- tags
- Privacy Julie Cohen
Notes
Introduction
focused not only on the moral costs of militarization but also on the opportunity costs.
NOTER_PAGE: (14 . 0.40462427745664736)
deterministic claims about the way that code “is” have evolved into normative claims about the way that it should be.
NOTER_PAGE: (15 . 0.16680429397192403)
NOTER_PAGE: (15 . 0.3699421965317919)
The essence of power lies precisely in its ability to shape-shift — to elude the perfect, crystalline characterizations with which scholars have attempted to both capture and cabin its methods of operation.
NOTER_PAGE: (16 . 0.33608587943848056)
the neoliberal political orientation emphasizes not only market liberties but also a market-based approach to structuring political and social participation.
NOTER_PAGE: (18 . 0.40049545829892647)
law is not simply superstructure but rather the means through which expressions of economic ration- ality and governmentality become specific, detailed, and actionable.
NOTER_PAGE: (19 . 0.16184971098265896)
new institutional settlements that alter the horizon of possibility for protective countermovements.
NOTER_PAGE: (20 . 0.12056151940545004)
once again, critics of law’s neoliberalization have focused principally on a set of burgeoning crises for public law but have largely neglected to ask a set of more fundamental questions
NOTER_PAGE: (20 . 0.13790255986787778)
My hope is that scholars more familiar with other legal systems will undertake similar projects.
NOTER_PAGE: (20 . 0.6036333608587944)
I. PATTERNS OF ENTITLEMENT AND DISENTITLEMENT
1. Everything Old Is New Again — Or Is It?
NOTER_PAGE: (26 . 0.1486374896779521)
NOTER_PAGE: (26 . 0.6069364161849711)
evolution of modern regimes of intellectual property protection, identifying a series of profound changes that relate to both imagined justifications and patterns of exploitation and use.
NOTER_PAGE: (27 . 0.08670520231213873)
basic factors of industrial production identified by Polanyi—Iabor, land, and money—are becoming dematerialized
NOTER_PAGE: (27 . 0.13459950454170105)
NOTER_PAGE: (27 . 0.6895127993393889)
the patent and copyright regimes that evolved in the United States beginning in the late nineteenth century were increasingly optimized for facilitating industrial processes of intangible production.
NOTER_PAGE: (28 . 0.4062758051197357)
Although neither the Patent Act nor, initially, the Copyright Act gave employers rights to their employees’ creations, judge-made rules developed to validate corporate practices of asserting ownership over employee-created inventions
NOTER_PAGE: (28 . 0.4533443435177539)
aathorship of commissioned works should flow to the party that had assumed the economic risk.
NOTER_PAGE: (28 . 0.5912469033856317)
Courts rejected a long-standing rule allowing competitors to exploit “unworked” patents in exchange for a reasonable royalty, clearing the way for corporate patent owners to amass portfolios of patents
NOTER_PAGE: (28 . 0.6870355078447563)
Whereas nineteenth-century rhetoric had emphasized the public and democratic benefits to be gained from underwriting progress in science and learning, the distinctive flavor of instrumentalism that developed beginning in the mid-twentieth century focused more narrowly on incentives to production.
NOTER_PAGE: (29 . 0.45251857968620973)
NOTER_PAGE: (29 . 0.7068538398018166)
foundations for the industrial organization of cultural and technical production have shifted to facilitate amassing intangible capital at scale.
NOTER_PAGE: (30 . 0.10404624277456646)
permits drafters in certain industries to practice systematic vagueness, and firms also have learned to practice selective, patent-preempting disclosure
NOTER_PAGE: (30 . 0.35590421139554085)
Each of those legal fields, moreover, values certainty and predictability in asset definition, and that overarching need shapes the way firms assert intellectual property claims, disfavoring doctrines perceived as vague and uncertain.
NOTER_PAGE: (30 . 0.6011560693641618)
Brand Values
NOTER_PAGE: (31 . 0.3996696944673823)
The growing prominence of brands and branding during the first half of the twen- tieth century reflected both the proliferation of mass-manufactured, prepackaged goods and the efforts of the nascent marketing industry.
NOTER_PAGE: (31 . 0.6564822460776217)
in any case marketers sought not only to understand tastes but also to shape them.
NOTER_PAGE: (32 . 0.4393063583815029)
Although courts and commentators initially characterized infringement lawsuits against down-market counterfeits as doctri- nally and economically baseless, mark owners eventually convinced courts to find infringement based on a novel theory of “post-sale confusion,”
NOTER_PAGE: (33 . 0.45582163501238643)
supplementary entitlements in brands have proliferated in ways that tacitly acknowledge and reinforce the expressive power of capital.
NOTER_PAGE: (33 . 0.7241948802642444)
shift toward a more diverse and differentiated landscape of intangible intellectual property entitlements.
NOTER_PAGE: (34 . 0.16845582163501238)
New (and Old) Legal Hybrids
NOTER_PAGE: (34 . 0.2246077621800165)
New types of entitlements—some legislatively decreed and others judicially invented—have mushroomed around the edges of existing entitlement schemes, blurring their borders and extending their reach.
NOTER_PAGE: (34 . 0.3352601156069364)
powerful new “law of look and feel” for the outputs of industrial designers.
NOTER_PAGE: (35 . 0.07018992568125516)
reinforced and expanded trade secrecy protections
NOTER_PAGE: (35 . 0.10239471511147812)
The regulatory disclosures required to bring certain types of biomed- ical and biotechnology innovations to market work at cross purposes to strategies based on secrecy.
NOTER_PAGE: (35 . 0.3393889347646573)
unable to marshal substantial empirical evidence
NOTER_PAGE: (35 . 0.5871180842279108)
this strikes me as untrue, I'm sure I've seen some such research. probably while looking at TRIPS?
opponents of intangible entitlements’ expan- sion and proliferation have been unable to disrupt the powerful syllogism linking propertization with increased progress.
NOTER_PAGE: (35 . 0.7208918249380677)
Labor, Land, and Money Reimagined
NOTER_PAGE: (36 . 0.0726672171758877)
NOTER_PAGE: (36 . 0.15772089182493806)
NOTER_PAGE: (36 . 0.24029727497935588)
many of the legal arrangements now under threat trace their origins to Polanyi’s protective countermove- ment. Disruptive business models route around the modern versions of the regulatory constraints put in place to mitigate the harshest consequences of commodification
NOTER_PAGE: (36 . 0.342691990090834)
While debates about the legal status of data and algorithms as property have been frozen in stalemate, the landscape of de facto appropriation and enclosure is in rapid and productive motion.
NOTER_PAGE: (36 . 0.5053674649050371)
Money without Investment
NOTER_PAGE: (36 . 0.6284062758051197)
the idea of money has grown increasingly notional and has become increasingly detached from the real-world activities that it was designed to enable.
NOTER_PAGE: (36 . 0.7052023121387283)
Because many cashless payment systems operate outside the traditional banking system and its associated overlay of in- surance and fraud-protection rules, however, they expose consumers who now take those protections for granted to a variety of hidden risks.
NOTER_PAGE: (39 . 0.2526837324525186)
NOTER_PAGE: (39 . 0.35177539223781995)
echoes of What Privacy is For
Understood simply as a new and more efficient way to authenticate transactions and move money across borders, blockchain also seems more likely to reinforce the dominance of finance capital than to disrupt it.
NOTER_PAGE: (39 . 0.6011560693641618)
an important theme running through the new language of financialization, and a common denominator driving all of the interme- diation strategies discussed previously, is privileged access to flows of data about trades and transactions.
NOTER_PAGE: (40 . 0.6705202312138728)
Labor without Employment
NOTER_PAGE: (41 . 0.07431874483897605)
Gig Economy
NOTER_PAGE: (41 . 0.42857142857142855)
NOTER_PAGE: (41 . 0.7489677952105698)
NOTER_PAGE: (42 . 0.26837324525185796)
NOTER_PAGE: (42 . 0.3534269199009083)
People have needs for sta- bility and support that the system of wage labor for employers and its associated regulatory overlay addressed—never fully or perfectly, but at least deliberately and systematically.
NOTER_PAGE: (44 . 0.08340214698596202)
The extension of gig-economy ventures into developing countries has begun to exert extreme downward pressure on the earnings of user-workers located in developed countries.
NOTER_PAGE: (44 . 0.28323699421965315)
Land without Presence
NOTER_PAGE: (45 . 0.07184145334434351)
NOTER_PAGE: (45 . 0.17671345995045415)
uring the 1990s and 2000s, secondary market demand came to dominate the mortgage lending landscape.
NOTER_PAGE: (45 . 0.5103220478943022)
assume, then that the ordinary rules of contract and real property law simply provided the neutral background
NOTER_PAGE: (46 . 0.0685383980181668)
ractices of mortgage resale and securitiza- tion that today are regarded as routine would not have been possible without prior acceptance of the idea of owning debt obligations as assets.
NOTER_PAGE: (46 . 0.15524360033030551)
NOTER_PAGE: (46 . 0.3575557390586292)
the underwriters who concocted the securities came to view the transaction costs imposed by local real property recording offices as a drag on financial innovation.
NOTER_PAGE: (46 . 0.5383980181668042)
In fact, the MERS system and its participants did not maintain good internal records of member bank trades.
NOTER_PAGE: (47 . 0.0685383980181668)
NOTER_PAGE: (47 . 0.43600330305532614)
NOTER_PAGE: (48 . 0.21800165152766307)
NOTER_PAGE: (48 . 0.3666391412056152)
NOTER_PAGE: (48 . 0.5028901734104047)
NOTER_PAGE: (48 . 0.6705202312138728)
Prologue: Access and Legibility
NOTER_PAGE: (49 . 0.15854665565648224)
NOTER_PAGE: (49 . 0.23369116432700246)
NOTER_PAGE: (50 . 0.42031379025598675)
NOTER_PAGE: (51 . 0.20313790255986786)
NOTER_PAGE: (53 . 0.24525185796862095)
The platform economy rewrites all parts of that story, reshaping the conditions of entry, the scope for disruption, and the sources and manifestations of economic power. Platforms do not simply enter markets, they replace (and rematerialize) them.
NOTER_PAGE: (53 . 0.6044591246903386)
NOTER_PAGE: (54 . 0.4384805945499587)
NOTER_PAGE: (55 . 0.14946325350949627)
Points of Access, Points of Control
NOTER_PAGE: (55 . 0.3129644921552436)
NOTER_PAGE: (55 . 0.4880264244426094)
NOTER_PAGE: (55 . 0.5706028075970272)
NOTER_PAGE: (55 . 0.7068538398018166)
private reordering of even the most bedrock legal rights and obligations
NOTER_PAGE: (55 . 0.7382328654004954)
The combination of scale, asserted contractual control, and technical control enacts enclosure of both data and algorithmic logics as an inexorable reality
NOTER_PAGE: (56 . 0.34929810074318746)
Facebook offers advertisers placement precisely targeted to the inferred needs and desires of its billions of users but never direct access to the data or algorithms themselves.
NOTER_PAGE: (56 . 0.5028901734104047)
traditional intellectual property rights play helpful but only secondary roles in the process of de facto propertization,
NOTER_PAGE: (56 . 0.671345995045417)
2. The Biopolitical Public Domain
NOTER_PAGE: (59 . 0.14616019818331957)
NOTER_PAGE: (59 . 0.31048720066061103)
NOTER_PAGE: (59 . 0.4104046242774566)
typically considers such activities as raising problems of privacy or data protection, and typically has focused on regulation of such activities after the fact. But the legal framework within which collection, processing, and use of per- sonal data occur is not simply a reactive framework, nor is it simply concerned with the relationship between commercial or law enforcement activities and privacy.
NOTER_PAGE: (59 . 0.47729149463253506)
Contemporary practices of personal data extraction and processing constitute a new type of public domain, which I will call the biopolitical public domain: a source of raw materials that are there for the taking and that are framed as inputs to particular types of productive activity
NOTER_PAGE: (59 . 0.6969446738232865)
public domain made up of those materials is biopolitical —rather than, say, personal or informational—because the productive activities that it frames as desirable are activities that involve the description, processing, and management of populations, with consequences that are productive, distributive, and epistemological.
NOTER_PAGE: (60 . 0.08505367464905036)
construct of a public domain both designates particular types of resources as available and suggests particular ways of putting them to work.
NOTER_PAGE: (60 . 0.20231213872832368)
constitutes personal data as available and potentially valuable:
NOTER_PAGE: (60 . 0.3203963666391412)
NOTER_PAGE: (60 . 0.3707679603633361)
Logics of Abundance and Extraction
NOTER_PAGE: (60 . 0.6581337737407101)
The process of constructing a public domain begins with an act of imagination that doubles as an assertion of power.
NOTER_PAGE: (60 . 0.6919900908340214)
The copyright and patent regimes that emerged during the nineteenth century in Europe and the United States depend centrally on the idea of the intellectual public domain as a repository of raw materials
NOTER_PAGE: (61 . 0.2510322047894302)
the idea of a public domain thus both emphasizes and assumes two conditions. The first is abundance.
NOTER_PAGE: (61 . 0.3707679603633361)
The second condition that the idea of a public domain presumes is the absence of prior claims to the resource
NOTER_PAGE: (61 . 0.5747316267547481)
their traditions of occupancy and use were not understood as ownership claims
NOTER_PAGE: (61 . 0.6061106523534269)
intellectual property regimes traditionally have taken a dismissive stance toward those claiming interests in folk art and traditional knowledge.
NOTER_PAGE: (61 . 0.6218001651527663)
constitute the ever-expanding universe of personal data as a terra nullius for enterprising data developers,
NOTER_PAGE: (62 . 0.3707679603633361)
NOTER_PAGE: (62 . 0.5722543352601156)
far-reaching reorganizations of sociotechnical activity to facilitate harvesting personal data “in the wild” and to mark such data, once collected, as owned.
NOTER_PAGE: (63 . 0.06936416184971098)
Prologue: Fair Credit Reporting and Walled Gardens
NOTER_PAGE: (63 . 0.12716763005780346)
data broker industry originated in practices of customer profiling and target marketing developed by and for members of the financial services industries—and in the empty spaces left by incomplete legal regulation of those practices.
NOTER_PAGE: (63 . 0.2931461601981833)
Digital Breadcrumbs
NOTER_PAGE: (65 . 0.07101568951279934)
NOTER_PAGE: (66 . 0.1180842279108175)
NOTER_PAGE: (67 . 0.32049180327868854)
restricting the use of so-called spyware failed repeatedly. Merchants and communications providers that deployed cookies for what they saw as legitimate purposes balked at definitional language extending labels such as “spyware” and “cybertrespass” to their own activities.
NOTER_PAGE: (67 . 0.42295081967213116)
NOTER_PAGE: (67 . 0.519672131147541)
FTC attempted to fill the regulatory gap by asserting its general authority to police unfair and deceptive practices in commerce. As a practical matter, this meant that the construct of no- tice and consent became the dominant regulatory framework
NOTER_PAGE: (67 . 0.6573770491803279)
The Sensing Net
NOTER_PAGE: (68 . 0.30655737704918035)
The radical expansion of surveillance capability via cookie technology was an unin- tended consequence of the search fora viable protocol for commercial transactions, but subsequent continuing extensions of surveillance capability have been more de- liberate.
NOTER_PAGE: (68 . 0.33524590163934426)
text messages, internet searches, social networking updates, personalized news and en- tertainment feeds, and interactions with dedicated apps for traffic, transit, shopping, investment and personal finance, fitness, and much more.
NOTER_PAGE: (68 . 0.6057377049180328)
Transit passes and highway toll transponders record daily travels; smart home thermostats, alarm systems, and building access cards create digital traces of comings and goings; special-purpose “wearables” collect and upload biometric data
NOTER_PAGE: (69 . 0.18278688524590164)
NOTER_PAGE: (69 . 0.4901639344262295)
NOTER_PAGE: (69 . 0.5680327868852459)
The conception of consent emerging from that default condition is unprece- dented in the law of contracts or any other body of law.
NOTER_PAGE: (69 . 0.7221311475409836)
In the contemporary networked marketplace, consent flows from status, not conduct, and attaches at the moment of marketplace entry. Under those circumstances, the lawyerly emphasis on such things as disclosure, privacy dashboards, and competition over terms becomes a form of Kabuki theater that distracts both users and regulators from what is really going on.
NOTER_PAGE: (70 . 0.0680327868852459)
work both to generate large quantities of data and to make public domain status the default condition for the data that are generated.
NOTER_PAGE: (70 . 0.1721311475409836)
seeming bounty depends heavily on both technical design and user agency. The sublimation of consent within the sensing net is a technique for supply chain management and is designed to ameliorate those uncertainties. It operates to call the biopolitical public domain into being and to define it as a zone of free and productive appropriation.
NOTER_PAGE: (70 . 0.28442622950819674)
The Postcolonial Two-Step
NOTER_PAGE: (70 . 0.39344262295081966)
the postcolonial two-step: initial extensions of surveillance via a two-pronged strategy of policing and development, followed by a step back as the data harvests are consolidated and absorbed.
NOTER_PAGE: (70 . 0.6049180327868853)
Secrecy as Enclosure
NOTER_PAGE: (73 . 0.12622950819672132)
frustrates the most basic efforts to understand how the internet search, social networking, and consumer finance industries sort and categorize individual consumers.
NOTER_PAGE: (73 . 0.17049180327868851)
NOTER_PAGE: (73 . 0.23688524590163934)
vague and general responses and claiming inability to locate requested documents.
NOTER_PAGE: (73 . 0.4024590163934426)
Realizing the profit potential of commercial surveillance activity requires practices that mark data flows with indicia of ownership.
NOTER_PAGE: (73 . 0.4516393442622951)
NOTER_PAGE: (73 . 0.6688524590163935)
al- though intellectual property theory places “facts” permanently in the public domain, intellectual property practice traditionally has recognized a need for gap-filling pro- tection in certain industries, and has looked to trade secrecy and contract law to fulfill that need.
NOTER_PAGE: (74 . 0.10163934426229508)
difference between public domain and commons as resource governance strategies.
NOTER_PAGE: (74 . 0.26885245901639343)
From Raw to Cooked: A Political Economy of Patterns and Predictions
NOTER_PAGE: (74 . 0.6622950819672131)
Data Cultivars
NOTER_PAGE: (75 . 0.3622950819672131)
NOTER_PAGE: (75 . 0.40327868852459015)
NOTER_PAGE: (75 . 0.5540983606557377)
equally inaccurate to say that the data collected for processing just happen to be there. The flexible and adaptive techniques used within contemporary surveillance environments are—and are designed to be—productive of particular types of infor- mation.
NOTER_PAGE: (76 . 0.22131147540983606)
NOTER_PAGE: (76 . 0.7057377049180328)
power becoming ontological: power expressed not through hegemonic control of meaning but rather through techniques for making the crowd known to itself.
NOTER_PAGE: (76 . 0.7418032786885246)
NOTER_PAGE: (77 . 0.2540983606557377)
Data Refineries
NOTER_PAGE: (77 . 0.36065573770491804)
NOTER_PAGE: (77 . 0.5049180327868853)
make human behaviors and revealed preferences calculable, predictable, and profitable in aggregate.
NOTER_PAGE: (78 . 0.3368852459016393)
Data doubles are, in other words, biopolitical in character: they are designed to enable the statistical construction, management of, and trade in populations.
NOTER_PAGE: (78 . 0.48770491803278687)
in the era of ascendant neoliberal governmentality, it is data refineries’ very privateness that gives their outputs normative and epistemological authority.
NOTER_PAGE: (78 . 0.7065573770491803)
operate to conceal the extent of our dependence on monoculture and to en- trench that monoculture in ways that make addressing its external effects on human and environmental health extremely difhicult.
NOTER_PAGE: (79 . 0.28688524590163933)
Data Markets
NOTER_PAGE: (79 . 0.3909836065573771)
question of what might come to qualify as a good or service and that of how transactions might be made intelligible as exchanges.
NOTER_PAGE: (79 . 0.489344262295082)
subject matter traded in markets must be conceived as a “calculable good”:
NOTER_PAGE: (79 . 0.671311475409836)
distributed valuation of calculable goods.
NOTER_PAGE: (80 . 0.15327868852459017)
commonly understood institutional struc- ture within which exchanges can occur.
NOTER_PAGE: (80 . 0.23934426229508196)
ublic-facing rhet- oric about personal data harvesting and processing is most usefully understood in an analogous way, as an example of marketing-speak
NOTER_PAGE: (80 . 0.6868852459016394)
NOTER_PAGE: (81 . 0.4204918032786885)
Consuming Consumers
NOTER_PAGE: (82 . 0.06967213114754098)
The data refinery is only secondarily an apparatus for producing knowledge; it is principally an apparatus for producing wealth.
NOTER_PAGE: (82 . 0.17459016393442622)
The overriding goal of data refineries and data markets is not understanding but rather predictability in pursuit of profit.
NOTER_PAGE: (82 . 0.2778688524590164)
NOTER_PAGE: (82 . 0.6155737704918033)
The Moore court, however, did not hold that human tissue could not be the subject of any proprietary claims; rather, it contrasted Moore’s claim to that of the research scientists who had labored to develop the patentable byproduct.
NOTER_PAGE: (83 . 0.23278688524590163)
the court’s famous anti-commodification opinion articulated a powerful logic of productive appropriation
NOTER_PAGE: (83 . 0.319672131147541)
The Power of Appropriative Privilege
NOTER_PAGE: (84 . 0.07049180327868852)
subordinates considerations of human well-being and human self-determination to the priorities and values of powerful economic actors.
NOTER_PAGE: (84 . 0.4262295081967213)
NOTER_PAGE: (84 . 0.4565573770491803)
Reimagining consumer markets as sites of unilateral technosocial sorting undermines both their utility as markets and their legitimacy as decentralized governance processes.
NOTER_PAGE: (84 . 0.6262295081967213)
NOTER_PAGE: (86 . 0.14754098360655737)
Amplifying Collective Unreason
NOTER_PAGE: (97 . 0.15655737704918032)
NOTER_PAGE: (98 . 0.3360655737704918)
NOTER_PAGE: (100 . 0.47950819672131145)
NOTER_PAGE: (100 . 0.5672131147540984)
NOTER_PAGE: (100 . 0.6508196721311476)
NOTER_PAGE: (101 . 0.1819672131147541)
NOTER_PAGE: (101 . 0.36885245901639346)
Innovation Jumps the Shark
NOTER_PAGE: (101 . 0.47540983606557374)
position innovation and protective regulation as intrac- tably opposed.
NOTER_PAGE: (101 . 0.5737704918032787)
in- novation as an autonomous and inevitably beneficial process that is the natural re- sult of human liberty.
NOTER_PAGE: (102 . 0.2540983606557377)
regulatory regimes have long endorsed the precautionary principle, which dictates caution in the face of as-yet-unknown and potentially significant risks. Importantly, rather than stifling “innovation,” the precautionary approach is widely recognized as creating incentive effects
NOTER_PAGE: (103 . 0.06967213114754098)
NOTER_PAGE: (103 . 0.5557377049180328)
From Persuasion to Experimentation
NOTER_PAGE: (104 . 0.6622950819672131)
The Most Important Law
NOTER_PAGE: (108 . 0.27295081967213114)
Identity and Authentication in the Cloud
NOTER_PAGE: (112 . 0.2442622950819672)
The Culture of Capture
NOTER_PAGE: (114 . 0.6893442622950819)
NOTER_PAGE: (115 . 0.13442622950819672)
NOTER_PAGE: (117 . 0.5008196721311475)
The communicative spaces produced by platform-based, massively intermediated information infrastructures are not neutral spaces. They are spaces optimized for eliciting automatic, instinctual reactions and for engendering, amplifying, and exploiting cascade-based diffusion, polarization, and relativization. Public dis- course in a democratic society is, and should be, contentious and unruly, but thereis also a difference between bending and breaking.
NOTER_PAGE: (118 . 0.23524590163934425)
4. Open Networks and Closed Circuits
NOTER_PAGE: (119 . 0.14672131147540984)
true sovereignty consists in the power to say when the excep- tion exists.'
NOTER_PAGE: (119 . 0.6286885245901639)
NOTER_PAGE: (120 . 0.07131147540983607)
NOTER_PAGE: (120 . 0.1680327868852459)
NOTER_PAGE: (120 . 0.5032786885245901)
Dangerous Knowledge
NOTER_PAGE: (122 . 0.07049180327868852)
expert training in human rights advocacy could work to legitimize dangerous or- ganizations."” By traditional First Amendment standards, the argument was laugh- able; rhetorical battles over legitimacy are exactly the sorts of contests that belong in the realm of persuasion. The majority accepted it uncritically
NOTER_PAGE: (125 . 0.2180327868852459)
As domains of ex- pertise far removed from violence and lawlessness were recast as inextricably entwined with threats to the body politic, government practices that the courts of an earlier era would have recognized instantly as overbroad and politically suspect came to seem both apolitical and existentially justified.
NOTER_PAGE: (125 . 0.5368852459016393)
Other People’s Property
NOTER_PAGE: (126 . 0.06885245901639345)
State Secrets and State Secrecy
NOTER_PAGE: (128 . 0.1762295081967213)
Struggles over Facilitation and Control
NOTER_PAGE: (131 . 0.6549180327868852)
Finding and Paying for Contraband
NOTER_PAGE: (133 . 0.2081967213114754)
NOTER_PAGE: (133 . 0.26967213114754096)
Circumventing Digital Barriers
NOTER_PAGE: (136 . 0.5098360655737705)
series of court rulings interpreting the provisions to bar the development of unauthorized devices for rendering content, even if the content itself was lawfully acquired, gives copyright holders and their licensed tech- nology developers comprehensive de facto control over the design and function- ality of digital media players, video recorders, and gaming systems.
NOTER_PAGE: (137 . 0.17131147540983607)
fore- close unauthorized experimentation and innovation of all sorts.
NOTER_PAGE: (137 . 0.6213114754098361)
software copyright owners typically structure end-user transactions as licenses
NOTER_PAGE: (138 . 0.2721311475409836)
Keeping Unauthorized Secrets
NOTER_PAGE: (139 . 0.13934426229508196)
NOTER_PAGE: (147 . 0.46229508196721314)
NOTER_PAGE: (148 . 0.0680327868852459)
NOTER_PAGE: (148 . 0.3016393442622951)
II. PATTERNS OF INSTITUTIONAL CHANGE
NOTER_PAGE: (150 . 0.19983484723369116)
in institutional processes structured by procedural rules, the “haves” tend to come out ahead because, as repeat players with disposable resources to spare, they can play for rules in addition to results.!
NOTER_PAGE: (150 . 0.699421965317919)
5. The End(s) of Judicial Process
NOTER_PAGE: (154 . 0.14781172584640792)
the judicial system now seems to function principally to funnel disputes toward settlement.
NOTER_PAGE: (154 . 0.5483071841453344)
NOTER_PAGE: (155 . 0.18637724550898205)
Managerialism is not simply an orientation but rather a flourishing discipline that has been called “the first neo-liberal science.”®
NOTER_PAGE: (155 . 0.5868263473053893)
NOTER_PAGE: (155 . 0.687125748502994)
Administration
NOTER_PAGE: (156 . 0.6541916167664671)
Who's Harming Who? Legal Constructions of Injury and Justiciability
NOTER_PAGE: (157 . 0.14670658682634732)
would-be plaintiff must establish “injury in fact,”
NOTER_PAGE: (157 . 0.2312874251497006)
NOTER_PAGE: (157 . 0.43413173652694614)
propositions about harm, imminence, causal connection, and redressability rest on tightly constructed syllogisms that verge on circularity
NOTER_PAGE: (157 . 0.5179640718562875)
courts function principally to discipline deviations from marketplace norms rather than to correct more sys- tematic marketplace excesses.
NOTER_PAGE: (157 . 0.719311377245509)
Concreteness and the Problem of Intangibiiity
NOTER_PAGE: (158 . 0.2732035928143713)
NOTER_PAGE: (158 . 0.4476047904191617)
One certainly could do at least as well (if not better) at valuing and compensating privacy injury.
NOTER_PAGE: (158 . 0.720059880239521)
both particularity and concreteness are so- cially constructed attributes.
NOTER_PAGE: (160 . 0.2687125748502994)
Imminence and the Problem of Risk
NOTER_PAGE: (160 . 0.5134730538922156)
courts have been consistently more receptive to risk-based reasoning about injury to dig- ital property interests.
NOTER_PAGE: (161 . 0.721556886227545)
NOTER_PAGE: (162 . 0.4041916167664671)
many instances of payment fraud and identity theft do not stem from mass data breaches. Rather, they are the foreseeable results of design choices that privilege convenience and speed over data integrity and security.
NOTER_PAGE: (162 . 0.48877245508982037)
framing the data breach or the exposure toa chemical with a known risk profile as the exception warranting emergency response has enabled courts to ignore the extent to which background norms and design practices work to enshrine vulnerability as a marketplace norm.
NOTER_PAGE: (162 . 0.5531437125748503)
Traceability and the Problem of Causation
NOTER_PAGE: (162 . 0.6923652694610779)
NOTER_PAGE: (164 . 0.22005988023952097)
ever more intense political and ideological pushback against the very idea of broadly distributed liability
NOTER_PAGE: (164 . 0.36976047904191617)
NOTER_PAGE: (165 . 0.34206586826347307)
Outsourced Production: Boilerplate and Beyond
NOTER_PAGE: (166 . 0.3944610778443114)
procedural devices that are designed to remove cer- tain kinds of disputes and ancillary knowledge production issues from the judicial system and assign responsibility for managing them to other actors.
NOTER_PAGE: (166 . 0.4176646706586827)
courts have become increasingly willing to enforce boilerplate clauses that constrain access to judicial process.
NOTER_PAGE: (166 . 0.718562874251497)
new generation of firms deploys a (radically reenvisioned) concept of privity to keep consumers and workers close, invoking narratives about consent to bar them from asserting a variety of claims that the law otherwise might support. As in the data sensing and harvesting arrangements studied in Chapter 2, the underlying conception of individual agency is vanishingly thin, consisting of little more than the ability to decline a transaction or employment relationship.
NOTER_PAGE: (167 . 0.25299401197604793)
As a practical matter, boilerplate waivers effectively instantiate private regulation
NOTER_PAGE: (167 . 0.38922155688622756)
freezes the gradual, iterative evolution of legal doctrine.
NOTER_PAGE: (167 . 0.437125748502994)
The lens of managerialism, however, suggests a complementary perspective that situates boilerplate waivers of judicial process within the contemporary turn to outsourcing in the interest of lean and nimble production.
NOTER_PAGE: (167 . 0.5014970059880239)
rely on market-based shareholder action as the principal disciplinary mechanism.
NOTER_PAGE: (168 . 0.10104790419161677)
NOTER_PAGE: (168 . 0.4041916167664671)
For the vast majority of consumers who become involved in disputes with providers of goods and services, the first and last stop is the provider’s internal process
NOTER_PAGE: (168 . 0.5538922155688623)
situate the systematic decentering of litigation for certain categories of disputes within the neo-Polanyian framework of institutional change
NOTER_PAGE: (170 . 0.48727544910179643)
Flexible Production: Aggregate Litigation Reconsidered
NOTER_PAGE: (170 . 0.6833832335329342)
aggregation and management of claims for asserted large-scale harm.
NOTER_PAGE: (170 . 0.7110778443113773)
The courts and Congress have systematically restricted access to class action procedures, and those procedures also have proved insufficiently adaptable to new kinds of claims for networked, intangible harm.
NOTER_PAGE: (171 . 0.23727544910179643)
Class complaints asserting broader, structural theories of civil wrong- doing not specifically delineated by statute face an uphill battle to both certification and admission of statistical evidence.
NOTER_PAGE: (171 . 0.437125748502994)
NOTER_PAGE: (172 . 0.10179640718562875)
NOTER_PAGE: (172 . 0.690119760479042)
adept at incorporating consent decree compliance into their regular business practices with only minimal disruption.
NOTER_PAGE: (173 . 0.4880066170388751)
NOTER_PAGE: (175 . 0.07196029776674938)
Modular Production: Intellectual Property Experimentalism (and Its Limits)
NOTER_PAGE: (175 . 0.2555831265508685)
NOTER_PAGE: (176 . 0.1513647642679901)
Reimagining Dispute Resolution for the Era of Networked Harms and Large Numbers
NOTER_PAGE: (178 . 0.6401985111662531)
NOTER_PAGE: (181 . 0.1513647642679901)
Seeing Like a (Regulatory) State
NOTER_PAGE: (184 . 0.19520264681555005)
NOTER_PAGE: (185 . 0.06865177832919768)
Networks, Standards, and Transnational Governance Institutions
NOTER_PAGE: (213 . 0.14392059553349876)
Dominance as Hegemony: The Problem of Unchecked Authority
NOTER_PAGE: (230 . 0.11910669975186104)
NOTER_PAGE: (230 . 0.587262200165426)
Legal Standards Wars: The Problem of Regulatory Arbitrage
NOTER_PAGE: (232 . 0.3763440860215054)
Network Power and Moral Hazard: The Problem of the Authoritarian End Run
NOTER_PAGE: (236 . 0.06947890818858561)
Extreme Multistakeholderism: The Problem of Public Accountability
NOTER_PAGE: (239 . 0.6393713813068652)
Technocracy and Its Discontents: The Problem of Publicly Available Law
NOTER_PAGE: (243 . 0.06368899917287014)
reliance on technical vernaculars produces both some obvious entry barriers and some less obvious obstacles to broadly democratic policymaking.
NOTER_PAGE: (244 . 0.10421836228287841)
NOTER_PAGE: (245 . 0.3746898263027295)
NOTER_PAGE: (248 . 0.3763440860215054)
The Future(s) of Fundamental Rights
NOTER_PAGE: (249 . 0.1455748552522746)