Putting Fair Use on Display: Ending the Permissions Culture in the Museum Community

By: Rosemary Chandler Digital technologies present museums with tremendous opportunities to increase public access to the arts. But the longstanding “permissions culture” entrenched in the museum community—in which licenses are obtained for the use of copyrighted materials regardless of whether such uses are “fair,” such that licenses are not legally required—likely will make the cost of many potential digital projects prohibitively expensive. Ending the permissions culture is therefore critically important to museums as they seek to connect with diverse audiences in the Digital Age. In this issue brief, I argue that such a development will require clear and context-specific information about fair use that enables museum professionals to better understand the appropriate boundaries of fair use, and that a community-based code of best practices—like the College Art Association’s recently released Code of Best Practices for Fair Use in the Visual Arts—is likely the best means to achieve this. Download Full Article (PDF) Cite: 15 Duke L. & Tech. Rev. 60

Unprotected and Unpersuaded: The FCC’s Flawed Merger Review Procedures

By: Trey O’Callaghan In CBS Corporation v. FCC, the D.C. Circuit struck down the Federal Communication Commission’s rules for protecting confidential information that it collects during certain merger proceedings. In response, the Commission released a new order, pursuant to the Charter, Time Warner, and Bright House merger proceeding, for protecting confidential information. This iBrief analyzes the policy and legal implications of the Order, arguing that the Order is unlawful because it violates the Trade Secrets Act and notice-and-comment rulemaking requirements. Download Full Article (PDF) Cite: 15 Duke L. & Tech. Rev. 39

ICRC, NATO and the U.S. – Direct Participation in Hacktivities – Targeting Private Contractors and Civilians in Cyberspace Under International Humanitarian Law

By: Ido Kilovaty Cyber-attacks have become increasingly common and are an integral part of contemporary armed conflicts. With that premise in mind, the question arises of whether or not a civilian carrying out cyber-attacks during an armed conflict becomes a legitimate target under international humanitarian law. This paper aims to explore this question using three different analytical and conceptual frameworks while looking at a variety of cyber-attacks along with their subsequent effects. One of the core principles of the law of armed conflict is distinction, which states that civilians in an armed conflict are granted a set of protections, mainly the protection from direct attacks by the adversary, whereas combatants (or members of armed groups) and military objectives may become legitimate targets of direct attacks. Although civilians are generally protected from direct attacks, they can still become victims of an attack because they lose this protection “for such time as they take direct part in hostilities.” In other words, under certain circumstances, if a civilian decides to engage in hostile cyber activities (or “hacktivities”), they may well become a target of a direct lethal attack. I will argue that although the answer is highly nuanced and context dependent, the most

Police Body Worn Cameras and Privacy: Retaining Benefits While Reducing Public Concerns

By: Richard Lin Recent high-profile incidents of police misconduct have led to calls for increased police accountability. One proposed reform is to equip police officers with body worn cameras, which provide more reliable evidence than eyewitness accounts. However, such cameras may pose privacy concerns for individuals who are recorded, as the footage may fall under open records statutes that would require the footage to be released upon request. Furthermore, storage of video data is costly, and redaction of video for release is time-consuming. While exempting all body camera video from release would take care of privacy issues, it would also prevent the public from using body camera footage to uncover misconduct. Agencies and lawmakers can address privacy problems successfully by using data management techniques to identify and preserve critical video evidence, and allowing non-critical video to be deleted under data-retention policies. Furthermore, software redaction may be used to produce releasable video that does not threaten the privacy of recorded individuals. Download Full Article (PDF) Cite: 14 Duke L. & Tech. Rev. 346

The Silence After the Beep: Envisioning an Emergency Information System to Serve the Visually Impaired

By: Elana R. Reman Due to a series of legal and regulatory setbacks, media accessibility regulations for consumers who are blind and visually impaired have lagged significantly behind those for deaf individuals. Until April 2014, when the Federal Communications Commission’s Emergency Information Order took effect, blind consumers were left “in the dark” when their safety mattered most—during weather emergencies—because visual emergency information displayed in the on-screen crawl during television programming was not accessible in an aural format. The Commission now mandates that this information be provided in an aural form through the secondary audio stream for linear programming viewed on televisions and mobile devices and other “second screens” used inside the home over the MVPD’s network, but this requirement leaves many issues unresolved. This Issue Brief examines and analyzes the arguments made by industry and consumer groups for and against expanded regulation, and makes several recommendations that efficiently fill gaps in the current regulatory requirements for accessible emergency information. These recommendations are technically feasible, not unduly burdensome, and necessary to effectuate the purpose of the Twenty-First Century Communications and Video Accessibility Act of 2010. Specifically, the Commission can extend emergency information regulations to the entities it failed to reach with

The Frontiers of Peer-to-Peer Lending: Thinking About a New Regulatory Approach

By: William S. Warren The growth of online alternative lending presents several advantages for both those seeking credit and those with excess capital to lend. Over the past decade, several different models of peer-to-peer lending have emerged in the US and U.K. Each of these models has developed in response to the different regulatory system it faces, which has led to the models’ different risk and reward profiles. However, the current regulatory framework for regulating peer-to-peer lending, especially in the U.S., leaves much to be desired. The inadequate regulatory regime not only hampers the potential for growth and further innovation in the industry, but also creates risks for consumers, lenders, and, as the sector grows, entire markets. There is no clear or easy answer as to the optimal regulatory regime, but regulators should at least consider the basic functions of peer-to-peer lending and how to address risks with a more comprehensive and sensible model for regulation. Download Full Article (PDF) Cite: 14 Duke L. & Tech. Rev. 298

The NLRB’s Purple Communications Decision: Email, Property, and the Changing Patterns of Industrial Life

By: Josh Carroll On December 11th, 2014, in a much-anticipated case, the National Labor Relations Board (“NLRB”) held in a 3-2 decision that employees with access to an employer’s email system had a presumptive right to use that email system during non-working time under Section 7 of the National Labor Relations Act (“NLRA”). In an attempt to adapt to the “changing patterns of industrial life,” the NLRB reversed a seven-year precedent by overturning In re Guard Publ’g Co., 351 N.L.R.B. 1110 (2007), and thereby gave employees the statutory right to use employer email systems for non-business purposes. This issue brief argues that the majority opinion in Purple Commc’ns, Inc., 361 N.L.R.B. No. 126 (2014) erroneously presumed that a ban on employer email systems interfered with employees’ rights to engage in concerted activities under Section 7. In reality, the influx of alternative avenues of communication, such as smartphones, social media, and tablets, have substantially grown for employees over the past several years, thus strengthening employees’ Section 7 rights. The new framework set forth in Purple Communications not only exaggerates the need for employees to exercise their Section 7 rights by using a company’s email system, but also unfairly burdens an employer’s

Informational Inequality: How High Frequency Traders Use Premier Access to Information to Prey on Institutional Investors

By: Jacob Adrian In recent months, Wall Street has been whipped into a frenzy following the March 31st release of Michael Lewis’ book “Flash Boys.” In the book, Lewis characterizes the stock market as being rigged, which has institutional investors and outside observers alike demanding some sort of SEC action. The vast majority of this criticism is aimed at high-frequency traders, who use complex computer algorithms to execute trades several times faster than the blink of an eye. One of the many complaints against high-frequency traders is over parasitic trading practices, such as front-running. Front-running, in the era of high-frequency trading, is best defined as using the knowledge of a large impending trade to take a favorable position in the market before that trade is executed. Put simply, these traders are able to jump in front of a trade before it can be completed. This Note explains how high-frequency traders are able to front-run trades using superior access to information, and examines several proposed SEC responses. Download Full Article (PDF) Cite: 14 Duke L. & Tech. Rev. 256

Legal Nature of Emails: A Comparative Perspective

By: Edina Harbinja There is currently a conflict between laws and the market in their treatment of email. Laws mandate that emails are not protected as property unless copyrightable or protected by another legal mechanism. But the market suggests that emails are user-owned property without further qualification. Moreover, the nature of email is treated slightly differently between the U.S. and U.K. legal regimes. While the current legal regimes applicable to email in the U.K. and U.S. are reasonable, legal harmonization within these systems, and with the service provider market, should be achieved. Download Full Article (PDF) Cite: 14 Duke L. & Tech. Rev. 227

Weathering the Nest: Privacy Implications of Home Monitoring for the Aging American Population

By: Jillisa Bronfman The research in this paper will seek to ascertain the extent of personal data entry and collection required to enjoy at least the minimal promised benefits of distributed intelligence and monitoring in the home. Particular attention will be given to the abilities and sensitivities of the population most likely to need these devices, notably the elderly and disabled. The paper will then evaluate whether existing legal limitations on the collection, maintenance, and use of such data are applicable to devices currently in use in the home environment and whether such regulations effectively protect privacy. Finally, given appropriate policy parameters, the paper will offer proposals to effectuate reasonable and practical privacy-protective solutions for developers and consumers. Download Full Article (PDF) Cite: 14 Duke L. & Tech. Rev. 192