The Internet is Changing the Public International Legal System
Henry H. Perritt, Jr.
Dean, Chicago-Kent College of Law
Illinois Institute of Technology
fax (312) 906-5335
Public international law increasingly is called upon to provide a framework for private international law—treaties for recognition and enforcement of civil judgments and to limit the adjudicative jurisdiction of civil and criminal courts, to codify rules for choice of law and to define safe harbors for private ordering or self regulation. New legal institutions resembling administrative agencies in the national context are emerging under treaty based public international law. These new international institutions are beginning to exercise limited quasi legislative (rule making) and quasi-judicial (adjudicatory) powers. While most of these bodies allow only state parties to participate formally, there is increasing pressure also to allow private standing, recognizing the growing de facto role of non-governmental organizations (“NGOs”) in international affairs.
Information technology in the form of the Internet accelerates this process in three ways. First, the Internet facilitates the negotiation of treaty based regimes, and makes it possible for new international legal machinery to operate effectively and more quickly. Second, the Internet alters the balance of interests that shape the political dynamics that determine the content of international law. Third, the Internet’s global character puts stress on traditional state-based precepts of private international law, increasing the pressure for public international law regimes to regulate Internet commerce and political activity directly or indirectly by providing frameworks for private ordering.
A. What makes the Internet special?
To evaluate the arguments presented in this article, one must understand how the Internet differs from other information technologies. Technological innovations always have required the adaptation of international legal system. Information technologies always affect international diplomacy. The telegraph changed the way wars were fought and the relations between diplomats and heads of state. Wireless telegraphy (radio) had similar profound impacts. Radio broadcasting in the 1930s helped bring the totalitarian regimes of Hitler and Mussolini to power. Television is credited for shaping American withdrawal from Vietnam and for encouraging international intervention in Bosnia and Kosovo.
But the Internet is different. For one thing, it is inherently global. Anyone can set up a Web page on a $2,000 computer, connect the computer to the Internet for $12.95 a month, and publish pages instantly visible everywhere in the world to anyone else who has connected a computer to the Internet. That kind of global reach is not true with Morse telegraphy, wireless radio communication, television or radio broadcasting. Users of older information technologies had to make special arrangements to extend their reach far across national boundaries. Users of the Internet must make special arrangements to localize their activities. Inherently, a Web page published on a server located in Tuscaloosa, Alabama is as visible in Tirana, Albania, as in Tuscaloosa.
The Internet has another important characteristic that distinguishes it from earlier information technologies. The price of entry is a “$2,000 computer. That is all one needs to broadcast to the world through the Internet or to participate in political dialogue. That is several orders of magnitude less that it costs to set up bricks-and-mortar store, a television broadcast transmitter, or to buy a printing press to publish a newspaper.
These remarkably lower economic barriers to entry for the Internet, compared with older information technologies, empowers disfavored groups within domestic political arenas; it empowers groups who want to form connections with each other across national boundaries; it empowers people who want to create or maintain NGOs.
B. Is the Internet really ubiquitous?
2. Kosovo enthusiasm for e-commerce
3. Ukraine’s University of Internet Affairs
II. Public and private international law
Public international law conventionally addresses relations between and among sovereign states, while private international law conventionally addresses relations between or among private persons who are citizens of different states. The boundary between public and private international law, though often treated as distinct, in fact, always has been indistinct. Until the Twentieth Century, international law involved the personal relations of sovereigns, while the subject matter of today’s private international law was covered by municipal law. Erosion of natural law theories in preference for positivism in the late Nineteenth Century widened the gap, reflected in the tension between monism and dualism in international law theory. Dualists distinguished sharply between public international law as the law of relations between states and private international law as the law governing persons.” Monists sought unification.
International commercial law straddled any gap between the two types of international law, because it regulates the activities of both individuals and states. Admiralty was a strong example. Admiralty restricted the power of states against vessels belonging to nationals of other states. It also was a source of right by individuals against vessels belonging to other individuals.
The growing importance of transnational business in the late decades of the Twentieth Century and the increasing emphasis on international human rights law in the same time period stimulated a return to a more unified view, albeit without an explicit abandonment of positivism as the theoretical foundation. The goal of International Law is to create and maintain systemic stability, to reduce frictions among states. Global commerce and political international, accelerated by the Internet, threatens to increase interstate friction unless international law keeps pace. The goal of International Law always has been universality, the result, politically, of harmonization, and convergence. More harmonization, resulting from struggles to allow the Internet to flourish, means greater scope for international law.
A. What is private law?
“The terms "public" and "private" law are common in a variety of contexts and have also carried a variety of other meanings. Because the public/private distinction emerged from the notion that there is a separate and distinct private order, private law can be understood as protecting "pre-political rights. . . . Private law, then, was that part of the legal system protecting the private ordering; public law consisted of government compulsions restricting private freedom." Under that definition, property law, tort law, and contract law may be considered examples of private law, and labor law and constitutional law public law.”
According to Philip Frickey and Daniel Farber, the traditional conception of private law says that it is that part of the legal system that protects private ordering, while public law consists of governmental compulsions restricting private freedom. Now, they observe, the distinction between public and private law has been blurred, in part because of the critique of legal realists, observing that private law reflects public policy choices, and the tendency of public law to grant new individual rights. Joel P. Trachtman has observed that "Private law is an oxymoron." In fact, he points out, conflict of laws – the traditional category of private international law -- relates to public law. "All conflict of laws rules allocate power to government." And, public interests in a market economy include private interests.
"The end goal of conflict of laws-as of law more generally-is the maximization of the welfare of the constituents of the relevant society. If international conflict of laws rules are analogous to constitutional law --describing the allocation of power horizontally within a unitary order-the relevant society whose welfare these rules must maximize is international society. Of course there is nothing quite comparable to a world Constitution, and world society is far more decentralized than, for example, the federal society of the United States. "
"The private-public distinction is inappropriate in the context of conflict of laws, assuming it is a valid in any context. From a law and economics perspective, the private sphere is that sphere normally left to market ordering. Thus, the private sphere, in theory, absent transaction cost or market failures, needs no law. However, it is generally agreed by even the most extreme law and economics theorists that in practice, the private sphere needs law to reduce transaction costs by facilitating the assignment of stable property rights and rules of tort liability and contractual responsibilities."
"Thus, public policy-that use of the state level-would be expected to incorporate certain values from the private level."
B. The role of public law
Public international law circumscribes the legitimate exercise of state power to regulate private conduct and to decide private disputes, through rules of jurisdiction, choice of law and judgment recognition. These rules, making up what American lawyers call conflict of laws, link public and private international law. When private persons or entities seek resort to civil courts to resolve their disputes, they encounter conflict of laws rules, which determine the power of national law makers, adjudicators and enforcement resources.
Although conflict of laws is considered to be but another name for private international law, its rules reflect public-law limitations on the exercise of sovereign power, motivated by the reality that, when one sovereign oversteps its bounds, it encroaches on the prerogatives of another. The rules therefore reflect a comity among sovereigns, seeking to preserve the essential attributes of sovereign power to each.
Trachtman says that the best solution to conflict of laws problems is the negotiation and agreement on conflicts rules by governments through the treaty making process, in other words, using public international law mechanisms to change the content of private international law. Vertical public law litigation involves the assertion by individuals of rights derived from public international law in regular courts. Harold Koh argues that vertical litigation is growing in importance.
Because public law defines the contours of private law, the public law questions with respect to Internet regulation include the role of private ordering. Two kinds of hybrid legal systems can be envisioned. One kind opens national courts to private litigation based on norms derived from public international law. The other kind uses public international law mechanisms to define structures for private ordering, much as American labor law defines structures for private ordering of the workplace.
C. Public law and private institutions
Many private institutions enjoy power in international politics and law that rivals that exerted by traditional states. Francois Rigaux’s “Transnational Civil Society,” involves three types of actors: the state acting through its domestic law, the community of states in the international order, and individuals acting through private initiatives including NGOs. “It is through the non governmental organizations and, more and more often, through the mass media that world public opinion makes its voice heard on the major problems requiring action at the international level.” Professor Koh's "transnationalist" school of international relations theory emphasizes the role of private actors in international law. Professor Anne Marie Slaughter agrees. Private actors create purely private legal relationships by dealing with each other, create mixed relationships by dealing with states, and as political actors, they coordinate their private self-interest across national boundaries, exerting pressure vertically through national interest groups thereby shaping the policy of states. The Internet will strengthen all these phenomena by making the horizontal relationships easier despite distance and regardless of formal national borders.
Just as domestic interest groups are an essential part of the political dynamics of domestic politics, non governmental organizations ("NGOs") are an essential part of international rulemaking and enforcement. Indeed, because the institutional structure for international governmental functions is less complete than that for state governmental functions, NGO’s play a proportionately greater role in the international context than in the domestic context.
NGOs are not a new phenomenon. They were instrumental in the eighteenth and nineteenth centuries in stopping the slave trade, promoting peace through international arbitration, advocating worker solidarity, encouraging free trade, and harmonizing international law for maritime commerce.
McDougal, Lasswell, and Reisman identified seven functions performed by NGOs: intelligence, promotion, prescription, invocation, application, termination, and appraisal. Intelligence is gathering, analyzing and disseminating information. Promotion is advocacy of particular policy options. Prescription is actual participation in rulemaking. Invocation is an accusatory role when norm violations are detected. Application is actual adjudication. Termination extinguishes norms. Appraisal is the evaluation of the performance of formal international institutions and norms.
III. The Internet improves the effectiveness of the international law system
International law affects human beings in two basic ways: it changes the way national-law institutions govern them, and it may grant them rights and impose duties on them directly, which are then enforced by national or international courts and agencies. The Internet’s influence is manifest in the increasing ease with which new international agreements are negotiated, in the impact such agreements have on state behavior, and in enforcement of international law norms directly against states and private persons. There are thus three branches to the argument that the Internet strengthens public international law: the Internet facilitates development of new law; the Internet promotes acceptance of international law by states; the Internet aids in detecting violations and imposing sanctions.
The arguments are interrelated: the same groups that promote the writing of new treaties, also engage in domestic political activities to induce states to conform their behavior to the treaties once they are adopted. And, the same groups are active in investigating violations.
A. The Internet facilitates the development of new public international law
The Internet facilitates development of new public international law in two ways. First, it reduces the transaction costs and speeds up the process of negotiating new treaties. This effect is evident mostly in the preparatory work that precedes formal adoption of treaty language. Second, the Internet empowers groups advocating new treaty law—primarily NGOs, making it easier for them to form bonds across state boundaries and to participate in the preparatory work for treaties even though they lack substantial resources.
1. Enhancing treaty negotiation
The Internet makes it easier to negotiate international agreements. Paul Szasz dissected the treaty making process into four major and some twenty subordinate tasks or “stages.” Many of these can be sped up and made more effective by use of the Internet. In the Initiation stage, virtual libraries and electronic surveys of participating governments enhance assessment of the likelihood of success and development of estimates of schedule and costs. In the second stage, when the text of a multilateral treaty is being drafted, the Internet makes it easier to conduct preliminary studies of the state of law, and to distribute completed studies and analyses. Drafting groups can deliberate through the Internet. When governmental consultations are necessary, drafts can be made available and comments received through the Web or email. In the adoption stage, deliberation software can increase the options for consensus formation and voting. During the ratification (“entry into force”) stage, virtual library functions can ease the burdens of smaller, less developed countries, and can organize reservations made by individual states. Once the treaty enters into force, placing treaty depositories on the Internet improves compliance.
The actual process of treaty negotiation begins with months or years of preparatory work, usually originating in workshops or conferences in which experts in the field—typically professors, public officials from concerned national agencies and lawyers from interested private and non profit organizations -- crystallize the issues and the alternatives which might eventually be expressed in the form of treaty language. As with any negotiation process, this preparatory work depends upon participants’ ability to persuade other participants that their views of reality are accurate and legitimate, to form alliances based on common perceptions and goals and ultimately to persuade opinion leaders in broader communities that their recommendations are worthy of acceptance because they relate to the political agenda of a complex array of public officials and interest groups usually focused on the national political process.
In this work leading up to the actual session in which the text of a treaty might be adopted, email plays an important role in allowing preparatory conferences to be organized. For example, this author recently participated in a workshop on Internet Jurisdiction organized by The Hague Conference on Private International Law. All of the invitations, negotiations over format, arrangements, and distribution of background materials occurred via email on the Internet. There was only one telephone conversation and no letters or faxes.
Once a preparatory conference is organized, Web pages supplement exchange of documents by email in making it more convenient and much quicker for participants to exchange draft language and to make available to each other relevant preexisting documents that they may wish to cite as precedent or from which to extract model language. After the face to face meetings are adjourned, at which participants develop personal bonds that can support trust and make further conversation more reliable, email, specialized Web sites—often closed to the public—facilitate completion of follow on work agreed to at the face to face conference. 
Eventually, the treaty-making process moves to another phase, in which advocates of a treaty must persuade their governments to support recommendations emerging from the preparatory conferences and to place actual treaty negotiation sufficiently high on their political agendas. At this point, the Web’s publishing function becomes more important. Interest groups favoring preparatory recommendations use the Web to inform the public and mobilize their constituencies for action. The landmine Web sites are examples of this process at work, as are various Web sites supporting U.S. participation in the drafting of a statute for an international criminal court, preceding The Rome Conference of 1998. While simply putting up a Web site does not mean that many people will read it, the way that various Internet search engines work enhance the likelihood that even the most obscure organizations can find an audience for their Web sites. Then, an ordinary member of the public or anyone else interested in the subject of landmines or international crimes is likely to find a Web site advocating a new treaty on those subjects.
Moreover, the political processes leading up to actual final agreement on treaty text rarely are as completely democratic as the foregoing discussion suggests. A variety of “regimes” exist in the international legal system that provide continuing frameworks for preparatory work in treaty negotiation. The Hague Conference on Private International Law, the ITU, WTO, WIPO, and other UN organizations have permanent secretariats that maintain evolving agendas referring to possibilities for negotiation of new treaties. Now, all of these organizations have Web sites that make it easy for anyone interested in their general subject matter to access the work plans and determine the status of preparatory work on treaties. As the preparatory work proceeds, these Web sites provide forums for mobilizing political support (and opposition).
All of these possibilities facilitate rule making in international institutions, where distances otherwise would be a barrier. They also increase the role of NGOs because they represent channels for NGO participation additional to traditional state-controlled channels.
Facilitating the treaty negotiation process can reduce some of the disadvantages of reliance on customary international law. One of the difficulties with customary international law always has been the difficulty in determining its content. Professor Jack Goldsmith that the Internet will make the incoherence of Customary International Law worse, making it even more perilous to incorporate it into U. S. federal common law. Nothwithstanding Professor Goldsmith’s argument the Internet may actually improve the coherence of customary international law. Even if it does not, the Internet’s facilitation of treaty negotiation will make customary international law less important.
It is important, however, not to exaggerate the claims that the Internet facilitates development of new treaty law. Whether or not states agree to treaties depends on their underlying interests. As Part ___ explains, the Internet may alter those interests, but the resulting interest balance may oppose, rather than favoring, international agreement. It does, however, open up new channels of political interaction, domestically, and across national boundaries. These new channels make it easier for international political movements to be organized, and for those movements to affect the position of states. This phenomenon is discussed in the next section.
2. Empowering advocates
The Internet’s lower economic barriers to entry give voice to political actors who otherwise would be denied effective access to the public arena. Because the Internet gives them access, and is inherently global, they can find likeminded people in other states, thus enabling them to build political movements across national lines.
Once they have built movements, the Internet makes it easier for them to mobilize public opinion, thus altering the position of state actors. The movement for a treaty against landmines is a good example. Web pages permitted the horrors of landmines to be dramatized to the general public and to political activists likely to be sympathetic to the need for a new treaty. The Internet permitted these activists, once aroused, to coordinate their arguments across national lines, and to use political action and sympathetic governmental positions in one country to promote sympathetic positions in other countries.
Because the regular press and media increasingly consult the Web for sources of news, growing use of the Web by political action groups also gives them more effective voice in traditional media. The Internet permits campaigns to be organized, funds to be raised, petitions to be signed, and public officials to be contacted, all more easily than could be done without the Internet.
Of course the same channels can be used by opponents of any new treaty, so the availability of the Internet does not necessarily mean that treaties are more likely to be adopted; and simply opens up new avenues for political dialogue—avenues that are indifferent to national boundaries. It has the effect of broadening the scope of political debate and making it more international in character.
NGOs, organized and expressing themselves through the Internet, have had great influence on the treaty negotiation process for many years. NGOs such as Amnesty International and the Lawyers’ Committee on Civil Rights perform important intelligence and invocation functions. NGO activity has been especially influential in the environmental arena. At the Stockholm Conference in the early 1970s, NGOs outnumbered accredited governmental representatives, and by 1987 were allowed to address plenary sessions drafting environmental treaties. Their role thus moved from promotion to prescription. Greenpeace typifies aggressive performance of the invocation function. Most people think that the Rome treaty for the International Criminal Court would not have been concluded when it was without NGOs leading the charge. Human rights NGOs mobilized world opinion in favor of international intervention in Bosnia and Kosovo.
The Internet improves the operation and therefore the strength of NGOs. Internet use improves performance of three of the functions McDougal, Lasswell, and Reisman identify as performed by NGOs -- intelligence, promotion, and prescription -- thereby facilitating the organization and operation of NGOs, and enhancing their influence.
Use of the Internet reduces the transaction costs for organizing, maintaining, and carrying out the functions of an NGO. Group organization and maintenance cost advantages from Internet use are greater when group members are more dispersed. Thus information technology makes it possible to contact potential NGO constituents dispersed around the world, while the cost of communicating with them and enlisting their support would likely be greater than the resources available without Internet technology. This function of the Internet instantly replaces or supplements direct mail campaigns and newsletters. As credit card commerce on the Internet becomes more common, more people will be equipped to contribute to NGOs directly through the Internet, thus expanding fund raising possibilities.
More than this kind of membership maintenance is possible. NGO activities can be directed and coordinated through e-mail and the Web. A communication associated with direction and coordination can either be public or private, depending on how e-mail and web systems are setup. An NGO can set up a Web page for each major project and allow project participants to post messages to discussion groups placed within that Web page. As soon as a project participant has something to report or a project leader has a new direction to give, that information instantly is available to other key members simply by copying a file from one directory to another on an Internet-connected computer.
B. The Internet promotes acceptance of public international law by states
The Internet promotes national adoption of new public international law by empowering national interest groups who advocate ratification of new treaties. This is one aspect of the interpenetration process. (The other aspect involves the adoption of international norms as domestic legislation is framed and international and domestic cases are decided by courts. The Internet also facilitates these post ratification aspects of interpenetration.)
In other words the Internet makes traditional sovereign states more permeable, weakening many of their traditional powers, at the same time that it empowers NGOs in all three of their functions.
As the Internet further blurs the lines between domestic interest groups and international NGOs, it strengthens the ability of individuals and small-group interests – weak in domestic politics -- to be expressed and given fulfillment through international institutions -- NGOs. Then, then Internet makes it easier for NGOs to influence domestic politics. It is no accident that China’s growing restrictions on political freedom in Hong Kong have limited the role of international organizations in politics. International organizations, especially in the human rights area, already play an active role in creating embarrassment for existing domestic political institutions.
The Internet and the World Wide Web fundamentally change the possibilities for mobilizing these interest groups and focusing their power on political choices taken by individual states. NGO performance of promotion functions was enhanced as they developed “sophisticated information networks linking dissidents, sympathetic governments, and the media.”
No longer is the choice of intervention in East Timor, Kosovo or Bosnia solely the province of political elites and professionals in diplomacy; now, due to information technology, it is a mass political question. Because the Internet increases access to the channels of communication to these world wide audiences, it fundamentally alters the balance of power between different political actors.
In his illuminating synthesis of competing and overlapping strands of international law, Harold Koh explores the process of “norm internalization.” He explains that transnational actors such as public officials, “norm entrepreneurs,” and NGOs mobilize domestic elites and popular constituencies and set in motion a domestic political process that internationalizes a norm of international law. The process can be viewed at three overlapping and potentially reinforcing levels: the level of the international system-s itself; the level of individuals and groups who make up the state; and the processes and institutions of domestic politics.
International institutions make a difference in compliance because they clarify norms, provide a mechanism for detecting noncompliance and commit the parties to interact repeatedly over a sustained period of time. Gradually the international norms interpenetrate the domestic legal system of the participants, ripening into “symbolic structures, standard operating procedures, and other internal mechanisms to maintain habitual compliance with the internalized norms.” Democratization strengthens the effect of international law because international law as rhetoric influences masses more than it influences leadership cadres, who are more likely to set policy based on interests in the realist tradition.
Interpenetration refers to the mutual influence between national and international legal systems. State-based law influences international law by providing models for judges applying international law. Already, state-based systems are reference points for international law under the doctrine of customary international law, which depends, in part on the universal practice in national legal systems. Working in the other direction, international law also influences state-based law. That process is hardly new. Early in the nineteenth century, concepts of private international law often were the reference points for federal courts deciding American cases of first impression relating to personal jurisdiction and choice of law.
Interpenetration involves a shift from dualism to monism as a characterization of international law as it actually operated. The monism/dualism dichotomy is giving way in the international law literature to a more nuanced approach which recognizes both theoretical and practical problems confronting a judge who would directly apply international law. Increasingly, domestic courts in the United States are pressed to consider international legal norms along with purely domestic norms in deciding cases. Although some American courts have declared international law to be part of domestic U.S. law, the more usual approach is to presume that Congress intends for U.S. statutory law to be interpreted as consistent with international law. Well recognized principles determine whether treaties to which the United States is a party have “direct effect” (i.e. can be applied directly as sources of law in domestic cases), reflecting some reticence in wholesale incorporation of international legal norms into the domestic legal order. Some foreign states, however, directly and explicitly incorporate some or all of international law into their domestic legal systems. The Chief Justice of the Wisconsin supreme court has urged state court judges to pay more attention to foreign law in deciding purely domestic U. S. cases.
“we can cross the divide separating us from other jurisdictions around the world. And if we do so with the modest intent to borrow ideas on classifying, discussing, and solving a particular problem, we should not be deterred by unfamiliarity with foreign legal systems. We may fail to understand a particular system of law or even misinterpret some foreign decisions. Nevertheless, we may also find unexpected answers or new challenges to domestic legal issues.”
One barrier to the application of international law in domestic court systems is the difficulties of gaining knowledge of international law. By some estimates, there are more than 15,000 treaties to which the U.S. is a party. There are surely thousands of scholarly opinions about the content of customary international law. These are scattered all over the world. The comprehensive scope of legal publishers in the U.S. with respect to domestic U.S. legal materials is not typical of other countries nor of international materials. Even an institution such as The Library of International Relations (“LIR”) at Chicago-Kent College of Law whose mission it is to organize international materials must devote considerable efforts to locate them, get copies, and index them for feasible access.
The Internet facilitates interpenetration in both directions by making international law and state-based law more available to judges and legislators all around the world. Rigaux’s “Transnational Civil Society” is strengthened by the Internet. Because of improved accessibility to international norms, domestic judges and legislators are more likely to be influenced by them, thus increasing interpenetration. Improved communication and information exchange through the Internet strengthens the role of NGOs in domestic political processes as well, further increasing interpenetration.
Legal decision makers cannot use another body of law as a reference if they do not know its content. The Internet makes it easier for them to discover its content. No longer must litigants and judges rely upon cumbersome and expensive mechanisms of having expert witnesses present their opinions about the content of a foreign legal system; now, the litigants and judges simply may look up the law for themselves.
The United States was an early leader in making its law visible to people outside the United States. The Federal Web Locator, provides a portal for accessing nearly a thousand federal Agency-sponsored web sites, and the Thomas system established by the Library of Congress in 1994 offers access to all major Congressional materials, and many state legislatures make bills and enacted law available. A combination of direct action by federal appellate courts and a cooperative effort by several American law schools make the full text of all federal appellate opinions available on the Web, and a rapidly growing fraction of state court systems are doing likewise. The U.S. Department of State has begun to publish on the Web treaties to which the U.S. is a party, beginning with trade agreements.
Now, many other nations are following suit. The decisions of the British House of Lords are the web. International human rights treaties are available through the Council of Europe. The United Nations is doing a good job of making scanned images of pages of all treaties in the United Nations series available on the Web. The The Council of Europe’s Venice Commission is moving its collection of constitutional courts decisions to the Web. Aided by efforts of this author and many of his students, decisions in Croatia, Macedonia, Bosnia, Albania, and -- soon -- Kosovo are available as well. China is improving legal transparency in order to hasten economic development by making court decisions and legislative materials available on the Web.
While mere availability of legal materials does not ensure interpenetration, it makes it easier to achieve. As noted above, there is a growing voice with the American judicial community for referencing materials outside the United States. The kind of large scale Web publishing of international documents described in the preceding paragraphs results in the extension of the virtual law library already present on the Internet World Wide Web. Such an expanded library provides a rich source of models for interest groups and parliamentarians writing new law. No longer must the author of a new commercial law for Bosnia-Herzegovina take a stab in the dark; the author can begin with recently enacted commercial laws in Croatia and emerging models from the European Commission, both available on the Internet. No longer must the drafter of a new media law for Kosovo guess at what will be acceptable to the Council of Europe, she can look at the media law adopted by Croatia under CoE pressure.
The availability of legislative models increases the likelihood of harmony among legislative enactments in different sovereign states, reinforcing economic pressures for such harmonization in order to reduce trade barriers. But not only does the virtual library make harmonization of positive law more likely; it also makes harmonization of decisional law more likely. The constitutional courts connected through the Venice Commission must decide issues arising under the European Convention on Human Rights--a single source of positive human rights law, incorporated by reference into the constitutions of most of the states of Central and Eastern Europe. Because the constitutional courts in the these countries are applying the same document, and because the kinds of conduct likely to give rise to human rights claims does not vary substantially from state to state, it is logical that courts from different states would decide similarly the same issues under the same law. The Venice Commission Project makes it easier for them to do this by giving them easy access to constitutional court decisions of all of the states confronted with the same questions. Even though stare decisis does not operate in a strong form in countries without sources of similar law traditions, as a matter of practical politics, a judge will be pressed to explain deviations from precedent established elsewhere.
Professor Goldsmith doubts the tendency for national and international institutions to harmonize substantive law and questions whether judges dealing with issues already decided by other judges relate their own decisions to the ones that have gone before. It would be interesting to test his view – and mine – by systematic analysis of constitutional court decisions, counting references to decisions in other countries. The point is not that more information about pertinent judicial decisions in other jurisdictions inexorably leads to agreement across jurisdictional lines, but rather that the easier availability of judicial decisions globally will force judges to articulate the connections between their decisions, even if deviant, and other decisions. The result is more reasoned decisionmaking, and a tendency for greater harmony at the margins. There surely will be disagreement, but at least it will not be accidental.
C. The Internet aids in detecting violations and mobilizing sanctions
The Internet encourages compliance with public international law by making it easier to detect violations and deviations, and to mobilize sanctions. More and more institutions concerned with implementation of treaties are using the Internet to publicize national decisions taken under treaties. Moreover, Internet use by NGOs enhances their performance of the invocation and application functions,  building on “sophisticated information networks linking dissidents, sympathetic governments, and the media.” Other sections of this article explain the growing influence of NGOs in negotiating and promoting adoption of international treaties. When violations of international norms are detected by NGOs, they can focus attention, through Web pages and e-mail, on the violators through blacklists and organize secondary pressure against those maintaining relations with the violators. An example of this process at work is the Organization of Economic Boycott of Myanmar for Human Rights Violations. The pressure for Pepsco and others to withdraw from Myanmar was organized almost entirely by NGOs and private persons rather than by governments. They used the Internet intensively to organize the boycott.
Beyond communicating blacklists of rule violators, thereby facilitating informal enforcement, NGO rule enforcers can use specialized Web pages to post results of their investigations to solicit expressions of support and contribution for formal and informal enforcement actions. They can use the Web and e-mail to organize mass write-in campaigns to prod political actors and to commence formal enforcement proceedings.
The Internet empowers nationalities (ethnic interest groups) to accuse regimes of violating international norms in their treatment of national minorities. The Armenian diaspora is generally perceived as largely determining U. S. policy toward Armenia, and the Croatian diaspora is credited with shaping German policy toward Slovenia and Croatia after they seceded from Yugoslavia. Public reaction to the siege of Sarajevo, to ethnic cleansing in Bosnia to Serbian suppression of municipal election results, and to ethnic cleansing in Kosovo are clear examples. As Serb atrocities against the Albanian minority in Kosovo escalated during the Spring and summer of 1999, the first color photographs of murder victims usually were found on Web sites maintained by the Albanian Diaspora; not on CNN.
An important part of the new international public law system involves peacekeeping by international institutions, ripening into international protectorates as in the case of Kosovo. The Internet facilitates construction and operation of the machinery necessary for these interventions. In the case of Kosovo, international legal documents, press releases and reports pertaining to the establishment and operation of the KFOR military, and the UNMIK civilian authorities are available on the Internet, making it easier for multinational administration to function.
Finally, in certain areas, the growing importance of the Internet as a political and legal forum and as a marketplace creates leverage for use against violators of international norms. One reason the debate over reform of Internet domain name administration is so interesting is that it has the seeds of a new private mechanism for enforcing private rules in an international arena. One cannot participate effectively on the Internet unless one has a domain name. The IAHC recommendation envisioned a Web of contractual relationships among domain name registers pursuant to which all registers will obligate themselves to revoke the domain name of the Internet user violating the rules and decisions of institution created under the IAHC recommendations.
D. Technology is not enough
Technology, on its own, never effects revolution. It is people, using technology for certain purposes, who alter international law. They must be able to use the Internet to publish law and law reform proposals; they must be able to find the law; and they must be able to engage in political dialogue on the Internet.
The Internet is a vast virtual library, but its virtual shelves will be empty unless individuals and institutions possessing relevant information place it on computers connected to the Internet. Moreover, other individuals and institutions must provide a value-added layer of bibliographic information pointing to primary documentation; the virtual library must have a classification system and a card catalog. For example, the full text of treaties must be placed on the Internet, and someone also must organize list of treaty titles with pointers to the text of the treaties, which may be located on a multiplicity of servers. Many of those providing the bibliographic information may choose to standardize typologies or theasuri for indexing documents, but they need not do so. One of the Internet’s major advantages is the diversity of approaches to information retrieval. Others, and they need not be the designers or implementers of the classification systems, must translate foreign-language documents.
The Internet facilitates both the publication of primary information and the organization of bibliographic aids. An Internet server can be established for a little as $2,000. All it takes to publish a document on the server is to save it in a particular format – Hypertext Markup Language (“html”) -- from either of the two most popular word processing programs and then to “publish it” to a particular directory on the server --- a single step in either of the two most popular Internet Web browser Programs. For an institution such as a court that regularly generates textual judgments or opinions, the process of web publishing can be automated with a few simple scripts that take word processing files for opinions or judgments as soon as they are released and automatically formats them and publishes them to an appropriate directory on the Web server, automatically generating indexes and tables of contents as new opinions or judgments are added.
The preparation of bibliographic aids also is simple. All one needs is a concept for organizing the information. For simple content, one simply publishes treaty titles or subjects on a Web page and links the entries on the word processing documents to the URLs for the full documents. Typically, the linking can be done with one mouse click in popular word processing programs and Internet Web browsers. The Web server containing the bibliographic information may be anywhere in the world and need have no pre-established relationship with the Web server containing the primary documents.
Free text search engines are available at low cost. These software modules automatically index every word in a collection of Web files and permit users to perform search against the full text of all the documents, without any human intervention to code the subject matter of new documents.
The actions necessary for conferencing on the Internet are somewhat more sophisticated. Someone needs to set up a e-mail list for a discussion group on a web page. For an experienced Webmaster or unique administrator, this is a five to ten minute task. Once the list or discussion space is in place, anyone in the world can participate in a discussion.
Acceptance of this new reality is growing. In the Fall of 1996, the author encountered many skeptics in Bosnia, when he and his students proposed creating Internet-based libraries of legal materials to hasten development of a Rule of Law. In the Fall of 1999, no such skepticism was evidence in Kosovo or Ukraine, where university and government officials were eager to get Internet connectivity established so access would be enhanced to Internet databases of legislative and judicial materials they already were building.
But the cheap printing press, virtual library and political forum features of the Internet’s World Wide Web cannot become realities unless the Internet is open. The qualities of openness in this sense means that every layer of the “stack” of communications and content layers must be free from artificial restrictions. The Internet’s universal, nonproprietary technical standards -- IP, TCP, SMTP, NNTP, and HTTP -- make it easier for the different pieces of an information infrastructure to fit together. Once connected to the Internet, anyone can send an email message, post to a news group, or mount a Web page, safe in the assurance that anyone else connected to the Internet will be able to read them. An open Internet also means that those wishing to connect to the Internet, whether primarily to receive information or to establish Web servers and to publish information, must not be subjected to licensing and market entry restrictions developed for older technologies such as radio and television broadcasting and telephone and telegraph services.
The distributed, layered architecture of the Internet must be available to suppliers and consumers of information. That means two things.
First, it means that centralization of content or communications functions by operation of law as through exclusive franchises, is unnecessary and harmful. The economies of scale for virtual libraries and electronic publishing are low. Therefore there are no natural monopolies or efficiencies likely to result from state granted monopolies. Establishing such monopolies deprives public and private sectors of the efficiencies naturally available from the Internet. It also means that competition laws should ensure that those with monopoly power, however obtained, do not extend it into adjacent layers of the stack of communications and content. Just as incumbent telephone companies in the United States and elsewhere must be forced to unbundle their services and offer connections at any feasible point, so also must suppliers at content levels be prevented from limiting competition in adjacent markets. This is what the anti-trust proceeding against Microsoft is all about.
An open infrastructure such as is described in this section ensures a diversity of sources and channels for public information and also ensures marginal cost pricing and rapid introduction of new technologies.
The open systems interconnection (“OSI”) stack is familiar to computer scientists. Published by the International Standards Organization, OSI is an abstract concept of how different elements of computing systems, including networks of all kinds, fit together based on seven layers of function, ranging from electrical signals and hardware plug specifications at the bottom or level one up to the relationship between applications and operating systems at level seven. The seven layers of the OSI stack embody the idea that subsystems making up a computer network can be disaggregated from each other. Each layer is defined in terms of the services it requires from the layers below it, its internal operations (protocols), and the services it provides the layers above it. If clear specifications exist for the functions to be performed by each subsystem or “layer” in the OSI stack, and if protocols exist defining the interface between layers, computer programmers and hardware manufacturers can focus their energies on one or more subsystems or layers without having to provide all of the layers. This gives the benefits of specialization to participants in the market for computer networks.
The OSI stack has conceptual power beyond what is needed by network engineers. The same basic ideas can be extended beyond the computer programs and electrical connections making up the OSI stack itself. One can imagine the same kind of stack of layers in content and information access features. The World Wide Web has raised consciousness about that kind of layering of information value.
The stack model expresses the idea instantiated by the Internet’s World Wide Web, that the elements of an information infrastructure can be unbundled. Implementation of the OSI stack and the protocol stack ideas free up positive network externalities inherent in lower levels. Otherwise, those levels are locked into competing proprietary islands. The result of general adoption the OSI conceptual model was a tipping, -- and then a stampede to -- IP, TCP and then http after the network externalities became apparent.
But competitive access to the conduit is not enough. The Internet will do little if there is no relevant content on it. The same principles of competitive access and opposition to monopoly that are appropriate for the telecommunications infrastructure also are appropriate for the information infrastructure. While copyright and other forms of intellectual property have an important role to play in private creation of information; they are irrelevant for public information, which is created as a public duty imposed on lawmakers and judges.
Almost anyone can frustrate transparency – governments, NGOs, universities. Realization of the Internet’s potential to affect development, acceptance, and enforcement of new public international law depends upon transparency. Preparatory work, actual drafting of treaty language, the political process of treaty ratification, and exposure of deviations and violations all depends upon the relevant information being freely available on the Web. When participants in any of these processes refuse to make information held by them freely available, seeking to extract revenue from those wishing access to the documents or seeking to prevent others from re-disseminating documents, the Internet’s potential is thwarted. In many instances, the incentives to build support for one’s position will overcome such rent-seeking behavior. In other instances, however, self interested economic behavior by public institutions must be overcome by freedom of information legal principles which should not be trumped by exaggerated copyright interpretations protecting basic political documents.
Unfortunately, not all governments make their information resources available for electronic access. The reluctance of some governments stems from the communist era in which public access to information about government activities either was unnecessary or was actively opposed. In other cases, the motivation is not to discourage public participation in government, but to make money. Many government institutions recognize the economic value of government information in electronic form and also recognize that monopolists can extract more revenue by maintaining their monopolies and discouraging competition. Accordingly, they set up government-run or government-sponsored monopolies to sell access to their information resources blocking access by others.
State sponsored monopolies over government information are undesirable for a number of reasons. Monopolies make it easier for censorship to occur. Monopolies usually perpetuate older information technologies because monopolists have no economic incentive to introduce new technologies, thus depriving consumers of the benefits of new technology. Monopolies rarely serve the needs of particular consuming communities as well as a competitive market structure can serve them because no monopolist can understand and cater to the needs of specialized communities as well as a designer and producer who specializes more narrowly.
Accordingly, information policy should commit to and encourage a diversity of sources and channels for government information. This policy is best implemented by a legal framework that grants anyone a right of access to basic government information and also gives everyone a privilege to publish that information in electronic form or otherwise. In some countries, such rights and privileges are deeply imbedded in current law.
In the United States, this entitlement is codified in the Freedom of Information Act, and in similar state statutes in almost every state. In Sweden, the entitlement is guaranteed by the Constitution.
The European Commission presently is engaged in drafting a Green Paper on access to public information, under a mandate of the Maastricht Treaty requiring that the functions of European governmental institutions become more transparent.
The basic underpinnings of an international freedom of information act are visible in the guarantees of freedom of expression and freedom of access in the International Covenant of Civil and Political Rights. They should be extended by decisional law and by national implementation of the core principles of the American Freedom of Information Act.
Freedom of information and competitive access to the Internet are important new international human rights, and they should be added to the inventory of values promoted by United States foreign policy and by human rights organizations.
IV.The Internet changes the balance of interest that determine the outcomes in international law
A. Tom Friedman’s Lexus phenomenon – the catnip effect
B. ABA Jurisdiction Project – new reasons to harmonize
C. But also enables Friedman’s Olive Tree phenomenon
1. Nationalism – 50,000 Albanian email accounts
2. WTO/Seattle protests organized through the Internet
V. The Internet is giving rise to new bodies of international law
The Internet not only improves the functioning of the public international legal system; it invites the extension of that system. There is growing recognition that traditional forms of regulation are unsuitable for many of the economic and political transactions that occur on the Internet. In some cases, subjecting Internet activities to state-based regulation will raise transaction costs to the point that desirable activities will not occur; in other cases, important public policy interests cannot be enforced effectively over Internet content originating in other states. Erection of new public law frameworks, encouraging and channeling private ordering (self-regulation) can address some of these problems, and pressure grows to develop such frameworks.
A. Battle between public (PuIL) and private (PrIL) ordering
But why does the Internet encourage greater reliance on private ordering as part of the international legal system? Because of the differences between the Internet and older technologies, people have been thinking hard about whether traditional jurisdictional rules are adequate for the Internet or whether some new approaches are necessary. The Internet’s inherently global character makes it difficult to localize conduct and effects, and localization is the traditional lynchpin of private international law doctrines for determining prescriptive and adjudicative jurisdiction. The Internet’s low barriers to entry encourage participation in transnational commerce and political affairs by millions of individuals and small enterprises which, before the Internet, were confined to national markets and forums. Statistics presented by the National Consumers League for 1997 show that Internet fraud complaints involving non-U.S. consumers ranked 8th, just after Illinois consumers and just ahead of Virginia consumers.
David R. Johnson and David Post say:
“Cyberspace radically undermines the relationship between legally significant (online) phenomena and physical location. The rise of the global computer network is destroying the link between geographical location and: (1) the power of local governments to assert control over online behavior; (2) the effects of online behavior on individuals or things; (3) the legitimacy of a local sovereign's efforts to regulate global phenomena; and (4) the ability of physical location to give notice of which sets of rules apply. The Net thus radically subverts the system of rule‑making based on borders between physical spaces, at least with respect to the claim that Cyberspace should naturally be governed by territorially defined rules.”
In other words the international legal system’s traditional rules for jurisdiction depend on localization of conduct or harm. The Internet challenges all three kinds of jurisdiction: prescriptive jurisdiction, adjudicative jurisdiction and enforcement jurisdiction, because it is difficult to localize legally relevant conduct occurring in the Internet.
Self-regulation can help with all three challenges because it lessens the pressure to localize behavior.
With respect to prescriptive jurisdiction, if a private group agrees on a code of good practice, that is a kind of legislative act. It is a form of prescription and it is inherently transnational, at least to the extent that the membership of the group is transnational.
With respect to adjudicative jurisdiction, private dispute resolution such as arbitration can be inherently transnational. International commercial arbitration under the New York Convention is a prominent example. Moreover, private dispute resolution is not limited to arbitration or mediation. There are some new models for private dispute resolution. Credit card chargeback mechanisms, dispute prevention and resolution systems unilaterally adopted by private Internet intermediaries such as EBay, which offers an escrow system, an insurance system, a dispute resolution system in the form of mediation, and a mechanism for a kind of consumer black listing of merchants who don't behave themselves, are beginning to attract attention.
Domestic U.S. systems for patient care disputes with managed care companies also have potential application in the international context. There is a long history in health care delivery in the United States of a hybrid system of dispute resolution that begins within a private entity like an insurance company and eventually ends up in an appeal process in a public entity. Such structures provide the simplicity of a private mechanism at the first level but also have some type of appellate review or control by public institutions.
To be credible private self-regulatory schemes have to produce enforceable decisions. That is a political reality. Enforceability implicates the concept of enforcement jurisdiction. Self-regulation works only to the extent that government permits it to work, as opposed to viewing private enforcement action as defamatory or violative of antitrust laws.
Self-regulatory schemes must be linked to public law and to public authorities. When such linkage exists, there is the possibility for real protection because private groups can legislate and resolve disputes privately and then to the extent that it seems appropriate, rely on the government apparatus for enforcement.
B. Models from other types of international regulation
The Internet’s global characteristic causes it to be a target of international regulation similar in some respects to the targets of law of the sea and the subject matter of outer space regulation. Its low economic barriers of entry, however, distinguish it sharply from outer space regulation and moderately from law of the sea.
The brief review of law of the sea and outer space regulation that follows offers some models for regulation when localization of activity within a state is difficult or impossible. These may be useful starting points for thinking about international Internet regulation. On the other hand, these regulatory regimes focus on state actors rather than private actors, and thus make them unsuitable conceptual models for Internet regulation of many thousands of private actors.
1. Maritime treaties (LOS) as model?
In 1609 Hugo Grotius postulated that no state legitimately could exercise jurisdiction over the open sea. Under customary international law, national jurisdiction was limited to territorial waters. Controversies concerned state jurisdiction over foreign vessels found within their territorial waters and state jurisdiction over natural resources such as fish found within the territorial waters. International law acknowledged state jurisdiction over fishing in territorial waters, and developed principles for defining territorial waters. As interstate ocean commerce increased, international law recognized that the law of the nationality of vessels governed activities on board, "on the pragmatic basis that there must be some law on shipboard, that it cannot change at every change of waters, and no experience shows a better rule than that of the state that owns her." Another pragmatic rule allowed free passage of warships in time of peace through straits used for international navigation between two parts of the high seas even though the passage occurred through territorial waters.
Controversy continued well into the Twentieth Century over the extent of territorial waters -- and hence of state jurisdiction. One of the most illuminating of the alternative rules was the "cannon-shot" rule which defined the extent of territorial waters by the range of a cannon fired from shore, thus clearly defining jurisdiction in terms of the practical extent of state power.
Article 33 of the USCLOS reconciles the competing interests by recognizing a "contiguous zone," extending no further than 24 nautical miles from shore, within which:
"the coastal state may exercise the control necessary to:
(a) prevent infringement of its customs, fiscal, immigration or sanitary lawa dn regulations within its territory or territorial sea;
(b) (b) punish infringement of the above laws and regulations committed within its territory or territorial sea."
Outside territorial, contiguous, and seas "exclusive economic zones," "the high seas are open and free to all states, and in those seas warships and noncommercial ships are entitled to "complete immunity" from interference by any other state. Private commercial ships are subject to boarding by warships and law-enforcement ships when authorized by the flag state or if there is reason to suspect the boarded ship of piracy, slave trading, unauthorized broadcasting, reason to suspect that the boarded ship is without nationality, or reason to suspect that the boarded ship is of the same nationality as the boarding ship.
UNCLOS recognizies the role of international dispute resolution machinery to the law of the sea. Article 286 of the United Nations Convention On The Law Of The Sea (“UNCLOS”) provides:
“Subject to section 3, any dispute concerning the interpretation or application of this Convention shall, where no settlement has been reached by recourse to section 1, be submitted at the request of any party to the dispute to the court or tribunal having jurisdiction under this section.”
Article 287 allows disputants to satisfy the requirements of article 286 through the International Tribunal for the Law of the Sea (“ITLOS”), the International Court of Justice an arbitral tribunal constituted in accordance with Annex VII, or a special arbitral tribunal constituted in accordance with Annex VIII for one or more of the categories of disputes specified therein. The means of dispute resolution must be specified at the time of ratification of the Convention. The general dispute resolution procedures contemplate the possibility of participation by non-state parties.
Among other things, the ITLOS and the alternative dispute resolution bodies expressly have the power to order the release of vessels that have been detained. The rules of the tribunal evidence its formal, adjudicatory character.
The deep seabed regime of UNCLOS is particularly significant in terms of its implications for Internet regulation. That regime includes an Authority comprising an Assembly, a Council, and a Secretariat, and also includes an Enterprise, an international business organization empowered undertake deep seabed resource development directly. Significantly, the dispute settlement machinery for deep seabed development extends standing to non-state entities, and rulemaking does not require consensus or unanimity by signatories.
Adoption of UNCLOS is regarded as a watershed in the development of public international law because UNCLOS, viewed as evidence of the content of customary international law, thus making it binding -- in a general sense -- even on non-signatories.
2. Space law as model
The law of outer space, includes among other things, regulation of communications satellites, and the closely associated law of international telecommunications. Like the internet, international telecommunications, constitutes an international resource - to be used for all of mankind, and a scarce resource - to be preserved.
The ITU convention is intended to:
"a) effect allocation of the radio frequency spectrum and registration of radio frequency assignments in order to avoid harmful interference between radio stations of different countries;
"b) coordinate efforts to eliminate harmful interference between radio stations of different countries and to improve the use made of the radio frequency spectrum;
"c) coordinate efforts with a view to harmonizing the development of telecommunications facilities, notably those using space techniques, with a view to full advantage being taken of their possibilities;
"d) foster collaboration among its Members with a view to the establishment of rates at levels as low as possible consistent with an efficient service and taking into account the necessity for maintaining independent financial administration of telecommunication on a sound basis;
"e) foster the creation, development and improvement of telecommunication equipment and networks in developing countries by every means at its disposal, especially its participation in the appropriate programmes of the United Nations;
"f) promote the adoption of measures for ensuring the safety of life through the co-operation of telecommunication services;
"g) undertake studies, make regulations, adopt resolutions, formulate recommendations and opinions, and collect and publish information concerning telecommunication matters."
These purposes are similar to the purposes of Internet domain name regulation in that they focus on technical issues, maximization of resource, and non interference.
The Outer Space Registration Convention provides that each signatory must maintain registry of objects launched into space, and obligates launching states to register with UN objects launched into orbit or beyond.
While some of the problems addressed by space law are similar to those presented by international Internet law , there also are important differences. Satellite communication, like the Internet inherently transcends national boundaries. With both systems of law, there is a need to recognized and allow the power of technology to be available, while at the same time respecting the prerogatives of traditional sovereignty.
On the other hand, important differences may make it difficult to adapt Space Law concepts for International Internet regulation. For one thing, as earlier sections of this article have noted, the economic barriers to entry on the Internet are much less than the economic barriers to entry for satellite communications. One need not procure satellite launch services, from a country that has a satellite launch capability, in order to establish a presence on the Internet. That means greater proliferation of sources of Internet content, making any form of international regulation more difficult than for satellite-based activities. Moreover, it is difficult to conceive how more than one or two sovereign states have the physical capability to exert power over satellite-based activities. That is not true with the Internet. While Internet border controls are not well understood, may be difficult to establish, and may serve to isolate the a country by closing down from the electronic commerce and political discourse of the net, Internet border controls are not impossible. Government-based routers can be established as firewalls for Internet communications outside the country. Internet intermediaries may be threatened with strict punishment if they allow forbidden content to enter the country, thus inducing them to figure out their own border control systems. And, criminal penalties focused on an individual citizens can be reinforced by the Internet tracking capabilities. It the citizen knows that his access of forbidden content will leave a certain trail that can be followed by a law enforcement authorities, he is more likely to comply with domestic regulations prohibiting access to content at the individual user level.
None of these things are possible with satellite systems. Accordingly, the practical underpinnings of space law--the virtual impossibility of applying traditional coercive measures to enforce national law--are not characteristic of the Internet. Because of the greater practicability of enforcing traditional law through traditional coercive measures, there is less incentive for nation states worried about the Internet to agree to an international treaty along the lines expressed by the space treaties.
3. Limited usefulness of maritime and space law models
Both the law of the sea and the space law models are intergovernmental in character. They contemplate that most of the work of rulemaking, treaty interpretation, enforcement, and operations will be conducted by traditional international organizations. Relatively little role is contemplated for the private sector in these models, with the exception of state-designated entities in both regimes.
As the next section shows, other approaches are conceivable for the Internet, involving relatively thin intergovernmental (public-law) frameworks within which private ordering can do most of the rulemaking, adjudication, enforcement, and operational work. These hybrid structures offer the advantages of greater flexibility and decentralization available through private ordering, while tying private ordering to public law to enhance legitimacy, political acceptability, and enforcement through state-based coercion when necessary.
C. Matrixes for hybrid regulation
Changes in information technology, including but not limited to the Internet, are causing the development of new public law structures for public and private regulation of commercial and political activities making use of these technologies, and also are causing the redesign and streamlining of traditional public law institutions such as the International Telecommunications Union and the World Intellectual Property Organization.
The Internet is encouraging exploration of new kinds of public international law matrixes for private self ordering because of the difficulties of regulating the Internet through conventional state-oriented means. Redesign of existing institutions enlarge their limited rule making power, and open them up to limited forms of participation by non-governmental entities such as service providers.
The new institutional frameworks are more significant because they represent hybrid forms of international regulation, providing public law frameworks for private ordering. The two most advance examples involve negotiation of a safe harbor for personal data moving from Europe to the United States, and the establishment of an internationally controlled private corporation to regulate Internet domain names and addresses.
The new public international matrixes for private ordering include choice of law rules and rules for adjudicative and prescriptive jurisdiction, treaties such as the New York Convention for enforcing arbitration awards and a proposed state convention on the enforcement of civil judgments. They also include immunities for actors in private ordering systems, such as immunities that would shield members of a self regulating organization from antitrust liability and immunities that would shield accusers and decision makers in private adjudicatory mechanisms from the defamation liability or liability for intentional interference with business relations.
1. Subsidiarity will receive increasing attention as a way of balancing global and local concerns.
Much needs to be done intellectually to sort out those matters that cannot be dealt with effectively at a more local level from those that will drift to international, political, and legal institutions. In this regard, careful analysis of the federalism in the United States would be instructive, not so much from the perspective of the commerce clause and preemption as from the perspective of political will to act nationally as opposed to locally. Europeans refer to the preference for local resolution of issues as subsidiarity.
The Internet not only reinforces other phenomena encouraging the development of international law; it facilitates government at the local level. One of the problems with earlier twentieth century information technologies such as television and radio broadcasting is that their economies of scale forced public affairs information to larger political units. The evening news covers Washington more easily than it covers the state representative district. An ordinary citizen is more likely to see the President of the United States on television than the Mayor. The greater visibility of higher levels of government encourages reliance on those higher levels to help to solve problems. The Internet changes that. Its lower barriers to entry mean that an alderman can have a home page that looks just as functional and just as accessible as the home page of the President of the United States. As lower levels of government begin to take advantage of the Internet’s potential, political underlings can become more relevant in the lives of their constituents even as power on certain issues is shifting upward from nation states to international institutions, and from national political organizations to international ones.
Subsidiarity relieves political pressure to resist adherence to international norms. Greater possibilities for effective government at the local level means that local concerns can be accommodated more completely, thus reducing alienation from more remote legal and political institutions. In other words, the Internet is likely to strengthen local and international law, probably at the expense of national, state-based law. Some early glimmers of this effect are evident from efforts at the state level in the United States to influence international developments.
2. Criteria for self regulation - privacy
The European Union’s directive on data protection, effective on October 25, 1998,  prohibits transfer of personal data outside of the EU except to countries that provide an “adequate” level of privacy protection.  Because the United States has a patchwork of industry-specific, state, federal, and private self regulatory approaches, it is not clear that transfers of data to the United States would be permitted by EU authorities. The Directive establishes two administrative bodies to assist the Commission in implementing the directive, a Working Party and a Committee. The Working Party has only advisory powers, while the Committee can block Commission action. As a practical matter, the Working party is more militant than the Committee in asserting the prerogatives of member-state data protection authorities.
While prohibiting data transfers originating in Europe does not, in a formal sense, contravene international law principles of prescriptive, adjudicative and enforcement jurisdiction, the practical effect of such a prohibition is to disrupt international commerce.
The European Commission (“EC”) and the United States government have been engaged in developing a hybrid regulatory scheme to avoid this disruption. The discussions resulted in the issuance, on April 19, 1999, of draft “International Safe Harbor Privacy Principles” by the United States Department of Commerce under its statutory authority to foster, promote, and develop international commerce. Under the safe harbor concept, qualifying U.S. organizations would be deemed to satisfy the “adequacy” principle of the European legislation and thus eligible to receive personal data transmitted from Europe. Under the principles, organizations could qualify for a safe harbor in several ways:
· They can join a private-sector-developed privacy program that adheres to the safe harbor principle;
· They can qualify to the extent that their activities are governed by U.S. statutory, regulatory, or administrative law (including rules issued by national securities exchanges, registered securities associations, registered clearing agencies, or municipal securities rule making boards) that effectively protect personal data privacy; or
· They can incorporate the safe harbor principles into contracts entered into with parties transferring personal data from the EU. Adoption of the safe harbor principles must be accompanied by a public declaration to do so.
Separately, Directorate General XV of the European Commission, through its Data Protection Working Party, adopted the following criteria for judging self-regulatory regimes as components of an international legal order to protect privacy:
For a self-regulatory instrument to be considered as a valid ingredient of "adequate protection" it must be binding on all the members to whom personal data are transferred and provide with adequate safeguards if data are passed on to non-members.
The instrument must be transparent and include the basic content of core data protection principles.
The instrument must have mechanisms which effectively ensure a good level of general compliance. A system of dissuasive and punitive sanctions is one way of achieving this. Mandatory external audits are another.
The instrument must provide support and help to individual data subjects who are faced with a problem involving the processing of their personal data. An easily accessible, impartial and independent body to hear complaints from data subjects and adjudicate on breaches of the code must therefore be in place.
The instrument must guarantee appropriate redress in cases of non-compliance. A data subject must be able to obtain a remedy for his/her problem and compensation as appropriate.”
By June, 1999, European authorities had not fully accepted the Department of Commerce draft principles. The Working Party of National Data Protection Commissioners reiterated its view that “the patchwork of narrowly focused sectorial laws and self regulatory rules presently existent in the United States cannot be relied upon to provide adequate protection in all cases for personal data transferred from the European Union.” It expressed its support for the safe harbor approach and encouraged further discussions to provide an acceptable benchmark. The working party comments identified a number of substantive protections in the April 19 safe harbor draft as to which it requested change or clarification. It also expressed concern about enforcement mechanisms, noting “that national supervisory authorities [in Europe] do not have jurisdiction in third countries and consequently lack any enforcement powers which would allow them to oversee effectively the implementation of the principles by U.S. organizations.”
Enforcement was considered in a joint draft paper on EU procedures, issued by the European Commission and the Department of Commerce on April 19, 1999, which described procedures for handling complaints about noncompliance with safe harbor rules and challenges to Commission decisions under Article 25.6 of the Directive.
The draft paper on EU procedures envisions three possible enforcement channels. The first, and preferred, channel begins with private and governmental complaint and dispute resolution procedures in the transferee country (the United States). If these procedures do not resolve the dispute, member states may entertain complaints. They must seek remedial measures from the data recipient and transferee country authorities, notifying the European Commission if such efforts are unsuccessful, and not blocking data transfers unless exceptional conditions set forth in the directive exist. If the EC is notified, it must notify the data subject, the data recipient, and transferee country authorities, provide an adequate hearing in conjunction with the Article 31 Committee, and ultimately may revoke the finding of adequacy pertinent to the transfer.
The second channel involves complaints filed directly with member state courts which may result in a judgment which might be executed in the transferee country but could not block data transfers unless pursuant to provisional measures authorized in the directive.
The final channel is a review of the validity of a decision by the European Commission by the European Court of Justice under Article 174.
The draft paper on EU procedures is silent as to the criteria, procedures for, or effect of recognition of a member state judicial judgment by a United States court or agency. Presumably recognition would be sought under the doctrine of comity or under the Uniform Recognition Act, in those states adopting it. An obvious problem under either recognition mechanism is that the decision of an EU member state court might not be regarded as a civil money judgment entitled to recognition and enforcement, but rather a penal measure.
The ultimate sanction, however, is a determination by the European Commission that the protections on the U.S. side no longer are adequate, thereby allowing a member state or the Commission itself to block further data transfer. This possibility presumably would provide sufficient incentives in most cases for the data recipient, under encouragement from the United States Government, to reach agreement with the Commission on remedial measures, possibly including compensation. In this regard, the Working Party’s review of the 19 April safe harbor principles observe that “in an entirely voluntary scheme such as [envisioned by the safe harbor principles] compliance with the rules must be at least guaranteed by an independent investigation mechanism for complaints and sanctions which must be, on the one hand dissuasive and, on the other hand give individuals compensation, where appropriate.”
In a Joint Report on Data Protection Dialogue to the EU/U.S. Summit, 21 June 1999, the parties reported that “the member states support in principle the proposed form of the arrangement, which will involve a decision on the basis of Article 25.6 of the EU Directive on data protection,” creating a presumption of adequate privacy protection for U.S. based organizations that “self certify their adherence to the principles and frequently asked questions and are subject to the jurisdiction of the U.S. Federal Trade Commission or other body with similar statutory powers.” It recited that the parties planned to finalize the safe harbor arrangement during the autumn of 1999.
As of this writing, it cannot be known whether the negotiations over a safe harbor for data privacy will prove successful. One can, however, learn certain lessons from the negotiations. First, hybrid public/private regulation can be politically acceptable in Europe and the United States. Second, any such hybrid scheme must reserve a role for public authorities in defining the basic parameters of regulatory requirement and in providing backup enforcement measures. Otherwise, self regulatory initiatives are likely to be dismissed as shams in the political arena. Third, working out hybrid international regulatory regimes will succeed only when effected interests perceive the negotiations will produce a result superior to what can be obtained through other means, such as traditional state-based legislation and rule making. The jurisdictional uncertainties raised by the Internet create such perceptions and incentives with respect to the pro regulatory interests. Increasingly, they understand that relying on traditional legislatures, courts, and state-based administrative agencies will prove under inclusive, in that certain types of conduct they wish to regulate will escape control because it will occur outside the jurisdiction of these traditional legal and political institutions. Incentives also exist for market-oriented interests because they fear the over inclusiveness of traditional state-based regulatory regimes, subjecting their activities to uncertain and conflicting requirements and hundreds of different jurisdictions. They also are likely to prefer hybrid regulatory regimes to an expansion of traditional international regimes because they perceive the traditional regimes as being inflexible and unduly influenced by states without a stake in the robust development of electronic commerce and political dialog in the Internet and other new technologies. The existence of these incentives does not however, insure that hybrid regimes actually will be worked out. Countervailing concerns exist. Pro regulatory interests—at least with respect to certain regulatory subjects—enjoy some measure of protection of their interests in traditional state-based regimes, however under inclusive. They will be reluctant to give these up in favor of untried hybrid approaches. They will prefer to workout new international regimes that layer new hybrid requirements on top of existing state-based requirements and enforcement mechanisms.
Conversely, pro-market interests have no desire to see regulatory requirements and enforcement measures multiply. They want to reduce rather than to increase the complexity resulting from overlapping requirements and enforcement channels. They will never agree to international hybrid regimes unless they have certain preemptive or safe harbor effects, linking them to existing state-based requirements and enforcement institutions. Moreover, all interests understand how to play existing games. They know how to mobilize political influence in existing legislative and administrative bodies. They know how to litigate cases before existing adjudicative and enforcement bodies. Any new regime is more uncertain than existing ones. Accordingly, if new international hybrid regimes simply reiterate existing substantive requirements and offer the same or greater transaction costs of litigating in traditional fora, pro market have little incentive to agree.
Accordingly, international hybrid regimes will gain agreement only if they offer new flexibility in rule making, permitting substantive duties to be closely tailored to the realities of rapidly changing technologies. They also must offer more flexibility and lower cost for complaint and dispute resolution, while at the same time being supported by effective state-based coercive measures to compel compensation and compliance.
3. Domain name administration
A different kind of international hybrid regulatory regime is overseeing Internet domain name administration. The Internet Corporation for Assigned Names and Numbers (“ICANN”) is a non-profit corporation formed to assume responsibility for IP address space allocation, protocol parameter assignment, domain name system management, and root server system management functions formerly performed under U.S. Government contract by IANA and other entities.
In 1999, the Department of Commerce signed a Memorandum Of Understanding Between the U.S. Department of Commerce and Internet Corporation For Assigned Names And Numbers, http://www.ntia.doc.gov/ntiahome/domainname/icann-memorandum.htm. In this memorandum, the parties agreed to a “DNS Project,” for joint design, development, and testing of new private mechanisms for DNS management. Under the memorandum, ICANN was expected to:
a. Establish policy for, and allocate, IP number blocks;
b. Oversee operation of the authoritative root server system;
c. Oversee policy for adding new top level domains
d. Coordinate assignment of other Internet technical parameters “as needed to maintain universal connectivity on the Internet;”
The statement of policy recited, among other things, “An increasing percentage of Internet users reside outside of the U.S., and those stakeholders want to participate in Internet coordination.” ICANN enjoys a kind of quasi governmental status under U.S. law, by virtue of its contract with the United States Government.
In meetings held in Berlin on May 25-27, 1999 the ICANN Board of Directors adopted a number of resolutions that illustrate the scope of its quasi-regulatory responsibilities. It defined certain “constituencies” to elect representatives for ICANN governing bodies, including ccTLD registries, commercial and business entities, global top level domain (“gTLD”) registries, intellectual property, ISPs and connectivity providers, and registrars. It concluded that interests represented by a non-commercial domain name holders constituency should be involved as early as possible in the organization process, and urged the organizers of that constituency to submit a consensus application for provisional recognition. It also agreed to consider proposals for a system to permit individuals to select geographically diverse at-large directors. All of these actions pertain to the political (interest-representation) structure for policy setting and rulemaking.
At the same meetings, ICANN concluded that gTLD .com, .org, and .net registrars should implement a uniform dispute resolution policy for coordinating domain name registration with trademark rights, thus taking the first steps toward a private adjudicatory system. The proposed ICANN dispute resolution policy resulted from recommendations of WIPO. In 1998 WIPO had undertaken an extensive international process of consultations at the request of the United States Government aimed at developing recommendations to ICANN on questions arising out of the interface between domain names and intellectual property rights. Among other things, WIPO recommended that domain name registrars collect enough inform from domain name applicants and holders to permit them to be contacted in the event of disputes, and the adoption of a uniform administrative procedure for resolving cybersquatting disputes. It also recommended that owners of well-known trademarks be allowed to block issuance of domain names containing the marks or close equivalents. In addition to providing guidelines for a dispute resolution procedure, the WIPO recommendation defined abusive domain name registration, thus offering a substantive rule for application in the ICANN system.
The proposal for a dispute resolution process was motivated in part by the multijurisdictional character of disputes over domain names that allegedly infringe trademarks. The recommendation suggested on-line dispute resolution procedures for certain classes of cases, and endorsed direct enforcement of decisions by registrars through domain name cancellation. The recommendation would not, however, deny participants in the “administrative” process access to regular courts, nor would the administrative process allow monetary damages or rulings concerning the validity of trademarks. Remedies would be limited to determinations of the status of the contested domain name registration through appropriate changes to the domain name database.
Notably, in light of the proposition that the Internet facilitates rulemaking by international bodies, ICANN, WIPO and the Department of Commerce all used the Web to publish proposals and to receive and publish comments on the proposals.
Private regulatory regimes (self ordering mechanisms) must confront representation and consent problems not faced by state-based legal systems. Whenever a private regulatory regime is constituted, its scope must be defined. In other words, the universe of individuals and entities bound by its legislative acts (rules), adjudicatory decisions, and enforcement actions must be defined. In addition, the relationship between the private regime and state-based institutions must be determined. ICANN illustrates the difficulty of solving these problems when the subject matter of the private ordering involves diverse interests and wide geographic scope. ICANNs ongoing effort to define “constituencies,” involves determining the scope of the regulated population. Effected interests want to be represented in ICANNs decision making bodies if they are to be bound by its rules and decisions. The difficulties are especially great with respect to representation of non commercial domain name holders and the general class of Internet users, who are supposed to be represented through “at large” directors of ICANN.
ICANN also struggles with the relationship between its rulemaking and dispute resolution bodies and state-based legal institutions. The final WIPO report devotes several paragraphs to this subject, concluding that ICANN, domain name registrar, and WIPO rules on cyber squatting do not displace national (state-based) rules, abjuring authority to decide the validity of trademarks, a question left to national courts, in preserving disputant access to state-based courts even when they consent to submit their disputes to private dispute resolution bodies.
The “constitution” of private regulatory regimes comprises a Web of contracts through which participants grant power to private rulemaking and adjudicatory bodies and consent to be bound by their decisions. The ICANN apparatus is also a good illustration of this concept.
But the efficacy of these contractual arrangements is only as great as state based legislation and adjudication allows. Contractually agreed to adjudicatory decisions may be validated individuals or entities excluded from a private regime may claim that the private regimes “constitution” violate state-based competition law.
These interdependencies between public and private regulatory regimes are addressed by what this article calls matrixes for hybrid regulation. The matrixes can be explicit and developed in advance, as is the aim of the DOC/EC negotiations over a data privacy safe harbor, or they can be the result of case by case adjudication of disputes arising out of the operation of a private regime, as has been the case with U.S. self ordering regimes such as technical standard setting bodies and private associations.
4. Credit card chargebacks
The explosion of e-commerce on the Internet has stimulated governmental interest in low-cost dispute resolution mechanisms for transnational consumer disputes. The most common form of alternative dispute resolution for consumer disputes in the United States is a credit card charge back. Under the Fair Credit Billing Act, credit card issuers must “investigate” cardholder claims of “billing errors,” “Billing errors” are defined to include “(3) A reflection on a statement of goods or services not accepted by the obligor or his designee or not delivered to the obligor or his designee in accordance with the agreement made at the time of a transaction.” When cardholders allege such non-acceptance or non delivery, the cardholder may not insist on the charge without determining “that such goods were actually delivered, mailed, or otherwise sent to the obligor and provid[ing] the obligor with a statement of such determination.”
Card issuers typically retain only limited authority—defined by the merchant-and cardholder agreements—actually to adjudicate the dispute, although repeated claims involving the same merchant may jeopardize the merchants membership in the credit card network. In most cases, the cardholder protests the charge, a charge back results, the merchant substantiates the charge, informal negotiation directly between merchant and cardholder may ensue, and the charge is reinstated.
Although good empirical data is lacking, it appears that the system satisfies both consumers and merchants. Almost no reported cases in the regular courts exist, suggesting that consumers rarely are motivated to go beyond the charge back process to more formal forms of dispute resolution.
It is important to understand the apparent attractiveness of the charge back mechanism. Several hypothesis can be offered as to why it works so well. Charge backs give customers leverage with merchants against whom they have claims, thus equalizing to some extent otherwise disparate bargaining power. Psychological satisfaction results from triggering a charge back even if the customer eventually has to pay the full price. In at least some cases, triggering a charge back gets the merchants attention, allowing merchant and consumer to work out a compromise. And, in extreme cases, there is the possibility that the consumer will not have to pay or that the merchant will be excluded from the credit card network, ended a pattern of consumer abuse. Moreover, the system is cheap, easily accessible, and quick. A consumer need not search for and find a lawyer or a third party dispute resolution forum. All that is necessary upon receiving a monthly credit card statement is to call or write the card issuer and protest the charge. The card issuer and the merchant handle the rest. No dispute resolution fees are involved.
Merchants like the system compared to other possibilities such as accepting personal checks for a larger percentage of transactions because the merchant is in a better position with credit card charge backs than with stop payment orders on checks. If a consumer buys merchandise or services with a personal check and then stops payment on the check to protest failure of the merchant to perform, the merchant has no attractive remedy. It only can sue the consumer or cut the consumer off from further check-payment privileges. Cutting the consumer off may be an effective remedy for the merchant when there is a continuing relationship between merchant and consumer, but not in the one-off stranger transactions increasingly important to electronic commerce. Lawsuits over small consumer transactions are no more attractive to merchants than to consumers. They are expensive, require lawyer involvement, and engender long delays.
Credit card charge backs are a more common form of dispute resolution in the United States than in other prosperous nations. One of the reasons is the existence of Regulation E in the United States which requires card issuers to make charge backs available. Canadian banks strongly oppose the institution of charge backs in Canada because of concern about processing costs for card issuers. This reluctance is reinforced by the perception of Canadian card issuers that the incidence of disputes is much higher in electronic commerce than in conventional face-to-face commerce.
In Europe, charge backs are not required, but they are nevertheless fairly common in credit card and debit card agreements. There availability in debit card agreements is much more important in Europe than in credit card agreements, because the proportion of consumer transactions accomplished through debit cards relative to credit cards in Europe is much higher than in the United States, although the total of credit and debit card transactions is a much smaller proportion of the total universe in Europe than in the United States. The relatively wide availability of charge backs in Europe despite the absence of any government compulsion to offer them is strong testimony to their attractiveness as an alternative dispute resolution mechanism.
Credit card charge backs put a private sector intermediary in the position of being the dispute resolver. Intermediaries are willing to do this because the availability of mutually acceptable dispute resolution facilitates consumer and merchant use of the intermediaries service. Intermediary-provided dispute resolution greatly reduces search costs and other costs because the intermediary already has a relationship with both disputants.
The features of chargebacks encourage public international law to provide an appropriate framework As the preliminary OECD Report said:
“Financial intermediaries appear best suited to resolve individual transaction problems in the global marketplace through chargeback mechanisms. This involves reversing a transaction (charging it back to the seller) to settle various types of problems (e.g. non-delivery of goods, non-conformance of goods, billing errors, etc.). Chargeback mechanisms encourage merchants to provide high levels of customer satisfaction, as card associations withdraw card privileges from merchants with excessive chargeback rates. Such mechanisms have long been available in the United States and are credited with helping to create consumer confidence in and widespread use of catalogue shopping in that country. During the several years of discussions on this project with card associates, the spread of such mechanisms internationally and to debit cards has been seen as an encouraging sign.”
5. Regulatory categories
In assessing the prospects for success of different approaches to hybrid regulation, it is important to distinguish technical standard setting from other forms of regulation. When an organization like the Internet Engineering Task Force (“IETF”) sets standards, as by prescribing the Internet Protocol (“IP”) or the Transport Control Protocol (“TCP”), compromises are necessary in the negotiation of the standard but enforcement through coercion is unnecessary. Compromise is necessary because some participants in the standard setting process benefit from the selection of a particular standard, and others lose. For example, a vendor whose existing technology is consistent with an adopted standard can expect increase demand for its product, while a vendor whose existing technology is inconsistent with the adopted standard faces sharply reduced demand or else must incur costs to change its products to conform to the new standard. As with any negotiation, affected interests will participate in the negotiation and agree to a negotiated outcome only if they perceive that the benefits of standardization outweigh the benefits of alternatives to a negotiated agreement. The literature on the dynamics of standard setting concludes that some configurations of market share, beliefs about the direction of technology development, and transaction costs will produce voluntary agreement on standards, and other configurations will not. When standards are adopted voluntarily, separate enforcement measures are unnecessary. Users and sellers of affected technologies and products can decide for themselves whether to comply with the standard, and generally do so because of positive network externalities from standards compliance. Moreover, a decision by a particular vendor or user not to follow the standard imposes no particular costs on any other vendor or user or on society.
In other forms of regulation, the incentives for widespread compliance are less, and the harms from noncompliance are greater. For example, a seller may obtain large benefits from engaging in fraudulent transactions. That seller has strong economic incentives not to comply rather than to comply with rules against consumer fraud. Allowing noncompliance victimizes defrauded consumers. Accordingly, a legal regime aimed at reducing consumer fraud must have not only effective and efficient rule making mechanisms; it also must have effective enforcement mechanisms.
But enforcement involves depriving the targets of enforcement of property and/or business opportunity, occasionally backed upped by deprivations of liberty as when incarceration results from criminal prosecution. Norms of political legitimacy and rule of law require some measure of due process before any legal system deprives persons of property or liberty interests.
Other regulatory regimes fall somewhere in between technical standard setting and rule adoption and enforcement. These intermediate regimes involve the allocation of rights to scarce resources, as when frequency spectrum is allocated when imminent domain is used to force one property owner to allow another property owner to make joint use of property or when Internet domain names and the power to register them are allocated among competing contenders. As to these intermediate regimes, the concern is not so much with mobilizing coercive power to enforce rules (although coercion occasionally must be necessary to oust one property owner in favor of another), as it is with due process, to make sure that resources actually are allocated in accordance with previously articulated rules.
So what do these differences mean for the design of matrixes for international hybrid regulatory systems? First, the same political forces that induce legislatures to make new law will operate regardless of the type of regulation to shape the rule making process and—at least to some extent—the content of the rules regardless of whether they are made by public assemblies, government agencies, or private enterprises or coalitions. The minimum requirements for safe harbor privacy protection expressed by the Department of Commerce is one example of this public political scrutiny at work; requirements derived from antitrust law and imposed on private standard setting organizations decades ago under radiant burner and Indian head are other examples.
It is with respect to decision making in individual cases and enforcement that the differences among the three types of regulatory regime matter. With respect to technical standard setting regimes, neither case by case adjudicatory procedures nor enforcement matters much. With respect to regimes that allocate scarce resources, the availability of fair adjudicative procedures matters, but not enforcement. With respect to regulatory regimes aimed at curbing harmful conduct, such as consumer protection or privacy regulation, the availability of effective coercive enforcement, as well as adjudicative due process and fair rule making matters.
In societies honoring the rule of law, the state has a monopoly on the use of coercive power because such power is necessary for effective enforcement regimes, the linkages between state based institutions and private regulatory mechanisms must be strongest with respect to conduct-altering regulatory regimes. Conversely, when only technical standard setting is involved, linkages to state-based enforcement is least necessary and the greatest degree of privatization can be satisfactory. Both resource-allocating and conduct-altering regulatory regimes need adjudicative due process, and therefore public law matrixes for those two types of regulation must include prescriptions for adjudication. But, as the long and successful history of private arbitration shows, adjudication need not be conducted by public bodies; it may be conducted by private entities subject to relatively permissive review when the power of the state is sought to back up decisions by the private adjudicative bodies.
6. The limits of legal compulsion
Understanding that conduct-altering regulatory regimes must be backed up by coercive enforcement mechanisms does not mean that no attention is necessary to incentives. On the one hand, strong incentives for noncompliance can swamp almost any conceivable level of coercive enforcement resources. The drug trade, and the failure of prohibition are examples. Conversely, areas of commerce and political and social interaction exists in which the power of social norms, or economic forces provides such strong incentives for rule compliance that resort to coercive enforcement rarely is necessary. Credit card charge back mechanisms and—perhaps—Ebay’s array of unilaterally adopted private complaint and dispute resolution procedures are examples. Because merchants and intermediaries with which they are associated conclude that customers will be satisfied only if they have access to effective complaint and dispute resolution procedures, they make such procedures available, and respect them without the need for much coercive backup by public bodies. Even when this is the case, however, an occasional lawsuit may be necessary to collect a debt or to vend against a claim of breech of contract for anti competitive behavior.
The EU/U.S. Data Protection Safe Harbor negotiations and domain name regulation involve two very different subjects for regulation. Domain name regulation is close to technical standard setting, while data privacy regulation involves imposing duties on one set of interests in order to benefit another set of interests. Few interests would prefer no domain name regulation at all, at least if they favor continued use and expansion of the Internet. The controversy with respect to domain name regulation relates, not to whether their should be regulation at all or how much regulation, but to entitlements to perform economically re numerative services in connection with operation of the domain name system, such as registration services, and operation of root servers. The controversy also relates to conflicting interests between trademark owners and users or applicants for Internet domain names that may resemble trademarks, in a period of transition between locally based trademark protection and the inherently global effect of Internet domain names.
Private regulation, on the other hand, is not as universally attractive. Some important interests would be just as happy without any legally imposed privacy protection. Thus controversies over international privacy protection regimes relate not only to the allocation of responsibility for managing the regime, but also to questions of the degree of protection and the robustness of enforcement regimes.
Other regulatory subjects present similarly different interest conflicts. Certain forms of banking regulation, for example, involve standards for settlements. Participants do not much care about the details of this system, as long as they know what they are. Other aspects of banking regulation, however, involve interests in greater conflict, as those relating to capital requirements and transparency which disadvantage borrowers including depository institutions such as banks) and advantage lenders. But state and private interests also exist who want to reform capital market regulation to improve stability.
If the EU/U.S. Data Privacy Negotiations are successful, and if the controversy over ICANN regulation of Internet domain names settles down, the world community will have two new, and strikingly different, models for international hybrid regulation. An attractive subject for adapting these models exists with respect to consumer protection in Internet-based electronic commerce. The basic norms of consumer protection differ little from state to state, although the details vary considerably. Additionally, effective and aggressive consumer protection agencies already exist at multiple levels of government around the world. Substantive harmony means that pro regulatory interests could lose relatively little in a new international hybrid regime that embraces universally recognized norms of consumer protection. The existing traditional regulatory matrix creates incentives for pro market interests to move toward and international hybrid regime that would provide more flexibility in rule making, while reducing the problems of regulatory overlap and over inclusiveness. The pro regulatory interests have an incentive to work out a new international hybrid regime because of the marked under inclusiveness of traditional state-based regimes.
Public choice theory suggest, however, that negotiation of an international hybrid regime for consumer protection may be more difficult than in the privacy arena because of the bureaucratic interests of the multiplicity of existing consumer protection agencies. They want to preserve a role for themselves and may have difficulty understanding how an acceptable role can be retained in a new hybrid regime. This kind of bureaucratic interest already has proven difficult in the EU/U.S. Privacy Negotiations as data protection commissioners represented on the working party have been more skeptical than the European Commission and the Article 31 committee of new approaches. The problem would be worse in the consumer protection arena because consumer protection agencies exist around the world, including at multiple levels in the United States, while data protection commissioners exist only in Europe.
The Internet is a vast new marketplace and arena for political discourse. Its inherently global character, and its low barriers to entry facilitate participation by many individuals and small enterprises and political action groups effectively denied participation in traditional markets and through traditional political channels.
The Internet’s characteristics are changing the political dynamics of international law formation and enforcement, changes likely to increase the influence of the international legal system.
The Internet’s characteristics also invite new forms of regulation, as state-based lawmakers and administrators struggle to extend their jurisdiction over conduct occurring through the Internet that have effects within their territory. This struggle to avoid threats to local values is giving rise to new models of regulation through the international legal system – especially to models that provide a public law framework for private, self-regulation.
 I appreciate thoughtful comments and suggestions from my colleague, Margaret G. Stewart, reporter for the ABA Internet Jurisdiction Project.
 See ___ conference draft; Torture Convention; ___ case.
 The WIPO treaty (Convention Establishing the World Intellectual Property Organization Signed at Stockholm on July 14, 1967 and as amended on September 28, 1979) empowers the General Assembly to adopt measures relating to the “administration” of the treaties by a three-quarters vote. Art. 6(g), (e). Amendments to the WIPO convention, in contrast, can be adopted only through the usual treaty ratification process by each signatory. Art. 17. See also Harold M. White, Jr. & Rita Lauria, The Impact of New Communication Technologies on International Telecommunication Law and Policy: Cyberspace and the Restructuring of the International Telecommunications Union, 32 Cal. W. L. Rev. 1 (1995) (discussing specific changes made by 1992 Kyoto Plenipotentiary Conference to increase rulemaking (policymaking) power of ITU bodies and to give standing to private companies and individuals); Krisna Jayakar, Comment, Globalization and the Legitimacy of International Telecommunications Standard-Setting Organizations, 5 Ind. J. Global Leg. Stud. 711 (1998) (explaining reform of ITU standard-setting procedures to facilitate rulemaking, including submission and publication of documents on the Internet).
 See Canada
U.S. Free Trade Agreement
 The natural-law view, abandoned in favor of positivism under the influence of John Austin and others, viewed sovereigns as administering a system of natural law, which bound all sovereigns. Positivism viewed all law as originating in some determinate source. Positivists could understand international law only as based on agreements between or among sovereigns. Anthony Anghie, Finding the Peripheries: Sovereignty and Colonialism in Nineteenth Century International Law, 40 Harv. Int'l L.J. 1, 10-18 (1999) (describing historical evolution of international law).
 See Harold Hongju Koh, Review Essay, Why Do Nations Obey International Law? The New Sovereignty: Compliance with International Regulatory Agreements. by Abram Chayes [FNa] and Antonia Handler Chayes, 106 Yale L.J. 2599, 2609 (1997) (strong blending of public and private remained key features of legal system even after Bentham and Austin began to lay the intellectual foundations of dualism); Paul, supra note 15 at 25-26 (explaining how European scholars sought to unify public and private international law even as Americans were separating them; conflicts can be understood as species of public international law by treating it as a limitation on state sovereignty).
 See Michael Cardozo, moderator for Mark W. Janis, Academic Workshop: Should We Continue to Distinguish Between Public and Private International Law?, 79 Am. Soc’y Int’l L. Proc. 352 (1985).
 Positivism seeks a legislative source for law and cannot find it in the international context because there is no international legislature. Natural law easily supplies the source for international law. See generally Anthony Anghie, Finding the Peripheries: Sovereignty and Colonialism in Nineteenth Century International Law, 40 Harv. Int'l L.J. 1, 10-18 (1999) (describing shift from naturalism to positivism in theory of international law).
 Ronald A. Brand, Direct Effect of International Economic Law in the United States and the European Union, 17 Nw. J. Int'l L. & Bus. 556, 561-62 (1996-97) (explaining monism and dualism)
 Cardozo, moderator for Janis, supra note 22 at 352.
 See generally Bin Cheng, Introduction to Subjects of International Law in International Law: Achievements and Prospects (Mohammed Bedjaoui ed. 1991) (monists, “led by Hans Kelsen, believe that international and municipal law . . . [form] . . . a single normative system” because the ultimate subject of all law is the individual; dualists, led by H. Triepel and D. Anziolottyi, believe they are distinct legal systems). Monism correlates with a natural law view. Dualism correlates with positivism. Monists believe national courts are obligated to apply international law; dualists believe they apply international law only when the national legislature has so prvoided. Thus there is a correlation between direct effect and monism.
 See Joel P. Trachtman, The International Economic Law Revolution, 17 U. Pa. J. Int'l Econ. L. 33, 35 (1996).
 See Cardozo, moderator for Janis, supra note 22 at 353.
 Lan Cao Looking at Communities and Markets, 74 Notre Dame L. Rev. 841, 924 (1999) (citing Daniel A. Farber & Philip P. Frickey, In theShadow of the Legislature: The Common Law in the Age of the New Public Law, 89 Mich. L. Rev. 875, 886 (1991)). Legal reform for transitional societies focuses on private law in the sense that it emphasizes developing the law property, of contracts, of corporations, and of financial markets. Paul H. Brietzke, Designing the Legal Framework for Markets in Eastern Europe, 7 Transnat'l Law 35, 41-51 (1994).
 Daniel A. Farber & Philip P. Frickey, In the Shadow of the Legislature: the Common Law in the Age of the New Public Law, 89 Mich. L. Rev. 875, 886 (1991). For additional sources of the distinction between public and private law, see Trachtman at note 245.
 Joel P. Trachtman, Conflict of Laws and Accuracy in the Allocation of Government Responsibility, 26 Vand. J. Transnat'l Law 975, 984 (1994).
 Trachtman at 985.
 Trachtman at 985. He proposes allocation of prescriptive jurisdiction to government(s) whose constituents are affected by the subject matter, pro rata in proportion to the relative magnitude of such effects, as accurately as is merited given transaction costs in allocation of prescriptive jurisdiction. Trachtman at 987.
 Trachtman at 997.
 Trachtman at 1032.
 Trachtman at 1035.
 Terminology is a problem in talking about private international law. Europeans often refer to “jurisdiction” when American’s refer to “adjudicative jurisdiction” or “personal jurisdiction.” Europeans often refer to “conflicts of law” when Americans refer to “prescriptive jurisdiction” or “choice of law.” Most Americans use the term “conflicts of law” to refer to the entire body of private international law.
 . He acknowledges, however, that treaty negotiation often is impracticable because of levels of controversy. Failing treaty negotiation, he proposes application of his rule by courts adjudicating particular cases. Trachtman at 990-991.
 Harold Hongju Koh, Transnational Public Law Litigation, 100 Yale L. J. 2347, 2347 (1991). Koh distinguishes vertical from horizontal transnational public law litigation. He marshals evidence in support of the proposition that vertical transnational public law litigation was common until the middle half of the 19th century, once again.
 Farber & Frickey at note 53.
 See Jessica T. Mathews, Power Shift, 76 Foreign Aff.,50, 58 (Jan./Feb. 1997) (to control international crime states must compromise cherished sovereign roles, including cooperation with the private sector); id. at 59 (NGOs create new constituencies for compliance with international law).
International Law: Achievements and Prospects 12 (Mohammed Bedjaoui ed. 1991).
 Id. at 12. See Martin Wolf, Uncivil Society, Financial Times, Sept. 1, 1999 at page 12 (lamenting role of NGOs in blocking negotiation of multilateral agreement on investment; “only elected governments can be property responsible for the making of law, domestically and internationally. . . . to grant any private interests a direct voice in negotiations over how coercion is to be applied is fundamentally subversive of constitutional democracy”). “If NGOs were indeed representative of the wishes and desires of the electroate those who embrace their ideas would be in power. Self evidently, they are not.” Id.
 See notes ___ to ___ supra and accompanying test; Harold Hongju Koh, Transnational Legal Process, 75 Neb. L. Rev. 181, 183-85 (1996) (explaining role of private actors in transnational legal processes).
 See supra note 44, and accompanying text.
 The principal limitation on this influence of the Internet will be language difference.
 See Steve Charnovitz, Two Centuries of Participation: NGOs and International Governance, 18 Mich. J. Int’l L. 183, 185 (1997).
 See generally id. at 189-190.
 See id. at 191-195 (citing all examples enumerated in text).
 See id. at 271 (referring to Myres S. McDougal, et al., The World Constitutive Process of Authoritative Decision, in International Law Essays: A Supplement to International Law in Contemporary Practice, at 191, 221-22 (Myres S. McDougal & W. Michael Reisman eds., 1981)).
 McDougal et al., supra note 156 at 221.
 See Charnovitz, supra note 161, at 271 & n.797 (citing Myres S. McDougal et al, The World Constitutive Process of Authoritative Decision, in International Law Essays: A Supplement to International Law in Contemporary Practice, at 221-22 (Myres S. McDougal & W. Michael Reisman eds., 1981) (defining private associations as groups not seeking power).
 Id. at 272.
 Id. at 273.
 Szasz, supra note 35 at 70-71 (The four stages named by Szasz are (1) the introduction of a bill (2) its assignment to a committee and the committee’s report (3) adoption by one house of the legislature and then by the other (4) and finally approval by the executive or return to the litigation).
 Szasz observes that the availability of treaties is “woefully fragmented.” Id. at 107. Dawson observed that legal publishing enhances legitimacy and development of legal norms. Cf. John P. Dawson, The Oracles of the Law xi-xii (1968).
 The same processes may result in a series of preparatory meetings involving different configurations of experts and public officials and private interest groups.
 Cite URLs for pre June, 1998 advocacy of U.S. involvement with international criminal court.
 There is some delay before new Web pages show up on the major search engine sites – usually several weeks pass before search engine crawlers to find new material.
 Public international law includes customary international law as well as treaty-based law. Customary international law emerges from state practice backed up by opinio juris. Opinio juris signifies that state conduct is intended to signify a legal norm. Opinio juris means that a state acts as it does because it believes its actions are mandated by a norm, or that the conduct is intended to give rise to a new norm. In colloquial terms, opinio juris exists when a state acts as it does in order to follow precedent set by other actions, or to set a new precedent which will be followed in the future.
 Compare Bradley & Goldsmith, supra note 8, at 2260 (stating that “CIL should not be treated as federal law without authorization from the political branches”), with Beth Stephens, The Law of Our Land: Customary International Law as Federal Law After Erie, 66 Fordham L. Rev. 393, 395-97 (1997) (criticism Bradley & Goldsmith view). Professor Goldsmith attack points out that the "new" CIL is developed more quickly, depends less on actual state practice, and is fragmented by the increased number of states.
 The Internet makes it easier for advocates and decision makers to find examples of state practice and to find statements of public officials that may be evidence of opinio juris. Before the Internet improved transparency of governmental decision making and scrutiny of governmental actions, research into customary international law either required tedious review of public documents in paper formats scattered over many repositories or reliance on commentators who may have conducted research or who may simply be expressing theoretical opinions with little support from real-world conduct..
 See http://www.removelandmines.org/index.htm, http://www.care.org/info_center/land_mines/lm_news.html (“TAKE ACTION: Urge the White House to Ban Land Mines December 3 is National Call-In Day…. Pick up the phone and be heard!”), , http://www.unicef.org/sowc96pk/hidekill.htm,
 The demonstrations, rioting and sabotage of WTO treaties in Seattle, Washington, in December, 1999, are good examples.
 See id. at 272 (examples of NGO influence in treaty negotiations).
 See id. at 262-264.
 See id. at 264.
 See Charnovitz, supra note 161, at 271 and accompanying text. Intelligence is gathering, analyzing and disseminating information. Promotion is advocacy of particular policy options. Prescription is actual participation in rulemaking.
 This phenomenon involves many of the same effects of the Internet – and many of the same groups – as the phenomena relating to negotiation of treaties; it focuses, however, on the domestic political process, while the preceding section focused on international forums.
 Promotion -- advocacy of particular policy options -- is one of the seven NGO functions identified by McDougal, Lasswell, and Reisman. . See note ___ supra.
 Id. at 264. The Internet enhances performance of the promotion function by NGOs. NGOs can use the Web (indeed they already are using the Web in the United States for this purpose) to mobilize mass opinion in support of particular positions in rulemaking or enforcement proceedings. They can organize e-mail campaigns to decision-makers, frame petitions and collect signatures.
 See Koh, 106 Yale L.J. 2599 at 2645; Harold Hongju Koh, The 1998 Frankel Lecture: Bringing International Law Home, 35 Hous. L. Rev. 623 (1998) (offering examples of internalization of international law: 12-mine territorial limit from UNCLOS III, landmines treaty, European Human Rights Convention, torture convention).
 Koh, 106 Yale L.J. 2599 at 2648 (analyzing example of ABM Treaty Interpretation debate).
 See id. at 2649-50.
 See id. at 2653 (analyzing example of domestic pressures to comply with Oslo Accords by Netanyahu government).
 Id. at 2654.
 See Abdelkader Boye, The Application of the Rules of International Public Law in Municipal Legal Systems, in International Law: Achievements and Prospects 289 (Mohammed Bedjaoui ed., 1991).
 See Breard v. Greene, 118 S. Ct. 1352,1355 (1998) (holding that failure to assert Vienna Convention claim in state court waived it); Kadic v. Karadzic, 74 F.3d 377, 378 (2d Cir. 1996) (holding that Alien Tort Claims Act incorporates international law violations).
 See Banco Nacional v. Sabbatino, 193 F. Supp. 375, 381 (S.D. N.Y 1961), rev’d on other grounds 376 U.S. 398, 422 (1964) (holding that international law may be part of U.S. law in some circumstances).
 This follows the so-called “Charming Besty canon.” See Curtis A. Bradley, The Charming Besty Canon and Separation of Powers: Rethinking the Interpretive Role of International Law, 86 Geo.L.J. 479, 482 (1998) (exploring U.S. constitutional implications of doctrine that U.S. statutes should be interpreted so as to be consistent with international law).
 See Breard, 118 S.Ct. at 1355 (rejecting international law claim to prevent execution of prisoner; claim was waived by failure to present in state court); In the Matter of Surrender of Elizaphan Ntakirutimana, 988 F. Supp. 1038 (S.D. Tex. 1997) (denying extradition pursuant to arrest warrant issued by international tribunal).
 See Bulg. Const. (adopted 1991) art. 5(4) (providing that international treaties ratified by Bulgaria have the force of domestic law and supersede contrary provisions of national law); Konst. RF (adopted 1993) art. 15 (“The commonly recognized principles and norms of international law and international treaties of the Russian Federation shall be a component part of its legal system. If an international treaty of the Russian Federation stipulates other rules than those stipulated by law, the rules of the international treaty shall apply.”)
 Shirley S. Abrahamson & Michael J. Fischer, All The World's A Courtroom: Judging In The New Millennium, 26 Hofstra L. Rev. 273 (1997).
 Id. at 286
 See Boye, supra note 29, at 291.
 By 1979, the United States was estimated to have become party to 8,909 agreements, including 1,281 treaties. Between 1980 and 1992, the U.S. became party to another 4,728 agreements, including 218 treaties, for a total of 13,637 agreements and 1,499 treaties. Barry E. Carter & Phillip R. Trimble, International Law 203-204 (2nd ed. 1995).
 See supra note ____ and accompanying text.
 See Thomas: Legislative Information on the Internet (last visited Sept. 5, 1998) <http://thomas.loc.gov.
 See, e.g. IL gen. Assy. Web site.
 See, e.g. IL supreme court Web site.
 See Agreements Negotiated by the United States Trade Representative (last visited Sept. 23, 1998) <http://www.ustr.gov/agreements/index.html> (WTO and NAFTA agreement).
 See generally European Court of Human Rights Home Page (last visited July 3, 1998) http://www.dhcour.coe.fr/.
 See generally Index of /Depts/Treaty/Collection/series (last visited July 3, 1998) <http://www.un.org/Depts/Treaty/collection/series>.
 The European Commission for Democracy through Law (the Venice Commission) is an advisory body on constitutional law, set up within the Council of Europe. (ed. Note: cite needed.) The Venice Commission is the popular name of the European Commission for Democracy Through Law, an activity of the Council of Europe. See Henry H. Perritt, Jr. Cyberspace And State Sovereignty, 3 J. Int'l Legal Stud. 155, 184 (1997) (discussing Venice Commission and Web-based activities). The Commission specifically focuses on enhancing the functioning of new constitutional courts, through publishing their opinions and otherwise. TheVenice Commission has collected and published the full text of significant constitutional court opinions in paper formats for several years. It moved these opinions to CDROM and Web media in 1997. The Council has developed a conceptual topology or thesaurus to index opinions according to their subject matter. The author of this article has worked with the Commission and with member constitutional courts to use the Internet to improve the efficiency of its decision publishing operation.
 Henry H. Perritt, Jr. & Randall R. Clarke, Chinese Economic Development, Rule Of Law, And The Internet, ___ Gov't Info. Q. ___ (1998).
 See, e.g., Communication from the Commission to the Council, the European Parliament, the Economic and Social Committee and the Committee of the Regions on the implementation of the telecommunications regulatory package (last visited Sept. 5, 1998) <http://www.ispo.cec.be/infosoc/legreg/docs/97236.html>; Law on Telecommunications (last visited Sept. 5, 1998) <http://www.vlada.hr/dokumenti/telecom2.htm >.
 In December, 1999, for example, the author was repeatedly informed by senior governmental and judicial officials in Ukraine that Ukraine is changing the entire structure of its law enforcement and prosecutorial system, and the content of its paternity and child-support law, to conform to Council of Europe standards, hopeful of membership in the Council, as an early precursor to membership in the European Union.
 See The Constitutional Court of the Czech Republic (last visited Sept. 23, 1998) <http://www.concourt.cz/angl_ver/decisions/doc/4 276 96.html>; see generally David Seymour, The Extension of the European Convention on Human Rights to Central and Eastern Europe: Prospects And Risks, 8 Conn. J. Int'l L. 243, 243-44 (1993) (discussing a common European attitude towards human rights).
 The author has assisted this phenomenon by helping constitutional courts get connected to the Internet through a project called "ECEULNET". See The Constitutional Court of the Czech Republic (last visited Sept. 20, 1998) <http://www.concourt.cz/> (acknowledging assistance from ECEULNet); The Constitutional Court of Hungary (last visited Sept. 5, 1998) <http://www.law.vill.edu/ceecil/hungary/court.html> (acknowledging ECEULNet assistance).
 See, e.g., Michael P. Van Alstine, Dynamic Treaty Interpretation, 146 U. Pa. L. Rev. 687, 689-93 (1998) (observing that law has moved from a regime of statutory interpretation to a regime of interpreting and applying international models, conventions and treaties).
 See Goldsmith, supra note 3, at .
 For example, The Hague Conference on private international law is working to organize a Web site that would publish opinions of national courts applying the various Hague conventions. Such a Web site would make it much easier for those interested in interpretation and application of the conventions to follow case law development.
 These are two of the functions identified by McDougal, Lasswell, and Reisman as being performed by NGOs. Invocation is an accusatory role when norm violations are detected. Application is actual adjudication. The other five, discussed in § ___, are: intelligence, promotion, prescription,, termination, and appraisal.
 Id. at 264.
 See supra notes 46 to 156 and accompanying text.
 See Some Example: States Who Are Violate Basic Human Rights, and Firms/Company There Are Dealing with Them, (last visited Sept. 24, 1998) <http://www.geocities.com/CapitolHill/8929/tekst gb.htm>.
 See Susan L. Woodward, Balkan Tragedy: Chaos and Dissolution After the Cold War 184-185 (1995) (German position to recognize Slovenia and Croatia was driven by domestic political pressures, including those of Croat minority in Germany).
 Netscape Navigator & Microsoft Internet Explorer.
 See section ___ infra, explaining the OSI stack, as a model for thinking about different elements of information and communications services.
 Henry H. Perritt, Jr. Sources of Rights to Access Public Information, 4 William & Mary Bill of Rights J. 179 (1995); Henry H. Perritt, Jr., Should Local Governments Sell Local Spatial Databases Through State Monopolies?, 35 Jurimetrics J. 449 (1995); Henry H. Perritt, Jr., Information Access Rights Based on International Human Rights Law, 45 Buff. L. Rev. 899 (1997) (with Christopher J. Lhulier).
 Fcc Promotes Local Telecommunications Competition, Report No. CC 99-41, 1999 WL 717251( September 15, 1999) (rules on unbundling of network elements).
 Layer 1, the physical layer, defines the electrical and mechanical interface, including numbers of pins, cable type, and electrical levels (voltage and current). It is a useful category for evaluating the physical communications infrastructure in any country.
Layer 2, the data link layer, covers link setup and error control. It deals with frames. This is a useful category for evaluating switching technology.
Layer 3, the network layer, deals with establishing virtual circuits. It defines how packets are assembled, disassembled, and routed. It is a useful category for reviewing data framing standards and facilities, and Internet backbone service.
“Historically, “retail” Internet service providers leased point to point telephone lines from their points of presence to transit networks to which they were connected through routers. At their points of presence, they provided multiple dial-up telephone numbers backed up by modems and terminal servers to aggregate traffic. Transit providers leased higher-capacity point to point telephone lines to link routers to which “retail” Internet service providers were connected. The Internet thus was layered on top of the telephone system and constituted a combination of routers, leased telephone lines, dial-up telephone points of presence, and associated organizational and human infrastructure to provide training, service, and maintenance.
“Now, the Internet conceptually is more complicated for several reasons. Dial-up lines now often are virtual, constituting an entitlement to pass traffic through frame relay or SMDS connections with local exchange and interexchange telephone carriers. These connections often are digital and involve some packet switching. Thus, rather than sending IP packets over a simple electrical connection (in the case of a dedicated point to point line) or over an analog telephone circuit (as in the case of a dial-up line). IP packets often move over an underlying digital network using other kinds of packets or cells.
“Second, the ways in which customers can access a “retail” ISP have become more complex. ISDN customers bypass modems and pass digital traffic directly into an ISDN switch and from there into a router for the ISP. Increasingly, retail ISPs and telephone companies are arranging for the ISP to bypass the local office telephone switch for large customers, thereby giving the ISP the advantage of the unbundling of telephone service mandated by the 1996 Telecommunications Act, and reducing the likelihood of congestion in telephone company switches.” Henry H. Perritt, Jr., Law and the Information Superhighway § 1.2A (1998 Supp.)
Level three (the network layer) includes standards for packetizing and depacketizing data in packet switched networks and also include standards for routing packets. Level four (the transport layer) includes information on reassembling packets and checking for errors. These two levels correspond roughly to the IP standard and TCP standard, respectively. TCP and IP are the two standards or protocols that define the Internet.
Layer 4, the transport layer, is concerned with defining quality of service and is closely integrated with layer 5. Layer 4 is a useful category for reviewing Internet service.
Layer 5, the session layer, relates the logical user interface to the communications layers; it establishes and manages communications paths or channels between two communicating applications processes; it establishes and releases connections.
Layer 6, the presentation layer, deals with data representation, data transformations on messages received from the application layer, compression, and data conversion and formatting, e.g., EBCDIC (Extended Binary‑Coded Decimal Interchange Code, used by IBM instead of ASCII) to ASCII. This is a useful category for considering human language and character translation issues.
Layer 7, the application layer, serves applications programs through service calls, providing file transfer, document transfer, and electronic mail. The application layer usually passes an address in the form of a service request to layer 5, the session layer, which maps addresses into a form that is acceptable to lower layers. This is a useful category for considering the availability of Internet applications such as email and World Wide Web services.
 See Henry H. Perritt, Jr., Federal Electronic Information Policy, 63 Temple L.Rev. 201 (1990) (describing stack of value added features); Henry H. Perritt, Jr., Market Structures for Electronic Publishing and Electronic Contracting in Building Information Infrastructure: Issues in the Development of the National Research and Education Network (Harvard University and McGraw-Hill 1992) (same); Henry H. Perritt, Jr., Format and Content Standards for the Electronic Exchange of Legal Information, 33 Jurimetrics J. 265 (1993) (same).
 Accord, statement of ___ Prodi, President of European Commission [statement issued week of 6 Dec 1999] (identifying Internet publication of legal documents as a major priority of European Commission, to improve transparency).
 See Henry H. Perritt, Jr., Sources of Rights to Access Public Information, 4 William & Mary Bill of Rights J. 179, 184 (1995) (explaining and criticizing agency temptations to set up state monopolies over government information); Should Local Governments Sell Local Spatial Databases Through State Monopolies?, 35 Jurimetrics J. 449, 454-55 (1995) (same).
 A good example of a commitment to a policy of diversity is expressed in the Paperwork Reduction Act Amendments of 1996, Pub.L. 104-13, 109 Stat 163 (May 22, 1995), which amended 44 U.S.C. § 3506 to read as follows, in material part:
“(d) With respect to information dissemination, each agency shall--
"(1) ensure that the public has timely and equitable access to the agency's public information, including ensuring such access through--
"(A) encouraging a diversity of public and private sources for information based on government public information;
"(B) in cases in which the agency provides public information maintained in electronic format, providing timely and equitable access to the underlying data (in whole or in part); and
"(C) agency dissemination of public information in an efficient, effective, and economical manner . . . .”
 The Paperwork Reduction Act amendments to 44 U.S.C. §
3506(d), appropriately continue:
“(4) [With respect to information dissemination, each agency shall] not, except where specifically authorized by statute--
"(A) establish an exclusive, restricted, or other distribution arrangement that interferes with timely and equitable availability of public information to the public;
"(B) restrict or regulate the use, resale, or redissemination of public information by the public;
"(C) charge fees or royalties for resale or redissemination of public information; or
"(D) establish user fees for public information that exceed the cost of dissemination.”
 5 U.S.C. § 552,
 Const. of Sweden 1989, Instrument of Government, chap. 2, art. 1 (2) (guaranteeing freedom of information); Swedish Freedom of the Press Act, chap. 2, art. 2 (guaranteeing access to official documents).
 See generally Henry H. Perritt, Jr. & Christopher J. Lhulier, Information Access Rights Based on International Human Rights Law, 45 Buff. L. Rev. 899, 906-11 (1997).
 Id. at 903-906, 911-13.
 See Lawrence Lessig, Code and Other Laws for Cyberspace (1999).
 "Cyberspace" refers to the virtual space in which personal, political and commercial relationships can be established. It is a superset of the Internet, including also private electronic networks using other protocols.
 David R. Johnson & David Post, Law and Borders – The Rise of Law in Cyberspace, 48 Stan. L. Rev. 1367, 1370 (1996)
 Convention on Enforcement of Commercial Arbitration Awards (“New York Convention”) (1958).
 Hugo Grotius, Mare Liberum ___ (1609).
 See UNCLOS art. 2 (recognizing state jurisdiction over territorial waters). [check]
 Fisheries Case (United Kingdom v. Norway),  I.C.J. 116 (merits) (reviewing and upholding Norwegian method for calculating extent of territorial sea).
 Wildenhus'Case, 120 U.S. 1, ___ (1886) (territorial-sea jurisdiction relinquished in favor of law of the flag of foreign vessels except as to activities that threaten "peace of the port" or "public peace").
 Lauritzen v. Larsen, 345 U.S. 571, ___ (1952).
 The Corfu Channel Case (United Kingdom v. Albania),  I.C.J. 1 (merits) (finding Corfu Channel to constitute strait through which free passage is permitted).
 Carter & Trimble casebook at 1005.
 Harold Hongju Koh, The 1998 Frankel Lecture: Bringing International Law Home, 35 Hous. L. Rev. 623, 636 (1998) (explaining cannon-shot rule).
 UNCLOS art. 33(2).
 UNCLOS art. 33 (1).
 Restatement (Third) of Foreign Relations Law of the United States § 521 (___) (recognizing freedom of navigation, overflight, fishing, laying submarine cables and pipelines, construction of artificial islands, installations, and structures and of scientific research).
 Restatement § 522(1).
 Cf. United States v. Romero-Galue, 757 F.2d 1147 (11th Cir. 1985) (allowing seizure by Coast Guard of vessel suspected of drug smuggling outside customs waters under "protective principle" of prescriptive jurisdiction).
 Restatement § 522(2).
 See Sohn, Peaceful Settlement of Disputes in Ocean Conflicts: Does UNCLOS III Point the Way?, 46 L. & Contemp. Probs. 195, ___ (1983) (if parties to convention retain power of unilateral interpretation, text of convention would lack stability, certainty and predictability).
 Article 297 of the Convention excepts disputes over sovereign rights to living resources (fish) within a state's exclusive economic zone, and article 298 allows signatories at their option to except from the dispute resolution obligation disputes concerning military and law enforcement activities. Art. 298(1)(b).
 The United States opted for special arbitral tribunals. "In accordance with article 30 (4) of the Agreement, the Government of the United States of America declares that it chooses a special arbitral tribunal to be constituted in accordance with Annex VIII of the United Nations Convention on the Law of the Sea of 10 December 1982 for the settlement of disputes pursuant to Part VIII of the Agreement."
 http://www.un.org/Depts/los/unclos/closindx.htm. Any of the specified dispute resolution institutions have jurisdiction over “any dispute concerning the interpretation or application of this Convention.” Id. art. 288.
 UNCLOS art. 291 (states parties and other parties as agreed); Statute for the International Tribunal for the Law of the Sea, art. 20(1) (state parties); art. 20(2) (other parties as agreed), Annex VI, Law of the Sea Convention.
 UNCLOS art. 292.
 Rule 1, Guidelines Concerning The Preparation And Presentation Of Cases Before The Tribunal (Issued by the International Tribunal for the Law of the Sea on 28 October 1997), http://www.un.org/Depts/los/ITLOS/Guidelines.htm,
 Id., Rule 10.
 UNCLOS Part XI (arts. 133-191).
 UNCLOS § 4 (arts. 156-185).
 UNCLOS arts. 159-160.
 UNCLOS arts. 161-165.
 UNCLOS arts. 166-169.
 UNCLOS art. 170.
 See UNCLOS art. 187(c) (extending jurisdiction of Sea-Bed Disputes Chamber of ITLOS to "natural or juridical persons" with nationality of signatories when sponsored by signatories). Article 190 of UNCLOS allows "sponsoring states" to participate in proceedings in which natural or juridical persons are parties.
 Id. art 155 para. 4 (allowing adoption of amendments by 3/4 vote of Review Conference to be submitted to states parties for ratification; ratification by 3/4 of members).
 Bernard H. Oxman, Law of the Sea, in 2 United Nations Legal Order 671, 706 (1995).
 The two pertinent international agreements are the 1967 Outer Space Treaty - Outer Space Treaty of 1967 (Treaty on Principles Governing the Activities of States in the Exploration and Use of Outer Space, Including the Moon and Other Celestial Bodies, opened for signature, Jan. 27, 1967, 18 U.S.T. 2410, T.I.A.S. No. 6347, 610 U.N.T.S. 205); The Registration Convention: The Convention on the Registration of Objects Launched into Outer Space, Nov. 12, 1974, 28 UST 695, TIAS 8480, UNGAOR, 29th Sess., Supp (No. 31), A/9631, adopted by the General Assembly in GA Res. 3235 (XXIX) entered into force, Sept. 15, 1976
 ITU convention International Telecommunication Convention, Oct. 25, 1973, 128 U.S.T. 2495, T.I.A.S. No. 8572, art. 1[hereinafter ITU Convention].
 ITU convention art. 33. The Nairobi Convention was convened in an attempt to incorporate the desires of developing countries into Article 33 of the 1973 ITU Convention
 ITU Treaty art. 4
 The Convention on the Registration of Objects Launched Into Outer Space, opened for signature, Jan. 14, 1975, 28 U.S.T. 695, T.I.A.S. No. 8480, 1023 U.N.T.S. 15
 art. 2
 UN registry art. 3
 Compare David R. Johnson with Jack Goldsmith and Henry Perritt.
 See Antonio F. Perez, WTO and U.N.. Law: Institutional Comity in National Security, 23 Yale J. Int'l L. 301, 381 (1998) (explaining significance of subsidiarity in European law).
 See David R. Schmahmann et al., Off the Precipice: Massachusetts Expands its Foreign Policy Expedition From Burma to Indonesia, 30 Vand. J. Transnat’l L. 1021, 1022 (1997).
. Council Directive 95/46/EC of 24 October 1995 on the Protection of Individuals with Regard to the Processing of Personal Data and on the Free Movement of Such Data, art. 32, 1995 O.J. (L 281) 31, 49 (requiring member states to adopt legislation conforming to terms of directive) [hereinafter European Privacy Directive].
. Id. art. 25(1). “In accordance with this Directive, Member States shall protect the fundamental rights and freedoms of natural persons, and in particular their right to privacy with respect to the processing of personal data.” Id. art. 1(1). “ Member States shall, within the limits of the provisions of this Chapter, determine more precisely the conditions under which the processing of personal data is lawful.” Id. art. 5.
The directive imposes duties with respect to data quality (Article 6). The directive allows processing of data only when (1) the data subject has unambiguously consented, (2) processing is necessary to protect vital interests of the data subject, (3) “processing is necessary for the performance of a task carried out in the public interest or in the exercise of official authority,” or (4) “processing is necessary for the purposes of the legitimate interests pursued by the controller or by the third party or parties to whom the data are disclosed, except where such interests are overridden by the interests for fundamental rights and freedoms of the data subject which require protection under Article 1(1).” Id. art. 7. The directive permits information to be given to the data subject (Articles 10-11), and allows the data subject a right of access to data (Article 12) and a right to object to certain data contents (Articles 14-15). It obligates data “controllers” to assure confidentiality and security of processing (Articles 16-17) and obligates them to notify the supervisory authority when engaging in processing outside blanket authorization obtained through registration (Articles 18-21).
It establishes a Working Party on the Protection of Individuals (Article 30) and a Committee (Article 31) to assist member states and the European Commission on harmonization and adaptation of the Directive.
The geographic scope of the directive is specified as follows:
Each Member State shall apply the national provisions it adopts pursuant to this Directive to the processing of personal data where:
(a) the processing is carried out in the context of the activities of an establishment of the controller on the territory of the Member State; when the same controller is established on the territory of several Member States, he must take the necessary measures to ensure that each of these establishments complies with the obligations laid down by the national law applicable;
(b) the controller is not established on the Member State’s territory, but in a place where its national law applies by virtue of international public law;
(c) the controller is not established on Community territory and, for purposes of processing personal data makes use of equipment, automated or otherwise, situated on the territory of the said Member State, unless such equipment is used only for purposes of transit through the territory of the Community.
Id. art. 4(1).
 See Working Party paper on adequacy of U.S. protection.
 “The Working Party shall be composed of a representative of the supervisory authority or authorities designated by each Member State and of a representative of the authority or authorities established for the Community institutions and bodies, and of a representative of the Commission.” Directive art. 29(2).
 “The Commission shall be assisted by a committee composed of the representatives of the Member States and chaired by the representative of the Commission.” Directive art. 31(1).
 See Henry H. Perritt, Jr. and Margaret G. Stewart, False Alarm, ___ FCC J.___ (1998).
 Notably, both the Department of Commerce and the European Commission have comprehensive Web sites enabling interested parties to follow the negotiations. This reinforces the conclusions in part ___ of this article that the Internet facilitates the development of public international law.
 April 19 draft principles, paragraph 3-4.
 April 19 principles at paragraph 6.
 Documents adopted by the [DG XV] Data Protection Working Party, Judging industry self-regulation: when does it make a meaningful contribution to the level of data protection in a third country? - Working Document (Adopted by the Working Party 14 January 1998), DG XV D/5057/97- WP 7 -http://europa.eu.int/comm/dg15/en/media/dataprot/wpdocs/wp7en.htm
 European Commission DGXV, data protection working party, Opinion 2/99 on the adequacy of the “international safe harbor principles” issued by the U.S. Department of Commerce on April 19, 1999 ((3 May 1999)), http://www.europa.eu.int/comm/dg15/en/media/dataprot/wpdocs/wp19en.htm.
 Established under art. 29 of the Directive.
 Opinion 2/99 at paragraph 4.
 Opinion 2/99 at paragraph 4.
 Opinion 2/99, numbered comment 6.
 Article 25.6 of the Directive authorizes findings that adequate protection is in place, preempting action by EU member states to block data transfers under Article 25.3.
 Article 31(2) provides:
“2. The representative of the Commission shall submit to the committee a draft of the measures to be taken. The committee shall deliver its opinion on the draft within a time limit which the chairman may lay down according to the urgency of the matter.
The opinion shall be delivered by the majority laid down in Article 148 (2) of the Treaty. The votes of the representatives of the Member States within the committee shall be weighted in the manner set out in that Article. The chairman shall not vote.
The Commission shall adopt measures which shall apply immediately. However, if these measures are not in accordance with the opinion of the committee, they shall be communicated by the Commission to the Council forthwith. In that event:
-- the Commission shall defer application of the measures which it has decided for a period of three months from the date of communication,
-- the Council, acting by a qualified majority, may take a different decision within the time limit referred to in the first indent.”
 Under Article 22 of the Directive, member states must provide “for the right of every person to a judicial remedy for any breech of the rights guaranteed him by the national law applicable to processing personal data.” Article 23 requires member states to provide for compensation for any damage suffered by violations.
 See Hilton v. Guyot, ___ U.S. ___ ( ).
 [full name] ___ U.L.A. ___ ()
 Cite Restatement (Second) of Judgments § ___ () (judgments not entitled to recognition).
 Opinion 2/99 second numbered paragraph 6.
 Art. 25.6 provides:
“6. The Commission may find, in accordance with the procedure referred to in Article 31 (2), that a third country ensures an adequate level of protection within the meaning of paragraph 2 of this Article, by reason of its domestic law or of the international commitments it has entered into, particularly upon conclusion of the negotiations referred to in paragraph 5, for the protection of the private lives and basic freedoms and rights of individuals.”
 One might say effected interests with sufficient political power to make a difference.
 In this context, “pro regulatory” means those interests who are not satisfied by reliance on pure market forces and the unilateral actions of market participants.
 See generally Perritt negotiated rule making materials explaining batna concept.
 Consumer and banking regulation are examples; privacy regulation in the United States and Internet domain name regulation are counter examples.
 See PGMedia, Inc. v. Network Solutions, Inc. , --- F.Supp.2d ----, No. 97 CIV. 1946 RPP , 1999 WL 144494 (S.D.N.Y., Mar 16, 1999) (describing domain name system).
 Management of Internet Names and Addresses, 63 Fed. Reg.
31741(1998) (Department of Commerce Statement of Policy on Internet domain names)
 Management of Internet Names and Addresses Docket Number: 980212036-8146-02 AGENCY: National Telecommunications and Information Administration ACTION: Statement of Policy (“the need for change”), http://www.ntia.doc.gov/ntiahome/domainname/6_5_98dns.htm.
 See PGMedia, Inc. v. Network Solutions, Inc. , --- F.Supp.2d ----, No. 97 CIV. 1946 RPP , 1999 WL 144494 (S.D.N.Y., Mar 16, 1999) (finding that domain name registrar NSI enjoyed federal instrumentality immunity from antitrust “essential facilities” liability, suggesting that immunity would extend to ICANN as well).
 http://www.icann.org/berlin/berlin-resolutions.html#1. For an example of such disputes, see Washington Speakers Bureau, Inc. v. Leading Authorities, Inc. , 49 F.Supp.2d 496 (E.D.Va., 1999) (ordering domain name holder to cease using domain names infringing trademark, but denying trademark owner’s claim to property interest in the domain names).
 http://wipo2.wipo.int/process/eng/final_report.html (Final WIPO recommendations to ICANN)
 For an analysis of cybersquatting, see AVERY DENNISON CORPORATION v. JERRY SUMPTON, --- F.3d ----, NO. 98-55810, D.C. NO. CV-97-00407, 1999 WL 635767 (9th Cir., Aug 23, 1999) (reversing preliminary injunction against use of domain name that allegedly diluted famous trademark)
 Final WIPO Recommendation, paragraphs 245-291.
 Id. at paras. 170-177 (including application of international law under the Paris Convention for the Protection of Industrial Property, and the TRIPS Agreement).
 Id. at para. 132(a).
 Id. at para. 210-214.
 Id. at para. 215.
 Id. at para. 140.
 Id. at para. 150.
 See Title II of the Federal Arbitration Act.
 See PG Media case.
 See radiant burner.
 See NCAA case; church and boy scout disputes.
 Debit card chargebacks are covered by Federal Reserve Regulation E, 12 C.F.R. pt 205, rather than Regulation Z. 12 C.F.R. § 226.13(i). The definition of error in Regulation E omits claims of nondelivery or nonconforming goods or services. 12 C.F.R. § 205.11.
 15 U.S.C. §§ 1666.
 15 U.S.C. § 1666 (a) (3) (B) (ii).
 The claim must be in writing. 15 U.S.C. § 1666. See Himelfarb v. American Exp. Co., 484 A.2d 1013 (Md.1984) (oral notice insufficient).
 15 U.S.C. § 1666(b)(3). See also 12 C.F.R. § 226.13(a)(3) (Federal Reserve Regulation Z). The term also includes transactions as to which the cardholder requests documentation as to the validity of the charge. Id. at § 226.13(a)(6).
 15 U.S.C. § 1666(a)(3)(B)(ii). Regulation Z defines the required investigation to include such a determination: “If a consumer submits a billing error notice alleging either the nondelivery of property or services under paragraph (a)(3) of this section or that information appearing on a periodic statement is incorrect because a person honoring the consumer's credit card has made an incorrect report to the card issuer, the creditor shall not deny the assertion unless it conducts a reasonable investigation and determines that the property or services were actually delivered, mailed, or sent as agreed or that the information was correct.” 12 C.F.R. § 226(13) (f) n.13.
 And the ____ Act, [FN114], 15 U.S.C. § 1666(a) (1988). 15 U.S.C. § 1666(a)(3)(B) (1988).
 12 C.F.R. § 226.3 (1999).
 See Banking Policy Report: FTC Expects Processors to Insulate Operations Against Consumer Fraud, 11 NO. 23 Banking Pol'y Rep. 6 (1992) (describing settlement between FTC and Citicorp Credit Services, Inc., requiring credit card processor to monitor chargeback rates and to stop processing charges from merchants with unusually high rates, as a protection against consumer fraud); Patrick E. Michela, “You May Have Already Won . . .”: Telemarketing Fraud and the Need for a Federal Legislative Solution, 21 Pepp. L. Rev. 553, 571 & n.116 (1994)(reporting that consumer fraud operations often are denied access to credit card systems because of high chargeback rates).
 “Visa's chargeback rules do not attempt to track all of the possible consumer protection laws around the world, although some chargeback rights do correspond with statutory rights granted to consumers in particular countries, such as the rights granted under Federal Reserve Board Regulation Z to dispute certain credit card transactions. The chargeback reasons permitted under Visa's rules for international transactions have been adopted to enable issuers of Visa Cards to address the fundamental consumer concerns of their cardholders, and incidentally to reinforce the reputation of Visa Cards as the best way to pay.” March 25, 1999 letter from VISA to Secretary, Federal Trade Commission, Re: U.S. Perspectives on Consumer Protection in the Global Electronic Commerce Marketplace - Comment, P994312, http://www.ftc.gov/bcp/icpw/comments/visa.htm.
“While U.S. law requires us to institute these practices, as a card issuer, we have adopted a policy of applying them consistently outside the U.S. as well. If a cardmember outside the U.S. is afforded more protection under local law, we of course comply with that law.” Letter from American Express to Secretary, Federal Trade Commission, Re: U.S. Perspectives on Consumer Protection in the Global Electronic Marketplace, http://www.ftc.gov/bcp/icpw/comments/americanexpress.htm
 “We will immediately charge back a merchant selling goods or services delivered electronically (e.g., software, images) if a cardmember disputes the charge (for example, claiming it was unauthorized). There are several sound business and policy reasons underlying this rule: processing an inquiry is costly and not justified by the usually small dollar amount of these transactions. In addition, an immediate chargeback for these types of purchases provides an incentive for the merchant to exercise greater care in authorizing such transactions.” Letter from American Express to Secretary, Federal Trade Commission, Re: U.S. Perspectives on Consumer Protection in the Global Electronic Marketplace, http://www.ftc.gov/bcp/icpw/comments/americanexpress.htm
 Chargebacks are required by law in the United Kingdom and not provided for in France, although Visa and Mastercard systems provide them throughout Europe to some extent. OECD, Consumer Redress in the Global Marketplace: Chargbacks, OCDE/GD(96)142 para. 2.3. In the United Kingdom, “merchants have interpreted section 75 of the Consumer Credit Act of 1974, 22 & 23 Eliz. 2, § 75 (Eng.), which establishes a chargeback regime, as inapplicable to international transactions. U.K. credit card issuers have agreed to apply section 75's protections in certain limited categories of international transactions. See Consumer Redress in the Global Marketplace: Chargebacks, at 70, OECD Doc. OCDE/GD(96)142, available at <http://www.oecd.org/dsti/sti/it/consumer/prod >. The OECD's Committee on Consumer Policy has addressed the possibility of establishing an international chargeback regime that would overcome the domestic limitation of national legal regimes. See id.” Rothchild at ____.
 See generally John Rothchild, Protecting the Digital Consumer: The Limits of Cyberspace Utopianism, 74 Ind. L.J. 893, 977 (1999)(proposing that credit card systems expand chargeback rights to facilitate electronic commerce)
 Consumer Redress In the Global Marketplace: Chargebacks, OCDE/GD(96)142, http://www.oecd.org/dsti/sti/it/consumer/prod/
 Cite 5th and 14th Amendment; international covenant on civil and political rights due process provisions.
 See pole attachment statutory provisions in 1996 Telecommunications Act and FCC order on co-location of equipment by competitive local exchange carriers.
 Cite examples from AOL.
 Conceivably, some private network services providers would be just as happy to see the Internet go away so they could serve the demand for electronic commerce and political interaction through private networks with proprietary protocols.