Hollywood’s Darkest Secret: How Hollywood Employs Non-Disclosure Agreements and Confidentiality Clauses to Silence Sexual Assault Victims

hollywood-looking-down-at-los-angeles-california

By Alex Palumbo

Few disagree that 2017 became a defining “watershed” moment in the national conversation and spurred awareness of the stories and experiences of sexual assault victims. Few industries were left unaffected by this conversation by the year’s end, including the realms of politics, arts, cable news, morning news, and corporate America. Victims came forward in numbers neither seen nor heard before. As with any situation where previously hidden stories come to light, questions arise. How have we never heard these stories before? How long have the victims lived in silence? How were the perpetrators able to keep living their lives and abusing more victims? This article examines that final question specifically. How did these perpetrators continue their patterns of abuse—silencing their victims while continuing to live freely?

Continue reading

Cryptocurrencies, Tulips, and Regulation?

Picture1

By Evan Fowler

Almost 400 years ago the Dutch were really excited about tulips. In a period of three years, a tulip bulb went from a reasonable value to as much as six times the average person’s annual salary. Today we look at Dutch people selling their homes to buy tulips as crazy (we literally call that bubble “Tulip Mania”). Yet, right now we are watching South Koreans sell their homes to buy a digital “currency” – Bitcoin. Continue reading

Washington Officials Seek to Keep Net Neutral Despite FCC Repeal

network-cable-ethernet-computer-159304

By Wiley Cason

In response to the repeal of Federal Net Neutrality rules, Washington State’s governor and attorney general have both argued that state-level regulations may still prevent Internet service providers (ISPs) from discriminating amongst data offered on their networks.

Continue reading

Why Don’t We Have a Free Bluebook App?

Screen Shot 2018-01-04 at 9.35.25 AM.png

by Christine Minhee

Imagine a monastery for luddites. Outside: brain implants reverse paralysis, gene therapies cure inherited diseases, and self-driving trucks deliver personal quantum computers purchased using payments authorized by face-scanning technologies. Inside: bunioned academics with chips on their shoulders pore over their worn copies of a legal citation manual, lovingly, reverently thumbing through its 560 pages in order to confirm truths like the italicization afforded to “construed in” but not to “construing” (Rule 1.6(c)).

Their holy text is called The Bluebook, and it promises not salvation, but merely, “A Uniform System of Citation.”

The Bluebook has been skewered so many times that it should have its own shish kabob. Above the Law features posts like: Want To Work In-House? Burn Your Bluebook, It’s Sad When The Bluebook Is An Important Part Of Your Day, and Yaw Law Students Support The End Of The Bluebook. UW Law’s own write pieces entitled The Dreaded Bluebook and The Worst System of Citation Except for All the Others. And UW’s Gallagher Library has this to say:

“Think Bluebooking is challenging? So do a lot of other people! There are many different tools out there to help you create Bluebook-formatting citations. But beware–none of these tools are a perfect solution for all of your Bluebook troubles. You will need to double-check your citations to make sure they’re correct even after using one of these tools.”

(Bolded, underlined emphasis is theirs, not mine.) While some students would even call Bluebooking a form of “academic hazing,” the uniform hatred of citation is less intriguing to this author than the Harvard Law Review Association’s stubborn, litigious unwillingness to grant access to the resource in a way that is neither analog nor expensive.

A one-year, digital subscription of The Bluebook is available online for $36. A search for “Bluebook” in the App Store will yield an infuriating swarm of car-buying apps, but a quick Google search reveals The Bluebook’s availability as an iOS-only, $39.99 in-app purchase in an app called Rulebook.

And the only “free,” unaffiliated “Bluebook”—The Indigo Book—was virtually the product of happenstance. When an earlier version of The [real] Bluebook happened to fall into the public domain, an NYU law professor fought to democratize the resource in open-source format, despite The Harvard Law Review Association engaging white-shoe firm Ropes & Gray LLP to fend off the attempt. (Interestingly, the founder of the site that publishes The Indigo Book was also sued for posting the Official Code of Georgia Annotated on his website—an act the State of Georgia described as “terrorism” in its complaint.)

So, why doesn’t the Harvard Law Review publish a free web app and bring The Bluebook outside of the walled, hegemonic garden of academic publishing and into the digital age? Much has been written about copyright claims over The Bluebook, the gist being that Section 102(b) of the Copyright Act states that systems—like a uniform system of citation—cannot be protected by copyright. And according to the Harvard Law Record, a “brief glance at the history of the Internet suggests that in a world where prestige matters, where students and practitioners alike begun their practice with the Bluebook, it is certainly possible to compete with free.”

Carpenter v. United States – What future for digital privacy?

Picture1By Jabu Diagana

On November 29th, 2017, the Supreme Court will hear Carpenter v. United States and decide whether the government violates the Fourth Amendment when it accesses a third party’s record of an individual’s cell phone location without a warrant.

Carpenter was a 2011 case where the defendant was convicted of a series of interstate robberies based on his phone location data, also known as cell-site-location information (CSLI). CSLI is maintained by wireless carriers and is a record of the cell towers our phones connect to every time we transmit calls, texts, emails, or any other digital information. It usually includes the precise geolocation of each tower as well as the day and time the phone tried to connect to it. The government obtained CSLI under the Stored Communications Act (SCA), a 1986 federal statute which provides that a “governmental entity may require a provider of electronic communication service or remote computing service to disclose” records using either a warrant, or, as in Carpenter, using a court order issued “if the governmental entity offers specific and articulable facts showing that there are reasonable grounds to believe that the contents of a wire or electronic communication, or the records or other information sought, are relevant and material to an ongoing criminal investigation.”

Stated differently, the real question is to what extent does the SCA allow the government to obtain CSLI without a warrant? Or to put it more bluntly, is the SCA unconstitutional?

The Sixth Circuit holding in Carpenter turned on the “third-party doctrine.”

The third-party doctrine originated in Smith v. Maryland, a 1979 case in which the Supreme Court found that installing and using a pen register to record a phone user’s dialed numbers was not an illegal search and didn’t merit Fourth Amendment protections. According to the Smith court, although the contents of our phone conversations are protected, information about the sender or receiver is not, since they willingly disclose that information to the phone company every time they place a call. Following this logic, the Sixth Circuit first found that the third-party doctrine also authorizes the government to access CSLI as “business records” directly from a cell phone company without a warrant. Additionally, it found that when a person uses their cell phone, they should be aware that their location data is shared with the service provider and should not have any “reasonable expectation of privacy” with respect to that data.

Although Carpenter is about users’ cell locations information, the principle at issue spans over other aspects of our digital privacy, given all the data we now share with third parties through the use of smartphones, wifi hotspots, apps, and cloud-based services. As Justice Sotomayor highlighted in her United States v. Jones concurrence, whatever our current societal expectations of privacy are, our citizenry can “attain constitutionally protected status only if our Fourth Amendment jurisprudence ceases to treat secrecy as a prerequisite for privacy.”

Whether Carpenter is affirmed or overruled, the court discourse will likely revolve around the impracticability of the “third-party doctrine” in the digital age. Does sharing with one mean sharing with many? It is tempting to recommend that the court abandons the “third party” doctrine, but that may be over simplistic. If the court choose to modify it, then where should the line be drawn? should there be a difference between information voluntarily conveyed to a third party or stored on the cloud? There is also a time component to this issue.  How long is continuous tracking too long? All these questions, a priori theoretical will be fundamental to the future of our privacy.