When Autonomous Vehicles Are Hacked, Who Is Liable?

Total Page:16

File Type:pdf, Size:1020Kb

When Autonomous Vehicles Are Hacked, Who Is Liable? When Autonomous Vehicles Are Hacked, Who Is Liable? Zev Winkelman, Maya Buenaventura, James M. Anderson, Nahom M. Beyene, Pavan Katkar, Gregory Cyril Baumann For more information on this publication, visit www.rand.org/t/RR2654 Library of Congress Cataloging-in-Publication Data is available for this publication. ISBN: 978-1-9774-0323-0 Published by the RAND Corporation, Santa Monica, Calif. © Copyright 2019 RAND Corporation R® is a registered trademark. Cover: Adobe Stock/Production Perig. Limited Print and Electronic Distribution Rights This document and trademark(s) contained herein are protected by law. This representation of RAND intellectual property is provided for noncommercial use only. Unauthorized posting of this publication online is prohibited. Permission is given to duplicate this document for personal use only, as long as it is unaltered and complete. Permission is required from RAND to reproduce, or reuse in another form, any of its research documents for commercial use. For information on reprint and linking permissions, please visit www.rand.org/pubs/permissions. The RAND Corporation is a research organization that develops solutions to public policy challenges to help make communities throughout the world safer and more secure, healthier and more prosperous. RAND is nonprofit, nonpartisan, and committed to the public interest. RAND’s publications do not necessarily reflect the opinions of its research clients and sponsors. Support RAND Make a tax-deductible charitable contribution at www.rand.org/giving/contribute www.rand.org Preface This report examines the civil liability implications that would flow from hackers commandeering or hacking autonomous vehicles (AVs) and using them to cause harm. Thanks to AVs, roles and civil legal response may shift among manufacturers, component makers, dealers, and owners (be they individual or fleet owners). Factor in the likeli- hood that hackers will attack AVs, and it becomes prudent to begin mapping the kind of damages that could arise—and who may face claims for damages. The RAND Institute for Civil Justice funded this work. Participants in the auto industry and the technology field, insur- ers, legal professionals, and potential owners of driverless cars will find value in this discussion of the liability implications of hackers attack- ing AVs. RAND Institute for Civil Justice The RAND Institute for Civil Justice (ICJ) is dedicated to improving the civil justice system by supplying policymakers and the public with rigorous and nonpartisan research. Its studies identify trends in liti- gation and inform policy choices concerning liability, compensation, regulation, risk management, and insurance. The Institute builds on a long tradition of RAND Corporation research characterized by an interdisciplinary, empirical approach to public policy issues and rigor- ous standards of quality, objectivity, and independence. ICJ research is supported by pooled grants from a range of sources, including cor- porations, trade and professional associations, individuals, government iii iv When Autonomous Vehicles Are Hacked, Who Is Liable? agencies, and private foundations. All its reports are subject to peer review and disseminated widely to policymakers, practitioners in law and business, other researchers, and the public. The ICJ is part of the Justice Policy Program within the RAND Social and Economic Well- Being Division. The program focuses on such topics as access to jus- tice, policing, corrections, drug policy, and court system reform, as well as other policy concerns pertaining to public safety and criminal and civil justice. For more information, email [email protected]. RAND Ventures The RAND Corporation is a research organization that develops solu- tions to public policy challenges to help make communities through- out the world safer and more secure, healthier and more prosperous. RAND is nonprofit, nonpartisan, and committed to the public interest. RAND Ventures is a vehicle for investing in policy solutions. Philanthropic contributions support our ability to take the long view, tackle tough and often-controversial topics, and share our findings in innovative and compelling ways. RAND’s research findings and recommendations are based on data and evidence, and therefore do not necessarily reflect the policy preferences or interests of its clients, donors, or supporters. Funding for this venture was provided by gifts from RAND sup- porters and income from operations. Contents Preface ............................................................................. iii Figures and Tables ............................................................... ix Summary .......................................................................... xi Acknowledgments ...............................................................xv Abbreviations ................................................................... xvii CHAPTER ONE Introduction—Understanding the Context ................................. 1 CHAPTER TWO Autonomous Vehicles and Future Roadways ................................ 5 What Is an Autonomous Vehicle, and How Does It Work? .................. 6 The Ecosystem of Autonomous Vehicles ........................................ 8 CHAPTER THREE How Can Hackers Exploit Autonomous Vehicles?.........................13 Hacking the Autonomous Vehicle by Exploiting Software Vulnerabilities ................................................................14 Physically Hacking the Autonomous Vehicle by Plugging in a Malicious Device .............................................................14 Hacking the Components of the Autonomous Vehicle Ecosystem .........14 What Types of Attacks Are Plausible? ..........................................15 Effects of Various Hacks .........................................................17 v vi When Autonomous Vehicles Are Hacked, Who Is Liable? CHAPTER FOUR Hacked Autonomous Vehicles and the Harms They Can Cause ........21 Examples of Vehicles Causing Damage ....................................... 22 Potential Hackers and Their Motivations ......................................25 Targets That Are Vulnerable to Hacked Autonomous Vehicles ............ 30 What Types of Harm Can Hacked Autonomous Vehicles Cause? ..........33 Conclusions ....................................................................... 34 CHAPTER FIVE Shifting Roles and Responsibilities for Information Assurance for Autonomous Vehicle Cybersecurity .....................................37 Parties Responsible for Automotive Cybersecurity ........................... 38 Phase-by-Phase Analysis of Shifts in Roles and Responsibilities ........... 42 Societal Perceptions and Responses to Emerging Autonomous Vehicle Trends .........................................................................53 Future Considerations for Autonomous Vehicle Stakeholders .............. 56 CHAPTER SIX Civil Liability and Cyberattacks: General Legal Framework ...........59 Civil Liability for the Criminal Actions of Another Party .................. 60 The Economic Loss Rule .........................................................63 Potential Defendants............................................................. 64 Acceptance of Liability by Autonomous Vehicle Manufacturers ........... 66 Federal and State Laws and Best Practices Relating to Autonomous Vehicles ........................................................................67 Liability for Software Flaws ......................................................69 Civil Liability Theories ...........................................................72 Damages Available Under Tort Theories ...................................... 88 Summarizing Liability Theories in the Context of Hacked Autonomous Vehicles ........................................................89 CHAPTER SEVEN Legal Analysis of Hypothetical Risk Scenarios ............................91 Scenario 1: Ransomware .........................................................91 Scenario 2: Military Base Damage ............................................. 98 Scenario 3: Hacking of Infrastructure ........................................ 101 Contents vii Scenario 4: Theft of Corporate Information ................................. 106 Scenario Takeaways ............................................................. 108 CHAPTER EIGHT Conclusions ..................................................................... 113 APPENDIXES A. Cyber Exploits Against Autonomous Vehicles ...................... 119 B. The Phases of the National Institute of Standards and Technology Cyber-Physical System Draft Framework ............ 129 Bibliography .................................................................... 131 Figures and Tables Figures 2.1. Diagram of Autonomous Vehicle Components ................... 7 2.2. Ecosystem of Autonomous Vehicles ................................ 8 5.1. Current Phases of Vehicle Development and Use ............... 40 5.2. Emerging Phases of Vehicle Development and Use .............41 Tables 3.1. Hacks on Autonomous Vehicle Components and Their Results .................................................................18 4.1. Typical Characteristics of Cyber Threats ........................ 26 4.2. Autonomous Vehicle Hackers’ Intentions ........................ 27 4.3. Commercial Facilities Subsectors ..................................33 5.1. Expansion of Responsibility in the Development and Production Phase ................................................... 44 5.2. On-Demand
Recommended publications
  • Escribe Agenda Package
    TOWNSHIP OF CHAMPLAIN REGULAR MEETING October 8, 2020 Electronic Participation 1. OPENING - 7:00 P.M. Call to order. 2. DISCLOSURE OF PECUNIARY INTEREST (on any items that appear on the agenda) 3. ADOPTION OF AGENDA 4. PRESENTATION BY COUNCIL 5. PRESENTATION − COMMITTEES / CONSULTANTS 6. DEPUTATION 7. STAFF REPORTS 7.1. Planning 7.1.1. On-Going Planning Projects 7.1.2. Zoning By-Law Amendment Application - Removal of "Holding" zone (h) - Habitations Robert Inc. 7.1.3. Land Severance Application B-053-2020 - 853853 Ontario Inc. / Andre Desjardins 7.1.4. Land Severance Application B-054-2020 and B-055-2020 - Voith Canada Inc. 7.1.5. Land Severance Application B-056-2020, B-057-2020 et B-058-2020 - Ridge Holdings Inc. / John Russell 7.2. ADOPTION OF PLANNING BY-LAWS 7.2.1. By-Law 2020-62 - to amend Zoning By-Law 2000-75 - Habitations Robert Inc. 7.3. Administration 7.3.1. Administration Report AD-18-2020 - Update on COVID-19 7.3.2. Administration Report AD-19-2020 - Bill 197 - Proxy Voting 7.3.3. Integrity Commissioner's Report 7.4. Finance 7.4.1. Accounts 7.4.2. Finance Report FIN-10-2020 - Water and Sewer Billing Period 7.4.3. Finance Report FIN-11-2020 - User Fees for 2021-2025 7.4.4. Finance Report FIN-12-2020 - 2020 Annual Repayment Limit (ARL) 7.5. Fire Department 7.5.1. District 1 - Monthly Report - September 2020 7.5.2. District 2 - Monthly Report - September 2020 7.6. Parks & Recreation 7.6.1. REC Monthly Report - September 2020 7.7.
    [Show full text]
  • Chapter 4 Procedural Rules and Orders
    Chapter 4 Procedural Rules and Orders 4.1 Introduction 4-3 A. Applicability of Rules of Civil Procedure in Juvenile Proceedings 1. Rules apply when explicitly required by the Juvenile Code 2. A rule or part of a rule will not apply where the Juvenile Code provides a different procedure 3. Rules or parts of rules apply when required to fill procedural gaps 4. Rules may not be used to confer rights B. Rule Application Analysis 4.2 Procedures Regarding the Petition 4-8 A. Contents of Petition B. Signature of Attorney or Party C. Amended and Supplemental Pleadings 1. Amendments in abuse, neglect, or dependency proceedings 2. Amendments in termination of parental rights proceedings 3. Supplemental pleadings D. Responsive Pleadings 4.3 Summons 4-11 A. Content and Issuance of Summons 1. Signature of clerk 2. Timing 3. Who receives summons 4. Service requirements when summons is not required B. Expiration of Summons 4.4 Service 4-13 A. The Impact of Service B. Summons 1. Service by delivery 2. Service by publication 3. Service in a foreign country C. Notice and Motions 4.5 Continuances 4-21 A. Continuances Disfavored B. Abuse, Neglect, Dependency Proceedings C. Termination of Parental Rights Proceedings D. Considerations 1. Party’s own actions 2. Absence of witness 3. Heavy dockets 4-1 Ch. 4: Procedural Rules and Orders (Dec. 31, 2019) 4-2 4. Time to prepare 5. Delay, prejudice, and the remedy of mandamus 4.6 Discovery 4-24 A. Discovery Generally B. The Juvenile Code and Discovery 1. DSS sharing of information 2.
    [Show full text]
  • Manual of Patent Practice and Procedure the Patent Office, India
    INTELLECTUAL PROPERTY INDIA PATENTS || DESIGNS || TRADEMARKS || GEOGRAPHICAL INDICATIONS MANUAL OF PATENT PRACTICE AND PROCEDURE THE PATENT OFFICE, INDIA Intellectual Property Office, Mumbai Intellectual Property Office, Delhi Intellectual Property Office, Chennai Intellectual Property Office, Kolkata Office of the Controller General of Patents, Designs & Trade Marks Boudhik Sampada Bhawan S.M. Road, Antop Hill Mumbai – 400 037. Patent Office, Kolkata (Head Office) Boudhik Sampada Bhawan CP-2, Sector V, Salt Lake City Kolkata – 700 091. Patent Office, Chennai Intellectual Property Building G.S.T. Road, Guindy Chennai – 600 032. Patent Office, Delhi Boudhik Sampada Bhawan Plot No.32, Sector-14, Dwarka New Delhi – 110 075. Patent Office, Mumbai Boudhik Sampada Bhawan S.M. Road, Antop Hill Mumbai – 400 037. Third Edition – 2008 Manual of Patent Practice & Procedure © Controller General of Patents, Designs & Trade Marks, India. 2 PREFACE This Manual is intended to provide detailed information to the public and users of Patent System on the practices and procedures followed by Patent Office for processing of patent applications. The Manual incorporates provisions of the Patents Act, 1970 as amended by the Patents (Amendment) Act, 2005 and the Patents Rules, 2003 as amended by the Patents (Amendment) Rules, 2006. The format of the Manual is to reproduce successive sections and relevant rules of the Patents Act and Patents Rules followed by explanation and past decisions of the Patent Office, wherever available. References to decisions of the courts of India and other countries have been included to provide guidance and help the users. The Manual does not constitute rule making and hence do not have the force and effect of law.
    [Show full text]
  • Internal Rules Rev 9
    EXTRAORDINARY CHAMBERS IN THE COURTS OF CAMBODIA INTERNAL RULES (REV.9) AS REVISED ON 16 January 2015 Table of Contents PREAMBLE ............................................................................................................................. 6 I – PROVISIONS RELATING TO THESE INTERNAL RULES (“IRs”) ....................................................................................................................................... 7 Rule 1. Entry into Force and Interpretation ...................................................................... 7 Rule 2. Procedure Applicable in Case of lacunae in these IRs ........................................ 7 Rule 3. Amendments ........................................................................................................ 7 II – ORGANISATION OF THE COURT ............................................................................. 8 A – General Provisions ...................................................................................................... 8 Rule 4. Administrative Regulations ................................................................................. 8 Rule 5. International Judicial Cooperation and Financial Assistance .............................. 8 Rule 6. Staff Duties and Discipline .................................................................................. 8 Rule 7. Resignation .......................................................................................................... 9 B – The Office of Administration .....................................................................................
    [Show full text]
  • 3 | 2020 Volume 11 (2020) Issue 3 ISSN 2190-3387
    3 | 2020 Volume 11 (2020) Issue 3 ISSN 2190-3387 Editorial by Lucie Guibault Articles The Concept Of Joint Control Under The Data Protection Law Enforcement Directive 2016/680 In Contrast To The GDPR by Tristan Radtke Demystifying The Role Of Data Interoperability In The Access And Sharing Law and Electronic Commerce Information Technology, Intellectual Property, Journal of Debate by Jörg Hoffmann and Begoña Glez. Otero From Theory To Practice: Exercising The Right Of Access Under The Law Enforcement And PNR Directives by Plixavra Vogiatzoglou, Katherine Quezada Tavárez, Stefano Fantin and Pierre Dewitte Net Neutrality And Free Choice Of Routers And Modems In Europe by Lucas Lasota Direct Copyright Liability As Regulation Of hosting Platforms For The Copyright-Infringing Content Uploaded By Their Users: Quo vadis? by Bianca Hanuz Navigating The Fragmented Online Music Licensing Landscape In Europe – A Legislative Compass In Sight? by Lucius Klobučník Abuse Of Patent Enforcement In Europe: How Can Start-ups And Growth Companies Fight Back? by Krista Rantasaari Editors: Thomas Dreier Axel Metzger Gerald Spindler Lucie Guibault Miquel Peguera Séverine Dusollier Chris Reed www.jipitec.eu Karin Sein Table Of Contents Journal of Intellectual Property, Information Technology and Editorial Electronic Commerce Law by Lucie Guibault 241 Volume 11 Issue 3 December 2020 www.jipitec.eu [email protected] A joint publication of: Prof. Dr. Thomas Dreier, M. C. J. (NYU) Articles KIT - Karlsruher Institut für Technologie, Zentrum für Angewandte The Concept Of Joint Control Under The Data Protection Law Enforcement Rechtswissenschaft (ZAR), Directive 2016/680 In Contrast To The GDPR Vincenz-Prießnitz-Str. 3, by Tristan Radke 242 76131 Karlsruhe Germany Prof.
    [Show full text]
  • House of Representatives 96Th Legislature REGULAR SESSION of 2012
    No. 61 STATE OF MICHIGAN JOURNAL OF THE House of Representatives 96th Legislature REGULAR SESSION OF 2012 House Chamber, Lansing, Wednesday, June 13, 2012. 10:00 a.m. The House was called to order by the Speaker. The roll was called by the Clerk of the House of Representatives, who announced that a quorum was present. Agema—present Gilbert—present LeBlanc—present Price—present Ananich—present Glardon—present Lindberg—present Pscholka—present Barnett—present Goike—present Lipton—present Rendon—present Bauer—present Graves—present Liss—present Rogers—present Bledsoe—present Greimel—present Lori—present Rutledge—present Bolger—present Haines—present Lund—present Santana—present Brown—present Hammel—present Lyons—present Schmidt, R.—present Brunner—present Haugh—present MacGregor—present Schmidt, W.—present Bumstead—present Haveman—present MacMaster—present Segal—present Byrum—present Heise—present McBroom—present Shaughnessy—present Callton—present Hobbs—present McCann—present Shirkey—present Cavanagh—present Hooker—present McMillin—present Slavens—present Clemente—present Horn—present Meadows—present Smiley—present Constan—present Hovey-Wright—present Moss—present Somerville—present Cotter—present Howze—present Muxlow—present Stallworth—present Crawford—present Hughes—present Nathan—present Stamas—present Daley—present Huuki—present Nesbitt—present Stanley—present Damrow—present Irwin—present O’Brien—present Stapleton—present Darany—present Jackson—present Oakes—present Switalski—present Denby—present Jacobsen—present Olson—present Talabi—present
    [Show full text]
  • Rules of Procedure and Evidence* **
    Rules of Procedure and Evidence* ** * Explanatory note: The Rules of Procedure and Evidence are an instrument for the application of the Rome Statute of the International Criminal Court, to which they are subordinate in all cases. In elaborating the Rules of Procedure and Evidence, care has been taken to avoid rephrasing and, to the extent possible, repeating the provisions of the Statute. Direct references to the Statute have been included in the Rules, where appropriate, in order to emphasize the relationship between the Rules and the Rome Statute, as provided for in article 51, in particular, paragraphs 4 and 5. In all cases, the Rules of Procedure and Evidence should be read in conjunction with and subject to the provisions of the Statute. The Rules of Procedure and Evidence of the International Criminal Court do not affect the procedural rules for any national court or legal system for the purpose of national proceedings. ** The Rules of Procedure and Evidence are reproduced from the Official Records of the Assembly of States Parties to the Rome Statute of the International Criminal Court, First session, New York, 3-10 September 2002 (ICC-ASP/1/3 and Corr.1), part II.A. The amendments are reflected via footnotes. Rules of Procedure and Evidence Published by the International Criminal Court ISBN No. 92-9227-278-0 ICC-PIDS-LT-02-002/13_Eng Copyright © International Criminal Court 2013 First edition 2005 Second edition 2013 All rights reserved Printed by PrintPartners Ipskamp, Enschede Cover design: Corps ontwerpers International Criminal Court | Po Box 19519 | 2500 CM | The Hague | The Netherlands | www.icc-cpi.int Rules of Procedure and Evidence Table of Contents Chapter 1.
    [Show full text]
  • The Tallinn Manual 2.0: Highlights and Insights
    THE TALLINN MANUAL 2.0: HIGHLIGHTS AND INSIGHTS ERIC TALBOT JENSEN* ABSTRACT Malicious cyber activities are pervasive in the lives of individuals and in the national security discussions of national governments across the globe. It is rare for a day to pass without some cyber event reaching the national news. These malicious cyber activities are attributed to both state and non-state actors such as transnational criminal groups, terrorist organizations, and individuals. In response to this widespread phenomenon, including a specific major cyber incident in Estonia in 2007, the Cooperative Cyber Defense Center of Excellence in Tallinn, Estonia hosted a multi-year process designed to provide the views of a group of renowned experts on the application of international law to cyber activities. The first Tallinn Manual dealt with the law applicable to armed conflict. The second, and recently published, Tallinn Manual (known as Tallinn 2.0) deals with a much broader type of cyber operations—those both in and out of armed conflict. This Article briefly summarizes the key points in the Tallinn Manual 2.0, including identifying some of the most important areas of non-consensus among the Experts who wrote the Manual. The Article then offers some insights into where international law on cyber operations will need to go in the future. I. INTRODUCTION .................................... 736 II. THE PROCESS ..................................... 738 III. THE MANUAL ..................................... 740 A. Sovereignty ................................... 740 B. Due Diligence ................................. 744 C. Jurisdiction ................................... 746 D. Law of International Responsibility .................. 750 E. Cyber Operations Not Per Se Regulated ................ 755 F. International Human Rights Law................... 758 G. Diplomatic and Consular Law ....................
    [Show full text]
  • The Harbin Jewish Community and the Regional Conflicts of Northeast China, 1903-1963
    The Harbin Jewish Community and the Regional Conflicts of Northeast China, 1903-1963 Ming Hui Pan A Thesis In the Department of Religions and Cultures Presented in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy (Religion) at Concordia University Montreal, Quebec, Canada March 2020 © Ming Hui Pan, 2020 CONCORDIA UNIVERSITY School of Graduate Studies This is to certify that the thesis prepared By: Ming Hui Pan Entitled: The Harbin Jewish Community and the Regional Conflicts of Northeast China, 1903-1963 and submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy (Religion) complies with the regulations of the University and meets the accepted standards with respect to originality and quality. Signed by the final Examining Committee: ___________________________ Chair Dr. Mark Steinberg ___________________________ External Examiner Dr. Kathryn Hellerstein ___________________________ Examiner Dr. Csaba Nickolenyi ___________________________ Examiner Dr. Norman Ravvin ___________________________ Examiner Dr. Marc des Jardins ___________________________ Supervisor Dr. Ira Robinson Approved by _____________________________________________ Dr. Marc des Jardins, Graduate Program Director March 10, 2020 ______________________________________________ Dr. André Roy, Dean, Faculty of Arts and Science ii Abstract The Harbin Jewish Community and the Regional Conflicts of Northeast China, 1903-1963 Ming Hui Pan, Ph.D. Concordia University, 2020 This study examines the historical development of the Harbin Jewish community in Northeast China from its beginning in the early 1900s to its end in the 1960s. Scholars seldom pay enough attention to the Harbin Jewish community, the largest and most influential Jewish community in Asia. This study aims to fill this significant geopolitical gap of the history of Jews in the East.
    [Show full text]
  • Board Agenda – 22 May 2019
    BOARD AGENDA – 22 MAY 2019 ITEM AGENDA ITEM ACTION PRESENTED BY PAGE NO TIME Attendance & 1 Noting Chair 3 Apologies 2 Declaration of Interest Noting Chair - 3 Minutes 5.30pm Minute of Meeting 20 3.1 Approval Chair 5 March 2019 - Chief 3.2 Action Sheet Approval 10 Executive 5.40pm Date of Next Meeting 4 Approval Chair - 19 June 2019 Director of 5 Health & Safety Noting - Operations ITEM AGENDA ITEM ACTION PRESENTED BY PAGE NO TIME 6 Items For Decision Annual Return on the Director of 6.1 Approval 12 Charter 2018/19 F&CS Review of Standing Chief 5.40pm 6.2 Approval 121 Orders Executive - Asset Management Director of 6.10pm 6.3 Approval 184 Strategy Operations Development Chief 6.4 Approval 196 Monitoring Report Executive ITEM AGENDA ITEM ACTION PRESENTED BY PAGE NO TIME 7 Policies for Approval Appointment of Chief 7.1 Approval 210 Consultants Policy Executive Communications Chief 7.2 Approval 223 Policy Executive Corporate Payroll Chief 6.10pm 7.3 Approval 242 Policy Executive Entitlements, Payments Director of - 7.4 Approval 254 & Benefits Policy F&CS Chief 6.40pm 7.5 Membership Policy Approval 277 Executive Recovery of Sundry Director of 7.6 Approval 294 Debts Policy F&CS Health & Safety Chief 7.7 Approval 303 Policies Executive ITEM AGENDA ITEM ACTION PRESENTED BY PAGE NO TIME Office Fire Safety Policy, ,Managing Violence & Aggression at Work Policy; Personal Relationships Chief 7.8 Approval 330 at Work Policy Executive Adverse Weather Chief 7.9 Approval 341 Policy Executive Landlord Health & Director of 7.10 Approval 350 Safety Policies
    [Show full text]
  • Facebook, Twitter, and the Uncertain Future of Present Sense Impressions
    BELLIN_FINAL.DOCX (DO NOT DELETE) 12/19/2011 3:29 PM University of Pennsylvania Law Review FOUNDED 1852 ________________ Formerly American Law Register ________________________ VOL. 160 JANUARY 2012 NO. 2 ARTICLE FACEBOOK, TWITTER, AND THE UNCERTAIN FUTURE OF PRESENT SENSE IMPRESSIONS † JEFFREY BELLIN The intricate legal framework governing the admission of out-of-court statements in American trials is premised on increasingly outdated communi- cation norms. Nowhere is this more apparent than with the hearsay exception for “present sense impressions.” Changing communication practices typified by interactions on social media websites like Facebook and Twitter herald the arrival of a previously uncontemplated—and uniquely unreliable—breed of present sense impressions. This Article contends that the indiscriminate admis- sion of these electronic present sense impressions (e-PSIs) is both normatively undesirable and inconsistent with the traditional rationale for the present sense impression exception. It proposes a reform to the exception that would exclude † Assistant Professor of Law, Southern Methodist University, Dedman School of Law. I would like to thank Edward Imwinkelried, Colin Miller, and the participants in the SMU Faculty Forum for their comments on a draft of this Article. Donna Bowman and Octavio Dominguez contributed valuable research assistance. The Article would not have been possible without the patience and support of Catherine Zoe Garrett. (331) BELLIN_FINAL.DOCX (DO NOT DELETE) 12/19/2011 3:29 PM 332 University of Pennsylvania Law Review [Vol. 160: 331 unreliable e-PSIs while simultaneously realigning the modern rule with its his- torical rationale. In so doing, this Article sounds an early warning to courts and legislators regarding similar challenges on the horizon, as modern commu- nication norms continue to evolve beyond the contemplation of the drafters of the hearsay rules.
    [Show full text]
  • Rules and Regulations Governing Public Utility Service
    RULES AND REGULATIONS GOVERNING PUBLIC UTILITY SERVICE ISSUED BY THE MISSISSIPPI PUBLIC SERVICE COMMISSION JACKSON, MISSISSIPPI COMPILED WITH AMENDMENTS March 2, 2011 1 1. GENERAL RULES RULE 1 – Applicability RULE 2 – Definitions RULE 3 - Accounts, Records and Reports RULE 4 - System Operation and Records RULE 5 - Continuity of Service RULE 6 - Customer Relations RULE 7 - Refusal to Serve Customers RULE 8 - Discontinuance of Service RULE 9 - Customer Deposits RULE 10 - Billing RULE 11 - Meters RULE 12 - New Construction RULE 13 - Joint Operation RULE 14 - Poles and Other Structures RULE 15 - Service Rules and Regulations 2. SPECIAL RULES - ELECTRICITY RULE 16 - Location of Meters RULE 17 - Meter Testing Facilities and Equipment RULE 18 - Accuracy Requirements for Service Watt-Hour Meters RULE 19 - Servicing Utilization and Control Equipment RULE 20 - Servicing Utilization and Control Equipment RULE 21 - Place and Methods for Meter Testing RULE 22 - Installation Tests RULE 23 - Periodic Tests of Watt-Hour and Demand Meters RULE 24 - Tests RULE 25 - Voltage RULE 26 - Voltage Surveys and Records RULE 27 - Station Instruments and Meters RULE 28 - Interstate Operation RULE 29 - Special Rule for Cogeneration & Small Power 3. SPECIAL RULES - TELEPHONE COMPANIES RULE 30 – Definitions RULE 31 - Grades CF Service RULE 32 - Service Areas RULE 33 - Base Rate Area Boundaries RULE 34 - Extensions of Service RULE 35 - Adequacy of Service RULE 36 - Rates and Tariff Changes RULE 37 - Traffic Rules RULE 38 - Service Interruptions 2 RULE 39 - Service Station Lines RULE 40 - Construction Standards RULE 41 - Held Applications for Service RULE 42 - Precedence of Service RULE 43 - Use of Telephone RULE 44 - Business and Residence Telephones RULE 45 – Directories RULE 46 – Grounded Circuits RULE 47 - Extended Area Service RULE 47.1 - Slamming 4.
    [Show full text]