Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Law

Social Media Harms And The Common Law, Leslie Y. Garfield Tenzer Oct 2022

Social Media Harms And The Common Law, Leslie Y. Garfield Tenzer

Elisabeth Haub School of Law Faculty Publications

This article finds fault with the judiciaries' failure to create a set of common law norms for social media wrongs. In cases concerning social media harms, the Supreme Court and lower courts have consistently adhered to traditional pre-social media principles, failing to use the power of the common law to create a kind of Internet Justice.

Part I of this article reviews social media history and explores how judicial decisions created a fertile bed for social media harm to blossom. Part II illustrates social media harms across several doctrinal disciplines and highlights judicial reluctance to embrace the realities of social …


A 180 On Section 230: State Efforts To Erode Social Media Immunity, Leslie Y. Garfield Tenzer, Hayley Margulis Jan 2022

A 180 On Section 230: State Efforts To Erode Social Media Immunity, Leslie Y. Garfield Tenzer, Hayley Margulis

Elisabeth Haub School of Law Faculty Publications

The turmoil of the 2020 presidential election renewed controversy surrounding 47 U.S.C § 230. The law, adopted as part of the 1996 Communications Decency Act (CDA), shields Interactive Computer Services (ICS) from civil liability for third-party material posted on their Platforms--no matter how heinous and regardless of whether the material enjoys constitutional protection. Consequently, any ICS, which is broadly defined to include Internet service providers (ISPs) and social media platforms (Platforms), can police its own postings but remains free from government intervention or retribution.

In 2022, members of the Texas and Florida legislatures passed laws aiming to limit the scope …


From Peer-To-Peer Networks To Cloud Computing: How Technology Is Redefining Child Pornography Laws, Audrey Rogers Jan 2013

From Peer-To-Peer Networks To Cloud Computing: How Technology Is Redefining Child Pornography Laws, Audrey Rogers

Elisabeth Haub School of Law Faculty Publications

This Article traces the history of the child pornography laws and sentencing policy in Part I. Part II explains the technologies that have caused some of the current controversies, and then Part III describes how these technologies have blurred the offenses. Finally, Part IV makes suggestions as to how the law could better reflect technology and comport with a refined harm rationale. Courts, legal scholars, and medical experts have explained the harm includes the sexual abuse captured in the images and the psychological injury the victim endures knowing the images are being viewed. This Article further develops the harm rationale …


Protecting Children On The Internet: Mission Impossible?, Audrey Rogers Jan 2009

Protecting Children On The Internet: Mission Impossible?, Audrey Rogers

Elisabeth Haub School of Law Faculty Publications

This Article posits that the Williams Court properly upheld Congress' shift in focus from the images to the speech pandering them. The majority ruled that the inability to complete a crime because of a factual error is not a defense. Its reasoning should lay to rest lingering claims that child protection statutes require an actual child. Nevertheless, the Article explains that the Williams dissent essentially relied on legal impossibility in its finding that the PROTECT Act's pandering provision was unconstitutionally overbroad. In so doing, the dissent reflects the reluctance of many to accept the extent to which adults are seeking …


The Privacy Gambit: Toward A Game Theoretic Approach To International Data Protection, Horace E. Anderson Jan 2006

The Privacy Gambit: Toward A Game Theoretic Approach To International Data Protection, Horace E. Anderson

Elisabeth Haub School of Law Faculty Publications

This article briefly explores several scenarios in which economic actors compete and cooperate in order to capture the value in personal information. The focus then shifts to one particular scenario: the ongoing interaction between the United States and the European Union in attempting to construct data protection regimes that serve the philosophies and citizens of each jurisdiction as well as provide a strategic economic advantage. A game theoretic model is presented to explain the course of dealings between the two actors, including both unilateral and bilateral actions. Part I ends with an exploration of opportunities for seizing competitive advantage, and …


Discrimination In The Laws Of Information Warfare, Mark R. Shulman Jan 1999

Discrimination In The Laws Of Information Warfare, Mark R. Shulman

Elisabeth Haub School of Law Faculty Publications

No abstract provided.