Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Internet Law

Selected Works

2009

First Amendment

Articles 1 - 2 of 2

Full-Text Articles in Law

Invoking And Avoiding The First Amendment: How Internet Service Providers Leverage Their Status As Both Content Creators And Neutral Conduits, Rob M. Frieden Jun 2009

Invoking And Avoiding The First Amendment: How Internet Service Providers Leverage Their Status As Both Content Creators And Neutral Conduits, Rob M. Frieden

Rob Frieden

Much of the policy debate and scholarly literature on network neutrality has addressed whether the Federal Communications Commission (“FCC”) has statutory authority to require Internet Service Providers (“ISPs”) to operate in a nondiscriminatory manner. Such analysis largely focuses on questions about jurisdiction, the scope of lawful regulation, and the balance of power between stakeholders, generally adverse to government oversight, and government agencies, apparently willing to overcome the same inclination. The public policy debate primarily considers micro-level issues, without much consideration of broader concerns such as First Amendment values. While professing to support marketplace resource allocation and a regulation-free Internet, the …


Cyber Civil Rights (November 2008; Mp3), Danielle Keats Citron Mar 2009

Cyber Civil Rights (November 2008; Mp3), Danielle Keats Citron

Danielle Keats Citron

Social networking sites and blogs have increasingly become breeding grounds for anonymous online groups that attack women, people of color, and members of other traditionally disadvantaged groups. These destructive groups target individuals with defamation, threats of violence, and technology-based attacks that silence victims and concomitantly destroy their privacy. Victims go offline or assume pseudonyms to prevent future attacks, impoverishing online dialogue and depriving victims of the social and economic opportunities associated with a vibrant online presence. Attackers manipulate search engines to reproduce their lies and threats for employers and clients to see, creating digital "scarlet letters" that ruin reputations. Today's …