The Law of the Horse: What Cyberlaw Might Teach

@article{Lessig1999TheLO,
  title={The Law of the Horse: What Cyberlaw Might Teach},
  author={Lawrence Lessig},
  journal={Harvard Law Review},
  year={1999},
  volume={113},
  pages={501-549}
}
  • L. Lessig
  • Published 1999
  • Sociology
  • Harvard Law Review
A few years ago, at a conference on the “Law of Cyberspace” held at the University of Chicago, Judge Frank Easterbrook told the assembled listeners, a room packed with “cyberlaw” devotees (and worse), that there was no more a “law of cyberspace” than there was a “Law of the Horse”;1 that the effort to speak as if there were such a law would just muddle rather than clarify; and that legal academics (“dilettantes”) should just stand aside as judges and lawyers and technologists worked through the… Expand
Failures of American Methods of Lawmaking in Historical and Comparative Perspectives
America’s eighteenth-century founders expected that the people of the United States would establish a wise and happy government of written laws adopted with a single eye to reason and the good ofExpand
Towards a Law of the Mammoth? Climate Engineering in Contemporary EU Environmental Law
In an article that made waves when it was first published in 1996, judge Easterbrook scorned the idea that the technological reality of cyberspace justified talk about or a need for ‘Cyber Law’. JustExpand
Towards a Law of the Mammoth? Climate Engineering in Contemporary EU Environmental Law
  • H. Somsen
  • Political Science
  • European Journal of Risk Regulation
  • 2016
In an article that made waves when it was first published in 1996, judge Easterbrook scorned the idea that the technological reality of cyberspace justified talk about or a need for ‘Cyber Law’. JustExpand
Free Speech and the Confluence of National Security and Internet Exceptionalism ©
As many scholars have recognized, the Supreme Court has not infrequently skewed free speech doctrine in times of war or heightened concerns, real or perceived, about national security. Many reasonsExpand
The Law of Electronic Commerce: The rule of cyberspace
This chapter examines and contemplates law and culture in cyberspace. The role of law and indeed the rule of law have different dynamics in cyberspace as a consequence of the architecture ofExpand
New Media at the Turn of the Century
In recent cases, the United States Supreme Court has shown great care and vigilance in protecting free speech on the Internet. It is therefore common to take for granted the Court's protective stanceExpand
A Portrait of the Internet as a Young Man
In brief, the core theory of Jonathan Zittrain’s1 2008 book The Future of the Internet - and How to Stop It is this: good laws, norms, and code are needed to regulate the Internet, to prevent badExpand
Reinventing “Magic Circle” in the Age of Internet Government Control: the Lessons of Videogame Law for Modern Practices of Legal Interpretation
The restrictions for disseminating certain kinds of information that is considered publicly offensive and (or) dangerous has made topical a fundamental problem of the limits of reasonableExpand
Nodes and Gravity in Virtual Space
Abstract In 1996 John Perry Barlow made his now infamous Declaration of Independence for Cyberspace. In this the cyberlibertarian ethos was laid out: We must declare our virtual selves immune to yourExpand
The art of trolling law enforcement: a review and model for implementing ‘flame trolling' legislation enacted in Great Britain (1981–2012)
The advancement of information and communications technology often results in early adoption, followed by concern over a digital divide, followed by mass adoption and then, inevitably, abuse andExpand
...
1
2
3
4
5
...

References

SHOWING 1-5 OF 5 REFERENCES
Open Relay Behavior-modification System, " maintains such blacklists. See What is ORBS? (visited Aug
  • Open Relay Behavior-modification System, " maintains such blacklists. See What is ORBS? (visited Aug
  • 1999
describing the problem of spam, the various legal solutions that have been proposed, and the First Amendment implications of those solutions); see also
  • Frequently Asked Questions About Spam
  • 1999
M]any entities related with junk mails [sic] have received paralyzing system attacks, viruses, and even physical threats
  • M]any entities related with junk mails [sic] have received paralyzing system attacks, viruses, and even physical threats
  • 1998
requiring legally binding rules to be promulgated through a notice and comment procedure). 118 500 U
  • requiring legally binding rules to be promulgated through a notice and comment procedure). 118 500 U
  • 1991
FINALHLS.DOC HARVARD LAW REVIEW
  • FINALHLS.DOC HARVARD LAW REVIEW