

National security decisions pose a paradox: they are among the most consequential a government can make, but are generally the least transparent to...
Musk’s attempts to gain access to agency databases is an egregious violation of the act, which protects personal information from abuse.
Children should be seen and not heard, or so the old saying goes. A new version of this adage is now playing out across the United States, as more...
The first principle of insurance reflects the fundamental lesson of the tragic California fires: you can’t get something for nothing. If expected...
This essay considers the future of public-private collaboration in the wake of the Murthy v. Missouri litigation, which cast doubt on the...
Extraordinary times beget extraordinary measures. Multiple national emergencies during the past quarter century have generated a pitched debate as to...
Content moderation is typically viewed as an affront to free expression. When companies remove online abuse, they face accusations of censorship. Lost...
This Essay expounds on the outsized role of private law in governing ownership of new technologies and data. As scholars lament gaps between law and...
The history of public policy is littered with failures to solve large-scale social problems using interventions derived from behavioral science...
The Supreme Court has twice held since 2020 that statutory restrictions on the President’s removal power violate Article II of the U.S. Constitution...
Large language models (LLMs) now perform extremely well on many natural language processing tasks. Their ability to convert legal texts to data may...
Privacy is a key issue in AI regulation, especially in a sensitive area such as healthcare. The United States (US) has taken a sectoral approach to...
The Environmental Law and Community Engagement Clinic at the University of Virginia School of Law filed this amicus brief on behalf of San Bernardino...
The 2024 edition of Selected Intellectual Property, Internet, and Information Law, Statutes, Regulations, and Treaties, edited by Professors Sharon K...
We live in an age of student surveillance. Once student surveillance just involved on-campus video cameras, school resource officers, and tip lines...
Fifty years ago, federal and state lawmakers called for the regulation of a criminal justice “databank” connecting federal, state, and local agencies...
The use of autonomy to initiate force, which states may begin to view as necessary to protect against hypersonic attacks and other forms of ‘hyperwar...
State public utility commissions are at the forefront of the clean-energy transition. These state agencies, which have jurisdiction over energy...