The Yale Law Journal

Internet Law


Sexual Privacy

Danielle Keats Citron

New technology threatens the security of information about our intimate lives—our sexual privacy. This Article conceives of sexual privacy as a unique privacy interest that warrants more protection than traditional privacy laws offer. Instead, it suggests a new approach to protecting sexual privacy …


Data Rights and Data Wrongs: Civil Litigation and the New Privacy Norms

Joseph V. DeMarco & Brian A. Fox

This Essay argues that that civil litigation between private parties in the data privacy space is shaping important privacy norms. Because no comprehensive data privacy law exists in the United States, litigants must rely on doctrines that are ill suited to the legal questions raised by the mass col…


Sovereign Difference and Sovereign Deference on the Internet

Jack Goldsmith

This Response to Andrew Woods makes two points. First, it shows why the “fragmentation” charge frequently levied against sovereignty-based approaches to internet governance is misplaced. Second, it questions the efficacy of Woods’s normative theory of judicial comity.


Litigating Data Sovereignty

Andrew Keane Woods

Internet disputes increasingly occur across borders. The key question, this Article contends, is not whether states can exert control over data, but rather the shape their exercises of sovereign power will take. Given this reality, application of sovereign-deference doctrines represents the best hop…


Googling for Meaning: Statutory Interpretation in the Digital Age

Alice A. Wang

Dictionary use has become a common practice in modern statutory interpretation at the Supreme Court.1 With the rise of the “new textualism,”2 Justices increasingly rely on dictionaries to shed light on the plain meaning of statutes—that is, the understanding that an ordinary Engli…


In Defense of Due Diligence in Cyberspace

Michael N. Schmitt

Introduction Recent events such as the attack on Sony by North Korea and revelations that Russians hacked President Obama’s e-mail have drawn attention to the dilemma of harmful transborder state and non-state cyber operations against government and private cyber infrastructure.1 Academ…


Storage Wars: Greater Protection for Messages in Memory

Matthew Sipe

The laws governing stored communication privacy—enacted almost thirty years ago—may finally be updated to reflect contemporary needs, at least in part. The Email Privacy Act,1 proposed by Representatives Kevin Yoder (R-Kan.), Tom Graves (R-Ga.), and Jared Polis (D-Colo.), would afford gr…


Refreshing the Page on Online Collateral Auctions

Stephen S. Gilstrap

120 Yale L.J. 679 (2010). 


Fourth Amendment Seizures of Computer Data

Orin S. Kerr

119 Yale L.J. 700 (2010). 

What does it mean to “seize” computer data for Fourth Amendment purposes? Does copying data amount to a seizure, and if so, when? This Article argues that copying data “seizes” it under the Fourth Amendment when copying occurs without human observation and interrupts the …


Fantasy Liability: Publicity Law, the First Amendment, and Fantasy Sports

Manav K. Bhatnagar

119 Yale L.J. 131 (2009). 


Why the IRS Has Not Taxed Income from Virtual World Transactions . . . Yet

Zachery Jones

Virtual world transactions (VWT) involve the sale or exchange of goods and services that are used exclusively within a virtual world. As participation in virtual worlds increases, both in volume and in character, the boundary between VWT and real world transactions becomes unclear. Consequently, man…


EBay’s Second Life: When Should Virtual Earnings Bear Real Taxes?

Leandra Lederman

Millions of people participate in virtual worlds—immersive online forums such as Second Life and World of Warcraft (WoW). While some online activities lack significant economic implications, one of the attractions of Second Life, which is designed to be a commercial platform, is the prospect of ma…


Virtual World Feudalism

James Grimmelmann

Second Life is a feudal society. No, not metaphorically. Literally. Two problems have preoccupied scholars of virtual world law: What is the political relationship between developers and users? And: Should we treat in-world objects as property? We can make progress on both questions by recognizing …


Reputation as Property in Virtual Economies

Joseph Blocher

Economists and legal theorists have long argued that real-world economies cannot function effectively without well-defined property rights. More recently, scholars have also begun to analyze at least three kinds of “virtual” economies: the online economies exemplified by eBay and other trade-fac…


Symposium Issue: Virtual Worlds

The Pocket Part

The Pocket Part is proud to present our second symposium issue of the academic year, which examines  legal issues surrounding the growing presence and influence of virtual worlds.  This week presents the second and final part of the two issue symposium.


Escape Into the Panopticon: Virtual Worlds and the Surveillance Society

Joshua Fairfield

The Eye: that horrible growing sense of a hostile will that strove with great power to pierce all shadows of cloud, and earth, and flesh, and to see you: to pin you under its deadly gaze, naked, immovable. Introduction Suppose that you move to a new town. To buy your home, you must allow the devel…


John Doe Subpoenas: Toward a Consistent Legal Standard

Nathaniel Gleicher

118 Yale L.J. 320 (2008).


This Note considers the rising trend of anonymous online harassment and the use of John Doe subpoenas to unmask anonymous speakers. Although anonymity often serves as an important shield for valuable speech, it also protects online harassment that can chill or completel…


Wealth Without Markets?

Lior Jacob Strahilevitz

116 Yale L.J. 1472 (2007) 

The Wealth of Networks: How Social Production Transforms Markets and Freedom




E-Discovery of Dynamic Data and Real-Time Communications: New Technology, Practical Facts, and Familiar Legal Principles

Thomas W. Burt & Gregory S. McCurdy

The forthcoming Federal e-discovery Rules are a welcome advance, but they do not address all of e-discovery’s challenging issues. For example, how should the law treat instant messaging (IM) or other forms of real-time communications? When must organizations or individuals preserve dynamic data su…


Regulation by Software

James Grimmelmann

114 Yale L.J. 1719 (2005)

This Note builds on Larry Lessig's famous formulation that "code is law" to argue that Lessig was wrong to equate computer software with physical architecture. Although software resembles both law and architecture in its power to constrain behavior, it has features that dis…


The Law and Economics of Reverse Engineering

Pamela Samuelson & Suzanne Scotchmer

111 Yale L.J. 1575 (2002)

Reverse engineering has a long history as an accepted practice. What it means, broadly speaking, is the process of extracting know-how or knowledge from a human-made artifact. Lawyers and economists have endorsed reverse engineering as an appropriate way to obtain such info…


Architecture as Crime Control

Neal Kumar Kaytal

111 Yale L.J. 1039 (2002)

Building on work in architectural theory, Professor Katyal demonstrates how attention to cities, neighborhoods, and individual buildings can reduce criminal activity. The field of cyberlaw has been transformed by the insight that architecture can regulate behavior in cybersp…


The Internet and the Dormant Commerce Clause

Jack L. Goldsmith & Alan O. Sykes

110 Yale L.J. 785 (2001)


Deliberative Trouble? Why Groups Go to Extremes

Cass R. Sunstein

110 Yale L.J. 71 (2000)

In this Essay, I have discussed the phenomenon of group polarization and explored some of its implications for deliberation generally and deliberative democracy in particular. The central empirical finding is that group discussion is likely to shift judgments toward a more ext…