internet law and policy resources

The following are select links relating to the law, policy and business of the internet and related areas. Last updated: July 29, 2016. Please see the legal disclaimer.

  Twitter Lists:

Cyberlaw + IP: A curated Twitter List which follows 95 individuals and organizations, including law professors, law school clinics, legal practitioners and non-profit organizations, related to law of the internet, infosec and intellectual property.

Technology, Internet and Science: A curated Twitter List which follows 86 individuals and organizations, including science and technology magazines, members of the business and technology press, activists, venture capitalists, angel investors, entrepreneurs, scholars and legal practitioners, related to technology (including the tech business, start-ups and venture capital), the internet (including internet developments and policy) and science.

  Websites and Blogs – Internet Law, Tech and Policy:

Mainstream Online Media on Law, Policy, Privacy and Security:
ArsTechnica’s Law & Disorder  
The Verge’s Policy & Law  
Wired’s Threat Level.  

EFF’s DeepLinks Blog: Electronic Frontier Foundation’s blog on law and policy developments, including EFF initiated or supported lawsuits.  

LawFare: The national security law and policy blog of The Lawfare Institute (in cooperation with Brookings).  

Info/Law: A blog about information, law, and “Information Law” (a convergence of intellectual property doctrine, communications regulation, First Amendment norms, and new technology).  

Technology & Marketing Law Blog: A multi-contributor blog, founded by Professor Eric Goldman (Santa Clara University School of Law; High Tech Law Institute), focusing primarily on legal developments related to online marketing and advertising.  

Just Security: An online forum for analysis of U.S. national security law and policy; based at the Center for Human Rights and Global Justice at New York University School of Law.  

CIS Blog: Tech/Internet law and policy updates on the blog of the Center for Internet and Society (CIS) at Stanford Law School.  

Schneier on Security: Bruce Schneier’s blog on security, cryptography and security technology.  

The Volokh Conspiracy: Perhaps the premier multi-contributor, general interest legal website, The Volokh Conspiracy is part of The Washington Post. Although not focused specifically on internet law and policy, many entries discuss developments in the area, particularly those by contributors Orin Kerr (professor of law at the George Washington University Law School and well known scholar in the subjects of computer crime law and internet surveillance) and Stewart Baker (former NSA general counsel and assistant secretary for policy at the United States Department of Homeland Security).  

Michael Geist’s Blog: Michael Geist is a law professor at the University of Ottawa, where he holds the Canada Research Chair in Internet and E-commerce Law. To a significant extent, his blog emphasizes Canadian IP and Cyberlaw.  

MIT Technology Review: A technology website, rather than a legal blog, but since so many science and technology developments both relate to the internet and have legal/public policy implications, it’s an essential regular read.  

A Few Thoughts on Cryptographic Engineering: The blog of Johns Hopkins research professor, Matthew Green, focused primarily on practical and applied cryptography.  

Light Blue Touchpaper: An infosec blog by researchers in the security group at the University of Cambridge Computer Laboratory.  

  Treatises, Guides and Casebooks:

E-Commerce & Internet Law: Treatise with Forms (Ian C. Ballon; West Publishing; multi-volume set; )

EFF’s Internet Law Treatise The Electronic Frontier Foundation’s Internet Law Treatise (currently in beta – read the disclaimer on the site) is a project to maintain a free, open licensed, collaborative treatise summarizing the law related to the internet with the cooperation of a wide variety of attorneys, law students and others. See “About” the EFF Internet Law Treatise and the “Table of Contents”.

Citizen Media Law Project’s online legal guide From the Citizen Media Law Project’s description of the guide: “The guide is intended for use by citizen media creators with or without formal legal training, as well as others with an interest in these issues, and addresses the legal issues that you may encounter as you gather information and publish your work online.”

2016 Internet Law Cases and Materials (pdf – $8, hard copy – $20 plus shipping/taxes, and kindle – $9.99 editions) by Professor Eric Goldman (Santa Clara University School of Law; High Tech Law Institute). Professor Goldman also provides additional resources (e.g., course syllabi, exams, sample exam answers, etc.) at his Technology & Marketing Law Blog.

Internet Law: Cases and Problems 5.0 (pdf casebook; $30 suggested price) by Professor James Grimmelmann (University of Maryland). Professor Grimmelmann also blogs at The Laboratorium.

Advertising & Marketing Law Casebook (2014) (pdf and epub casebook; $11.50) by Professors Eric Goldman (Santa Clara University School of Law; High Tech Law Institute) and Rebecca Tushnet (Georgetown University Law Center).

Computer Crime Law (3rd edition) casebook and its 2016 Supplement by Professor Orin Kerr (George Washington University Law School) (West; )

Cybersecurity: A Practical Guide to the Law of Cyber Risk (PLI; )

EFF’s Surveillance Self-Defense Guide – described by the Electronic Frontier Foundation as “tips, tools and how-tos for safer online communications”. Also see the Free Software Foundation’s Email Self-Defense Guide, but, in both cases, keep in mind my caveat under Tools and Services below.

Robot Law edited by Ryan Calo (University of Washington School of Law), A. Michael Froomkin (University of Miami School of Law), and Ian Kerr (University of Ottawa) ($$$; Edward Elgar Publishing; March 2016).

Intellectual Property: Law & the Information Society; cases & materials (open casebook – 2014 edition) (pdf edition – free; paperback – $29.99) by Professor James Boyle (Duke University School of Law) and Jennifer Jenkins (Director of Duke’s Center for the Study of the Public Domain).

Trademark Law: An Open Source Casebook, Version 3.0 (2016) (pdf and .doc versions – free) by Professor Barton Beebe (NYU School of Law).

The United States Copyright Office’s “Compendium of U.S. Copyright Office Practices, Third Edition” (1,288 page pdf). The compendium (the first since 1984’s Second Edition) took effect on December 22, 2014 and is the governing administrative manual for registrations and recordations issued by the Copyright Office on and after that date.

  Email Newsletters:

Politico’s Morning CyberSecurity Tipsheet. Sign up (or read online) at the link.

Just Security‘s daily curated email summaries of national security and related developments. Sign up here.

Bruce Schneier’s Crypto-Gram – a monthly email digest of his comments on security. Sign up here.

  Podcasts and Video:

Steptoe Cyberlaw Podcast.  

LawFare Podcast.  

This Week in Law.  

Santa Clara University High Tech Law Institute:
iTunes U podcasts and videocasts

Berkman Center for Internet & Society – Multimedia
Audio Fishbowl: Berkman’s Podcast on Internet & Society  
Berkman’s YouTube Channel  

Stanford Center for Internet & Society (CIS) – Multimedia
Stanford CIS YouTube Channel  

How to Start a Startup – a series of video lectures (and related readings) by Y Combinator, its President Sam Altman, and various guest lecturers (initially given at Stanford in Fall 2014).

a16z, from the prominent venture capital firm, Andreessen Horowitz.

Accidental Tech, featuring three software developers, podcasters and reviewers.  

Exponent, focusing on the general theme of tech and society.  

John Gruber’s The Talk Show – tech/software developments in general, and Apple, more specifically.  

  Tools and Services:

Caveat: In light of the revelations regarding the capabilities of the NSA, certain nation states (including China and Russia) and various hackers, the consideration and use of any tool or service which promises things such as enhanced security or anonymity for the user must be undertaken with extreme caution. Any tool or service might have been compromised, and many of these tools and services can be difficult to properly use. Even if the safety of any such tool or service has not been compromised, errors in use or the compromise of the user’s hardware or, for example, of intermediate, middleman or endpoint software/hardware, might jeopardize the user and the user’s safety, security or anonymity. This list does not constitute any endorsement or warranty by me of any of these third party tools or services (or of the links to such tools and services); all such third party tools and services are used at the reader’s own risk.

The Sunlight Foundation’s Tools and Projects, including tools (such as Scout) for tracking legislation and public policy. EFF’s online tool for sending messages to members of the U.S. Senate and House of Representatives.

Lumen’s searchable database of DMCA takedown notices and cease and desist letters.

The Tor Project, including the Tor Browser and Orbot.

Tails: an operating system designed to be used from a DVD, USB stick, or SD card independently of a computer’s original operating system, and which aims to protect privacy and anonymity.

Digital First Aid Kit, a set of tools designed by a group of NGOs, including EFF, to provide preliminary assistance to those facing common digital threats (e.g., account hijacking, seizure of devices, malware infections and DDoS attacks).

uProxy (Google Ideas – beta release), a browser extension (chrome and firefox) that uses p2p technology to enable people to provide others with a trusted internet connection.

Project Shield (Google Ideas – application required), to help human-rights activists, NGOs, and news organizations defend their websites from distributed denial of service (DDos) attacks.

Digital Attack Map: Google Ideas’ live data visualization, displaying DDoS attacks in real time.

Freedom of the Press Foundation’s SecureDrop open-source whistleblower submission system that media organizations can use to securely accept documents from anonymous sources (originally coded by the late Aaron Swartz).

FreedomBox: still in its relative infancy (developer release), a project to create a personal, easy-to-use plug server that integrates encrypted voice and text communication, anonymous publishing, social networking, media sharing, and (micro)blogging – all on a decentralized basis.

  Websites and Blogs – Tech and General (Non-Legal):

Two Rivers of Tech News/Links:
Techmeme’s River of Tech News.  
Y Combinator’s Hacker News.  

BITS: New York Times’ technology business blog.  

Dave Winer’s Scripting News: software developer, entrepreneur and writer.  

The Verge: Technology, gadgetry and general interest website.  

The Intercept: Originally, all things Snowden/NSA, but has broadened to other topics.   And, its Unofficial Sources blog

Felix Salmon: formerly a well known finance journalist at Reuters. Now senior editor at Fusion. This is his personal website, which links to his writings across the web.  

Musings on Markets: thoughts on valuation, corporate finance and the news of the day by NYU business and finance professor, Aswath Damodaran.  

New economic, demographic, and political commentary about places.  

538: Nate Silver’s “data journalism” website.  

New Scientist: The online website of New Scientist magazine.  

Four VCs: Fred Wilson – ; Mark Suster – ;
M.G. Siegler – ; and Benedict Evans –

Two Software Developers: John Gruber (Daring Fireball) –   and
Marco Arment –  

Ben Thompson’s Stratechery: technology commentator and analyst.  

Monday Note: a journalist (Frédéric Filloux) and a former Apple executive (Jean-Louis Gassée).  

Jason Kottke: link blogger extraordinaire.  

Quanta   and Aeon   – two online magazines focused on science, tech and philosophy.

Om Malik: entrepreneur, journalist and VC.  

Anil Dash: technologist and entrepreneur.  

Lessig Blog: Harvard Law professor, Larry Lessig.  


The Amazon links below are provided for convenience only and do not generate affiliate fees for this website’s publisher —

Turing’s Cathedral: The Origins of the Digital Universe – George Dyson (Amazon)

The Information: A History, a Theory, a Flood – James Gleick (Amazon)

The Idea Factory: Bell Labs and the Great Age of American Innovation – Jon Gertner (Amazon)

The Chip : How Two Americans Invented the Microchip and Launched a Revolution – T.R. Reid (Amazon)

Dealers of Lightning: Xerox PARC and the Dawn of the Computer Age – Michael A. Hiltzik (Amazon)

The Master Switch: The Rise and Fall of Information Empires – Tim Wu (Amazon)

Hackers: Heroes of the Computer Revolution (25th anniversary edition) – Steven Levy (Amazon)

From Counterculture to Cyberculture: Stewart Brand, the Whole Earth Network, and the Rise of Digital Utopianism – Fred Turner (Amazon)

Where Wizards Stay Up Late: The Origins Of The Internet – Katie Hafner (Amazon)

Revolution in The Valley: The Insanely Great Story of How the Mac Was Made – Andy Hertzfeld (Amazon)

The Search: How Google and Its Rivals Rewrote the Rules of Business and Transformed Our Culture – John Battelle (Amazon)

Captive Audience: The Telecom Industry and Monopoly Power in the New Gilded Age – Susan P. Crawford (Amazon)

The Innovator’s Dilemma: When New Technologies Cause Great Firms to Fail – Clayton Christensen (Amazon)

The Wealth of Networks – Yochai Benkler (free download) (Amazon)

Free Software, Free Society: Selected Essays of Richard M. Stallman – Richard Stallman (free pdf download)

The Future of the Internet–And How to Stop It – Jonathan Zittrain (Amazon)

Codev2 – Lawrence Lessig – (free download) (Amazon) This is the second (updated) version of Lessig’s classic Code and Other Laws of Cyberspace, originally published in 2000.

The Boy Who Could Change the World: The Writings of Aaron Swartz – Aaron Swartz (Amazon)

You Are Not a Gadget – Jaron Lanier (Amazon)

The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography – Simon Singh (Amazon) and The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet – David Kahn (Amazon)

No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State – Glenn Greenwald (Amazon)

Tallinn Manual on the International Law Applicable to Cyber Warfare – NATO Cooperative Cyber Defence Centre of Excellence (Wikipedia entry) (free download) (Amazon)

Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon Hardcover – Kim Zetter (Amazon) and Worm: The First Digital World War – Mark Bowden (Amazon)

See also: The CyberSecurity Canon, an attempt by Rick Howard, Palo Alto Networks Chief Security Officer, to identify a list of must-read books for cybersecurity practitioners.

  Selected Internet Law and Policy Papers:

Caveat: Keep in mind the New York Times recent advisory regarding law review articles – “About 43 percent of law review articles have never been cited in another article or in a judicial decision .   .   .  The judge, lawyer or ordinary reader looking for accessible and timely accounts or critiques of legal developments is much better off turning to the many excellent law blogs  .  .  . In the 1970s and 1980s, about half of all Supreme Court opinions cited at least one law review article, according to a [recent] study  .  .  . Since 2000, the rate is just 37 percent — even as Supreme Court opinions have grown longer and more elaborate .  .  .  The leading Supreme Court advocates know that law review articles carry almost no weight with the justices. ‘Only a true naïf,’ Seth P. Waxman, a former solicitor general said in 2002, ‘would blunder to mention one at oral argument.'”

The Fourth Amendment and the Global Internet – Orin Kerr, 67 Stanford Law Review 285 (2015)
Robotics and the Lessons of Cyberlaw – Ryan Calo, California Law Review, Vol. 103 (2015)
Bulk Metadata Collection: Statutory and Constitutional Considerations – Laura K. Donohue, 37 Harvard Journal of Law and Public Policy 757 (2014)
Don’t Fear the Leaker: Thoughts on Bureaucracy and Ethical Whistleblowing – Glenn H. Reynolds, University of Tennessee Legal Studies Research Paper No. 254 (2014)
The Mosaic Theory of the Fourth Amendment – Orin Kerr, Michigan Law Review, Vol. 110 (forthcoming 2012)
The Path of Internet Law: An Annotated Guide to Legal Landmarks – Michael L. Rustad and Diane D’Angelo, Duke Law & Technology Review, Vol. 2011, No. 012 (2012)
Ten Commandments of Internet Law Revisited: Basic Principles for Internet Lawyers – Arno R. Lodder, Information & Communications Technology Law, Vol. 22, Issue 3 (forthcoming 2013)
‘I’ve Got Nothing to Hide’ and Other Misunderstandings of Privacy – Daniel J. Solove, 44 San Diego Law Review 745 (2007)

• more to come •

Legal Disclaimer: The links above are provided for convenience only and are not intended to be comprehensive. I am not responsible for the content or operation of any external websites, and caution should be used by readers, as any information provided on this website or on any external websites that are linked to by this website might not necessarily be complete, timely or accurate.   Return to the Top