The Center for Internet and Society at Stanford Law School is a leader in the study of the law and policy around the Internet and other emerging technologies.
Amazon’s latest effort to mitigate IP infringement in its third-party seller program is a ban on the sale of streaming media devices (“Kodi boxes”) that promote piracy. In addition to banning sales of the devices, Amazon reserves the right to destroy any offending physical inventory in its warehouses. The new policy raises not-so-new questions about the ability of copyright holders to control the distribution of dual-use technologies that can (but needn’t necessarily) be used to infringe copyrights.
The recent spat of Washington D.C. leaks is "unusually active," according to FBI Director Mr. James Comey. Even if the leaks are as normal as they are in an allergic nose dealing with New Orleans spring pollen, what are the legal and ethical issues in leaking such confidential information, unknowingly reverse engineering it, or in publishing the leaks?
In my previous blog on propaganda, I noted private information, when stolen and published, can prove useful for propaganda efforts. This post develops that concept in more detail, with an emphasis on privacy considerations.
I agree with interpretations of the First Amendment finding important protections for publication of private information without consent. And I concur that, as a matter of principle, the public interest can justify such publication. But too often the “public interest” defense is rather often a post hoc rationalization rather than a reasoned justification.
Contemporary analyses give insufficient weight to privacy and information security interests. Such interests often outweigh the public interest value of making private information public without the consent of the owner or data subject, but that weight may not be recognized. Some reasons for this potentially include media business models that reward clicks and attention, increased partisan polarity (and the utility of such disclosures for propaganda), mistrust of government, and insufficient enforcement of laws on cybercrime.
Late last month, I posted to SSRN a draft of my forthcoming article, “Notice and Takedown in the Domain Name System: ICANN’s Ambivalent Drift into Online Content Regulation.” The article takes a close look at ICANN’s role in facilitating a new program of extrajudicial notice and takedown in the DNS for domain names associated with accused “pirate sites.” The program is a cooperative, private venture between Donuts, the registry operator for hundreds of new gTLDs in the DNS, and the Motion Picture
No one wants to live in a “dumb” city. But I question whether anyone ought to want to live in a really smart city either. I’d prefer to just live in a smarter city -- one that puts my privacy and security first before rolling out ubiquitous sensors and broad-scale data collection in the name of some larger public good.
How Governments Can Promote Automated Driving recommended that governments conduct "legal audits" to "identify and analyze every statute and regulation that could apply adversely or ambiguously to automated driving." Automated Vehicles Are Probably Legal in the United States attempted this nationwide, and now the authors of Georgia's HB 248 have produced a bill that (while not perfect) reflects a tho