Dec 21
Vol.
43
Issue 2

Article

The Myth of Autonomy Rights

Supreme Court rhetoric, scholarly discussion, blackletter law, and ethical rules have perpetuated a myth that individual rights protect the autonomy of defendants within the criminal legal system. To expose this myth, I examine six rights that the Court has enshrined as essential decision points for criminal defendants due to the rights’ purported expressive and consequential functions: (1) the right to self-representation; (2) the right to plead guilty; (3) the right to waive a jury; (4) the right to testify; (5) the right to waive appeals; and (6) the right to maintain innocence at a capital trial. I conclude that each of these rights fails to protect defendant autonomy.

by Kathryn E. Miller

Article

The Use Doctrine in Trademark Law: Issues from Trade and Transborder Reputation

“Welcome to the best restaurant in town” was the byline of the advertisement in the local newspaper. A restaurant named Panera was to commence business in Tippasandra, Bangalore, India, with a menu that included chat, biryani, and kebabs. Panera Bangalore had no relationship with the American chain with the same name. At the time the advertisement appeared, Panera Inc., the American entity, had no interest in India, and hence, there was no registration for the name in India. The Indian entity registered the trademark (mark) by applying for registration with the Indian Patent & Trademarks Office (IPTO) for a large array of goods, including coffee; chai (a local Indian drink made with milk and black tea); flavored bakery products; frozen products, such as ice creams and flavored ice; insignias; t-shirts; caps; toys; and more.

by Srividhya Ragavan

Article

Beyond Data Ownership

Proposals for data ownership are widely misunderstood, aim at the wrong goal, and would be self-defeating if implemented. This Article, first, shows that data ownership proposals do not argue for the bundle of ownership rights that exists over property at common law. Instead, these proposals focus on transferring rights over personal information solely through consent. Second, this Article shows the flaws of a property approach to personal information. Such an approach magnifies well-known problems of consent in privacy law: asymmetric information, asymmetric bargaining power, and leaving out inferred data. It also creates a fatal problem: moral hazard where corporations lack incentives to mitigate privacy harm. The moral hazard problem makes data ownership self-defeating. Recognizing these deficiencies entails abandoning the idea that property over personal data can achieve meaningful protection.

by Ignacio Cofone

Article

The Powerful Problem of Prayer at Public School Board Meetings

At the start of the Birdville Independent School District school board meeting in Haltom City, Texas, a young public school student prays for the proceedings, stating, “All of us students are lucky to be a part of this district, and I ask God to bless you.” While the student speaks into the microphone that is used by constituents and set at his level in front of the podium, the school board members post a disclaimer on the screen behind them and in front of the gathered assembly of meeting attendees that states: “The content of the speaker’s message is the private expression of the individual student.” This student is part of a longstanding tradition of the district’s merit-based selection of elementary and middle school students to deliver an invocation prior to the start of school board meetings—an invocation practice that was upheld as constitutional by the Fifth Circuit in American Humanist Ass’n v. McCarty.

by Amanda Harmon Cooley

Article

Fake

The Internet today is full of fake people and fake information. Trust in both technology and institutions is in a downward spiral. This Article offers a novel comprehensive framework for calibrating a legal response to technology “fakery” through the lens of information security. Introducing the problems of Internet “MIST”—manipulation, impersonation, sequestering, and toxicity—it argues that these MIST challenges threaten the future viability of the Internet through two morphed dynamics destructive to trust. First, the arrival of the Internet-enabled “long con” has combined traditional con artistry with enhanced technological capability for data collection. Second, the risk of a new “PSYOP industrial complex” now looms. This chimera fuses techniques and employees from military psychological operations with marketing technologies of message hyperpersonalization in order to target civilian audiences for behavioral modification. To address these two problematic dynamics through law, the Article constructs a broader theory of Internet untrustworthiness and fakery regulation.

by Andrea M. Matwyshyn* & Miranda Mowbray*

Student Note

Beyond the Grave: A Fiduciary’s Access to a Decedent’s Digital Assets

Ryan Coleman passed away suddenly and tragically in his sleep at the age of twenty-four on Christmas Day. His initial death certificate stated that the cause of death was “pending further study.” The autopsy report ultimately came back inconclusive—Ryan had died of unknown causes. Left with questions unanswered, Ryan’s parents, Gregory and Adrienne, reached out to Apple in hopes of retrieving data from Ryan’s iPhone. After Apple turned them away, they petitioned the Surrogate’s Court of New York, Westchester County, seeking a court order granting them access to Ryan’s digital assets as personal representatives of his estate.

by Isabelle N. Sehati

Student Note

War & the Constitution: Chemical Agents and the Rights of Protestors

In the wake of the murder of George Floyd, citizens across America launched mass protests that were mirrored around the world. Civil society sought to bring attention to the systematic killing of Black and Brown individuals at the hands of police officers and to the lack of accountability that these tragic events have been met by. Angry, frustrated, and feeling defeated, protestors took to the streets to chant “Black Lives Matter,” “no justice, no peace,” and “defund the police.”

by Yomidalys Güichardo Morel

Student Note

Treat Thy Neighbor as Thyself? Equal Protection and the Scope of RLUIPA’s Equal Terms Clause

Can municipalities use the zoning power to prevent racial or religious minorities from moving in? Not expressly. In 1917, almost a decade before the dawn of modern “Euclidean” zoning—and several decades before Brown v. Board of Education abolished “separate but equal”—the Supreme Court decided that racially segregated zoning, then common, was unconstitutional. But municipalities have other ways to exclude minorities via the zoning power.

by Noah Kane

Issues Archive