Leanne Smith, ‘Family Law for Family Life: Rethinking the Boundaries of Family Law’

ABSTRACT
A key function of family law is to regulate family breakdown and conflict. Consequently, family law has been characterized as under threat as family disputes have been diverted from courts and lawyers, and its norms have become inaccessible to many. This article questions the scale of the threat. It argues for a rethinking of the boundaries of family law to shift focus away from dispute resolution and towards more constructive and anticipatory approaches. It shows how family law norms and rules might usefully be understood at the beginning of, or during, relationships. As such, the relevance of family law can be recaptured by seeing it as a tool for better informed – and perhaps normatively better – relationships over time; family law can be for family life, as well as family conflict. Finally, the article considers how contemporary shifts in the modalities of family law might be embraced and extended to accommodate a family law for family life agenda.

Leanne Smith, Family Law for Family Life: Rethinking the Boundaries of Family Law, Current Legal Problems. Published: 22 April 2025.

Patricia McCoy, ‘Inflection Points In The Drafting Of The Restatement On Consumer Contracts: Salience And Its ARC’

ABSTRACT
When the Reporters of the Restatement of the Law, Consumer Contracts (RCK or Restatement) undertook that project for the American Law Institute, they faced a bind. Courts generally infer blanket assent to boilerplate, contingent on proper notice. But the Reporters were previously on record as skeptical of notice because consumers almost never read boilerplate. So how would the Reporters resolve this tension while upholding the function of Restatements to restate the law? Their solution was two-fold: to organize the RCK around the concept of salience and to look to contract defenses such as unconscionability and deception to protect consumers. In early versions of the RCK, unconscionability would have been available as a defense – regardless of notice – for non-salient terms, ie, ones that did not affect the contracting decisions of a substantial number of consumers. In contrast, early drafts of the RCK maintained that salient terms could never be substantively unconscionable because they were adequately policed by market forces.

With salience as the springboard, the Restatement project unfolded in three acts, each with its own inflection point. In Act One, the Reporters rolled out salience as the work-around to the problems posed by notice. In Act Two, salience sparked heavy pushback. In Act Three, pro-consumer forces grafted some meaningful reforms onto the RCK’s text and managed to extend the unconscionability defense to all contractual terms. But those reforms did not excise the traditional common-law notice requirements that had been built into the RCK from the start. Once salience disappeared from the black letter of the RCK due to opposition within the ALI’s ranks, those notice requirements regained their former prominence. As a result, the final Restatement generally allows fine-print terms to bind unsuspecting consumers so long as there is proper notice, subject to defenses that are difficult to prove. With consumer contracts thus being easy to make but hard to break, it remains unclear whether the Restatement will result in meaningful relief for injured consumers.

McCoy, Patricia Ann, Inflection Points In The Drafting Of The Restatement On Consumer Contracts: Salience And Its ARC (April 17, 2025), Boston University School of Law Research Paper (forthcoming); Forthcoming in the Harvard Business Law Review.

Benjamin Weiss, ‘Civil-criminal hybridization: sexual violence plaintiffs’ attorneys’ efforts to blur the boundaries between civil and criminal law’

ABSTRACT
Despite symbolic boundaries between civil and criminal law, sociolegal scholars note their conceptual and operational overlap, or hybridity. Values (eg, restoration vs punishment) and practices (eg, monetary compensation vs incarceration) thought distinct to each manifest in both, and contact with one legal system can generate involvement with the other. Scholars typically attribute hybridity’s emergence to top-down mechanisms like legislation. This article presents interviews with sexual violence plaintiffs’ attorneys who describe their efforts to improve case outcomes by incorporating criminal legal artifacts like police reports, police evidence and criminal convictions into civil litigation and inserting civil legal artifacts, including costly evidence, victim support and monetary compensation, into criminal prosecutions. Building on organizational theories of boundary work, this article argues that attorneys, in taking purposive action to win their cases, blur distinctions between civil and criminal law from the bottom-up, a distinct mechanism through which civil-criminal hybridity emerges.

Benjamin R Weiss, Civil-criminal hybridization: sexual violence plaintiffs’ attorneys’ efforts to blur the boundaries between civil and criminal law, Law & Society Review. Published online by Cambridge University Press: 22 April 2025.

Kim and Leavitt, ‘Data Rights for Workers’

ABSTRACT
Workers are subject to immense amounts of data collection on the job, and the algorithmic management tools built with that data can produce negative effects, including deskilling jobs, unstable work hours, reduced wages, and dangerous and degrading working conditions. Workers thus have significant interests how their data are collected and used, and yet they have been excluded from nearly all the recently enacted or proposed data protection laws. Their exclusion stems from data protection’s roots in privacy law and theory, which primarily focused on consumers as data subjects. Current data protection laws, even if expanded to cover workers, would provide little protection because those laws are framed by an individual consumer model of privacy that does not account for the distinctive ways workers are vulnerable to firms’ data practices. Traditional labor law protections are also insufficient to protect their rights because they fail to address a central cause of workers’ disempowerment today – the largely unrestrained collection and exploitation of their data by firms. Protecting workers’ rights will require legally recognizing their collective interests in data and providing robust channels for worker participation in decisions about how data-driven technologies are deployed. Empowering collective worker voice over data practices is essential to ensure that the gains from these technologies will be widely shared rather than just enriching a few.

Kim, Pauline and Leavitt, Rachel, Data Rights for Workers (April 17, 2025). Forthcoming 106 Boston University Law Review (2026); Washington University in St Louis Legal Studies Research Paper No 25-04-01.

Iryna Dikovska, ‘War, Sanctions and Exemption from Liability under Contracts Falling Within the Scope of the CISG’

ABSTRACT
This article analyses the circumstances in which war or sanctions preventing the fulfilment of a contract covered by the CISG entitle the parties to exemption from liability for a contractual breach. It addresses how contractual provisions relate to Article 79 of the CISG. It also focuses on the interpretation of contractual provisions exempting parties from liability for breach of contracts covered by the CISG. It reveals the conditions under which war and sanctions may constitute the grounds for exemption from liability under Article 79 of the CISG in cases in which a buyer or seller has relied on performance by a third party. Finally, the paper addresses the issue of a notification of impediment by the party in breach.

Dikovska, Iryna, War, Sanctions And Exemption From Liability Under Contracts Falling Within The Scope Of The CISG (November 17, 2024).

Tony Pursall, ‘Invalid exercises of powers and defective changes of trustees: what can go wrong and how to put it right’

ABSTRACT
The first part of this article outlines some of the reasons why the exercise of powers can be invalid, with a focus on the failure to comply with formal requirements. The second part considers possible remedies, including the implied exercise of powers doctrine and the defective exercise of powers doctrine, as well as those available to the court where there has been a defective change of trustees. It argues that there will often be an available remedy that enables the invalid exercise of dispositive powers to be retrospectively validated even where the court does not have that jurisdiction.

Tony Pursall, Invalid exercises of powers and defective changes of trustees: what can go wrong and how to put it right, Trusts & Trustees, volume 31, issue 3, pages 83–89 (April 2025). Published: 27 January 2025.

Alyson Carrel, ‘Murmurs of the Silenced: Secure Reporting of Misconduct Settlements’

ABSTRACT
For decades, scholars debated the merits between resolving disputes by public adjudications or private settlements. This tension is particularly relevant in misconduct settlements, where wrongdoers can hide behind the confidentiality available in a private settlement. A paradigmatic example of this was the #MeToo movement and the revelation of serial sexual predators sheltered by secret settlements. Using Multi-Party Computation, a cryptographic technique that enables parties to provide private data for computation without giving up confidentiality, we contribute a fully-interwoven statutory-technological system that implements secure reporting of wrongful misconduct settlements, in order to provide oversight statistics to policymakers and to unmask repeatedly-settling parties for investigation. By providing a unique policy option that balances privacy with oversight, our proposal lessens the need to restrict settlement confidentiality, thereby protecting the autonomy of the parties to settle privately, if they so choose. More broadly, our proposal addresses the oversight complaints against settlements by scholars, and advances the discourse on the appropriate roles of adjudication and settlements in resolving disputes.

Carrel, Alyson, Murmurs of the Silenced: Secure Reporting of Misconduct Settlements (April 15, 2025) in Symposium on Computer Science and Law (CSLAW ’25), March 25–27, 2025, München, Germany; ACM, New York, NY, USA, https://doi.org/10.1145/3709025.3712207; Northwestern Public Law Research Paper No 25-16.

Mateusz Grochowski, ‘Consumer Vulnerability: A Genealogy’

ABSTRACT
Vulnerability has become a central concept in contemporary discussions on contract regulation and market oversight. In particular, it features prominently in the European Union’s digital market regulatory framework, where appeals to vulnerability frequently serve as justifications for intervention in horizontal market relationships. These arguments are typically grounded in the recognition that market actors are not a homogenous group; rather, they exhibit varying degrees of exposure to risks and potential harm. This paper explores the conceptual foundations of vulnerability as a distinctive category within EU consumer law. It begins by tracing the historical and theoretical roots of vulnerability in consumer protection discourse, before turning to two principal approaches to its conceptualization: (1) vulnerability as a function of static, individual characteristics of consumers, and (2) vulnerability as context-dependent, arising from particular market structures and dynamics that increase the likelihood of harm. Building on this framework, the paper offers a critical examination of the current uses of the vulnerability concept, highlighting key limitations and ambiguities that – if left unaddressed – risk undermining its effectiveness as both an analytical tool and a normative guide for policy-making. Ultimately, the paper seeks to clarify the core elements that constitute consumer vulnerability and to assess the concept’s practical and theoretical significance for the development of EU consumer law and policy.

Grochowski, Mateusz, Consumer Vulnerability: A Genealogy (January 2, 2025) in Stefan Grundmann and Pietro Sirena (eds), European Contract Law and Future Challenges, Intersentia 2025, Forthcoming; Tulane Public Law Research Paper Forthcoming.

Charles Duan, ‘What Is Copyrightable in Software?’

ABSTRACT
For five decades, copyright law has been internally inconsistent. Computer code receives copyright protection-the statute says so. But the statute also excludes methods of operation from copyright. Given that computer code is a method of operating a computer, these two blackletter doctrines contradict each other. To avoid this doctrinal conflict, courts and commentators have for years controversially disregarded or at least bent one of the doctrines. The Supreme Court has twice ducked the issue as too difficult to resolve, most recently in the 2021 Google v Oracle case, and the circuits continue to be split.

Yet there is a simple solution. Computer science concepts, heretofore not explored in the legal literature, show that software contains numerous elements with no effect on a computer’s operation: comments, syntactic alternatives, bound variable names, and ordering of variable declarations and subroutines. These elements instead serve a purely communicative purpose, helping other humans understand computer code. Computer scientists have long valued these communicative elements as vehicles for expression.

Communicative elements in code reconcile the doctrines, fully satisfying the exclusion of methods of operation while nevertheless providing a basis for copyright protection in software. And they are the strongest basis for copyright in computer code. Protection based on these elements is consistent with copyright rationales and doctrines. It offers a solid foundation for answering the trickiest questions in software copyright law, including application programming interfaces and generative artificial intelligence. And it would resolve, after half a century, the internal contradiction in the Copyright Act.

Duan, Charles, What Is Copyrightable in Software? (April 1, 2025).

Nicholas McBride, ‘Free-Standing Liabilities’

ABSTRACT
This chapter was written in honour of Stephen A Smith, and discusses a number of different liabilities that cannot be said either to arise out of the breach of a duty owed to another or to give effect to a duty that is owed to another. The chapter discusses the characteristic reasons that give rise to these liabilities (to promote social good, or the legitimacy of private law, or virtuous behaviour) and the significance of these liabilities for our understanding of private law.

McBride, Nicholas, Free-Standing Liabilities (July 24, 2023), University of Cambridge Faculty of Law Research Paper; in Evan Fox-Decent, John Goldberg and Lionel Smith (eds), Understanding Private Law: Essays in Honour of Stephen A Smith (Hart Publishing, 2025).