Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 20 of 20

Full-Text Articles in Law

Alternative Restrictions Of Sex Offenders' Social Media Use & The Freedom Of Speech, Norah M. Sloss Dec 2015

Alternative Restrictions Of Sex Offenders' Social Media Use & The Freedom Of Speech, Norah M. Sloss

Catholic University Journal of Law and Technology

No abstract provided.


Investigating Jurors On Social Media, Caren Myers Morrison Jun 2015

Investigating Jurors On Social Media, Caren Myers Morrison

Caren Myers Morrison

This essay proceeds in three parts. First, it examines the current state of jury investigations, and how they differ from those conducted in the past. Then, it describes the evolving legal and ethical positions that are combining to encourage such investigations. Finally, it offers a note of caution–condoning such investigations while keeping them hidden from jurors may be perceived as unfair and exploitative, risking a possible backlash from outraged jurors. Instead, I propose a modest measure to provide notice and explanation to jurors that their online information is likely to be searched, and why.


Wide Right: How Isp Immunity And Current Laws Are Off The Mark In Protecting The Modern Athlete On Social Media, Dominick J. Mingione Jun 2015

Wide Right: How Isp Immunity And Current Laws Are Off The Mark In Protecting The Modern Athlete On Social Media, Dominick J. Mingione

Pace Intellectual Property, Sports & Entertainment Law Forum

“[Y]our tranny looking dad is a disgrace to American football,” “I would rape the shit out of her,” and “[The] [B]ears are easier than you on prom night,” are just a sampling of some of the alarmingly harassing tweets received by Chloe Trestman between the night of November 9, 2014 and November 10, 2014. Who is Chloe Trestman, and what could she have possibly done to warrant such abuse? Chloe’s father is Marc Trestman, the head coach of the Chicago Bears. And the twitter vitriol, or “twitriol,” directed toward Chloe was in response to the Bears’ blowout loss to their …


Here We Are Now, Entertain Us: Defining The Line Between Personal And Professional Context On Social Media, Raizel Liebler, Keidra Chaney May 2015

Here We Are Now, Entertain Us: Defining The Line Between Personal And Professional Context On Social Media, Raizel Liebler, Keidra Chaney

Pace Law Review

Social media platforms such as Facebook, Twitter, and Instagram allow individuals and companies to connect directly and regularly with an audience of peers or with the public at large. These websites combine the audience-building platforms of mass media with the personal data and relationships of in-person social networks. Due to a combination of evolving user activity and frequent updates to functionality and user features, social media tools blur the line of whether a speaker is perceived as speaking to a specific and presumed private audience, a public expression of one’s own personal views, or a representative viewpoint of an entire …


Social Media Thoughtcrimes, Daniel S. Harawa May 2015

Social Media Thoughtcrimes, Daniel S. Harawa

Pace Law Review

As people live out their lives online, what is protected expression and what is criminal speech? This article begins to explore this fine distinction, and advocates for a shift in the way online speech is protected vis-à-vis the First Amendment. Part I provides examples of criminalized social media activity and explores why people seemingly treat online speech as private communications. Part II looks at existing jurisprudence regarding the criminalization of speech and First Amendment protections. And Part III attempts to determine where to draw the line by advocating for a return to simpler times in First Amendment jurisprudence.


Social Media And The Internet: A Story Of Privatization, Victoria D. Baranetsky May 2015

Social Media And The Internet: A Story Of Privatization, Victoria D. Baranetsky

Pace Law Review

This article will question what role private and public actors assume in the current structure of data collection and what potential rights are violated. To tease out the relationship between the private and government sectors, this article, for sake of argument, accepts as fact that surveillance is a core government function and that data is a public resource collected by private organizations. While those assumptions may be challenged by different definitions of what constitutes a public function, public resource, or mode of collection, this article does not take on those challenges. It also does not ask the normative question of …


Investigating Jurors On Social Media, Caren Myers Morrison May 2015

Investigating Jurors On Social Media, Caren Myers Morrison

Pace Law Review

This essay proceeds in three parts. First, it examines the current state of jury investigations, and how they differ from those conducted in the past. Then, it describes the evolving legal and ethical positions that are combining to encourage such investigations. Finally, it offers a note of caution–condoning such investigations while keeping them hidden from jurors may be perceived as unfair and exploitative, risking a possible backlash from outraged jurors. Instead, I propose a modest measure to provide notice and explanation to jurors that their online information is likely to be searched, and why.


Copyright And Social Media: A Tale Of Legislative Abdication, Diane Leenheer Zimmerman May 2015

Copyright And Social Media: A Tale Of Legislative Abdication, Diane Leenheer Zimmerman

Pace Law Review

The focus of this article will be on what I call DMCA 2.0. It will begin by discussing the Digital Millennium Copyright Act (DMCA) and why that statute, passed in 1998 to shore up the enforceability of copyright online by protecting content providers’ ability to engage in forms of technological self-help against online copyright infringers, has been problematic. Part II describes largely unsuccessful efforts in the form of statutes and trade agreements to shore up the DMCA. Part III turns to the latest salvo, the adoption of “voluntary agreements” whereby content owners and ISPs, in particular social media platforms, join …


The Constitution And Revenge Porn, John A. Humbach May 2015

The Constitution And Revenge Porn, John A. Humbach

Pace Law Review

While the Supreme Court has recognized a number of circumstances that justify government impingements on free expression, the Court has been extremely reluctant to permit speech restrictions that discriminate based on a message’s content, its viewpoint, or the speaker. It has nearly always refused to tolerate such discrimination unless the case falls within one of the several historically established exceptions to First Amendment protection. Because of the special place that the modern First Amendment cases accord to content discrimination (and the allied discriminations based on viewpoint and speaker), any statutes designed specifically to outlaw revenge porn as such would seem …


#Snitches Get Stitches: Witness Intimidation In The Age Of Facebook And Twitter, John Browning May 2015

#Snitches Get Stitches: Witness Intimidation In The Age Of Facebook And Twitter, John Browning

Pace Law Review

In order to better understand witness intimidation in the age of social media, one must examine both the forms it has taken as well as the response by law enforcement and the criminal justice system. As this article points out, the digital age has brought with it a host of new ways in which witnesses may be subjected to online harassment and intimidation across multiple platforms, and those means have been used to target not only victims and fact witnesses but even prosecutors and expert witnesses as well. The article will also examine potential responses to the problem of witness …


Social Justice, Social Norms And The Governance Of Social Media, Tal Z. Zarsky May 2015

Social Justice, Social Norms And The Governance Of Social Media, Tal Z. Zarsky

Pace Law Review

This article proceeds as follows: Part II briefly addresses the theoretical arguments regarding the pros and cons of various governance strategies, focusing on the advantages, disadvantages and pitfalls of reliance on private parties. In Part III, the article describes, in general terms, the above-mentioned empirical study, explaining its methodology, the specific challenges to its design and implementation, and how these were met. The discussion specifically centers on a survey taken to establish the nature of social norms. Part IV presents a specific test case: whether pseudonymity should be permitted in social media or should “real names” be mandatory. Part V …


Anarchy, Status Updates, And Utopia, James Grimmelmann May 2015

Anarchy, Status Updates, And Utopia, James Grimmelmann

Pace Law Review

Social software has a power problem. Actually, it has two. The first is technical. Unlike the rule of law, the rule of software is simple and brutal: whoever controls the software makes the rules. And if power corrupts, then automatic power corrupts automatically. Facebook can drop you down the memory hole; PayPal can garnish your pay. These sovereigns of software have absolute and dictatorial control over their domains.

Is it possible to create online spaces without technical power? It is not, because of social software’s second power problem. Behind technical power, there is also social power. Whenever people come together …


The Challenges Of Preventing And Prosecuting Social Media Crimes, Thaddeus Hoffmeister May 2015

The Challenges Of Preventing And Prosecuting Social Media Crimes, Thaddeus Hoffmeister

Pace Law Review

The adoption and use of social media by a broad spectrum of criminal defendants has raised some significant challenges for those tasked with crime prevention. This article will look at those challenges through the lens of three cases involving social media: United States v. Drew, United States v. Sayer, and United States v. Cassidy. However, prior to beginning that examination, this article will briefly discuss and categorize the various ways criminal defendants employ social media.


Friends Of Justice: Does Social Media Impact The Public Perception Of The Justice System?, Nicola A. Boothe-Perry May 2015

Friends Of Justice: Does Social Media Impact The Public Perception Of The Justice System?, Nicola A. Boothe-Perry

Pace Law Review

This article will demonstrate how the unregulated use of social media by participants in the justice system (judges, attorneys and jurors specifically) affects the public perception and subsequently the integrity of our justice system. The article will provide a holistic review of social media use by judges, attorneys and jurors, and demonstrate why their use of social media should be harnessed in a manner to ensure compliance with ethical rules and reduce potential negative effects to the social contract between law and society.

Social media is like a culvert. It catches pictures, novelties, personal profiles, gossip, news, unfiltered opinions, and …


Tinkering With Success: College Athletes, Social Media And The First Amendment, Mary Margaret Meg Penrose May 2015

Tinkering With Success: College Athletes, Social Media And The First Amendment, Mary Margaret Meg Penrose

Pace Law Review

Good law does not always make good policy. This article seeks to provide a legal assessment, not a policy directive. The policy choices made by individual institutions and athletic departments should be guided by law, but absolutely left to institutional discretion. Many articles written on college student-athletes’ social media usage attempt to urge policy directives clothed in constitutional analysis.

In this author’s opinion, these articles have lost perspective – constitutional perspective. This article seeks primarily to provide a legal and constitutional assessment so that schools and their athletic departments will have ample information to then make their own policy choices.


Abuse And Harassment Diminish Free Speech, Anita Bernstein May 2015

Abuse And Harassment Diminish Free Speech, Anita Bernstein

Pace Law Review

Owen Fiss focused on “the robustness of public debate” to conclude on his last page: “The autonomy protected by the First Amendment and rightly enjoyed by individuals and the press is not an end in itself, as it might be in some moral code, but is rather a means to further the democratic values underlying the Bill of Rights.”

This article embraces the same values but more conservatively. Whereas Fiss defended state-sponsored coercion, I leave the government mostly outside the descriptions and arguments presented here. Scholars have sought to apply the law—of crimes, torts, intellectual property, and statutory allotments and …


Reputational Privacy And The Internet: A Matter For Law?, Elizabeth Anne Kirley May 2015

Reputational Privacy And The Internet: A Matter For Law?, Elizabeth Anne Kirley

PhD Dissertations

Reputation - we all have one. We do not completely comprehend its workings and are mostly unaware of its import until it is gone. When we lose it, our traditional laws of defamation, privacy, and breach of confidence rarely deliver the vindication and respite we seek due, primarily, to legal systems that cobble new media methods of personal injury onto pre-Internet laws. This dissertation conducts an exploratory study of the relevance of law to loss of individual reputation perpetuated on the Internet. It deals with three interrelated concepts: reputation, privacy, and memory. They are related in that the increasing lack …


Social Media And The Job Market: How To Reconcile Applicant Privacy With Employer Needs, Peter B. Baumhart Jan 2015

Social Media And The Job Market: How To Reconcile Applicant Privacy With Employer Needs, Peter B. Baumhart

University of Michigan Journal of Law Reform

In the modern technological age, social media allows us to communicate vast amounts of personal information to countless people instantaneously. This information is valuable to more than just our “friends” and “followers,” however. Prospective employers can use this personal data to inform hiring decisions, thereby maximizing fit and minimizing potential liability. The question then arises, how best to acquire this information? For job applicants, the counter-question is how best to protect the privacy of their social media accounts. As these two competing desires begin to clash, it is important to find a method to mediate the conflict. Existing privacy law, …


Law And Ethics Of Experiments On Social Media Users, James Grimmelmann Jan 2015

Law And Ethics Of Experiments On Social Media Users, James Grimmelmann

Cornell Law Faculty Publications

If you were on Facebook in January 2012, there is a chance that it tried to make you sad. If you were on OkCupid, there is a chance that it tried to match you up with someone incompatible. These were social psychology experiments: Facebook and OkCupid systematically manipulated people's environments to test their reactions. Academics doing similar experiments in a university setting would typically need to obtain informed consent from participants and approval from an Institutional Review Board (IRB). But Facebook and OkCupid, and the academics working with Facebook, had neither. This, I believe, is a problem.

These experiments offer …


Agency Publicity In The Internet Era, Nathan Cortez Jan 2015

Agency Publicity In The Internet Era, Nathan Cortez

Faculty Journal Articles and Book Chapters

This Report, prepared for the Administrative Conference of the United States (ACUS), details how federal agencies use modern forms of publicity - including press releases, agency web sites, searchable online databases, and social media - to achieve regulatory ends. It evaluates the benefits and burdens of modern agency publicity practices, using three agencies as case studies: the Food and Drug Administration (FDA); the Federal Trade Commission (FTC); and the Consumer Financial Protection Bureau (CFPB). Part V recommends a series of largely procedural reforms that balance the need for public disclosure with the need to protect those potentially injured by adverse …