Professors' Letter in Opposition to the "Cybersecurity Information Sharing Act" (S. 754)

Today, 21 cyberlaw and/or cybersecurity professors and researchers joined a letter calling for the Senate to reject the Cybersecurity Information Sharing Act ("CISA"). Endorsing the concerns raised in an April 2015 technologists' letter, the signatories identify the fundamental problem with CISA, namely, that it will achieve little to address the real cybersecurity challenges facing US industry.

Broad Coalition Urges European Parliament to Adopt Amendments to Save Net Neutrality

For Immediate Release

October 25, 2015

Leading Companies, Investors, Academics and NGOs Urge European Parliament

to Save Net Neutrality Proposal through Key Amendments

Ahead of European Parliamentary vote, a broad coalition of start-ups, businesses, non-profits and legal scholars urges Parliament to adopt critical amendments to proposed rules.


Reminder: We Robot Deadline is November 1

Hope to see you!


We invite submissions for We Robot 2016 to be held in Coral Gables, Florida on April 1-2, 2016 at the University of Miami School of Law. We Robot–the premier US conference on law and policy relating to Robotics that began at the University of Miami School of Law in 2012, and has since been held at Stanford and University of Washington–returns to Miami Law April 1st-2nd in 2016. Attendees include lawyers, engineers, philosophers, robot builders, ethicists, and regulators who are on the front lines of robot theory, design, or development. The main conference will be preceded by a day of special workshops (see below). The conference web site is

The good, bad, and ugly of binary thinking . . .

Sometimes the best choice when you come to a fork in the road is to retreat, or even merge the two forks by taking one then going off road to the other! And yet binary thinking will force us to choose between the right or left fork, even if both forks suck standing alone. Only by understanding the perils of binary thinking can you protect against its destabilizing bipolar effects in conflict resolution.

Tool Without a Handle: Quantum Paradox #3

To moderate (edit or block objectionable or illegal content) in the online context implicates the quantum paradox of privacy. To effectively moderate a user, you must know who the user is, and give the user a fixed identity. It can of course be a pseudonymous identity, but even in such cases some degree of privacy, some degree of invisibility, is lost. Accepting that this is necessary if there is to be some effective form of content moderation can move past unworkable solutions


Subscribe to Stanford CIS Blog