A Code-Based Approach to Unauthorized Access Under the Computer Fraud and Abuse Act
Patricia L. Bellia 84 Geo. Wash. L. Rev. 1442 Thirty years ago, Congress passed the Computer Fraud and Abuse Act (“CFAA”) to... Read More
Preambles as Guidance
Kevin M. Stack · 84 Geo. Wash. L. Rev. 1252 · Debates over administrative agencies’ reliance on guidance documents have largely neglected the most... Read More
Chevron Bias
Philip Hamburger · 84 Geo. Wash. L. Rev. 1187 · This Article takes a fresh approach to Chevron deference. Chevron requires judges to defer... Read More
Lenient in Theory, Dumb in Fact: Prison, Speech, and Scrutiny
David M. Shapiro 84 Geo. Wash. L. Rev. 972 The Supreme Court declared thirty years ago in Turner v. Safley that prisoners... Read More
Plea Bargaining and Price Theory
Russell D. Covey 84 Geo. Wash. L. Rev. 920 Like other markets, the plea bargaining market uses a pricing mechanism to coordinate... Read More
The Duty of Clarity
John O. McGinnis 84 Geo. Wash. L. Rev. 843 This Article shows that the Constitution contemplates that judges are to exercise a... Read More
Constitutional Acquiescence
Shalev Roisman 84 Geo. Wash. L. Rev. 668 When courts, scholars, and government decisionmakers debate constitutional separation of powers questions, they primarily... Read More
Constitutional Personhood
Zoë Robinson 84 Geo. Wash. L. Rev. 605 Over the past decade, in a variety of high-profile cases, the Supreme Court has... Read More
Judicial Amendment of Statutes
Eric Fish 84 Geo. Wash. L. Rev. 563 When courts engage in judicial review they do not merely invalidate or “strike down”... Read More