-
3
-
-
0034399003
-
The new regulatory state and the transformation of criminology
-
223-24
-
See John Braithwaite, The New Regulatory State and the Transformation of Criminology, 40 BRIT. J. CRIMINOLOGY 222, 223-24 (2000) (arguing that the new regulatory state "holds up state steering and civil society rowing as the ideal").
-
(2000)
Brit. J. Criminology
, vol.40
, pp. 222
-
-
Braithwaite, J.1
-
5
-
-
11244303709
-
The renew deal: The fall of regulation and the rise of governance in contemporary legal thought
-
354
-
See Orly Lobel, The Renew Deal: The Fall of Regulation and The Rise of Governance in Contemporary Legal Thought, 89 MINN. L. REV. 342, 354 (2004) ("Newness itself becomes the essential substance of the emerging paradigm.").
-
(2004)
Minn. L. Rev.
, vol.89
, pp. 342
-
-
Lobel, O.1
-
6
-
-
76249113839
-
Law and Governance in the 21st Century Regulatory State
-
826 (2008) reviewing LAW AND NEW GOVERNANCE IN THE EU AND THE US (Gráinne de Btírca & Joanne Scott eds., 2006)
-
See Jason M. Solomon, Law and Governance in the 21st Century Regulatory State, 86 TEX. L. REV. 819, 826 (2008) (reviewing LAW AND NEW GOVERNANCE IN THE EU AND THE US (Gráinne de Btírca & Joanne Scott eds., 2006),
-
Tex. L. Rev.
, vol.86
, pp. 819
-
-
Solomon, J.M.1
-
8
-
-
78650826006
-
-
Lobel, supra note 4, at 442 ("[T]he obsessive maintenance of traditional boundaries-including those of public and private, profit and nonprofit, formal and informal, theory and practice, secular and religious, left and right-is no longer a major concern with the shift to the Renew Deal paradigm.")
-
See, e.g., Lobel, supra note 4, at 442 ("[T]he obsessive maintenance of traditional boundaries-including those of public and private, profit and nonprofit, formal and informal, theory and practice, secular and religious, left and right-is no longer a major concern with the shift to the Renew Deal paradigm.").
-
-
-
-
9
-
-
0346155286
-
A constitution of democratic experimentalism
-
314, 320
-
Michael Dorf and Charles Sabei, though using the term "democratic experimentalism," describe it as deploying the private-sector techniques of "benchmarking, simultaneous engineering, and error detection" in service of the pragmatic, problem-solving approach to democracy they call "directly deliberative polyarchy" where a political community makes choices through "tiered governance councils-councils that organize service provision with the collaboration of local citizens, and pool their experience to inform their separate decisions." Michael C. Dorf & Charles F. Sabel, A Constitution of Democratic Experimentalism, 98 COLUM. L. REV. 267, 314, 320 (1998).
-
(1998)
Colum. L. Rev.
, vol.98
, pp. 267
-
-
Dorf, M.C.1
Sabel, C.F.2
-
10
-
-
33749837914
-
Solving Problems vs. Claiming Rights: The Pragmatist Challenge to Legal Liberalism
-
181
-
William Simon describes the "core operating premises of Legal Pragmatism," the underlying philosophy behind new governance, as "stakeholder negotiation, transparency, and rolling rule regimes." William H. Simon, Solving Problems vs. Claiming Rights: The Pragmatist Challenge to Legal Liberalism, 46 WM. & MARY L. REV. 127, 181 (2004).
-
(2004)
Wm. & Mary L. Rev.
, vol.46
, pp. 127
-
-
Simon, W.H.1
-
11
-
-
85015993726
-
Mind the Gap: Law and new approaches to governance in the European Union
-
5-6
-
Scott and Trubek describe the key attributes of new governance as "participation and power-sharing," "multi-level integration," "diversity and decentralisation," "deliberation," "flexibility and revisability," and "experimentation and knowledge creation." See Joanne Scott & David M. Trubek, Mind the Gap: Law and New Approaches to Governance in the European Union, 8 EUR. L.J. 1, 5-6 (2002). Also, Orly Lobel's list of the "organizing principles" of the new governance model include "participation and partnership," "collaboration," "diversity and competition," "decentralization and subsidiarity," "integration of policy domains," "flexibility and noncoerciveness (or softness-in-law)," "fallibility, adaptability, and dynamic learning," and "law as competence and orchestration."
-
(2002)
Eur. L.J.
, vol.8
, pp. 1
-
-
Scott, J.1
Trubek, D.M.2
-
12
-
-
78650815314
-
-
Lobel, supra note 4, at 371-404
-
Lobel, supra note 4, at 371-404.
-
-
-
-
13
-
-
78650821210
-
Standard-setting in regulatory regimes
-
R. Baldwin et al. eds. forthcoming July
-
See Colin Scott, Standard-Setting in Regulatory Regimes, in THE OXFORD HANDBOOK OF REGULATION (R. Baldwin et al. eds.) (forthcoming July 2010), available at http://ssrn.com/abstract= 1393647.
-
(2010)
The Oxford Handbook of Regulation
-
-
Scott, C.1
-
14
-
-
33646587009
-
Best practices
-
See generally David Zaring, Best Practices, 81 N.Y.U. L. REV. 294 (2006) (explaining this development).
-
(2006)
N.Y.U. L. Rev.
, vol.81
, pp. 294
-
-
Zaring, D.1
-
15
-
-
78149443036
-
-
Jody Freeman & Martha Minow eds.
-
Another major blurring of roles, of course, has been the performance of traditionally governmental services by private entities. For an overview of such developments, see GOVERNMENT BY CONTRACT: OUTSOURCING AND AMERICAN DEMOCRACY (Jody Freeman & Martha Minow eds., 2009).
-
(2009)
Government By Contract: Outsourcing and American Democracy
-
-
-
16
-
-
77950467763
-
Regulation by Deal: The government's response to the financial crias
-
535-36
-
For a look at how the financial crisis led to a new model of privatizing government functions altogether, see Stephen M. Davidoff & David Zaring, Regulation by Deal: The Government's Response to the Financial Crias, 61 ADMIN. L. REV. 464, 535-36 (2009).
-
(2009)
Admin. L. Rev.
, vol.61
, pp. 464
-
-
Davidoff, S.M.1
Zaring, D.2
-
17
-
-
23044521119
-
The private role in public governance
-
Jody Freeman, The Private Role in Public Governance, 75 N.Y.U. L. REV. 543 (2000).
-
(2000)
N.Y.U. L. Rev.
, vol.75
, pp. 543
-
-
Freeman, J.1
-
18
-
-
28744445629
-
The private life of public law
-
See Michael P. Vandenbergh, The Private Life of Public Law, 105 COLUM. L. REV. 2029 (2005) (arguing that the role of private actors in the traditional government functions of standard-setting, implementation, and enforcement are even greater than previously identified).
-
(2005)
Colum. L. Rev.
, vol.105
, pp. 2029
-
-
Vandenbergh, M.P.1
-
19
-
-
78650834673
-
-
It may also blur the boundary between law and policy, but that boundary may never have been so clear
-
It may also blur the boundary between law and policy, but that boundary may never have been so clear.
-
-
-
-
20
-
-
78650841597
-
-
AYRES & BRAITHWAITE, supra note 2, at 39
-
See AYRES & BRAITHWAITE, supra note 2, at 39.
-
-
-
-
21
-
-
53949103254
-
Law, governance, or new governance? The changing open method of coordination
-
652-53
-
See Kenneth Armstrong & Claire Kilpatrick, Law, Governance, or New Governance? The Changing Open Method of Coordination, 13 COLUM. J. EUR. L. 649, 652-53 (explaining that new governance can be seen as a regulatory "tool" or "instrument").
-
Colum. J. Eur. L.
, vol.13
, pp. 649
-
-
Armstrong, K.1
Kilpatrick, C.2
-
22
-
-
78650836954
-
-
Dorf & Sabei, supra note 7, at 322-23. This is more of a temporal limitation than a blurred boundary. The idea is that both the means and the ends of regulation ought be treated as provisional in light of inevitable uncertainty and limited knowledge. For discussion in the context of Gunther Teubner's reflexive law
-
See Dorf & Sabei, supra note 7, at 322-23. This is more of a temporal limitation than a blurred boundary. The idea is that both the means and the ends of regulation ought be treated as provisional in light of inevitable uncertainty and limited knowledge. For discussion in the context of Gunther Teubner's "reflexive law,"
-
-
-
-
23
-
-
84923807175
-
Reflexive environmental law
-
1265
-
see Eric W. Orts, Reflexive Environmental Law, 89 Nw. U. L. REV. 1227, 1265 (1994) ("[R]eflexive law recognizes the cognitive and normative limitations of a legal system operating in a complex modern society.").
-
(1994)
Nw. U. L. Rev.
, vol.89
, pp. 1227
-
-
Orts, E.W.1
-
24
-
-
78650839814
-
-
Dorf & Sabei, supra note 7, at 292-314 (explaining how innovation in the private sector has increased the problem-solving abilities of firms)
-
See Dorf & Sabei, supra note 7, at 292-314 (explaining how innovation in the private sector has increased the problem-solving abilities of firms).
-
-
-
-
25
-
-
85191127316
-
Information-forcing regulation and environmental governance
-
Gráinne de Búrea & Joanne Scott eds.
-
See, e.g., Bradley C. Karkkainen, Information-Forcing Regulation and Environmental Governance, in LAW AND NEW GOVERNANCE IN THE EU AND THE US 293 (Gráinne de Búrea & Joanne Scott eds., 2006);
-
(2006)
Law and New Governance in the EU and the US
, pp. 293
-
-
Karkkainen, B.C.1
-
26
-
-
84855541830
-
Law and new environmental governance in the European Union
-
Gráinne de Btírca & Joanne Scott eds.
-
Joanne Scott & Jane Holder, Law and New Environmental Governance in the European Union, in LAW AND NEW GOVERNANCE IN THE EU AND THE US 211 (Gráinne de Btírca & Joanne Scott eds., 2006).
-
(2006)
Law And New Governance in the EU and the US
, pp. 211
-
-
Scott, J.1
Holder, J.2
-
27
-
-
78650816140
-
-
Dorf & Sabei, supra note 7, at 284
-
Dorf & Sabei, supra note 7, at 284.
-
-
-
-
28
-
-
78650851544
-
-
See Solomon, supra note 5, at 835
-
See Solomon, supra note 5, at 835.
-
-
-
-
29
-
-
78650814457
-
The regulatizing process and the boundaries of new public governance
-
545
-
Edward Rubin, The Regulatizing Process and the Boundaries of New Public Governance, 2010 WIs. L. REV. 535, 545 (citation omitted).
-
(2010)
Wis. L. Rev.
, pp. 535
-
-
Rubin, E.1
-
30
-
-
62649145065
-
Legislative threats
-
See generally Guy Halfteck, Legislative Threats, 61 STAN. L. REV. 629 (2008).
-
(2008)
Stan. L. Rev.
, vol.61
, pp. 629
-
-
Halfteck, G.1
-
31
-
-
78650817559
-
-
There is an unexplored assumption here that a policy-maker or policy entrepreneur could have successfully pushed a new governance approach if motivated to do so, but did not; certainly this assumption is worth greater exploration. I make no attempt to explain why such an approach did not emerge in these cases
-
There is an unexplored assumption here that a policy-maker or "policy entrepreneur" could have successfully pushed a new governance approach if motivated to do so, but did not; certainly this assumption is worth greater exploration. I make no attempt to explain why such an approach did not emerge in these cases.
-
-
-
-
32
-
-
78650809204
-
-
Thanks to Alison Lerner, University of Georgia School of Law, class of 2010, for drafting the case study that served as the basis for this Section, and Matt Weiss, University of Georgia School of Law, class of 2008, for doing much of the initial research
-
Thanks to Alison Lerner, University of Georgia School of Law, class of 2010, for drafting the case study that served as the basis for this Section, and Matt Weiss, University of Georgia School of Law, class of 2008, for doing much of the initial research.
-
-
-
-
33
-
-
78650842152
-
-
Identity Theft Resource Center, Security Breaches Jan. 8
-
Press Release, Identity Theft Resource Center, Security Breaches (Jan. 8, 2008), http://www.idthefteenter.org/artman2/publish/lib-survey/Press-Release- 2007-Breach-List. shtml.
-
(2008)
-
-
-
34
-
-
34948903300
-
The choicepoint dilemma: How data brokers should handle the privacy of personal information
-
Sept.-Oct.
-
See generally Pavul N. Otto et al., The ChoicePoint Dilemma: How Data Brokers Should Handle the Privacy of Personal Information, IEEE SECURITY & PRIVACY, Sept.-Oct. 2007, at 15 (giving general background information on data breaches).
-
(2007)
Ieee Security & Privacy
, pp. 15
-
-
Otto, P.N.1
-
35
-
-
33947536241
-
Notification of data security breaches
-
920-23
-
See Paul M. Schwartz & Edward J. Janger, Notification of Data Security Breaches, 105 MICH. L. REV. 913, 920-23 (2007) (categorizing the institutions subject to notification laws into four categories: business-to-consumer retail, business-toconsumer financial, outsourcing entities, and data brokers).
-
(2007)
Mich. L. Rev.
, vol.105
, pp. 913
-
-
Schwartz, P.M.1
Janger, E.J.2
-
36
-
-
84896581102
-
Identity then puts pressure on data sellers
-
Feb. 18
-
Evan Perez, Identity Then Puts Pressure on Data Sellers, WALL ST. J., Feb. 18, 2005, at B1.
-
(2005)
Wall St. J.
-
-
Perez, E.1
-
37
-
-
78650807202
-
-
Id
-
Id.
-
-
-
-
38
-
-
78650829260
-
-
No. 06198 N.D. Ga. Jan. 30
-
Complaint for Civil Penalties, Permanent Injunction, and Other Equitable Belief at Exhibit C, In re ChoicePoint, Inc., Sec. Litig., No. 06-198 (N.D. Ga. Jan. 30, 2006), available at http://www.ftc.gov/os/caselist/choicepoint/ 0523069com>plaint.pdf;
-
(2006)
Re ChoicePoint, Inc., Sec. Litig.
-
-
-
39
-
-
78650815039
-
-
Perez, supra note 28
-
Perez, supra note 28.
-
-
-
-
40
-
-
33645556143
-
A model regime of privacy protection
-
359-60
-
The federal government, through the Federal Trade Commission (FTC), can charge "consumer reporting agencies" with violations of the Fair Credit Reporting Act (FCRA) for data breaches. See Daniel J. Solove & Chris Jay Hoofnagle, A Model Regime of Privacy Protection, 2006 U. III. L. REV. 357, 359-60 (2006) (describing the weakness inherent in using the FCRA to handle data-security breach cases).
-
(2006)
U. Iii. L. Rev.
, vol.2006
, pp. 357
-
-
Solove, D.J.1
Hoofnagle, C.J.2
-
41
-
-
78650826263
-
-
The FCRA requires that consumer-reporting agencies institute procedures to ensure accuracy, and allows for procedures which have now become familiar, such as the ability to access one's credit report and correct mistakes on it
-
The FCRA requires that consumer-reporting agencies institute procedures to ensure accuracy, and allows for procedures which have now become familiar, such as the ability to access one's credit report and correct mistakes on it.
-
-
-
-
42
-
-
78650825167
-
-
Id. at 360
-
Id. at 360.
-
-
-
-
43
-
-
0041680546
-
-
Additionally, government agencies are subject to the Privacy Act of 1974, which regulates public sector use of confidential information and is modeled after the FCRA. U.S.C. §552a Finally, companies under the purview of the SEC may face violations of the Exchange Act for data security-breach incidents
-
Additionally, government agencies are subject to the Privacy Act of 1974, which regulates public sector use of confidential information and is modeled after the FCRA. Privacy Act of 1974, 5 U.S.C. §552a (2006). Finally, companies under the purview of the SEC may face violations of the Exchange Act for data security-breach incidents.
-
(2006)
Privacy Act of 1974
, pp. 5
-
-
-
44
-
-
78650830672
-
-
Otto et al., supra note 26, at 17-18. However, data brokers like ChoicePoint are not covered under any of these statutes
-
See Otto et al., supra note 26, at 17-18. However, data brokers like ChoicePoint are not covered under any of these statutes.
-
-
-
-
45
-
-
78650818881
-
-
id. at 15
-
See id. at 15.
-
-
-
-
46
-
-
78650845773
-
-
note
-
See Gramm-Leach-Bliley Act, 15 U.S.C. §§6801-6809 (2006). Under the 1999 Gramm-Leach-Bliley Act (GLBA), the financial services industry was subject to regulations "to protect against unauthorized access to or use of such records or information which could result in substantial harm or inconvenience to any customer." Id. §6801(b)(3) (emphasis added). The relevant agencies released a set of Guidelines that required financial institutions to develop and implement a set of procedures to protect against the release of confidential personal information.
-
-
-
-
47
-
-
78650825990
-
A new approach to data security breaches
-
155-56
-
See, e.g., Gideon Emcee Christian, A New Approach to Data Security Breaches, 7 CANADIAN J.L. & TECH. 149, 155-56 (2009) (describing the GLBA and subsequent agency action);
-
(2009)
Canadian J.L. & Tech.
, vol.7
, pp. 149
-
-
Christian, G.E.1
-
48
-
-
78650814488
-
Two-factor authentication: A solution to times past or present? The debate surrounding the gramm-leach-bliley security safeguards rule and the methods of risk assessment and compliance
-
763-65
-
see also Ritu Singh, Two-Factor Authentication: A Solution to Times Past or Present? The Debate Surrounding the Gramm-Leach-Bliley Security Safeguards Rule and the Methods of Risk Assessment and Compliance, 2 I/S: J.L. & POL'Y FOR INFO. SOC'Y 761, 763-65 (2006) (discussing the implementation of the Guidelines and the lax enforcement and compliance with GLBA).
-
(2006)
I/S: J.L. & Pol'y For Info. Soc'y
, vol.2
, pp. 761
-
-
Singh, R.1
-
49
-
-
78650829555
-
-
Individual Reference Services Group, Dec. 15
-
Individual Reference Services Group, Industry Principles - Commentary (Dec. 15, 1997), avilable at http://www.ftc.gov/os/1997/12/irsappe.pdf.
-
(1997)
Industry Principles - Commentary
-
-
-
51
-
-
78650824327
-
Database giant gives access to fake firms
-
Feb. 14
-
Bob Sullivan, Database Giant Gives Access to Fake Firms, MSNBC.COM, Feb. 14, 2005, http://www.msnbc.msn.com/id/6969799/.
-
(2005)
Msnbc.Com
-
-
Sullivan, B.1
-
52
-
-
78650845525
-
-
Id
-
Id.
-
-
-
-
53
-
-
78650840611
-
Crooks duped data archive
-
Feb. 16
-
Bill Husted, Crooks Duped Data Archive, ATLANTA J.-CONST., Feb. 16, 2005, at 1A.
-
(2005)
Atlanta J.-Const.
-
-
Husted, B.1
-
54
-
-
78650818880
-
-
Id
-
Id.
-
-
-
-
55
-
-
78650845249
-
-
Id
-
Id.
-
-
-
-
57
-
-
78650828910
-
-
Otto et al., Supra note 26, at 18
-
Otto et al., Supra note 26, at 18.
-
-
-
-
58
-
-
78650828985
-
-
ChoicePoint, Inc., Mar. 4
-
ChoicePoint, Inc., Current Report (Form 8-K), at 4 (Mar. 4, 2005).
-
(2005)
Current Report (Form 8-K)
, pp. 4
-
-
-
59
-
-
78650847139
-
38 AGs send open letter to choicepoint
-
Feb. 19
-
38 AGs Send Open Letter to ChoicePoint, Assoc PRESS FIN. WIRE, Feb. 19, 2005.
-
(2005)
Assoc Press Fin. Wire
-
-
-
60
-
-
78650829260
-
-
No. 06198 N.D. Ga. Feb. 10
-
Stipulated Final Judgment and Order For Civil Penalties, Permanent Injunction, and Other Equitable Relief, In re ChoicePoint, Inc., Sec. Litig., No. 06-198 (N.D. Ga. Feb. 10, 2006), available at http://www.fte.gov/os/ caselist/choicepoint/0523069stip.pdf [hereinafter FTC Consent Order];
-
(2006)
Re ChoicePoint, Inc., Sec. Litig.
-
-
-
63
-
-
78650832218
-
Compliance with california data privacy laws: Federal law also provides guidance to businesses nationwide
-
19
-
See Anthony D. Milewski Jr., Compliance with California Data Privacy Laws: Federal Law Also Provides Guidance to Businesses Nationwide, 2 SHIDLER J.L. COM. & TECH. 19, 19(2006).
-
(2006)
Shidler J.L. Com. & Tech.
, vol.2
, pp. 19
-
-
Milewski Jr., A.D.1
-
64
-
-
78650844716
-
-
Id
-
Id.
-
-
-
-
65
-
-
78650805315
-
California security breach notification act
-
§1798.82 West
-
California Security Breach Notification Act, CAL. CIV. CODE §1798.82 (West 2009).
-
(2009)
Cal. Civ. Code
-
-
-
66
-
-
70350421436
-
-
§45.48.010
-
See ALASKA STAT. §45.48.010 (2009);
-
(2009)
Alaska Stat.
-
-
-
68
-
-
73049089675
-
-
§4-110-105(a)(1)
-
ARK. CODE ANN. §4-110-105(a)(1) (2009);
-
(2009)
Ark. Code Ann.
-
-
-
69
-
-
33750538297
-
-
§61-716 (d)(1)
-
COLO. REV. STAT. §61-716 (d)(1) (2009);
-
(2009)
Colo. Rev. Stat.
-
-
-
70
-
-
77954755565
-
-
§36a-701b(b)
-
CONN. GEN. STAT. §36a-701b(b) (2009);
-
(2009)
Conn. Gen. Stat.
-
-
-
71
-
-
77950285497
-
-
tit. 6, §12B-102(a)
-
DEL. CODE ANN. tit. 6, §12B-102(a) (2009);
-
(2009)
Del. Code Ann.
-
-
-
72
-
-
78649236811
-
-
§28-3852(a)
-
D.C. CODE §28-3852(a) (2009);
-
(2009)
D.C. Code
-
-
-
73
-
-
78650824318
-
-
§817.5681(1)(a)
-
FLA. STAT. §817.5681(1)(a) (2006);
-
(2006)
Fla. Stat.
-
-
-
74
-
-
73149093089
-
-
§10-1-912
-
GA. CODE. ANN. §10-1-912 (2009);
-
(2009)
Ga. Code. Ann.
-
-
-
75
-
-
5544260401
-
-
§487N-2(a)
-
HAW. REV. STAT. §487N-2(a) (2009);
-
(2009)
Haw. Rev. Stat.
-
-
-
76
-
-
77950674098
-
-
§28-51-104(5), 28-51-105
-
IDAHO CODE ANN. §28-51-104(5), 28-51-105 (2009);
-
(2009)
Idaho Code Ann.
-
-
-
78
-
-
78649313577
-
-
§24-4.9-3-1 LexisNexis Supp.
-
IND. CODE §24-4.9-3-1 (LexisNexis Supp. 2009);
-
(2009)
Ind. Code
-
-
-
79
-
-
0344458780
-
-
§715C.1-2 West Supp.
-
IOWA CODE ANN. §715C.1-2 (West Supp. 2009);
-
(2009)
Iowa Code Ann.
-
-
-
80
-
-
73049117992
-
-
§50-7a02(a)
-
KAN. STAT. ANN. §50-7a02(a) (2008);
-
(2008)
Kan. Stat. Ann.
-
-
-
81
-
-
0345784624
-
-
§51: 3074(a) West Supp.
-
LA. REV. STAT. ANN. §51: 3074(a) (West Supp. 2010);
-
(2010)
La. Rev. Stat. Ann.
-
-
-
82
-
-
78650806383
-
-
§14-3502(A) LexisNexis
-
MD. CODE ANN. §14-3502(A) (LexisNexis 2009);
-
(2009)
Md. Code Ann.
-
-
-
83
-
-
0043070776
-
-
eh. 93H, §3 LexisNexis Supp.
-
MASS. GEN. LAWS eh. 93H, §3 (LexisNexis Supp. 2009);
-
(2009)
Mass. Gen. Laws
-
-
-
85
-
-
34147102326
-
-
§325E.61, Subdiv. 1, West
-
MINN. STAT. ANN. §325E.61, Subdiv. 1, (West 2010);
-
(2010)
Minn. Stat. Ann.
-
-
-
86
-
-
77951269478
-
-
§407.1500.2 West
-
Mo. ANN. STAT. §407.1500.2 (West 2010);
-
(2010)
Mo. Ann. Stat.
-
-
-
87
-
-
68949208703
-
-
§30-14-1704(1)
-
MONT. CODE ANN. §30-14-1704(1) (2009);
-
(2009)
Mont. Code Ann.
-
-
-
88
-
-
19544394665
-
-
§87-803 LexisNexis
-
NEB. REV. STAT. ANN. §87-803 (LexisNexis 2009);
-
(2009)
Neb. Rev. Stat. Ann.
-
-
-
89
-
-
68549087643
-
-
§603A.220 LexisNexis
-
NEV. REV. STAT. ANN. §603A.220 (LexisNexis 2007);
-
(2007)
Nev. Rev. Stat. Ann.
-
-
-
91
-
-
0344458787
-
-
56:8-163(12)(a) (West YEAR)
-
N.J. STAT. ANN. 56:8-163(12)(a) (West YEAR);
-
N.J. Stat. Ann.
-
-
-
92
-
-
84873952412
-
-
§899-aa.2 (Publisher YEAR)
-
N.Y. GEN. BUS. LAW §899-aa.2 (Publisher YEAR);
-
N.Y. Gen. Bus. Law
-
-
-
94
-
-
77954730433
-
-
§51-30-02 (YEAR)
-
N.D. CENT. CODE §51-30-02 (YEAR);
-
N.D. Cent. Code
-
-
-
95
-
-
33746245220
-
-
§1349.19(A)(1)(a) (Publisher YEAR)
-
OHIO REV. CODE ANN. §1349.19(A)(1)(a) (Publisher YEAR);
-
Ohio Rev. Code Ann.
-
-
-
96
-
-
78650820392
-
-
2008 H.B. 2245(a) (YEAR) (Okla.)
-
2008 H.B. 2245(a) (YEAR) (Okla.);
-
-
-
-
97
-
-
68549096713
-
-
§646A.604
-
OR. REV. STAT. §646A.604 (2009);
-
(2009)
Or. Rev. Stat.
-
-
-
99
-
-
72549106899
-
-
§11-49.2-3 Supp.
-
R.I. GEN. LAWS §11-49.2-3 (Supp. 2008);
-
(2008)
R.I. Gen. Laws
-
-
-
100
-
-
0042422490
-
-
§39-1-90 Supp.
-
S.C. CODE ANN. §39-1-90 (Supp. 2009);
-
(2009)
S.C. Code Ann.
-
-
-
101
-
-
0348044359
-
-
§47-18-2107(b) Supp.
-
TENN. CODE ANN. §47-18-2107(b) (Supp. 2009);
-
(2009)
Tenn. Code Ann.
-
-
-
102
-
-
68949168679
-
-
§13-44-202(1)(a) Supp.
-
UTAH CODE ANN. §13-44-202(1)(a) (Supp. 2009);
-
(2009)
Utah Code Ann.
-
-
-
103
-
-
78650823791
-
-
tit. 9, §2435(b)(1)
-
VT. STAT. ANN. tit. 9, §2435(b)(1) (2006);
-
(2006)
Vt. Stat. Ann.
-
-
-
104
-
-
77950406003
-
-
§18.2-186.6(D)
-
VA. CODE ANN. §18.2-186.6(D) (2009);
-
(2009)
Va. Code Ann.
-
-
-
105
-
-
27744518745
-
-
§19.255.010(1) West
-
WASH. REV. CODE ANN. §19.255.010(1) (West 2007);
-
(2007)
Wash. Rev. Code Ann.
-
-
-
106
-
-
70349121523
-
-
§46A.2A.102 LexisNexis
-
W. VA. CODE ANN. §46A.2A.102 (LexisNexis 2006);
-
(2006)
W. Va. Code Ann.
-
-
-
107
-
-
77950248640
-
-
§40-12-502(a)
-
WYO. STAT. ANN. §40-12-502(a) (2009).
-
(2009)
Wyo. Stat. Ann.
-
-
-
108
-
-
78650805315
-
Compare california security breach notification act
-
§1798.82, with sources cited supra note 48. Other states adopted similar statutes using California's legislation as a template but varied based on their definitions of personal information, their notification requirements related to encrypted information, conditions necessary to trigger notification requirements, the procedures necessary to satisfy actual notice, the situations in which substitute notice was permissible, and the timetable for notification, which ranged from a set time period (i.e., forty-five days in Florida) to more vague requirements (such as California's requirement to notify consumers in the "most expedient time possible and without unreasonable delay")
-
Compare California Security Breach Notification Act, CAL. CIV. CODE §1798.82, with sources cited supra note 48. Other states adopted similar statutes using California's legislation as a template but varied based on their definitions of "personal information," their notification requirements related to encrypted information, conditions necessary to trigger notification requirements, the procedures necessary to satisfy actual notice, the situations in which substitute notice was permissible, and the timetable for notification, which ranged from a set time period (i.e., forty-five days in Florida) to more vague requirements (such as California's requirement to notify consumers in the "most expedient time possible and without unreasonable delay").
-
Cal. Civ. Code
-
-
-
109
-
-
78650851013
-
-
Id
-
Id.
-
-
-
-
110
-
-
78650810707
-
-
See GINA MARIE STEVENS ET AL., CONG. RESEARCH SERV., CRS REPORT FOR CONGRESS, DATA SECURITY: FEDERAL AND STATE LAWS (2006), available at http://assets.opencrs.com/rpts/RS22374-20060203.pdf>. While most states are like California in that they require notification when there has been any "unauthorized access" of personal information, several states have a higher threshold for when notification is triggered: instead of simply unauthorized access, these states require some determination of "likelihood of misuse."
-
(2006)
Cong. Research Serv., Crs Report for Congress, Data Security: Federal and State Laws
-
-
Stevens, G.M.1
-
111
-
-
0006799291
-
-
§817.5681(4) West
-
Schwartz & Janger, supra note 27, at 932-34. For example, Florida's data-breach law requires disclosure when unauthorized access "materially compromises the security, confidentiality, or integrity of personal information . . . ." FLA. STAT. ANN. §817.5681(4) (West 2006).
-
(2006)
Fla. Stat. Ann.
-
-
-
116
-
-
70349851709
-
-
§1798.82(g)(2)-(3);
-
CAL. CIV. CODE §1798.82(g)(2)-(3);
-
Cal. Civ. Code
-
-
-
118
-
-
78650830115
-
-
109th Cong.
-
See Notification of Risk to Personal Data Act, S. 115, 109th Cong. (2005). The bill also broadened the scope of required disclosures, eliminated any safe harbor for disclosed encrypted information, and created additional federal agencies to combat identity theft and to oversee statutory compliance.
-
(2005)
Notification of Risk to Personal Data Act
, pp. 115
-
-
-
119
-
-
78650805595
-
-
Id
-
Id.
-
-
-
-
120
-
-
78650848438
-
-
Enforcement authority was provided to the state attorneys general, who could sue the companies responsible for data breaches for civil remedies. Id.
-
Enforcement authority was provided to the state attorneys general, who could sue the companies responsible for data breaches for civil remedies. Id.
-
-
-
-
122
-
-
10744227478
-
Management-based regulation: Prescribing private management to achieve public goals
-
See generally Cary Coglianese & David Lazer, Management-Based Regulation: Prescribing Private Management to Achieve Public Goals, 37 LAW & SOC'Y REV. 691 (2003) (describing a regulatory approach where firms are directed to engage in a planning process designed to achieve public goals).
-
(2003)
Law & Soc'y Rev.
, vol.37
, pp. 691
-
-
Coglianese, C.1
Lazer, D.2
-
123
-
-
78650843256
-
-
109th Cong. §2(b)(1) (2005)
-
See, e.g., Identity Theft Protection Act, S. 1408, 109th Cong. §2(b)(1) (2005) (introduced by Sen. Gordon Smith (R-Or.)).
-
Identity Theft Protection Act
, pp. 1408
-
-
-
124
-
-
78650843009
-
-
As with Senator Sessions's legislation, this bill required the implementation of a program to secure personal consumer information through administrative, technical, and physical safeguards . ... Id. The most robust such bill was introduced by, among others, Senators Arlen Specter (R-Pa.), and Patrick Leahy (D-Vt.), the Chairman and Ranking Democratic Member of the Senate Judiciary Committee
-
As with Senator Sessions's legislation, this bill required the implementation of a program to secure personal consumer information through "administrative, technical, and physical safeguards . ..." Id. The most robust such bill was introduced by, among others, Senators Arlen Specter (R-Pa.), and Patrick Leahy (D-Vt.), the Chairman and Ranking Democratic Member of the Senate Judiciary Committee.
-
-
-
-
126
-
-
78650824882
-
-
The bill mandated that companies create a personal data privacy and security program, id. §2, based in part on the Interagency Guidelines for financial institutions, and also set third-party contractors hired to process data, id. § 502
-
The bill mandated that companies create a personal data privacy and security program, id. §2, based in part on the Interagency Guidelines for financial institutions, and also set third-party contractors hired to process data, id. § 502.
-
-
-
-
127
-
-
78650847128
-
-
H.R. 4127, 109th Cong. §2(a)(1)(B) (DATA) introduced by Rep. Cliff Stearns (R-Fla.). DATA required establishing a policy for information collection, appointing a data-security officer within the organization, taking preventative and corrective action, and creating a process for the disposal of obsolete data. Id. §2(a)(2). In the case of a breach, the FTC would then be authorized to require the data broker to submit its information protection policy to an FTC audit
-
Data Accountability and Trust Act, H.R. 4127, 109th Cong. §2(a)(1)(B) (2005) (DATA) (introduced by Rep. Cliff Stearns (R-Fla.). DATA required establishing a policy for information collection, appointing a data-security officer within the organization, taking preventative and corrective action, and creating a process for the disposal of obsolete data. Id. §2(a)(2). In the case of a breach, the FTC would then be authorized to require the data broker to submit its information protection policy to an FTC audit.
-
(2005)
Data Accountability and Trust Act
-
-
-
128
-
-
78650835859
-
-
Id. §2(b)
-
Id. §2(b).
-
-
-
-
129
-
-
78650834898
-
-
Sara Krauss to Privacy L. Blog, Mar. 2
-
See posting of Jeffrey D. Neuburger & Sara Krauss to Privacy L. Blog, Will Congress Enact Data Security Breach Provisions This Year - ? Guess What, It Already Has, http://privacylaw.proskauer.com/2009/03/articles/security- breach>-notification-1/will-congress-enact-data-security-breach-provisions- this-year-guess-what -it-already-has/ (Mar. 2, 2009) (noting that while Congress never actually passed datasecurity laws, changes to HIPAA require notification when health information is released without authorization).
-
(2009)
Will Congress Enact Data Security Breach Provisions This Year -? Guess What, It Already Has
-
-
Neuburger, J.D.1
-
130
-
-
78650817038
-
Risk allocation by legislation: Proposed state laws allocate costs of data breaches
-
768-69
-
Christopher J. Volkmer, Risk Allocation by Legislation: Proposed State Laws Allocate Costs of Data Breaches, 2 PRIVACY & DATA SEC. L.J. 764, 768-69 (2007).
-
(2007)
Privacy & Data Sec. L.J.
, vol.2
, pp. 764
-
-
Volkmer, C.J.1
-
131
-
-
78650848732
-
-
Schwartz & Janger, supra note 27, at 952. Another critique of the current crop of state and federal data notification laws is that it is impossible for businesses to comply with a patchwork of state law plus federal regulation. Even without the federal legislation on the table, businesses today must be aware of forty-two subtly different notification laws, plus any applicable federal regulations under the FTC, SEC, and HIPAA
-
Schwartz & Janger, supra note 27, at 952. Another critique of the current crop of state and federal data notification laws is that it is impossible for businesses to comply with a patchwork of state law plus federal regulation. Even without the federal legislation on the table, businesses today must be aware of forty-two subtly different notification laws, plus any applicable federal regulations under the FTC, SEC, and HIPAA.
-
-
-
-
132
-
-
78650843512
-
-
Another model can be found in Schwartz and Janger's article. Id. at 96070 (proposing a coordinated response agent (CRA) that will be more comprehensive than simple notification laws)
-
Another model can be found in Schwartz and Janger's article. Id. at 96070 (proposing a coordinated response agent (CRA) that will be more comprehensive than simple notification laws).
-
-
-
-
133
-
-
78650840610
-
-
Thanks to Rachel Goodrich, University of Georgia School of Law, class of 2010, for drafting the case study on which this Section is based
-
Thanks to Rachel Goodrich, University of Georgia School of Law, class of 2010, for drafting the case study on which this Section is based.
-
-
-
-
135
-
-
78650822060
-
-
id. at 19-21
-
See id. at 19-21.
-
-
-
-
136
-
-
78650835557
-
-
id. at 33-35
-
See id. at 33-35.
-
-
-
-
137
-
-
49749128919
-
-
Pub. L. No. 108265, 118 Stat. 729
-
See also Child Nutrition and WIC Reauthorization Act of 2004, Pub. L. No. 108-265, 118 Stat. 729. The Act requires local educational institutions using the National School Lunch Program to establish local wellness policies setting forth "nutrition guidelines ... for all foods available on each school campus under the local educational agency during the school day with the objectives of promoting student health and reducing childhood obesity . ..." Id. §204(a)(2).
-
Child Nutrition and WIC Reauthorization Act of 2004
-
-
-
138
-
-
78650841165
-
-
42 U.S.C. §1779(b) (2006)
-
42 U.S.C. §1779(b) (2006).
-
-
-
-
140
-
-
78650836654
-
National school lunch program, general purpose and scope
-
pt. 210, app. B(a)(1)
-
National School Lunch Program, General Purpose and Scope, 7 C.F.R. pt. 210, app. B(a)(1) (2009).
-
(2009)
C.F.R.
, vol.7
-
-
-
142
-
-
41949109868
-
The interplay of public health law and industry self-regulation: The case of sugar-sweetened beverage sales in schools
-
597
-
Michelle M. Mello et al., The Interplay of Public Health Law and Industry Self-Regulation: The Case of Sugar-Sweetened Beverage Sales in Schools, 98 AM. J. PUB. HEALTH 595, 597 (2008) (quoting a 2002 National Soft Drink Association statement on efforts to ban or restrict the sale of carbonated soft drinks in schools).
-
(2008)
Am. J. Pub. Health
, vol.98
, pp. 595
-
-
Mello, M.M.1
-
143
-
-
78650804487
-
-
Id. (citation omitted)
-
Id. (citation omitted).
-
-
-
-
144
-
-
78650819140
-
-
Id
-
Id.
-
-
-
-
145
-
-
78650802682
-
-
Id
-
Id.
-
-
-
-
146
-
-
78650808423
-
-
last visited Feb. 9
-
American Beverage Association, About ABA: History, http://www.ameribev. org/about-aba/history/ (last visited Feb. 9, 2010).
-
(2010)
-
-
-
147
-
-
78650852618
-
-
Mello et al., Supra note 72, at 600
-
Mello et al., Supra note 72, at 600.
-
-
-
-
148
-
-
78650848170
-
-
American Beverage Association, last visited Feb. 20
-
Id.; see American Beverage Association, Beverage Industry School Vending Policy, available at http://www.ia-sb.org/assets/2246ADC4-FBDl-46>C7-9631- 92091CBB4538.pdf (last visited Feb. 20, 2010) [hereinafter Vending Policy].
-
(2010)
Beverage Industry School Vending Policy
-
-
-
149
-
-
78650810986
-
-
Mello et al., Supra note 72, at 600
-
Mello et al., Supra note 72, at 600.
-
-
-
-
150
-
-
78650840609
-
-
Id
-
Id.
-
-
-
-
151
-
-
78650814762
-
-
Vending Policy, Supra note 78
-
Id.; see Vending Policy, Supra note 78.
-
-
-
-
152
-
-
35248870685
-
How bill put the fizz in the fight against fat
-
May 15, 22.
-
Jeffrey Kluger, How Bill Put the Fizz in the Fight Against Fat, TIME, May 15, 2006, at 22, 22.
-
(2006)
Time
, pp. 22
-
-
Kluger, J.1
-
153
-
-
78650841880
-
-
Alliance for a Healthier Generation, About the Alliance, last visited Feb. 9
-
Alliance for a Healthier Generation, About the Alliance, http://www.healthiergeneration.org/about.aspx (last visited Feb. 9, 2010).
-
(2010)
-
-
-
154
-
-
78650847865
-
-
Mello et al., supra note 72, at 600
-
Mello et al., supra note 72, at 600.
-
-
-
-
155
-
-
78650806647
-
-
Id
-
Id.
-
-
-
-
156
-
-
78650828406
-
-
Id
-
Id.
-
-
-
-
157
-
-
78650813155
-
-
Id
-
Id.
-
-
-
-
158
-
-
78650807191
-
-
Id
-
Id.
-
-
-
-
159
-
-
78650829821
-
-
Id
-
Id.
-
-
-
-
160
-
-
78650823790
-
-
Id
-
Id.
-
-
-
-
161
-
-
78650801359
-
-
Id
-
Id.
-
-
-
-
162
-
-
78650818070
-
-
Id
-
Id.
-
-
-
-
164
-
-
78650840349
-
-
Id. §10(b)(1)(A)
-
Id. §10(b)(1)(A).
-
-
-
-
165
-
-
78650821772
-
-
Id. §10(b)(1)(B)
-
Id. §10(b)(1)(B).
-
-
-
-
167
-
-
78650840350
-
-
U.S. Senator Tom Harkin, Senator Harkin's Health and Wellness Update: Harkin Pushes Bipartisan Measure to Improve Kids Health, April 2006 (on file with author)
-
U.S. Senator Tom Harkin, Senator Harkin's Health and Wellness Update: Harkin Pushes Bipartisan Measure to Improve Kids Health, April 2006 (on file with author).
-
-
-
-
168
-
-
84865414592
-
-
last visited Feb. 26
-
S. 934: Child Nutrition Promotion and School Lunch Protection Act of 2009, GOVTRACK.us, http://www.govtrack.us/congress/bill.xpd?bill=slll- 934&tab=related (last visited Feb. 26, 2010) (discussing the legislative history of the Child Nutrition Promotion and School Lunch Protection legislation in the current Senate bill 934, and previous House and Senate bills S. 771, H.R. 1363, S. 2592, H.R. 5167).
-
(2010)
Child Nutrition Promotion and School Lunch Protection Act of 2009
, pp. 934
-
-
-
169
-
-
78650843255
-
-
Woolsey and Harkin again introduced the bills in 2009. Deborah Lehmann, School Lunch Talk, Harkin Introduces School Food Bill in Senate,
-
Woolsey and Harkin again introduced the bills in 2009. Deborah Lehmann, School Lunch Talk, Harkin Introduces School Food Bill in Senate, http://www.school foodpolicy.com/2009/05/06/harkin-introduces-school-food-bill- in-senate/
-
-
-
-
170
-
-
78650833587
-
Competitive foods
-
Prevention Institute for the Center for Health Improvement
-
In 1993, the West Virginia Board of Education regulated competitive foods with some of the highest standards in the nation. Prevention Institute for the Center for Health Improvement, Competitive Foods, in NUTRITION POLICY PROFILES (2002) http://www.preventioninstitute.org/component/jlibrary/article/id-202/127. htmleight (click on "Competitive Foods" under "Associated File(s)"). In 2003, Arkansas banned vending machines accessible to elementary school students.
-
(2002)
Nutrition Policy Profiles
-
-
-
171
-
-
78650805846
-
-
Vending Machines in Schools
-
See Act 1220, 2003 Ark. Acts 4226, 4230. Colorado, Louisiana, Tennessee, and Washington followed Arkansas with bans on school vending machines in 2004. National Conference of State Legislatures, Vending Machines in Schools 2005, http://www.ncsl.org/issuesresearch/health/vendingmachinesinschools2005/ tabiďl4108/default.aspx.
-
(2005)
National Conference of State Legislatures
-
-
-
172
-
-
1542420400
-
-
§38,085 (West 2009)
-
CAL. EDUC. CODE §38,085 (West 2009).
-
Cal. Educ. Code
-
-
-
173
-
-
1542420400
-
-
More recently and with specific regard for beverage sales in schools, California enacted the Pupil Nutrition, Health, and Achievement Act of 2001 to take effect in 2006. The Pupil Nutrition, Health, and Achievement Act of 2001, ch. 913, §2, 2001 Cal. Legis. Serv. 5734, 5736 (West 2001) codified at §49,431.5 West
-
More recently and with specific regard for beverage sales in schools, California enacted the Pupil Nutrition, Health, and Achievement Act of 2001 to take effect in 2006. The Pupil Nutrition, Health, and Achievement Act of 2001, ch. 913, §2, 2001 Cal. Legis. Serv. 5734, 5736 (West 2001) (codified at CAL. EDUC. CODE §49,431.5 (West 2006)).
-
(2006)
Cal. Educ. Code
-
-
-
174
-
-
78650843007
-
-
Mello et al., Supra note 72, at 596
-
Mello et al., Supra note 72, at 596.
-
-
-
-
175
-
-
78650828986
-
-
Thanks to Alison Lerner, University of Georgia School of Law, class of 2010, for her excellent work in drafting the case study that served as the basis for this Section
-
Thanks to Alison Lerner, University of Georgia School of Law, class of 2010, for her excellent work in drafting the case study that served as the basis for this Section.
-
-
-
-
177
-
-
78650811823
-
-
See id. at 9
-
See id. at 9.
-
-
-
-
178
-
-
78650845240
-
Increasing global demand for an uncensored internet-how the U.S. can help defeat online censorship by facilitating private action
-
318
-
Andrew W. Lloyd, Increasing Global Demand for an Uncensored Internet-How the U.S. Can Help Defeat Online Censorship by Facilitating Private Action, 41 VAND. J. TRANSNAT'L L. 299, 318 (2008);
-
(2008)
Vand. J. Transnat'l L.
, vol.41
, pp. 299
-
-
Lloyd, A.W.1
-
179
-
-
78650830657
-
Internet anti-jamming technology companies reach milestone agreement
-
Dec. 18
-
Internet Anti-Jamming Technology Companies Reach Milestone Agreement, Bus. WIRE, Dec. 18, 2006.
-
(2006)
Bus. Wire
-
-
-
180
-
-
78650806922
-
Aiding the enemy: Imposing liability on U.S. corporations for selling China internet tools to restrict human rights
-
511 In 2003, President Hu Jintao took office, and restrictions on speech tightened further
-
In 2002, the Chinese government implemented filtering software based on keywords, which greatly increased its ability to control content. Jill R. Newbold, Aiding the Enemy: Imposing Liability on U.S. Corporations for Selling China Internet Tools to Restrict Human Rights, 2003 U. III. J.L. TECH. & POL'Y 503, 511 (2003). In 2003, President Hu Jintao took office, and restrictions on speech tightened further.
-
(2003)
U. III. J.L. Tech. & Pol'y
, vol.2003
, pp. 503
-
-
Newbold, J.R.1
-
181
-
-
77952681319
-
-
supra note 103, at 3. In 2004, the government jailed Shi Tao, a prominent anti-government blogger, in a highly publicized incident that created an outcry in the media around the world
-
See RACE TO THE BOTTOM, supra note 103, at 3. In 2004, the government jailed Shi Tao, a prominent anti-government blogger, in a highly publicized incident that created an outcry in the media around the world.
-
Race to the Bottom
-
-
-
182
-
-
78650828650
-
-
Id. at 32
-
Id. at 32;
-
-
-
-
183
-
-
34247602144
-
-
Information Supplied by Yahoo! Helped Journalist Shi Tao Get 10 Years in Prison, Sept. 6
-
Information Supplied by Yahoo! Helped Journalist Shi Tao Get 10 Years in Prison, REPORTERS WITHOUT BORDERS, Sept. 6, 2005, http://en.rsf.org/spip.php? page=article&id-article = 14884.
-
(2005)
Reporters Without Borders
-
-
-
184
-
-
78650828145
-
A global first amendment?
-
514 (citation omitted)
-
In 2005, the Chinese government created yet more regulations, this time affecting news providers, dubbed "Internet News Information Sources" that significantly tightens the existing censorship requirements and took direct aim at companies like Google, Yahoo!, and MSN. Kaydee Smith, A Global First Amendment?, 6 J. TELECOMM. & HIGH TECH. L. 509, 514 (2008) (citation omitted);
-
(2008)
J. Telecomm. & High Tech. L.
, vol.6
, pp. 509
-
-
Smith, K.1
-
185
-
-
78650838496
-
License to blog: Internet regulation in the people's republic of China
-
providing an excellent overview of the dynamics of Chinese censorship and China's legal foundation allowing it
-
see generally Trina K. Kissel, License to Blog: Internet Regulation in the People's Republic of China, 17 IND. INT'L & COMP. L. REV. 229 (2007) (providing an excellent overview of the dynamics of Chinese censorship and China's legal foundation allowing it).
-
(2007)
Ind. Int'l & Comp. L. Rev.
, vol.17
, pp. 229
-
-
Kissel, T.K.1
-
186
-
-
78650801889
-
Hitting wall in China
-
Feb. 15
-
Rachel Laing, Hitting Wall in China, SAN DIEGO UNION-TRIB., Feb. 15, 2006;
-
(2006)
San Diego Union-Trib.
-
-
Laing, R.1
-
187
-
-
78650833846
-
-
see generally Lloyd, supranote 105
-
see generally Lloyd, supranote 105.
-
-
-
-
188
-
-
77956370216
-
The global online freedom act: A critique of its objectives, methods, and ultimate effectiveness combating american businesses that facilitate internet censorship in the people's republic of China
-
157-62 discussing the role of corporations China and the companies' defenses to accusations of complicity
-
See William J. Cannici, Jr., The Global Online Freedom Act: A Critique of its Objectives, Methods, and Ultimate Effectiveness Combating American Businesses That Facilitate Internet Censorship in The People's Republic of China, 32 SETON HALL LEGIS. J. 123, 157-62 (2007) (discussing the role of corporations China and the companies' defenses to accusations of complicity).
-
(2007)
Seton Hall Legis. J.
, vol.32
, pp. 123
-
-
Cannici Jr., W.J.1
-
190
-
-
84857182284
-
-
F.3d 1199 9th Cir. Yahoo! also came under fire in the mid-2000s for releasing information that ultimately lead to the arrest and imprisonment of the Chinese dissidents Li Zhi in 2003 and Shi Tao in 2004
-
Yahoo! brought the French government's requests to federal court in the United States to determine if they were enforceable in the U.S., but the court handily ducked the issue by declaring it moot-since Yahoo! had already complied with the order, without further action by the French government, there was no case. See Yahoo! Inc. v. La Ligue Contre Le Racisme et L'Antiseitisme, 433 F.3d 1199 (9th Cir. 2006). Yahoo! also came under fire in the mid-2000s for releasing information that ultimately lead to the arrest and imprisonment of the Chinese dissidents Li Zhi in 2003 and Shi Tao in 2004.
-
(2006)
Yahoo! Inc. V. La Ligue Contre le Racisme et L'Antiseitisme
, vol.433
-
-
-
191
-
-
38849086079
-
Internet firms facing questions about censoring online searches in China
-
Feb. 15
-
See Tom Zeller Jr., Internet Firms Facing Questions About Censoring Online Searches in China, N.Y. TIMES, Feb. 15, 2006, at C3.
-
(2006)
N.Y. Times
-
-
Zeller Jr., T.1
-
192
-
-
78650830377
-
-
See also RACE TO THE BOTTOM, supra note 103, at 107-10
-
See also RACE TO THE BOTTOM, supra note 103, at 107-10;
-
-
-
-
193
-
-
78650808901
-
-
Information Supplied by Yahoo! Helped Journalist Shi Tao Get 10 Years in Prison, supra note 106. In addition to the disclosure to Chinese authorities of personal identifying information, Yahoo! also engages in the practice of de-listing Web sites in compliance with Chinese government speech laws, which means that certain Web sites are simply unavailable on Yahoo!'s Chineselanguage search engine
-
Information Supplied by Yahoo! Helped Journalist Shi Tao Get 10 Years in Prison, supra note 106. In addition to the disclosure to Chinese authorities of personal identifying information, Yahoo! also engages in the practice of de-listing Web sites in compliance with Chinese government speech laws, which means that certain Web sites are simply unavailable on Yahoo!'s Chineselanguage search engine.
-
-
-
-
194
-
-
77952681319
-
-
supra note 103, at 26
-
See RACE TO THE BOTTOM, supra note 103, at 26.
-
Race to the Bottom
-
-
-
195
-
-
78650847866
-
Microsoft censors Chinese blogger
-
Jan. 4
-
Andrew Donaghue, Microsoft Censors Chinese Blogger, ZDNET UK, Jan. 4, 2006, http://news.zdnet.co.Uk/security/0,1000000189,39245583,OO.htm.
-
(2006)
Zdnet UK
-
-
Donaghue, A.1
-
196
-
-
77952681319
-
-
supra note 103, at 43-44
-
RACE TO THE BOTTOM, supra note 103, at 43-44.
-
Race to the Bottom
-
-
-
197
-
-
78650802421
-
-
Id. at 55
-
Id. at 55;
-
-
-
-
198
-
-
78650806134
-
Google to censor results on new Chinese search site
-
Jan. 25
-
Google to Censor Results on New Chinese Search Site, WASH. POST, Jan. 25, 2006, at DIO.
-
(2006)
Wash. Post
-
-
-
199
-
-
77952681319
-
-
supranote 103, at 55
-
RACE TO THE BOTTOM, supranote 103, at 55;
-
Race to the Bottom
-
-
-
200
-
-
78650829541
-
-
Google to Censor Results on New Chinese Search Site, supra note 113
-
Google to Censor Results on New Chinese Search Site, supra note 113.
-
-
-
-
201
-
-
78650841587
-
-
last visited Feb. 12, 2010
-
Broadcasting Board of Governors, About the Agency, http://www.bbg.gov/ about/index.html (last visited Feb. 12, 2010);
-
-
-
-
202
-
-
78650834659
-
-
Lloyd, supra note 105
-
Lloyd, supra note 105.
-
-
-
-
203
-
-
78650807594
-
-
House Policy Committee, Policy Statement, Sept. 19, hereinafter Tear Down This Firewall
-
House Policy Committee, Policy Statement, Establishing Global Internet Freedom: Tear Down This Firewall, Sept. 19, 2002, available at http://web.archive.Org/web/20021014010556/http://policy.house.gov/html/ news-item.cfm?id= 112 [hereinafter Tear Down This Firewall].
-
(2002)
Establishing Global Internet Freedom: Tear Down This Firewall
-
-
-
204
-
-
78650809480
-
-
Id
-
Id.
-
-
-
-
205
-
-
78650828911
-
-
Id
-
Id.
-
-
-
-
206
-
-
78650803793
-
-
discussing successive Senate and House bills last visited Apr. 9
-
After the initial introduction of the Global Internet Freedom Act in 2002, it was subsequently introduced twice more but failed to be made into law. See H.R. 4741: Global Internet Freedom Act, GOVTRACK.US http://www.govtrack.us/ congress/bill.xpd?bill=hl09-4741&tab=related (discussing successive Senate and House bills) (last visited Apr. 9, 2010).
-
(2010)
H.R. 4741: Global Internet Freedom Act
-
-
-
207
-
-
78650834107
-
-
H.R. 4741, 109th Cong. §4(a)
-
Global Internet Freedom Act, H.R. 4741, 109th Cong. §4(a) (2006).
-
(2006)
Global Internet Freedom Act
-
-
-
208
-
-
78650839798
-
-
Id. §6
-
Id. §6.
-
-
-
-
209
-
-
78650819896
-
-
Id. §2(1)
-
Id. §2(1).
-
-
-
-
210
-
-
78650812345
-
-
Id. §4(a)
-
Id. §4(a);
-
-
-
-
211
-
-
78650801614
-
-
see supra note 115 and accompanying text (discussing the IBB)
-
see supra note 115 and accompanying text (discussing the IBB).
-
-
-
-
212
-
-
78650821775
-
-
H.R. 4741 §3(5)
-
H.R. 4741 §3(5);
-
-
-
-
213
-
-
78650802964
-
-
see supranote 105 and accompanying text discussing of private anti-jamming companies
-
see supranote 105 and accompanying text (discussing of private anti-jamming companies).
-
-
-
-
214
-
-
78650827895
-
-
U.S. Department of State, Internet Freedom last visited Feb. 5
-
U.S. Department of State, Internet Freedom, http://www.state.gov/e/eeb/ cip/cl7156.htm (last visited Feb. 5, 2010).
-
(2010)
-
-
-
215
-
-
78650815860
-
-
Smith, Supra note 106, at 518
-
Smith, Supra note 106, at 518.
-
-
-
-
216
-
-
78650823519
-
-
Id
-
Id.
-
-
-
-
217
-
-
78650825412
-
Google, yahoo support "independent monitoring" of foreign practices
-
May 21
-
Greg Piper, Google, Yahoo Support "Independent Monitoring" of Foreign Practices, WASH. INTERNET DAILY, May 21, 2008.
-
(2008)
Wash. Internet Daily
-
-
Piper, G.1
-
218
-
-
78650824317
-
The internet in China: A tool for freedom or suppression?: Joint hearing before the subcomm. on Africa, global human rights and international operations and the subcomm. on Asia and the Pacifíc of the H. comm. on international relations
-
hereinafter 2006Hearing
-
The Internet in China: A Tool for Freedom or Suppression?: Joint Hearing Before the Subcomm. on Africa, Global Human Rights and International Operations and the Subcomm. on Asia and the Pacifíc of the H. Comm. on International Relations, 109th Cong. (2006) [hereinafter 2006Hearing].
-
(2006)
109th Cong
-
-
-
219
-
-
78650820925
-
-
Id. at 2 (statement of Rep. Smith)
-
Id. at 2 (statement of Rep. Smith).
-
-
-
-
220
-
-
78650825701
-
-
Id
-
Id.
-
-
-
-
221
-
-
78650823517
-
-
Id. at 65-76 statement of Elliot Schräge, Vice President for Corporate Communications & Public Affairs, Google, Inc
-
Id. at 65-76 (statement of Elliot Schräge, Vice President for Corporate Communications & Public Affairs, Google, Inc.).
-
-
-
-
222
-
-
78650852069
-
Gates suggests US law to guide on internet censorship abroad
-
Feb. 16 alterationinoriginal
-
Richard Waters, Gates Suggests US Law to Guide on Internet Censorship Abroad, FIN. TIMES (London), Feb. 16, 2006, at 6 (alteration in original).
-
(2006)
Fin. Times (London)
, pp. 6
-
-
Waters, R.1
-
223
-
-
78650850562
-
-
2006 Hearing, supra note 129, at 4 (statement of Rep. Smith)
-
2006 Hearing, supra note 129, at 4 (statement of Rep. Smith).
-
-
-
-
224
-
-
78650816785
-
-
Id
-
Id.
-
-
-
-
225
-
-
78650841881
-
-
H.R. 4780, 109th Cong.
-
Global Online Freedom Act, H.R. 4780, 109th Cong. (2006).
-
(2006)
Global Online Freedom Act
-
-
-
226
-
-
78650826816
-
-
Id
-
Id.
-
-
-
-
227
-
-
78650807323
-
-
Id. §104
-
Id. §104.
-
-
-
-
228
-
-
78650810033
-
-
Id. §104(b)(6)
-
Id. §104(b)(6).
-
-
-
-
229
-
-
78650852617
-
-
last visited Feb. 5
-
H.R. 4780: Global Online Freedom Act of 2006, GOVTRACK. US, http://www.govtrack.us/congress/bill.xpd?bill=hl09-4780> (last visited Feb. 5, 2010).
-
(2010)
H.R. 4780: Global Online Freedom Act of 2006
-
-
-
230
-
-
78650842142
-
-
last visited Feb. 5
-
H.R. 275: Global Online Freedom Act of 2007, GOVTRACK.US, http://www.govtrack.us/congress/bill.xpd?bill=h110-275 (last visited Feb. 5, 2010).
-
(2010)
H.R. 275: Global Online Freedom Act of 2007
-
-
-
231
-
-
78650805312
-
Internet conduct code ready in "months," yahoo's yang says
-
Apr. 4
-
Greg Piper, Internet Conduct Code Ready in "Months," Yahoo's Yang Says, WASH. INTERNET DAILY, Apr. 4, 2008.
-
(2008)
Wash. Internet Daily
-
-
Piper, G.1
-
232
-
-
78650816119
-
-
Id
-
Id.
-
-
-
-
233
-
-
78650810411
-
Global internet freedom: Corporate responsibility and the rule of law: Hearing before the subcomm. on human rights and the law of the S. Comm. on the judiciary
-
hereinafter 2008Hearing
-
Global Internet Freedom: Corporate Responsibility and the Rule of Law: Hearing Before the Subcomm. on Human Rights and the Law of the S. Comm. on the Judiciary, 110th Cong. (2008) [hereinafter 2008Hearing].
-
(2008)
110th Cong
-
-
-
234
-
-
78650851536
-
-
Id. at 3 (statement of Sen. Durbin)
-
Id. at 3 (statement of Sen. Durbin).
-
-
-
-
235
-
-
78650820662
-
-
Id. at 10-12 (statement of Arvind Ganesan, Director, Business and Human Rights Program, Human Rights Watch)
-
Id. at 10-12 (statement of Arvind Ganesan, Director, Business and Human Rights Program, Human Rights Watch).
-
-
-
-
236
-
-
78650810988
-
-
Id
-
Id.
-
-
-
-
237
-
-
78650834660
-
-
Id. at 12
-
Id. at 12.
-
-
-
-
238
-
-
78650850565
-
-
Id. Bill Gates himself, actually, suggested modeling legislation on the FCPA
-
Id. Bill Gates himself, actually, suggested modeling legislation on the FCPA.
-
-
-
-
239
-
-
78650802160
-
-
Waters, supra note 133. The FCPA works by requiring that companies put systems in place to prevent abuses, and then holds them accountable when abuses occur
-
Waters, supra note 133. The FCPA works by requiring that companies put systems in place to prevent abuses, and then holds them accountable when abuses occur.
-
-
-
-
240
-
-
78650841588
-
-
Id
-
Id.
-
-
-
-
241
-
-
78650822059
-
-
2008 Hearing, supra note 144, at 119 (statement of John G. Palfrey, Jr., Clinical Professor of Law and Executive Director, Berkman Center for Internet & Society, Harvard Law School)
-
2008 Hearing, supra note 144, at 119 (statement of John G. Palfrey, Jr., Clinical Professor of Law and Executive Director, Berkman Center for Internet & Society, Harvard Law School).
-
-
-
-
242
-
-
78650808424
-
-
Id. at 115 (statement of Leslie Harris, President and CEO, Center for Democracy & Technology)
-
Id. at 115 (statement of Leslie Harris, President and CEO, Center for Democracy & Technology).
-
-
-
-
243
-
-
78650846883
-
-
2006 Hearing, supranote 129, at 34-35 (statement of Sen. Durbin)
-
2006 Hearing, supranote 129, at 34-35 (statement of Sen. Durbin).
-
-
-
-
244
-
-
78650815030
-
-
last visited Apr. 19
-
Global Network Initiative, http://www.globalnetworkinitiative.org (last visited Apr. 19, 2008).
-
(2008)
-
-
-
245
-
-
78650840352
-
-
last visited Feb. 5
-
Global Network Initiative, Core Commitments, http://www. globalnetworkinitiative.org/corecommitments/index.php (last visited Feb. 5, 2010).
-
(2010)
-
-
-
246
-
-
78650837215
-
-
Id
-
Id.
-
-
-
-
247
-
-
78650813156
-
-
last visited Feb. 5
-
Global Network Initiative, Principles, http://www.globalnetwork initiative.org/principles/index.php (last visited Feb. 5, 2010).
-
(2010)
-
-
-
248
-
-
78650850031
-
-
Id
-
Id.
-
-
-
-
249
-
-
78650844323
-
-
Id
-
Id.
-
-
-
-
250
-
-
78650807597
-
-
Id
-
Id.
-
-
-
-
251
-
-
78650816784
-
-
last visited Feb. 5
-
Global Network Initiative, Implementation Guidelines, http://www.globalnetworkinitiative.org/implementationguidelines/index.php (last visited Feb. 5, 2010).
-
(2010)
-
-
-
252
-
-
78650812628
-
-
Id
-
Id.
-
-
-
-
253
-
-
78650816410
-
-
For example, the document recommends that human rights impact assessments should be employed when companies engage in the following practices: Reviewing and revising internal procedures for responding to government demands for user data or content restrictions in existing markets. Entering new markets, particularly those where freedom of expression and privacy are not well protected. Reviewing the policies, procedures and activities of potential partners, investments, suppliers and other relevant related parties for protecting freedom of expression and privacy as part of its corporate due diligence process. Designing and introducing new technologies, products and services
-
For example, the document recommends that human rights impact assessments should be employed when companies engage in the following practices: Reviewing and revising internal procedures for responding to government demands for user data or content restrictions in existing markets. Entering new markets, particularly those where freedom of expression and privacy are not well protected. Reviewing the policies, procedures and activities of potential partners, investments, suppliers and other relevant related parties for protecting freedom of expression and privacy as part of its corporate due diligence process. Designing and introducing new technologies, products and services.
-
-
-
-
254
-
-
78650826815
-
-
Id
-
Id.
-
-
-
-
255
-
-
78650804225
-
-
Id
-
Id.
-
-
-
-
256
-
-
78650850563
-
-
Id
-
Id.
-
-
-
-
257
-
-
78650804047
-
-
visited Feb. 5
-
Global Network Initiative, Governance, Accountability & Learning Framework, http://www.globalnetworkinitiative.org/governanceframework/index. phpgt;Oast visited Feb. 5, 2010).
-
(2010)
-
-
-
258
-
-
78650846031
-
-
Id
-
Id.
-
-
-
-
259
-
-
78650830659
-
-
Id
-
Id.
-
-
-
-
260
-
-
78650832487
-
-
Id
-
Id.
-
-
-
-
261
-
-
78650807596
-
-
Id. These core commitments are carried out by the group's stakeholders, which include the ISP companies and non-profits discussed earlier
-
Id. These core commitments are carried out by the group's stakeholders, which include the ISP companies and non-profits discussed earlier.
-
-
-
-
262
-
-
78650847609
-
-
last visited Feb. 5, In addition to the human rights non-profits and academics that were active in the creation of the GNI, the members also include socially responsible investment firms like the Calvert Group and Trillium Asset Management
-
See Global Network Initiative, Participants, http://www. globalnetworkinitiative.org/participants/index.php (last visited Feb. 5, 2010). In addition to the human rights non-profits and academics that were active in the creation of the GNI, the members also include socially responsible investment firms like the Calvert Group and Trillium Asset Management.
-
(2010)
-
-
-
263
-
-
78650821486
-
-
Id. The only governmental participant is a United Nations Special Representative to the Secretary-General on Business & Human Rights, who has observer status
-
Id. The only governmental participant is a United Nations Special Representative to the Secretary-General on Business & Human Rights, who has observer status.
-
-
-
-
264
-
-
78650849536
-
-
Id
-
Id.
-
-
-
-
265
-
-
78650850999
-
Wired blog: Just a PR exercise?
-
Oct. 31
-
See James Eagle, Wired Blog: Just a PR Exercise?, MORNING STAR (BRITAIN), Oct. 31, 2008, http://www.morningstaronline.co.uk/index.php/news/content/view/ full/67643;
-
(2008)
Morning Star (Britain)
-
-
Eagle, J.1
-
266
-
-
78650849534
-
Big tech companies back global plan to shield online speech
-
Oct. 28, ending with scathing criticism of the GNI by human rights organizations
-
Miguel Helft & John Markoff, Big Tech Companies Back Global Plan to Shield Online Speech, N. Y. TIMES, Oct. 28, 2008, at B8 (ending with scathing criticism of the GNI by human rights organizations);
-
(2008)
N. Y. Times
-
-
Helft, M.1
Markoff, J.2
-
268
-
-
78650846881
-
-
See Farivar, supra note 170. Since its formation in October, the main action that GNI appears to have taken has been to hold a public forum in December, in conjunction with the International Seminar on Business and Human Rights in celebration of the sixtieth anniversary of the Universal Declaration of Human Rights
-
See Farivar, supra note 170. Since its formation in October, the main action that GNI appears to have taken has been to hold a public forum in December, in conjunction with the International Seminar on Business and Human Rights in celebration of the sixtieth anniversary of the Universal Declaration of Human Rights.
-
-
-
-
269
-
-
78650846880
-
-
Dec. 18, It has also created several blog-style press releases
-
GNI Successfully Holds First Public Forum, GLOBAL NETWORK INITIATIVE, Dec. 18, 2008, http://www.globalnetworkinitiative.org/newsandevents/GNI- Successfully-Holds-First-Public-Forum.php. It has also created several blog-style press releases.
-
(2008)
GNI Successfully Holds First Public Forum
-
-
-
270
-
-
78650820144
-
-
last visited Feb. 5
-
See Global Network Initiative, News and Events, http://www. globalnetworkinitiative.org/newsandevents/index.php (last visited Feb. 5, 2010).
-
(2010)
-
-
-
272
-
-
78650807324
-
Code of conduct requires companies to press governments for legal grounds
-
Oct. 29
-
See Greg Piper, Code of Conduct Requires Companies to Press Governments for Legal Grounds, WASH. INTERNET DAILY, Oct. 29, 2008.
-
(2008)
Wash. Internet Daily
-
-
Piper, G.1
-
273
-
-
76949101232
-
Google's gatekeepers
-
Nov. 30
-
Jeffrey Rosen, Google's Gatekeepers, N.Y. TIMES, Nov. 30, 2008, at MM50.
-
(2008)
N.Y. Times
-
-
Rosen, J.1
-
275
-
-
78650807872
-
-
Thanks to Alison Lerner for thoughts on this analogy
-
Thanks to Alison Lerner for thoughts on this analogy.
-
-
-
-
276
-
-
78650822618
-
The promise and pitfalls of coregulation: How governments can draw on private governance for public purpose
-
David Moss & John Cisterino eds., describing such self-regulatory organizations
-
See Edward J. Balleisen & Marc Eisner, The Promise and Pitfalls of CoRegulation: How Governments Can Draw on Private Governance for Public Purpose, in NEW PERSPECTIVES ON REGULATION 127 (David Moss & John Cisterino eds., 2009) (describing such self-regulatory organizations).
-
(2009)
New Perspectives on Regulation
, vol.127
-
-
Balleisen, E.J.1
Eisner, M.2
-
277
-
-
78650834108
-
-
Solomon, supra note 5, at 824
-
Solomon, supra note 5, at 824.
-
-
-
-
278
-
-
78650815574
-
-
See Global Network Initiative, supranote 169
-
Of the twenty-four participants in the GNI as of this writing, fully half of them are high-profile and well-funded non-profit and academic organizations such as Human Rights Watch, the Berkman Center, the Center for Democracy and Technology, and the Electronic Frontier Foundation that were active during the 1990s and 2000s in monitoring and publicizing the activities of the Chinese government. See Global Network Initiative, supranote 169.
-
-
-
-
279
-
-
74849132345
-
Global internet freedom: Can censorship and freedom coexist?
-
arguing for either the direct creation of OGIF as envisioned by GOFA or some similar body
-
See generally Elaine Chen, Global Internet Freedom: Can Censorship and Freedom Coexist?, 13 DEPAUL-LCA J. ART & ENT. L. & POL'Y 229 (2003) (arguing for either the direct creation of OGIF as envisioned by GOFA or some similar body);
-
(2003)
DEpaul-Lca J. Art & Ent. L. & Pol'y
, vol.13
, pp. 229
-
-
Chen, E.1
-
280
-
-
78049248844
-
Corporate complicity in the Chinese censorship regime: When freedom of expression and protability collide
-
same
-
Kristen Farrell, Corporate Complicity in the Chinese Censorship Regime: When Freedom of Expression and Protability Collide, 11 J. INTERNET L. 1 (2008) (same);
-
(2008)
J. Internet L.
, vol.11
, pp. 1
-
-
Farrell, K.1
-
281
-
-
77954772878
-
Code red: Responding to the moral hazards facing U.S. information technology companies in China
-
same Nawyn proposes a hybrid solution which fits the new governance model the closest
-
Marc D. Nawyn, Code Red: Responding to the Moral Hazards Facing U.S. Information Technology Companies in China, 2007 COLUM. BUS. L. REV. 505 (2007) (same). Nawyn proposes a "hybrid solution" which fits the new governance model the closest.
-
(2007)
Colum. Bus. L. Rev.
, vol.2007
, pp. 505
-
-
Nawyn, M.D.1
-
282
-
-
78650804046
-
-
Id. at 554-62
-
Id. at 554-62.
-
-
-
-
283
-
-
78650836137
-
-
273, 310 describing her success in popularizing the phrase "drill, baby, drill" as shorthand for Republican energy policy
-
See SARAH PALIN, GOING ROGUE: AN AMERICAN LIFE 105, 243, 273, 310 (2009) (describing her success in popularizing the phrase "drill, baby, drill" as shorthand for Republican energy policy).
-
(2009)
Going Rogue: An American Life
, vol.105
, pp. 243
-
-
Palin, S.1
-
284
-
-
78650802967
-
-
Edward Balleisen and Marc Eisner refer to this as a well-established and crucial "tactic in the politics of deflection
-
Edward Balleisen and Marc Eisner refer to this as a well-established and crucial "tactic in the politics of deflection."
-
-
-
-
285
-
-
78650823262
-
-
See Balleisen & Eisner, supra note 177, at 131 "Whenever some corner of the business community faces a groundswell of popular support for regulations that will impinge on its commercial practices, the odds are good that its leaders will champion some form of industry-wide regulatory selfgovernance as a means to forestall more onerous rule making and enforcement by the state
-
See Balleisen & Eisner, supra note 177, at 131 ("Whenever some corner of the business community faces a groundswell of popular support for regulations that will impinge on its commercial practices, the odds are good that its leaders will champion some form of industry-wide regulatory selfgovernance as a means to forestall more onerous rule making and enforcement by the state.").
-
-
-
-
286
-
-
11244302593
-
Reply, new governance in legal thought and in die world: Some splitting as antidote ta overzealous lumping
-
484 Writings of the 'democratic experimentalist' camp, in particular, emphasize the inherent and inescapable epistemic constraints that limit our ability to map and devise comprehensive solutions to complex and dynamic social problems, militating in favor of a regulatory architecture that embraces the provisionality, revisability, and experimental character of all policy determinations
-
See Bradley C. Karkkainen, Reply, "New Governance" in Legal Thought and in die World: Some Splitting as Antidote ta Overzealous Lumping, 89 MINN. L. REV. 471, 484 (2004) ("Writings of the 'democratic experimentalist' camp, in particular, emphasize the inherent and inescapable epistemic constraints that limit our ability to map and devise comprehensive solutions to complex and dynamic social problems, militating in favor of a regulatory architecture that embraces the provisionality, revisability, and experimental character of all policy determinations.").
-
(2004)
Minn. L. Rev.
, vol.89
, pp. 471
-
-
Karkkainen, B.C.1
-
287
-
-
78650814487
-
-
AYRES & BRAITHWAITE, supra note 2, at 101-32
-
Related ideas in the literature include "enforced self-regulation," see AYRES & BRAITHWAITE, supra note 2, at 101-32;
-
-
-
-
289
-
-
45149115696
-
Meta-regulation: Legal accountability for corporate social responsibility
-
210-13 Doreen McBarnet et al. eds.
-
see Christine Parker, Meta-Regulation: Legal Accountability for Corporate Social Responsibility, in THE NEW CORPORATE ACCOUNTABILITY: CORPORATE SOCIAL RESPONSIBILITY AND THE LAW 207, 210-13 (Doreen McBarnet et al. eds., 2007).
-
(2007)
The New Corporate Accountability: Corporate Social Responsibility and the Law
, pp. 207
-
-
Parker, C.1
-
290
-
-
61349142706
-
Self-regulation and the meta-regulatory state
-
136-40 Fabrizio Cafaggi ed., providing "a taxonomy of the different forms of relationship between state actors and self-regulatory regimes
-
See also Colin Scott, Self-Regulation and the Meta-Regulatory State, in REFRAMING SELF-REGULATION IN EUROPEAN PRIVATE LAW 131, 136-40 (Fabrizio Cafaggi ed., 2006) (providing "a taxonomy of the different forms of relationship between state actors and self-regulatory regimes").
-
(2006)
Reframing Self-Regulation in European Private Law
, pp. 131
-
-
Scott, C.1
-
291
-
-
33845734180
-
Regulation as delegation: Private firms, decisionmaking, and accountability in the administrative state
-
377-78
-
Invent and use this new term of "industry capture" to refer to the distinct idea that there is this existing private-sector regulatory architecture which the public sector uses for its own ends. Another related idea is that of delegating regulatory authority to firms, explored in Kenneth A. Bamberger, Regulation as Delegation: Private Firms, Decisionmaking, and Accountability in the Administrative State, 56 DUKE L.J. 377, 377-78 (2006).
-
(2006)
Duke L.J.
, vol.56
, pp. 377
-
-
Bamberger, K.A.1
-
292
-
-
78650804778
-
-
AYRES & BRAITHWAITE, supra note 2, at 5 "[T]he best [regulatory] strategy is shown to depend on context, regulatory culture, and history
-
See AYRES & BRAITHWAITE, supra note 2, at 5 ("[T]he best [regulatory] strategy is shown to depend on context, regulatory culture, and history.").
-
-
-
|