Issue Archives

Response to: William Baude, Is Originalism Our Law?, 115 Colum. L. Rev. 2349 (2015).

Response to: Jessica Bulman-Pozen & David E. Pozen, Uncivil Obedience, 115 Colum. L. Rev. 809 (2015)

Response to: Jon D. Michaels, An Enduring, Evolving Separation of Powers, 115 Colum. L. Rev. 515 (2015).

In Reed v. Town of Gilbert the Supreme Court rearticulated the standard for when regulation of speech is content based. This determination has already had a large impact on cases involving panhandling regulations and is likely to result in the invalidation of the majority of this nationโ€™s panhandling laws.

This Note will begin with a discussion of First Amendment doctrine and how panhandling is protected speech. This Note will...

FREE SPEECH AND DEMOCRACY IN THE VIDEO AGE

Justin Marceau* & Alan K. Chen**

This Article examines constitutional theory and doctrine as applied to emerging government regulation of video image capture across a specยญtrum of regulatory regimes. It proposes a framework that promotes free speech to the fullest extent without presenting unnecessary intrusions into legitimate property or privacy interests. The Article first argues that video recording is a form of expression or at the very least, is conduct that serves as a...

The Supreme Courtโ€™s 2014 decision inย Hobby Lobby v. Burwellย sent shockwaves through the legal community. While many praised its broad interpretation of the Religious Freedom Restoration Act (RFRA) as a milestone in protecting religious liberty, others expressed concern that it would essentially turn RFRA and similar legislation on the state level into a โ€œlicense to discriminateโ€ against LGBT individuals in areas such as...

This Essay develops an approach to interpreting computer trespass laws, such as the Computer Fraud and Abuse Act, that ban unauthorized access to a computer. In the last decade, courts have divided sharply on what makes access unauthorized. Some courts have interpreted computer trespass laws broadly to prohibit trivial wrongs such as violating terms of use to a website. Other courts have limited the laws to harmful examples of hacking into a computer....

Antitrust courts often confront โ€œmixedโ€ conduct that has two contrasting effects, one harmful and the other beneficial. For example, a nationwide agreement not to pay college football players harms the players while benefiting fans of amateur sports. An important tool for analyzing mixed conduct is to compare the action to a hypothesized alternative and to ask whether the alternative action is โ€œless restrictiveโ€ and hence less harmful....

In the aftermath of the global financial crisis, Congress significantly broadened the reach of various regulatory entities through the Dodd-Frank Act. One particular power, found in section 113 of the Act, gives the newly formed Financial Stability Oversight Council (FSOC) the authority to designate nonbank financial institutions (NBFIs) as sysยญtemically important financial institutions...

Federal extraterritorial prosecutions of terrorists and arms dealers and even narcotics traffickers have become an integral part of modern American criminal justice. But extraterritorial prosecutions raise foundational legal questionsโ€”about the fairness of forcing foreign defendants to stand trial in our courts and about the outer boundaries of American power. And extraterritorial prosecutions foreยญground a puzzling inconsistency in constitutional...