicing criminal defense law in California. She was selected by Information Security magazine in 2003 as one of 20 "Women of Vision" in the computer security field. She earned her law degree from University of California, Hastings College of the Law and her undergraduate degree from the New College of the University of South Florida.
High Res Photo of Jennifer Granick
The DNI's Non-Denial of Mass Surveillance of Americans
By Jennifer Granick • June 7, 2013 at 8:11 am
On Wednesday, news broke that the U.S. National Security Agency (NSA) had been routinely collecting all call metadata on every Verizon (and presumably other telco) customer for the past seven years. Read more » about The DNI's Non-Denial of Mass Surveillance of Americans
A Big Week for News in Internet Policy
By Jennifer Granick • April 25, 2013 at 4:26 pm
This has been a busy Internet law week. I'd like to sum up some of the more interesting developments: Read more » about A Big Week for News in Internet Policy
Letter to Goodlatte Criticizes CFAA Anti-Reform Language
By Jennifer Granick • April 1, 2013 at 2:29 pm
I am a signatory to a letter to Rep. Robert Goodlatte and other legislators critiquing draft legislation reportedly slated for consideration this month that would amend the Computer Fraud and Abuse Act (CFAA) by increasing penalties and expanding the scope of conduct punishable under the statute. The letter points out that the draft under discussion is a significant expansion of the CFAA at a time when
public opinion is demanding the law be narrowed. This language would, among other things: Read more » about Letter to Goodlatte Criticizes CFAA Anti-Reform Language
Here's How to Legalize Phone Unlocking
By Jennifer Granick • March 14, 2013 at 3:18 pm
In the wake of a public petition to allow people to unlock their cellphones for use on the wireless network of their choice, both the White House and the Federal Communications Commission came out in favor of a change in the law. Read more » about Here's How to Legalize Phone Unlocking
Congressional Hearing Tomorrow on CFAA Reform
By Jennifer Granick • March 12, 2013 at 1:59 pm
Tomorrow, the U.S. House Judiciary Committee will hold a hearing on reforming the Computer Fraud and Abuse Act (CFAA). Before you start thinking, "it's about time", note that the witness list includes someone from the Department of Justice, the Federal Bureau of Investigation and the Business Software Alliance. The only reform proponent is former computer crime prosecutor Orin Kerr, now a Professor at George Washington University Law School. Read more » about Congressional Hearing Tomorrow on CFAA Reform
Pages
Shloss v. Estate of Joyce
After the Estate of James Joyce refused to allow a scholar to quote Joyce in her book, we successfully defended her right under the fair use doctrine to use the quotes she needed to illustrate her scholarship. After we prevailed in the case, the Estate paid $240,000 of our client’s legal fees. Read more » about Shloss v. Estate of Joyce
Kahle v. Gonzales
In this case, two archives challenged statutes that extended copyright terms unconditionally—the Copyright Renewal Act and the Copyright Term Extension Act (CTEA)—as unconstitutional under Copyright Clause and the First Amendment. Read more » about Kahle v. Gonzales
Towards learning from losing Aaron Swartz
Al Jazeera republished Jennifer Granick's two part blog postTowards learning from losing Aaron Swartz. Read more » about Towards learning from losing Aaron Swartz
Organized Labor Can Protect Workers by Supporting 'Aaron's Law'
Right now, a battle is underway to reform the Computer Fraud and Abuse Act, a statute that can transform innocuous workplace behavior into a federal crime, simply because a computer is involved. The CFAA is a bludgeon that Big Business and the Department of Justice have willingly used against the American worker, and its time for that to stop. Read more » about Organized Labor Can Protect Workers by Supporting 'Aaron's Law'
Megaupload Indictment Leaves Everyone Guessing - Part 2
Daily/Journal Op/Ed
The first part of this article outlined the mechanics of the Megaupload website, and the novel questions of criminal inducement on which the government's indictment is premised. Here, we explore two more extensions of existing law on which the indictment is based, and the impact this prosecution is likely to have on Internet innovators and users alike. Read more » about Megaupload Indictment Leaves Everyone Guessing - Part 2
Megaupload.com Indictment Leaves Everyone Guessing - Part 1
Days after anti-piracy legislation stalled in Congress, the U.S. Department of Justice coordinated an unprecedented raid on the Hong Kong-based website Megaupload.com. New Zealand law enforcement agents swooped in by helicopter to arrest founder Kim Dotcom at his home outside of Auckland, and seized millions of dollars worth of art, vehicles and real estate. Six other Megaupload employees were also arrested. Meanwhile, the Justice Department seized Megaupload's domain names and the data of at least 50 million users worldwide. Read more » about Megaupload.com Indictment Leaves Everyone Guessing - Part 1
Shloss v. Estate of Joyce - Amended Complaint
Pages
Author of Cell Phone Unlocking Petition Makes Final Push for 100K Signatures
""My immediate reaction was to shut down the business," Khanifar wrote, but he started working with Jennifer Granick, founder of Stanford's Cyberlaw Clinic, who has also held posts at the EFF and the Center for Internet and Society. She battled the suit pro bono and ultimately got Motorola to back down and secured a win on unlocking overall." Read more » about Author of Cell Phone Unlocking Petition Makes Final Push for 100K Signatures
The Law Against Unlocking Cellphones Is Anti-Consumer, Anti-Business, and Anti-Common Sense
"In the year after helping me with my case, Jennifer Granick fought for an exemption from the DMCA for unlocking phones, and in November 2006 it was granted." Read more » about The Law Against Unlocking Cellphones Is Anti-Consumer, Anti-Business, and Anti-Common Sense
Aaron’s Law Takes Shape
"Jennifer Granick, a scholar and computer crime defense attorney at Stanford’s Center for Internet and Society, addressed Kerr’s proposal in a January 23 post, calling it “a great second step.”" Read more » about Aaron’s Law Takes Shape
Congress' horse-and-buggy computer laws
""Congress tries to write technology-neutral laws," says Jennifer Granick, an Internet law expert at Stanford, "but there's been a wholesale change in how we interact with computers" that renders these laws quickly anachronistic." Read more » about Congress' horse-and-buggy computer laws
Hackers asked to help revise outdated digital laws
"Citing the legendary Hacker Manifesto and tragic suicide of digital activist Aaron Swartz, Jennifer Granick, Director of Civil Liberties at the Stanford Center for Internet and Society, pointed out that just studying computers, network security, and programming flaws, simply in the name of curiosity and exploration, can be a crime or civil offense — values counter to the hacking community." Read more » about Hackers asked to help revise outdated digital laws
Pages
Meet the Center for Internet and Society 2012 (Past Event)
Come meet CIS and hear about our exciting work and ways to get involved. Read more » about Meet the Center for Internet and Society 2012
MegaUpload: Guilty or Not Guilty? (Past Event)
On January 19, 2012, Kim DotCom was arrested in a dramatic raid after being indicted on federal criminal charges that he knew that his website, MegaUpload, was a haven of piracy and counterfeiting. In the days that followed, the media commented on the presumed guilt of MegaUpload. In this debate, Jim argues that the law and evidence clearly point to MegaUpload's officers being found guilty, while Jennifer will argue that the MegaUpload case is built on unprecedented and wrongheaded interpretations of copyright law, and thus the principles should be found not guilty. Read more » about MegaUpload: Guilty or Not Guilty?
Should the Wall of Sheep Be Illegal? A Debate Over Whether and How Open WiFi Sniffing Should Be Regulated (Past Event)
Prompted by the Google Street View WiFi sniffing scandal, the question of whether and how the law regulates interception of unencrypted wireless communications has become a hot topic in the courts, in the halls of the FCC, on Capitol Hill, and in the security community. Are open WiFi communications protected by federal wiretap law, unprotected, or some strange mix of the two? (Surprise: it may be the last one, so you'll want to come learn the line between what's probably illegal sniffing and what's probably not.) Read more » about Should the Wall of Sheep Be Illegal? A Debate Over Whether and How Open WiFi Sniffing Should Be Regulated
Smashing the Future for Fun and Profit (Past Event)
Has it really been 15 years? Time really flies when keeping up with Moore's law is the measure. In 1997, Jeff Moss held the very first Black Hat. He gathered together some of the best hackers and security minds of the time to discuss the current state of the hack. A unique and neutral field was created in which the security community--private, public, and independent practitioners alike—could come together and exchange research, theories, and experiences with no vendor influences. That idea seems to have caught on. Jeff knew that Black Hat could serve the community best if it concentrated on finding research by some of the brightest minds of the day, and he had an uncanny knack for finding them. Read more » about Smashing the Future for Fun and Profit
Pages
3D Printing: Is the Law Ready for the Future?
May 16, 2013
Three dimensional printing turns bits into atoms. The technology is simply amazing. These machines draw on programming, art and engineering to enable people to design and build intricate, beautiful, functional jewelry, machine parts, toys and even shoes. In the commercial sector, 3D printing can revolutionize supply chains as well. As the public interest group Public Knowledge wrote once, "It will be awesome if they don't screw it up."
Read more » about 3D Printing: Is the Law Ready for the Future?
Constitution USA with Peter Sagal - Episode II - It’s A Free Country
May 14, 2013
Jennifer Granick appears at 46:44.
Ask Americans what the Constitution’s most important feature is, and most will say it’s the guarantees of liberty enshrined in the Bill of Rights, the first ten amendments of the Constitution.
Americans are fiercely proud of their freedoms but they continue to argue about what those basic rights are and how they can be sustained in a changing world. Are our rights unchangeable, or should they evolve over time? What is the proper role for the courts in interpreting rights? Read more » about Constitution USA with Peter Sagal - Episode II - It’s A Free Country
Innovation or Exploitation (Video)
February 21, 2013
Have you ever borrowed a smartphone without asking? Modified a URL? Scraped a website? Called an undocumented API? Congratulations: you might have violated federal law! A 1986 statute, the Computer Fraud and Abuse Act (CFAA), provides both civil and criminal remedies for mere "unauthorized" access to a computer. Read more » about Innovation or Exploitation (Video)
Innovation or Exploitation? (Audio)
February 21, 2013
Have you ever borrowed a smartphone without asking? Modified a URL? Scraped a website? Called an undocumented API? Congratulations: you might have violated federal law! A 1986 statute, the Computer Fraud and Abuse Act (CFAA), provides both civil and criminal remedies for mere "unauthorized" access to a computer. Read more » about Innovation or Exploitation? (Audio)
CODE 2600
July 24, 2012
Synopsis: CODE 2600 documents the rise of the Information Technology Age as told through the events and people who helped build and manipulate it. The film explores the impact this new connectivity has on our ability to remain human while maintaining our personal privacy and security. As we struggle to comprehend the wide-spanning socio-technical fallout causd by data collection and social networks, oru modern culture is caught in an undercurrent of cyber-attacks, identity theft and privacy invasion. Read more » about CODE 2600