
Jennifer Granick is the Director of Civil Liberties at the Stanford Center for Internet and Society. Jennifer returns to Stanford after stints as General Counsel of entertainment company Worldstar Hip Hop and as counsel with the internet boutique firm of Zwillgen PLLC. Before that, she was the Civil Liberties Director at the Electronic Frontier Foundation. Jennifer practices, speaks and writes about computer crime and security, electronic surveillance, consumer privacy, data protection, copyright, trademark and the Digital Millennium Copyright Act. From 2001 to 2007, Jennifer was Executive Director of CIS and taught Cyberlaw, Computer Crime Law, Internet intermediary liability, and Internet law and policy. Before teaching at Stanford, Jennifer spent almost a decade practicing criminal defense law in California. She was selected by Information Security magazine in 2003 as one of 20 "Women of Vision" in the computer security field. She earned her law degree from University of California, Hastings College of the Law and her undergraduate degree from the New College of the University of South Florida.
High Res Photo of Jennifer Granick
New Phone Unlocking Bill
By Jennifer Granick • March 7, 2013 at 12:43 pm
Senator Klobuchar's bill to legalize phone unlocking would require the Federal Communications Commission to direct wireless providers to unlock mobile devices. The bill is available here. Read more » about New Phone Unlocking Bill
ECPA Reform Bill Announced
By Jennifer Granick • March 6, 2013 at 12:21 pm
Today, Rep. Zoe Lofgren in conjunction with Reps. Read more » about ECPA Reform Bill Announced
White House in Favor of Phone Unlocking! Now What?
By Jennifer Granick • March 5, 2013 at 3:15 pm
Yesterday, the White House declared "It's Time to Legalize Cell Phone Unlocking". The call was in immediate response to a petition with over 114,000 signatures on it, decrying the Librarian of Congress' decision last October to let lapse an exemption ensuring people who unlocked their phones would not be in violation of the anti-circumvention provisions of the Digital Millennium Copyright Act of 1998 (DMCA), Read more » about White House in Favor of Phone Unlocking! Now What?
Innovation or Exploitation Wrap Up
By Jennifer Granick • February 20, 2013 at 3:02 pm
Thanks to our speakers and everyone who came out last night for the Innovation or Exploitation event, highlighting problems the Computer Fraud and Abuse Act (CFAA) poses for security research, innovation, tinkering, academic research and libraries. I learned a lot, including that much of what librarians do today -- like making court records and academic articles widely available and cataloging books -- requires "scraping" and da Read more » about Innovation or Exploitation Wrap Up
Petition to Free the Cell Phone: Now is the Time
By Jennifer Granick • February 19, 2013 at 5:13 pm
The Librarian of Congress recently decided in their triennial DMCA exemption rule-making process to remove the existing exemption that allowed individuals to unlock their own mobile phones to use on the compatible network of their choice. As a result of this decision, individuals no longer have clear immunity to unlock new phones - thereby putting them in potential legal jeopardy. Read more » about Petition to Free the Cell Phone: Now is the Time
Pages
Shloss v. Estate of Joyce
After the Estate of James Joyce refused to allow a scholar to quote Joyce in her book, we successfully defended her right under the fair use doctrine to use the quotes she needed to illustrate her scholarship. After we prevailed in the case, the Estate paid $240,000 of our client’s legal fees. Read more » about Shloss v. Estate of Joyce
Kahle v. Gonzales
In this case, two archives challenged statutes that extended copyright terms unconditionally—the Copyright Renewal Act and the Copyright Term Extension Act (CTEA)—as unconstitutional under Copyright Clause and the First Amendment. Read more » about Kahle v. Gonzales
Towards learning from losing Aaron Swartz
Al Jazeera republished Jennifer Granick's two part blog postTowards learning from losing Aaron Swartz. Read more » about Towards learning from losing Aaron Swartz
Organized Labor Can Protect Workers by Supporting 'Aaron's Law'
Right now, a battle is underway to reform the Computer Fraud and Abuse Act, a statute that can transform innocuous workplace behavior into a federal crime, simply because a computer is involved. The CFAA is a bludgeon that Big Business and the Department of Justice have willingly used against the American worker, and its time for that to stop. Read more » about Organized Labor Can Protect Workers by Supporting 'Aaron's Law'
Megaupload Indictment Leaves Everyone Guessing - Part 2
Daily/Journal Op/Ed
The first part of this article outlined the mechanics of the Megaupload website, and the novel questions of criminal inducement on which the government's indictment is premised. Here, we explore two more extensions of existing law on which the indictment is based, and the impact this prosecution is likely to have on Internet innovators and users alike. Read more » about Megaupload Indictment Leaves Everyone Guessing - Part 2
Megaupload.com Indictment Leaves Everyone Guessing - Part 1
Days after anti-piracy legislation stalled in Congress, the U.S. Department of Justice coordinated an unprecedented raid on the Hong Kong-based website Megaupload.com. New Zealand law enforcement agents swooped in by helicopter to arrest founder Kim Dotcom at his home outside of Auckland, and seized millions of dollars worth of art, vehicles and real estate. Six other Megaupload employees were also arrested. Meanwhile, the Justice Department seized Megaupload's domain names and the data of at least 50 million users worldwide. Read more » about Megaupload.com Indictment Leaves Everyone Guessing - Part 1
Shloss v. Estate of Joyce - Amended Complaint
Pages
Emails Detail Northern District's Use of Controversial Surveillan
"Jennifer Granick, director of civil liberties at the Stanford Center for Internet and Society, said it would be troubling if prosecutors did not inform Seeborg that stingray technology would be used to locate Rigmaiden's computer." Read more » about Emails Detail Northern District's Use of Controversial Surveillan
Stanford Law Director Outlines How Congress Should Legalize Phone Unlocking
"Jennifer Granick, the Director of Civil Liberties at the Stanford Center for Internet and Society, says that none of the unlocking bills recently introduced to Congress provide a comprehensive fix for consumers." Read more » about Stanford Law Director Outlines How Congress Should Legalize Phone Unlocking
From 'WarGames' to Aaron Swartz: How U.S. anti-hacking law went astray
""The extraordinary potential sentences are a result of political pressure by the Department of Justice, characteristic of their pressing for higher penalties in all sorts of areas of criminal regulation," says Jennifer Granick, director of civil liberties at the Stanford Center for Internet and Society, who has represented hackers facing criminal charges." Read more » about From 'WarGames' to Aaron Swartz: How U.S. anti-hacking law went astray
Can I Get Some Privacy?
Jennifer Granick, Aleecia McDonald, Jonathan Mayer and Arvind Narayanan discuss data privacy in this cover story by Stanford Magazine. Read more » about Can I Get Some Privacy?
Petition forces White House to address why unlocking smartphones is illegal
"An attorney from Stanford’s Cyberlaw Clinic, Jennifer Granick, offered to help the 20-year-old Khanifar fight Motorola. The company eventually dropped its threats, and Granick went on to help persuade the Librarian to exempt cell phone unlocking under the DMCA in 2006." Read more » about Petition forces White House to address why unlocking smartphones is illegal
Pages
2013 Stanford University-Peking University Internet Law and Public Policy Conference (Past Event)
This Conference is cordially hosted by Stanford Law School and Peking University, and is sponsored by Tencent, China’s largest Internet company and one of the largest worldwide, and Microsoft, the largest software maker in the world. The main organizers include the China Guiding Cases Project, the Stanford Program in Law, Science, & Technology, the China Law and Policy Association, and the Stanford Law School Programs. Read more » about 2013 Stanford University-Peking University Internet Law and Public Policy Conference
3D Printing: Is the Law Ready for the Future? (Past Event)
Third Annual Internet Law Works-in-Progress Event (Past Event)
Jennifer Granick will be presenting her paper Principles for Regulation of Government Surveillance in the Age of Big Data.
For more information visit: http://law.scu.edu/hightech/2013-internet-law-wip.cfm Read more » about Third Annual Internet Law Works-in-Progress Event
Innovation or Exploitation? (Past Event)
Have you ever borrowed a smartphone without asking? Modified a URL? Scraped a website? Called an undocumented API? Congratulations: you might have violated federal law! A 1986 statute, the Computer Fraud and Abuse Act (CFAA), provides both civil and criminal remedies for mere "unauthorized" access to a computer. Read more » about Innovation or Exploitation?
Swimming in the Ocean of Big Data: National Security in an Age of Unlimited Information (Past Event)
The Journal of National Security Law & Policy and The Georgetown Center on National Security and the Law proudly present "Swimming in the Ocean of Big Data: National Security in an Age of Unlimited Information". Read more » about Swimming in the Ocean of Big Data: National Security in an Age of Unlimited Information
Pages
3D Printing: Is the Law Ready for the Future?
May 16, 2013
Three dimensional printing turns bits into atoms. The technology is simply amazing. These machines draw on programming, art and engineering to enable people to design and build intricate, beautiful, functional jewelry, machine parts, toys and even shoes. In the commercial sector, 3D printing can revolutionize supply chains as well. As the public interest group Public Knowledge wrote once, "It will be awesome if they don't screw it up."
Read more » about 3D Printing: Is the Law Ready for the Future?
Constitution USA with Peter Sagal - Episode II - It’s A Free Country
May 14, 2013
Jennifer Granick appears at 46:44.
Ask Americans what the Constitution’s most important feature is, and most will say it’s the guarantees of liberty enshrined in the Bill of Rights, the first ten amendments of the Constitution.
Americans are fiercely proud of their freedoms but they continue to argue about what those basic rights are and how they can be sustained in a changing world. Are our rights unchangeable, or should they evolve over time? What is the proper role for the courts in interpreting rights? Read more » about Constitution USA with Peter Sagal - Episode II - It’s A Free Country
Innovation or Exploitation (Video)
February 21, 2013
Have you ever borrowed a smartphone without asking? Modified a URL? Scraped a website? Called an undocumented API? Congratulations: you might have violated federal law! A 1986 statute, the Computer Fraud and Abuse Act (CFAA), provides both civil and criminal remedies for mere "unauthorized" access to a computer. Read more » about Innovation or Exploitation (Video)
Innovation or Exploitation? (Audio)
February 21, 2013
Have you ever borrowed a smartphone without asking? Modified a URL? Scraped a website? Called an undocumented API? Congratulations: you might have violated federal law! A 1986 statute, the Computer Fraud and Abuse Act (CFAA), provides both civil and criminal remedies for mere "unauthorized" access to a computer. Read more » about Innovation or Exploitation? (Audio)
CODE 2600
July 24, 2012
Synopsis: CODE 2600 documents the rise of the Information Technology Age as told through the events and people who helped build and manipulate it. The film explores the impact this new connectivity has on our ability to remain human while maintaining our personal privacy and security. As we struggle to comprehend the wide-spanning socio-technical fallout causd by data collection and social networks, oru modern culture is caught in an undercurrent of cyber-attacks, identity theft and privacy invasion. Read more » about CODE 2600