Error message

Deprecated function: implode(): Passing glue string after array is deprecated. Swap the parameters in Drupal\gmap\GmapDefaults->__construct() (line 107 of /mnt/w/cyberlaw/docs/prod/sites/all/modules/contrib/gmap/lib/Drupal/gmap/GmapDefaults.php).

Take a Class at Stanford Law School

Current and upcoming classes available with CIS faculty, staff, and affiliates

 

Spring 2020

 

AntitrustBarbara van Schewick
Antitrust law sets the ground rules for competition. This course will explore the basic concepts in antitrust law. We will examine cartels and competitor collaborations, monopolization, vertical restraints and horizontal mergers.

 

Internet Platforms and Free ExpressionBarbara van Schewick and Morgan Weiland
In recent years, Internet platforms like Facebook, Google, or Twitter have increasingly come under fire. Top executives from these companies have testified before Congress about their role in spreading misinformation in the 2016 elections. With the increased scrutiny come diverse calls for change. They include asking the platforms to self-regulate, asking regulators to address the platforms' growing market power, or asking Congress to adopt laws regulating various aspects of the platforms' behavior. The seminar explores the many ways in which Internet platforms shape free expression online and asks what public responsibilities these private companies do and should have. By interrogating the structural role that these companies play in society -- are they quasi-state actors? are they the press? are they monopolies? -- we will assess how the platforms contribute to (or possibly mitigate) key social problems. We will critically examine constitutional and statutory laws, like the First Amendment, CDA 230, and antitrust law to evaluate whether and how they facilitate or constrain possible solutions. And with the benefit of guest speakers from academia and policy sectors, we will draw our own conclusions about how to best ensure platform accountability. tl;dr: If you want to work at a tech law firm, in-house at a tech company, in a regulatory position vis-a-vis the tech sector, or are generally interested in critical questions around the role of Internet platforms in society and their impact on free expression online, this class is for you.

 

Search Warrants in the Digital AreaStephen Smith
This will be a 2-hour advanced criminal procedure class, designed to acquaint students with the challenges confronting judges as they apply the Fourth Amendment to the bewildering array of search and surveillance techniques available to law enforcement in the 21st century. Various surveillance techniques will be examined, such as cell site simulators, GPS and RFID tracking devices, remote computer access (NITs), biometric identification, facial recognition technology, and automated license plate readers.

The novel legal and practical issues generated by computer-based search techniques will be explored, for example: Should the plain view exception apply to computer searches? Are ex ante conditions on computer search warrants necessary, or even advisable? When is compulsion of biometric device identifiers appropriate? Can providers be compelled to decrypt locked cell phones? What are the notice requirements for search warrants directed to service providers? What limits should be placed on border searches of electronic devices? After the Supreme Court’s 2018 decision in Carpenter, what rules govern law enforcement access to medical or genetic databases maintained by third parties? How is a cell tower dump order distinguishable from a general warrant? What are the particularity requirements for search warrants seeking electronically stored information? Should there be super-warrant requirements pertaining to minimization and overcollection for such searches? What about extraterritoriality and conflict of law issues raised by U.S. law enforcement access to data stored on foreign servers?

Broader policy questions will also be addressed. For example, is it sensible to rely on the exclusionary rule to develop Fourth Amendment doctrine in this “golden age of surveillance”? Are courts or legislatures better equipped to regulate modern police investigations? What lessons can be learned from comparative approaches to police regulation in other countries?

The course will build upon foundations laid in the Criminal Procedure—Investigation and Criminal Procedure—Adjudication courses. Those classes touch upon the basics of search warrants and the Fourth Amendment, and both are recommended prerequisites for this class. The next generation of judges, prosecutors, defense attorneys, and civil rights advocates will be forced to apply existing legal precedent to unprecedented surveillance technologies generated by the digital era. This course is designed to help them meet that daunting challenge.

 

Winter 2020

 

Communications Law: Internet and TelephonyBarbara van Schewick
The internet has enabled new forms of innovation, content production and political participation that are transforming our economy, society and democratic system. Technical, legal and economic choices will affect whether the Internet can realize its potential or not. Communications law - the law that governs both the physical infrastructures for communications services such as cable and telephone networks as well as the communication services which are provided over these infrastructures - has become one of the most important arenas in which choices affecting the future of the information society are made. The debates over network neutrality or the right ways to foster broadband deployment are examples of this trend. At the same time, the Internet's ability to support a variety of different communications services such as telephony, information services or video over the same physical network infrastructure challenges the existing communications law, which is based on the assumption that different physical infrastructures offer different communications services. What can regulators and legislators do to allow the Internet to realize its economic, social, cultural, and political potential? How can we foster the deployment of more broadband networks? And how can policymakers allow applications like Internet telephony and traditional telephony to coexist without giving one an unfair advantage over the other? The course will address how current law deals with these questions, but also explore what regulators and legislators may do to better deal with the challenges posed by the Internet. The course is mostly focused on the US, but highlights developments elsewhere where appropriate.

 

Information Privacy LawAlbert Gidari
This course will explore the roots of privacy law, its evolution in the 20th century in the face of ever changing technology, and the challenges of individual control over or government regulation of information in the modern era where institutions and individuals need and reveal information constantly, but also seek basic dignity and safety from harm. Privacy law is comprised of torts, contracts, constitutional law, statutory law, international law, soft law norms, and affected by emerging technologies. We will discuss all of these things, as well as incorporate developments in the news, from the perspective of the various privacy stakeholders--consumers, regulators and business.

 

Autumn 2019

 

Regulating Internet Speech PlatformsDaphne Keller
Internet platforms like Google and Facebook play an enormous role in our online speech and information environment today. This class will review the intermediary liability laws that shape platforms' decisions about online content, and examine how successfully those laws achieve their goals. Students will be encouraged to think pragmatically about the legal, operational, and product design choices platforms may make in response to particular laws, drawing on the instructor's experience handling such questions as Associate General Counsel at Google. Readings and discussions will focus primarily on current US law, with some attention to European laws and to proposed or pending legislation. Important themes of the class include Constitutional and human rights constraints on intermediary liability laws; legal limits (or lack thereof) on platforms' enforcement of privatized speech rules under their Community Guidelines or Terms of Service; global enforcement of national laws requiring platforms to remove content; and connections between platform liability and other areas of law such as consumer protection or privacy.

 

Hack Lab - Riana Pfefferkorn & Alex Stamos
This course aims to give students a solid understanding of the most common types of attacks used in cybercrime and cyberwarfare. Taught by a long-time cybersecurity practitioner, a recovering cyberlaw litigator, and a group of hearty, motivated TAs, each session will begin with a lecture covering the basics of an area of technology and how that technology has been misused in the past. Students will then complete a lab section, with the guidance of the instructor and assistants, where they attack a known insecure system using techniques and tools seen in the field. Each week, there will be a second lecture on the legal and policy impacts of the technologies and techniques we cover. By the end of the course, students are expected to have a basic understanding of some of the most common offensive techniques in use today as well as a comprehensive overview of the most important aspects of cyberpolicy and law. No computer science background is required. All students must have access to a Windows, Mac OS X or Linux laptop. Regulating Internet Speech Platforms - Daphne Keller
Internet platforms like Google and Facebook play an enormous role in our online speech and information environment today. This class will review the intermediary liability laws that shape platforms' decisions about online content, and examine how successfully those laws achieve their goals. Students will be encouraged to think pragmatically about the legal, operational, and product design choices platforms may make in response to particular laws, drawing on the instructor's experience handling such questions as Associate General Counsel at Google. Readings and discussions will focus primarily on current US law, with some attention to European laws and to proposed or pending legislation. Important themes of the class include Constitutional and human rights constraints on intermediary liability laws; legal limits (or lack thereof) on platforms' enforcement of privatized speech rules under their Community Guidelines or Terms of Service; global enforcement of national laws requiring platforms to remove content; and connections between platform liability and other areas of law such as consumer protection or privacy.

 

Winter 2019

 

Communications LawBarbara van Schewick
Most people watch television on a regular basis (although not necessarily on TV). Television entertains, delivers the news, and provides an important forum for debating political issues. Focusing on communications law and first amendment law, the course will discuss how and why regulation shapes what we see on TV, and how it attempts to ensure that television can fulfill its functions for society. For example, why is cable television so expensive? Why can comedians swear on cable TV, but not on broadcast TV? Should regulators care as much about violence as they do about indecency? Can we trust the market to give the audience what it wants? Will the market provide content that is in the public interest, such as local news or educational programming, or do regulators need to intervene? Should we care if media outlets are increasingly owned by a few small conglomerates? And how does the Internet affect the need for ownership regulation? The course mostly focuses on the U.S., but highlights developments elsewhere where appropriate.

 

Spring 2018-2019

 

AntitrustBarbara van Schewick
Antitrust law sets the ground rules for competition. This course will explore the basic concepts in antitrust law. We will examine cartels and competitor collaborations, monopolization, vertical restraints and horizontal mergers. There are no prerequisites for this course. No economic background is required.

 

Current Issues in Network NeutralityBarbara van Schewick
Due to the change in administration, the future of net neutrality in the US is in question again. Network neutrality rules are based on a simple principle: Internet service providers like Verizon or Comcast that connect us to the Internet should not control what happens on the Internet. Net neutrality rules prohibit ISPs from blocking or slowing down websites, making some sites more attractive than others, or charging sites fees to reach people faster. After a long, public fight that mobilized more than 4 million people across the political spectrum, the Federal Communications Commission (FCC) adopted strong net neutrality rules in February 2015. Now these rules might be on the chopping block. FCC Chairman Pai, who opposed the rules when they were adopted, has declared his intention to roll back the rules, while expressing some support for "net neutrality principles." At the same time, Republicans in Congress have indicated they might consider a legislative solution. Through lectures, class discussions, and guest speakers, the seminar will introduce students to the key questions underlying the net neutrality debate so that they can become informed participants in this debate. Do we need net neutrality rules, and, if yes, what should they be? What are the options for addressing net neutrality at the FCC and in Congress? How do past court decisions constrain the FCC's options for adopting net neutrality rules? While the class focuses on the net neutrality debate in the U.S., the underlying policy questions are general and directly applicable to ongoing net neutrality debates around the world. The class is open to law students and students from other parts of the university. Students do not need to have any technical background to participate in the class; any necessary background will be taught in class.

 

Winter 2018

 

Information Privacy LawAlbert Gidari
This course will explore the roots of privacy law, its evolution in the 20th century in the face of ever changing technology, and the challenges of individual control over or government regulation of information in the modern era where institutions and individuals need and reveal information constantly, but also seek basic dignity and safety from harm. Privacy law is comprised of torts, contracts, constitutional law, statutory law, international law, soft law norms, and affected by emerging technologies. We will discuss all of these things, as well as incorporate developments in the news, from the perspective of the various privacy stakeholders--consumers, regulators and business.

 

Spring 2017-2018

 

Cybersecurity: A Legal and Technical Perspective - Riana Pfefferkorn and Dan Boneh
This class will use the case method to teach basic computer, network, and information security from technology, law, policy, and business perspectives. Using real world topics, we will study the technical, legal, policy, and business aspects of an incident or issue and its potential solutions. The case studies will be organized around the following topics: vulnerability disclosure, state sponsored sabotage, corporate and government espionage, credit card theft, theft of embarrassing personal data, phishing and social engineering attacks, denial of service attacks, attacks on weak session management and URLs, security risks and benefits of cloud data storage, wiretapping on the Internet, and digital forensics. Students taking the class will learn about the techniques attackers use, applicable legal prohibitions, rights, and remedies, the policy context, and strategies in law, policy and business for managing risk. Grades will be based on class participation, two reflection papers, and a final exam.

 

Free Expression in a Networked World Barbara van Schewick and Morgan Weiland
This seminar explores cutting-edge questions at the intersection of the First Amendment, the internet, and new technologies. The internet and digital media technologies have opened up new spaces for expression -- spaces that are designed and controlled by a handful of private companies. For example, Facebook, Twitter, and Google's algorithms determine what content is presented to us; software designed by Facebook and Twitter identifies and filters content like fake news; and new kinds of "speakers" like bots tweet and share information. The engineering and design choices underlying these technologies have significant implications for our ability to express ourselves and for democracy. But our expressive rights are increasingly in tension with platform companies' statutory immunities, like CDA 230, and, potentially, their constitutional claims to speech and press rights. Lawyers operating in this space -- whether from the perspective of technology companies, policymakers, regulators, or academia -- need to understand not only traditional First Amendment doctrine, but also the statutes and technologies that shape the behavior of private actors and the spaces in which expression occurs. They need to grapple with questions of responsibility and accountability, and with the proper balance between private and public control. This course prepares students to deal with the complex dynamics underlying these issues. Every other week, a scholar or practitioner at the cutting edge of these topics will present their research or discuss their professional experiences. Students will read any materials provided in advance, and the class will engage in a discussion with the guest. In the week before the speaker's presentation, we will meet as a group to discuss key literature informing the scholar's work or the practitioner's experiences.

 

Winter 2017

 

Information Privacy LawAlbert Gidari
This course will explore the roots of privacy law, its evolution in the 20th century in the face of ever changing technology, and the challenges of individual control over or government regulation of information in the modern era where institutions and individuals need and reveal information constantly, but also seek basic dignity and safety from harm. Privacy law is comprised of torts, contracts, constitutional law, statutory law, international law, soft law norms, and affected by emerging technologies. We will discuss all of these things, as well as incorporate developments in the news, from the perspective of the various privacy stakeholders--consumers, regulators and business.

 

Policy Practicum: Intermediary Liability - Daphne Keller and Mark A. Lemley

 

Communications Law<: Internet and Telephony/a> – Barbara van Schewick
The internet has enabled new forms of innovation, content production and political participation that are transforming our economy, society and democratic system. Technical, legal and economic choices will affect whether the Internet can realize its potential or not. Communications law - the law that governs both the physical infrastructures for communications services such as cable and telephone networks as well as the communication services which are provided over these infrastructures - has become one of the most important arenas in which choices affecting the future of the information society are made. The debates over network neutrality or the right ways to foster broadband deployment are examples of this trend. At the same time, the Internet's ability to support a variety of different communications services such as telephony, information services or video over the same physical network infrastructure challenges the existing communications law, which is based on the assumption that different physical infrastructures offer different communications services. What can regulators and legislators do to allow the Internet to realize its economic, social, cultural, and political potential? How can we foster the deployment of more broadband networks? And how can policymakers allow applications like Internet telephony and traditional telephony to coexist without giving one an unfair advantage over the other? The course will address how current law deals with these questions, but also explore what regulators and legislators may do to better deal with the challenges posed by the Internet. The course is mostly focused on the US, but highlights developments elsewhere where appropriate.

 

Spring 2016-2017

 

Cybersecurity: A Legal and Technical Perspective – Jennifer Granick and Dan Boneh

 

Policy Practicum: Intermediary Liability - Daphne Keller and Mark A. Lemley

 

AntitrustBarbara van Schewick
Antitrust law sets the ground rules for competition. This course will explore the basic concepts in antitrust law. We will examine cartels and competitor collaborations, monopolization, vertical restraints and horizontal mergers.

 

Current Issues in Network NeutralityBarbara van Schewick
Due to the change in administration, the future of net neutrality in the US is in question again. Network neutrality rules are based on a simple principle: Internet service providers like Verizon or Comcast that connect us to the Internet should not control what happens on the Internet. Net neutrality rules prohibit ISPs from blocking or slowing down websites, making some sites more attractive than others, or charging sites fees to reach people faster. After a long, public fight that mobilized more than 4 million people across the political spectrum, the Federal Communications Commission (FCC) adopted strong net neutrality rules in February 2015. Now these rules might be on the chopping block. FCC Chairman Pai, who opposed the rules when they were adopted, has declared his intention to roll back the rules, while expressing some support for "net neutrality principles." At the same time, Republicans in Congress have indicated they might consider a legislative solution. Through lectures, class discussions, and guest speakers, the seminar will introduce students to the key questions underlying the net neutrality debate so that they can become informed participants in this debate. Do we need net neutrality rules, and, if yes, what should they be? What are the options for addressing net neutrality at the FCC and in Congress? How do past court decisions constrain the FCC's options for adopting net neutrality rules? While the class focuses on the net neutrality debate in the U.S., the underlying policy questions are general and directly applicable to ongoing net neutrality debates around the world. The class is open to law students and students from other parts of the university. Students do not need to have any technical background to participate in the class; any necessary background will be taught in class.

 

Spring 2015

Information Privacy Law
Instructor: Jennifer Granick
Today almost all modern businesses need advice about information privacy law. While the roots of privacy law in the US started with a right to be let alone, modern business models, the needs of the administrative state, law enforcement priorities, and our own behavior complicate approaches based solely upon seclusion or secrecy. This course will explore the roots of US privacy law, its evolution in the 20th century, and the challenges of regulating information in the modern era where institutions and individuals need and reveal information constantly, but also seek basic dignity and safety from harm. Privacy law is comprised of torts, contracts, constitutional law, statutory law, soft law norms, and emerging technologies. We will discuss all of these things, as well as incorporate developments in the news. 

Antitrust
Instructor: Barbara van Schewick
Antitrust law sets the ground rules for competition. This course will explore the basic concepts in antitrust law. We will examine cartels and competitor collaborations, monopolization, vertical restraints and mergers. There are no prerequisites for this course. No economic background is required.  The course is open to GSB students and graduate students in the Economics Department.

Copyright and Content in the Digital Age
Instructor: Tom Rubin
The digital age has brought about unprecedented opportunity and upheaval in the creation and distribution of content. This seminar will examine digital disruptions to the business models of content creators and industries, and the corresponding impact of the Internet on copyright law, largely through the lens of the litigation involving Google Books. That litigation, which has been active in the courts for almost a decade, is a microcosm of the vast issues that have faced content owners and consumers in the digital age: new technologies to reproduce and distribute works, evolving concepts of fair use, changing consumer norms, massive disruptions to economic interests, increased access to information, concerns about piracy, and threats to competition. We will examine issues related to copyright and content in the digital age by focusing not only on legal claims and defenses, but also litigation strategy, business strategy, policy strategy and public relations strategy, all of which play an important part in the art of lawyering today. The seminar will explore in depth the many contours of the Google Books litigation, including transformative fair use, the problem of orphan works, the rise of ebooks, non-display use and the proposed class action settlement of the case, which was rejected by the district court in 2011. We will also examine digital developments in other content industries (movie, music and newspaper) and focus on two related book issues: the ebook antitrust case against both publishers and Apple and the frequent disputes between publishers and Amazon. The seminar will include visitors who have been involved in the issues being studied. Grading will be based upon weekly reflections, class participation and (for those opting for Research credit) a long paper based on independent research. Some copyright experience is recommended. The course is open to graduate students throughout the university, especially the Graduate School of Business, the Department of Communication and the Journalism Program, by consent of the instructor.

Winter 2015

Communications Law: Internet and Telephony
Instructor: Barbara van Schewick

New developments in Internet and other technology enable new forms of innovation, content production and political participation that have the potential to significantly transform our economy, society and democratic system. This transformation will not happen automatically. Technical, legal and economic choices will affect whether the Internet can realize its potential or not. Communications law - the law that governs both the physical infrastructures for communications services such as cable and telephone networks as well as the communication services which are provided over these infrastructures - has become one of the most important arenas in which choices affecting the future of the information society are made. The debates over network neutrality (whether network providers should be able to restrict the applications and content that their Internet service customers can access over the network) or the right ways to foster broadband deployment are examples of this trend. At the same time, the Internet's ability to support a variety of different communications services such as telephony, information services or video over the same physical network infrastructure challenges the existing communications law, which is based on the assumption that different physical infrastructures offer different communications services. What are the features of the Internet that are at the core of its economic, social, cultural and political potential? What can regulators and legislators do to allow the Internet to realize this potential? And how can they allow applications like Internet telephony and traditional telephony to coexist without giving one an unfair advantage over the other? The course will address how current law deals with these questions, but also explore what regulators and legislators may do to better deal with the challenges posed by the Internet. The course is mostly focused on the US, but highlights developments elsewhere where appropriate. 

Autumn 2014

Surveillance Law (Coursera)
Instructor: Jonathan Mayer

It’s easy to be cynical about government surveillance. In recent years, a parade of Orwellian disclosures have been making headlines. The FBI, for example, is hacking into computers that run anonymizing software. The NSA is vacuuming up domestic phone records. Even local police departments are getting in on the act, tracking cellphone location history and intercepting signals in realtime. Perhaps 2014 is not quite 1984, though. This course explores how American law facilitates electronic surveillance—but also substantially constrains it. You will learn the legal procedures that police and intelligence agencies have at their disposal, as well as the security and privacy safeguards built into those procedures. The material also provides brief, not-too-geeky technical explanations of some common surveillance methods.

 

Past Classes

Spring 2014

Antitrust
Instructor: Barbara van Schewick
Antitrust law sets the ground rules for competition. This course will explore the basic concepts in antitrust law. We will examine cartels and competitor collaborations, monopolization, vertical restraints and mergers. There are no prerequisites for this course. No economic background is required.  The course is open to GSB students and graduate students in the Economics Department.

Current Issues in Network Neutrality
Instructor: Barbara van Schewick
Do we need network neutrality rules and, if yes, what should they be? After more than ten years, this question is still hotly debated around the world. Network neutrality rules limit the ability of Internet service providers to interfere with the applications, content and services on their networks; they allow users to decide how they want to use the Internet without interference from Internet service providers. 

In the US, the recent decision by the Court of Appeals for the DC Circuit in Verizon v. FCC has re-opened the debate. In December 2010, the Federal Communications Commission (FCC) adopted the Open Internet Order, which enacted binding network neutrality rules for the first time. In January of this year, the Court of Appeals for the D.C. Circuit struck down the core provisions of the Open Internet Order - the rules against blocking and discrimination. As a result of this ruling, Internet service providers like Verizon, AT&T or Cox Cable that connect users to the Internet are now free to block any content, service or application they want. They can slow down selected applications, speed up others, or ask application or content providers like Netflix or Spotify to pay fees to reach their users. These practices would fundamentally change how we experience the Internet. In the wake of the Court's decision, policy makers, stakeholders and observers in the US are debating how to best ensure that the Internet remains open and free. In February, the Federal Communications Commission opened a new docket to collect public input on the best way to proceed. In Europe, the European Commission, the European Parliament and the member states are currently considering which approach to network neutrality they should take. The Brazilian Parliament is in the process of adopting network neutrality rules. 
 
This seminar aims to enable students to participate in the ongoing policy debates over network neutrality in the US and abroad. Class sessions will explore whether there is a need for network neutrality rules and, if yes, what kind of rules a network neutrality regime should include. For example, should network neutrality rules only ban blocking, or also discrimination? And if yes, what kind of differential treatment should be banned? Should Internet service providers be allowed to charge application or content providers for prioritized or otherwise enhanced access to their Internet service customers? How can we find network neutrality rules that allow network providers to manage their networks and that allow innovation in the network, while protecting the interests of users and application developers? Does competition in the market for Internet services remove the need for network neutrality rules? And finally, what is the best way to move forward in the US? 
 
Students will work in groups on written assignments that explore specific questions from the perspective of particular Internet companies or interest groups. Students are expected to attend all sessions of the class and participate in the class discussion. 
 
Special Instructions: Students may submit consent applications to enroll in the "Current Issues in Network Neutrality" seminar and the "Next Steps in Network Neutrality" policy lab practicum. Students concurrently accepted in the seminar and the policy practicum will research and write parts of white papers and comments to the Federal Communications Commission that will help policy makers assess the available options. Students will be required to attend the seminar and participate in the discussion, but will not do any of the written assignments for the seminar. Students enrolled in the seminar and the practicum will have the option to write papers for W, PW, or R credit in the practicum, with instructor consent. 
 
The class is open to law students and students from other parts of the university. It does not require any technical background. 
 
Consent Application: To apply for this course, students must complete and e-mail the Consent Application Form available on the SLS Registrar's Office website (see Registration and Selection of Classes for Stanford Law Students) to the instructor. See Consent Application Form for submission deadline. 
 
Next Steps in Network Neutrality
Instructor: Barbara van Schewick
Earlier this year, the Court of Appeals for the D.C. Circuit struck down the Federal Communications Commission's Open Internet rules. This policy practicum will help policy makers assess the available options in the wake of the court's decision.
 
In December 2010, the Federal Communications Commission (FCC) adopted the Open Internet Order, which enacted binding network neutrality rules for the first time. Network neutrality rules limit the ability of Internet service providers to interfere with the applications, content and services on their networks; they allow users to decide how they want to use the Internet without interference from Internet service providers. 
 
In January of this year, the Court of Appeals for the D.C. Circuit struck down the core provisions of the Open Internet Order - the rules against blocking and discrimination. The decision combined two wins for the FCC with one decisive loss. According to the Court, the FCC has authority to regulate providers of broadband Internet access service under Section 706 of the Telecommunications Act of 1996, and the FCC's justification for the Open Internet Order is "reasonable and supported by substantial evidence." The no-blocking and non-discrimination rules, the Court found, however, violate the Communications Act's ban on imposing common carrier obligations on entities like Internet service providers that the FCC has not classified as telecommunications service providers under Title II of the Communications Act. 
 
As a result of this ruling, Internet service providers like Verizon, AT&T or Cox Cable that connect users to the Internet are now free to block any content, service or application they want. They can slow down selected applications, speed up others, or ask application or content providers like Netflix or Spotify to pay fees to reach their users. These practices would fundamentally change how we experience the Internet. 
 
In the wake of the Court's decision, policy makers, stakeholders and observers are debating how to best ensure that the Internet remains open and free. Policy makers essentially have three options: First, the FCC can preserve the Open Internet Rules by reclassifying Internet service as a telecommunications service under Title II of the Communications Act. Second, it can develop a different, narrower network neutrality regime under Section 706 of the Telecommunications Act within the boundaries established by the Court of Appeal's decision. Finally, Congress or the FCC can adopt a new network neutrality regime, but only, in the case of the FCC, after reclassifying Internet service as a telecommunications service. In mid-February, the Federal Communications Commission opened a docket within which to consider how the Commission should proceed. 
 
Special Instructions: Upon consent of the instructor, students may choose enrollment Option 1 or Option 2: 
 
Option 1 (3 units) - Students who elect Option 1 will research and write parts of white papers and comments to the Federal Communications Commission that will help policy makers assess the available options. In special cases, students electing Option 1 may take the policy practicum for 2 units. Students interested in this option should indicate this on their application. 
 
Option 2 (1 to 2 units) - In order to elect Option 2, students must concurrently enroll (with consent of instructor) in the seminar component, "Current Issues in Network Neutrality" (2 units), which meets Thursdays from 4:15pm-6:15pm. Students in the policy practicum with the seminar component will research and write parts of white papers and comments to the Federal Communications Commission that will help policy makers assess the available options Students will be required to attend the seminar and participate in the discussion, but will not do any of the written assignments for the seminar. 
 
Depending on the type of work in Option 1 or Option 2, students taking the policy practicum for two-units or more may receive professional writing (PW) or research (R) credit. Students must obtain the instructor's approval of their election to take the course for writing (PW or W) or research (R) credit. After the term begins, students accepted into the course can transfer from the W/PW writing section (01) into section (02), which meets the R requirement, with consent of the instructor. 
 
The class is open to law students and students from other parts of the university. It does not require any technical background. 
 
Consent Application: To apply for this course, students must complete and e-mail the Consent Application Form available on the SLS Registrar's Office website (see Registration and Selection of Classes for Stanford Law Students) to the instructors. See Consent Application Form for submission deadline. 
 
Instructor: Jonathan Mayer
This seminar surveys the legal environment for technology security and privacy. We will emphasize areas of law that are frequently invoked, hotly contested, or ripe for reform. Specific topics will include trespass offenses (CFAA and DMCA), consumer protection against deficient security, breach notification, privacy policies, communications safeguards (ECPA), and compelled disclosure to law enforcement and intelligence agencies (Title III and FISA). The material will draw upon high profile and challenging cases, including the prosecutions of Aaron Swartz and Bradley Manning, the contempt citation against Lavabit, and class actions against Apple, Facebook, and Google. 
 
Students will have the option of completing a series of short written assignments or one research paper. After the term begins, students accepted into the course can transfer from section (01) into section (02), which meets the R requirement, with consent of the instructor. 
 
A background in computer science is not required for this course. 

Winter 2014

Communication Law: Broadcast and Cable Television
Instructor: Barbara van Schewick
Most people watch television on a regular basis (although not necessarily on TV). Television entertains, delivers the news, and provides an important forum for debating political issues. Focusing on communications law and first amendment law, the course will discuss how and why regulation shapes what we see on TV, and how it attempts to ensure that television can fulfill its functions for society. For example, why is cable television so expensive? Why can comedians swear on cable TV, but not on broadcast TV? Should regulators care as much about violence as they do about indecency? Can we trust the market to give the audience what it wants? Will the market provide content that is in the public interest, such as local news or educational programming, or do regulators need to intervene? Should we care if media outlets are increasingly owned by a few small conglomerates? And how does the Internet affect the need for ownership regulation? The course mostly focuses on the U.S., but highlights developments elsewhere where appropriate. 

Modern Surveillance Law
Instructors: Jennifer Granick and Richard Salgado

This seminar is an in depth look at modern government surveillance policies and practices. Taught by Richard Salgado, director of law enforcement and information security at Google, Inc, and a former prosecutor at the U.S. Department of Justice's Computer Crime and Intellectual Property Section and Jennifer Granick, Stanford Center for Internet and Society's Civil Liberties Director, the course will cover the technology, law and policy of government surveillance of the Internet and other communications technologies. We will focus on U.S. law, but other nations' interactions with U.S. companies will be addressed. Technologies covered will include wiretapping, stored data collection and mining, location tracking and drones and legal regimes will include the Fourth Amendment, Electronic Communications Privacy Act, the USA Patriot Act, CALEA and the Foreign Intelligence Surveillance Act. 

Spring 2013

Privacy and Technology in Law and Practice
Instructors: Jennifer Granick / Aleecia McDonald
In this lecture course, students will identify instances in which new technologies have changed the likelihood that information about individuals will be created, collected, stored, analyzed, and disclosed to both private entities and to governments. We will look at the internet, mobile platforms and drones, among other developments. The class will identify both privacy defeating and privacy enhancing technologies, and consider how legal regimes and policy choices as well as technological design can mitigate or highten the risk of unwanted information disclosure. Assignments will ask for both descriptive and normative analysis. Students will examine the interrelationship between privacy, security, free speech, innovation and other public goods and be asked to debate particular policy outcomes in light of competing values about information privacy with regard to both the public and private sector. We will cover issues such as Do-Not-Track and online advertising, data security breaches, consumer notice, privacy by design, corporate best practices, Federal Trade Commission enforcement, workplace monitoring, and law enforcement and national security access. 

Communications Law: Internet and Telephony
Instructor: Barbara van Schewick
New developments in Internet and other technology enable new forms of innovation, content production and political participation that have the potential to significantly transform our economy, society and democratic system. This transformation will not happen automatically. Technical, legal and economic choices will affect whether the Internet can realize its potential or not. Communications law - the law that governs both the physical infrastructures for communications services such as cable and telephone networks as well as the communication services which are provided over these infrastructures - has become one of the most important arenas in which choices affecting the future of the information society are made. The debates over network neutrality (whether network providers should be able to restrict the applications and content that their Internet service customers can access over the network) or the right ways to foster broadband deployment are examples of this trend. At the same time, the Internet's ability to support a variety of different communications services such as telephony, information services or video over the same physical network infrastructure challenges the existing communications law, which is based on the assumption that different physical infrastructures offer different communications services. What are the features of the Internet that are at the core of its economic, social, cultural and political potential? What can regulators and legislators do to allow the Internet to realize this potential? And how can they allow applications like Internet telephony and traditional telephony to coexist without giving one an unfair advantage over the other? The course will address how current law deals with these questions, but also explore what regulators and legislators may do to better deal with the challenges posed by the Internet. The course is mostly focused on the US, but highlights developments elsewhere where appropriate. Students may take Communications Law: Internet and Telephony and Communications Law: Broadcast and Cable Television in any order (neither is a prerequisite for the other). There are no prerequisites for this course. No technical background is required.

Winter 2013

Antitrust
I
nstructor: Barbara van Schewick
This course will explore the basic concepts in antitrust and competition. We will examine cartels, monopolization, vertical restraints and mergers. The course is open to GSB students and graduate students in the Economics Department. 

 

Autumn 2012

Intellectual Property Advanced Topics: The Future of Online Music and Online Video
I
nstructors: Barbara van Schewick and Paul Goldstein
The online music and online video industries are undergoing profound changes. In online video, the rise of Netflix and Hulu are just two examples of this trend. This class will explore how the different technical, economic or regulatory decisions we make today will interact to shape the future of these industries, and what the different options under consideration will mean for specific companies in this space. Class sessions will consist of a mix of guest lectures by industry leaders and class discussions of the assigned readings. Throughout the class, the students will work in interdisciplinary groups on problems facing specific companies in the online and online video industry today. For the final project, the groups will address specific policy problems from the perspective of a specific company, with different groups representing companies on different sides of an issue. The class is open to law students and students from other parts of the university.

Legal Aspects of Autonomous Driving
Instructor: Bryant Walker Smith
Self-driving cars and trucks are rapidly entering the mainstream. They raise key legal and policy questions, which this seminar explores through source materials (from case law to treaties), academic scholarship, and industry speakers. Topics include state and federal regulation, public and private standards, liability and insurance, privacy and security, and social norms. Because the course is intended to meaningfully advance -- rather than to merely present -- legal analysis of this emerging technology, participants will be expected to actively contribute during class and to critically reflect through either regular essays for W credit or a final research paper for R credit. 

Winter 2012

Cyberlaw/Fair Use Clinic: Advanced
Instructor: Anthony Falzone
In this hands-on, project-oriented seminar, students will work on a wide range of cyberlaw projects with lawyers from the Center for Internet and Society's Fair Use Project and with lawyers from the Electronic Frontier Foundation. There will be significant faculty-student interactions through meetings to discuss the projects and an associated bi-monthly discussion seminar covering advanced cyberlaw topics.

This clinic provides law students with the opportunity to represent clients in cutting-edge issues of intellectual property and technology law, in the public interest. Through the hands-on experience of representing clients (under the supervision of the faculty) in various fora, students will learn professional responsibility and advocacy skills, substantive law and procedural rules related to their projects, and will examine the concept of the public interest in intellectual property and technology law. Clients will likely vary widely, and may be individual artists; technologists; non-profit institutions; coalitions; etc. In the past, students have drafted amicus briefs, counseled nonprofits on public-interest initiatives, created a patent licensing scheme, represented independent and documentary filmmakers who are pursuing legislation in Congress, and counseled artists developing new technology-based art forms, among other projects. Thus, the skills each student learns will also vary according to project. In the classroom component, we will explore public interest practice in tech law in various fora, and spend significant time on student projects.

You are expected to commit approximately 20 hours per week (variable) to clinic work.

Elements used in Grading: Compliance with office procedures, dependability, relationship with clients and students, instructor and supervisor, productivity, responsibility, class participation, quality of work, development of lawyering skills, improvement shown.

Spring 2012
Intellectual Property Advanced Topics:The Future of Online Music and Online Video
Instructors: Barbara van Schewick and Paul Goldstein

The online music and online video industries are undergoing profound changes. In online video, the rise of Netflix and Hulu are just two examples of this trend. This class will explore how the different technical, economic or regulatory decisions we make today will interact to shape the future of these industries, and what the different options under consideration will mean for specific companies in this space. Class sessions will consist of a mix of guest lectures by industry leaders and class discussions of the assigned readings.

Throughout the class, the students will work in interdisciplinary groups on problems facing specific companies in the online and online video industry today. For the final project, the groups will address specific policy problems from the perspective of a specific company, with different groups representing companies on different sides of an issue.

The class is open to law students and students from other parts of the university.

Privacy and Technology
Instructor: Ryan Calo

This seminar explores U.S. privacy law through the lens of American experiences with, and perceptions of, technology. Samuel Warren and Louis Brandeis open their seminal article The Right to Privacy with a vivid description of technologic change. The reader learns that "recent inventions" such as "instantaneous photographs … have invaded the sacred precincts of private and domestic life" and how "numerous mechanical devices threaten to make good the prediction that 'what is whispered in the closet shall be proclaimed from the house-tops.'" The examples change, but countless law review articles, court opinions, floor debates, and legislative preambles also begin by describing a technological shift thought to necessitate a change in regulation or interpretation. The evolution of American privacy law seems inexorably bound up in a story about technology.

What role does our perception of technology play in establishing or reforming statutory, common, and constitutional privacy law? Can the way we conceptualize technology shed light on the disconnect between how people talk about privacy and behave in practice? Can it help explain the lag many perceive between the evolution of privacy law and the pace of technologic change? Through a series of readings that include case law, statutes, and academic scholarship, seminar participants will gain a working understanding of American privacy law by examining its intersection with our individual and collect experiences of technology.

Autumn 2011
Freedom of Speech in a Digitally Interconnected World
Instructor: Andrew McLaughlin

This course will examine differing national approaches to the regulation of speech and expression, aiming at a deeper understanding of the First Amendment and its values in today's context of global interconnectedness. Americans tend to underappreciate the extent to which the First Amendment, as interpreted by our federal courts, is exceptional, both in the scope of its protections and the peculiarity of its limitations and exceptions. We also tend to equate our expansive First Amendment with democracy, and censorship with dictatorship, whereas in practice nearly all other countries, including many vibrant democracies, have implemented regimes for speech regulation that are notably more restrictive than ours. To understand why, students in this course will engage in a critical, comparative examination of the major legal, cultural, religious, and political rationales put forth for limiting individual expression, and then examine how those rationales play out in real-world legal and extra-legal state systems and tactics.

Our work will be broken into three parts. We'll start with a systematic look at the leading theories and justifications asserted to support state restrictions on citizen speech and press activities. We'll then delve into country case studies, including India, Germany, Thailand, Turkey, Australia, Iran, Russia, South Korea, France, and the UK. Finally, we'll assess the ability of conflicting national systems to coexist in the age of the Internet, which is both increasingly significant as a medium of individual and organized expression, and proving to be disruptive of traditional legal and non-legal state techniques for enforcing limitations.

Special Instructions: This course is open to law students and graduate students from other parts of the university. Students will have the option to write either a significant research paper or a series of weekly writing assignments. After the term begins, students accepted into the course can transfer from section (01) into section (02), which meets the R requirement, with consent of the instructor.

 


See all classes related to law, science and technology.