A. Michael Froomkin
Laurie Silvers and Mitchell Rubenstein Distinguished
Professor of Law
J.D. 1987, Yale Law School
Regulating Mass Surveillance as Privacy Pollution: Learning from Environmental Impact Statements (2014)
Self-Defense Against Robots (2014) (with Zack Colangelo)
ICANN and the Domain Name System after the 'Affirmation of Commitments' (book chapter) in Research Handbook on Governance of the Internet (Ian Brown, ed.) (2013).
'PETs Must Be on a Leash': How US Law (and Industry Practice) Often Undermines and Even Forbids Valuable Privacy Protecting Technology, 74 Ohio St. L.J. (2013).
“Hard to Believe, The High Cost of a Biometric Identity Card” (with Jonathan Weinberg), Research Brief issued by The Chief Justice Earl Warren Institute on Law and Social Policy, University of California at Berkeley School of Law (Feb. 2012), available here.
Almost Free: An Analysis of ICANN's 'Affirmation of Commitments', 9 J. Telecom. & High Tech. Law 187 (2011).
Ethical, legal and social issues for personal health records and applications (2010) (with Reid Cushman, Anita Cava, Patricia Abril, & Kenneth W. Goodman) 43 Journal of Biomedical Informatics 551 (2010).
Government Data Breaches, 24 BERK. TECH. L.J. 1018 (2009).
Building the Bottom Up from the Top Down, 5 I/S: A JOURNAL OF LAW AND POLICY FOR THE INFORMATION SOCIETY 141 (2009).
Identity Cards and Identity Romanticism (book chapter) in LESSONS FROM THE IDENTITY TRAIL: ANONYMITY, PRIVACY AND IDENTITY IN A NETWORKED SOCIETY (Ian Kerr, ed., 2009).
Anonymity and the Law in the USA (book chapter) in LESSONS FROM THE IDENTITY TRAIL: ANONYMITY, PRIVACY AND IDENTITY IN A NETWORKED SOCIETY (Ian Kerr, ed., 2009)
The Uneasy Case for National ID Cards as a Means to Enhance Privacy (book chapter) in SECURING PRIVACY IN THE INTERNET AGE (A. Chander, L. Gelman, M.J. Radin, eds Stanford U.P. 2008.
The New Health Information Architecture: Coping with the Privacy Implications of the Personal Health Records Revolution, UM ELSI Group for Project HealthDesign (2008)
Forced Sharing of Patient-Controlled Health Records, UM ELSI Group for Project HealthDesign (2007)
ELSI Guide to Licensing Project HealthDesign Work Product in the Public Interest, for Project HealthDesign (2007)
On the Future of Internet Governance (transcript of panel discussion), 101 AMERICAN SOCIETY OF INTERNATIONAL LAW, PROCEEDINGS OF THE ANNUAL MEETING (2007)
Creating a Viral Federal Privacy Standard, 8 B.C. L. Rev. 55 (2007). The Plural of Anecdote is "Blog", 84 WASH. U. L. REV. 1149 (2006). A Dispatch From the Crypto Wars (Review of MATT CURTIN, BRUTE FORCE: CRACKING THE DATA ENCRYPTION STANDARD (2005)), 2 I/S: A JOURNAL OF LAW AND POLICY FOR THE INFORMATION SOCIETY 345 (2006).
International and National Regulation of the Internet (book chapter in THE ROUND TABLE EXPERT GROUP ON TELECOMMUNICATIONS LAWS: CONFERENCE PAPERS (E.J. DOMMERING & N.A.N.M. VAN EIJK (EDS.) (2005)).
Virtual Worlds, Real Rules (with Caroline Bradley), 49 N.Y.L.S.L. Rev. 103 (2004)
When We Say America™ We Mean It, 41 HOUSTON. L. REV. 839 (2004).
Technologies for Democracy (book chapter in THE PROSPECTS FOR ELECTRONIC DEMOCRACY (Peter Shane, ed. 2004))
Commentary: Time to Hug a Bureaucrat, 35 LOY. U. CHI. L.J. 139 (2003)
ICANN & Anti-Trust, 2003 ILLINOIS L. REV. 1 (co-authored with Mark Lemley)
ICANN 2.0: Meet the New Boss, 36 LOY. L.A. L. REV. 1087 (2003)
Habermas@discourse.net: Toward a Critical Theory of Cyberspace, 116 HARV. L. REV. 749 (2003)
Anonymity in the Balance (book chapter in DIGITAL ANONYMITY: TENSIONS AND DIMENSIONS (C. Nicoll, J.E.J. Prins & M.J.M. van Dellen eds. 2003)
Internet's International Regulation: Emergence and Enforcement, in Évolution des systèmes juridique, bijuridism et commerce international (Louis Perret & Alain-François Bisson, eds.) (Montreal, 2003)
Form and Substance in Cyberspace, 6 J. SMALL & EMERGING BUS. L. 93 (2002)
ICANN's UDRP: Its Causes and (Partial) Cures, 67 BROOKLYN L. REV. 605 (2002)
Internet Governance: The ICANN Experiment (Or, Three Paradoxes in Search of a Paradigm), in LA LIBERTAD DE INFORMACIÓN: GOBIERNO Y ARQUITECTURA DE INTERNET 12 (ed. Loreto Corredoira y Alfonso) (Madrid, 2001).
The Collision of Trademarks, Domain Names, and Due Process in Cyberspace, 44 COMM. ACM 91 (FEB. 2001)
Wrong Turn in Cyberspace: Using ICANN to Route Around the APA and the Constitution, 50 DUKE L.J. 17 (2000)
The Death of Privacy? 52 STAN. L. REV. 1461 (2000).
Speculative Microeconomics for Tomorrow's Economy (with James Bradford De Long) (book chapter) INTERNET PUBLISHING AND BEYOND: THE ECONOMICS OF DIGITAL INFORMATION AND INTELLECTUAL PROPERTY 6 (Brian Kahin &Hal Varian, eds., 2000).
Semi-Private International Rulemaking: Lessons Learned from the WIPO Domain Name Process, book chapter in CHRISTOPHER T. MARSDEN (ED), REGULATING THE GLOBAL INFORMATION SOCIETY 211 (Routledge 2000).
Beating Microsoft at its Own Game (with J. Bradford DeLong), HARV. BUS. REV. 159 (Jan-Feb. 2000) (Review of CHARLES FERGUSON, HIGH STAKES, NO PRISONERS (1999)).
The Constitution and Encryption Regulation: Do We Need a "New Privacy"?, 3 N.Y.U. J. LEGIS & PUB. POL. 25 (1999-2000). Of Governments and Governance, 14 BERKELEY LAW & TECHNOLOGY JOURNAL 617 (1999)
Legal Issues in Anonymity and Pseudonymity, AAAS SYMPOSIUM VOLUME, 15 THE INFORMATION SOCIETY 113 (1999).
2B as Legal Software for Electronic Contracting -- Operating System or Trojan Horse?, 13 BERKELEY L. & TECHNOLOGY JOURNAL 1023 (1999).
A Critique of WIPO's RFC3 (1999)
Comment, The Empire Strikes Back, 73 Chi-Kent L. Rev. 1101 (1998)
Firme digitali e Autorità di Certificazione: La garanzie di validità degli atti elettronici, 23 INGENIUM (Italy) 12 (March, 1998) (tr. Giovanni Nasi)
Recent Developments in US Computer Law, AMICUS CURIAE 27 (Jan., 1998).
Digital Signatures Today in FINANCIAL CRYPTOGRAPHY 287 (Rafael Hirschfeld ed., 1997) (Springer Lecture Notes in Computer Science vol. 1318).
The Internet as a Source of Regulatory Arbitrage (book chapter) in BORDERS IN CYBERSPACE (Brian Kahin and Charles Nesson, eds.) (MIT Press, 1997).
It Came From Planet Clipper, 1996 U. CHI. L. FORUM 15 (The Law of Cyberspace symposium volume).
Flood Control on the Information Ocean: Living With Anonymity, Digital Cash, and Distributed Databases, 15 U. PITT. J. L. & COM. 395 (1996) (Conference for the Second Century of the University of Pittsburgh School of Law Symposium volume).
The Essential Role of Trusted Third Parties in Electronic Commerce, 75 ORE. L. REV. 49 (1996) (The Law and Entrepreneurship Program: Innovation and the Information Environment, Symposium Volume). Reprinted in READINGS IN ELECTRONIC COMMERCE 119 (Ravi Kalakota & Andrew B. Whinston, eds. 1997).
Reinventing the Government Corporation 1995 ILL. L. REV. 543.
Anonymity and Its Enmities, 1 JOURNAL OF ONLINE LAW art. 4 (1995).
The Metaphor is the Key: Cryptography, the Clipper Chip and the Constitution, 143 U. Penn. L. Rev. 709 (1995)).
The Constitutionality of Mandatory Key Escrow--A First Look in BUILDING IN BIG BROTHER: THE CRYPTOGRAPHIC POLICY DEBATE 413 (Lance Hoffman, ed. 1995).
The Imperial Presidency's New Vestments, 88 NW. L. REV. 1346 (1994).
Still Naked After All These Words, 88 NW. L. REV. 1420 (1994).
Politiké Finance V ÈSFR (with Steve Gordon), 12 PRÁVNÍK 1079 (1990).
Climbing the Most Dangerous Branch: Legisprudence and the New Legal Process, 66
TEX. L. REV. 1071 (1988) (book review). Note, In Defense of Administrative Agency Autonomy, 96 YALE L.J. 787 (1987).