Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Internet Law

Series

First Amendment

Institution
Publication Year
Publication

Articles 31 - 57 of 57

Full-Text Articles in Law

Durkheim's Internet: Social And Political Theory In Online Society, Ari Ezra Waldman Jan 2013

Durkheim's Internet: Social And Political Theory In Online Society, Ari Ezra Waldman

Articles & Chapters

While the Internet has changed dramatically since the early 1990s, the legal regime governing the right to privacy online and Internet speech is still steeped in a myth of the Internet user, completely hidden from others, in total control of his online experience, and free to come and go as he pleases. This false image of the “virtual self” has also contributed to an ethos of lawlessness, irresponsibility, and radical individuation online, allowing the evisceration of online privacy and the proliferation of hate and harassment.

I argue that the myth of the online anonym is not only false as a …


Hostile Educational Environments, Ari Ezra Waldman Jan 2012

Hostile Educational Environments, Ari Ezra Waldman

Articles & Chapters

This Article is one in a series about bullying and cyberbullying in schools. I argue that the proper analysis for a First Amendment challenge to school discipline for off-campus misuse of the Internet to harm or harass a member of the school community based on the victim’s identity depends on the nature of the offending behavior. For students who are punished for a single incident – what I will call cyberattacking – a Tinker analysis makes sense. But, given that Tinker’s “substantial disruption” standard originated in the context of student protests and that targeted identity-based harassment can create substantial disruptions …


Incendiary Speech And Social Media, Lyrissa Barnett Lidsky Jan 2012

Incendiary Speech And Social Media, Lyrissa Barnett Lidsky

UF Law Faculty Publications

Incidents illustrating the incendiary capacity of social media have rekindled concerns about the "mismatch" between existing doctrinal categories and new types of dangerous speech. This Essay examines two such incidents, one in which an offensive tweet and YouTube video led a hostile audience to riot and murder, and the other in which a blogger urged his nameless, faceless audience to murder federal judges. One incident resulted in liability for the speaker, even though no violence occurred; the other did not lead to liability for the speaker even though at least thirty people died as a result of his words. An …


All Those Like You: Identity Aggression And Student Speech, Ari Ezra Waldman Jan 2012

All Those Like You: Identity Aggression And Student Speech, Ari Ezra Waldman

Articles & Chapters

Online and face-to-face harassment in schools requires a coordinated response from the school, parents, students, and government. In this Article, I address a particular subset of online and face-to-face harassment, or identity-based harassment. Identity-based aggressors highlight a quality intrinsic to someone’s personhood and demean it, deprive it of value, and use it as a weapon. They attack women, racial minorities, religious minorities, and other traditionally victimized groups. And, as such, they attack not only their particular victims but also their victims’ communities. Identity-based aggressors com- mit a constitutional evil not only because their behavior interferes with victims’ access to education, …


Incitement To Riot In The Age Of Flash Mobs, Margot E. Kaminski Jan 2012

Incitement To Riot In The Age Of Flash Mobs, Margot E. Kaminski

Publications

As people increasingly use social media to organize both protests and robberies, government will try to regulate these calls to action. With an eye to this intensifying dynamic, this Article reviews First Amendment jurisprudence on incitement and applies it to existing statutes on incitement to riot at a common law, state, and federal level. The article suggests that First Amendment jurisprudence has a particularly tortuous relationship with regulating speech directed to crowds. It examines current crowd psychology to suggest which crowd behavior, if any, should as a matter of policy be subject to regulation. It concludes that many existing incitement-to-riot …


Incendiary Speech And Social Media, Lyrissa Lidsky Jan 2011

Incendiary Speech And Social Media, Lyrissa Lidsky

Faculty Publications

Incidents illustrating the incendiary capacity of social media have rekindled concerns about the "mismatch" between existing doctrinal categories and new types of dangerous speech. This Essay examines two such incidents, one in which an offensive tweet and YouTube video led a hostile audience to riot and murder, and the other in which a blogger urged his nameless, faceless audience to murder federal judges. One incident resulted in liability for the speaker even though no violence occurred; the other did not lead to liability for the speaker even though at least thirty people died as a result of his words. An …


Supreme Court Amicus Brief Of Aarp And The National Legislative Association On Petition Drug Prices In Support Of Petitioners, William H. Sorrell V. Ims Health, Inc., No. 10-779 (Filed March 1, 2011), Sean Flynn, Meredith Jacob, Stacy Canan Jan 2011

Supreme Court Amicus Brief Of Aarp And The National Legislative Association On Petition Drug Prices In Support Of Petitioners, William H. Sorrell V. Ims Health, Inc., No. 10-779 (Filed March 1, 2011), Sean Flynn, Meredith Jacob, Stacy Canan

Amicus Briefs

This Court should refuse to apply the First Amendment to Vermont’s Prescription Confidentiality Law based on two essential facts. First, the regulation at issue is limited to the commercial use or private-channel distribution of confidential data. It is thus governed by cases of this Court upholding the regulation of uses of information in purely private settings that do not inform or contribute to the public sphere. Bartnicki v. Vopper, 532 U.S. 514, 526-27 n.10 (2001); Dun & Bradstreet, Inc. v. Greenmoss Builders, Inc., 472 U.S. 749 (1985). Second, it concerns the regulation of secondary uses of information where the government …


Government Speech 2.0, Helen L. Norton, Danielle Keats Citron Jan 2010

Government Speech 2.0, Helen L. Norton, Danielle Keats Citron

Faculty Scholarship

New expressive technologies continue to transform the ways in which members of the public speak to one another. Not surprisingly, emerging technologies have changed the ways in which government speaks as well. Despite substantial shifts in how the government and other parties actually communicate, however, the Supreme Court to date has developed its government speech doctrine – which recognizes “government speech” as a defense to First Amendment challenges by plaintiffs who claim that the government has impermissibly excluded their expression based on viewpoint – only in the context of disputes involving fairly traditional forms of expression. In none of these …


Regulating Cyberharassment: Some Thoughts On Sexual Harassment 2.0, Helen Norton Jan 2010

Regulating Cyberharassment: Some Thoughts On Sexual Harassment 2.0, Helen Norton

Publications

No abstract provided.


Government Speech 2.0, Danielle K. Citron, Helen Norton Jan 2010

Government Speech 2.0, Danielle K. Citron, Helen Norton

Faculty Scholarship

New expressive technologies continue to transform the ways in which members of the public speak to one another. Not surprisingly, emerging technologies have changed the ways in which government speaks as well. Despite substantial shifts in how the government and other parties actually communicate, however, the Supreme Court to date has developed its government speech doctrine – which recognizes “government speech” as a defense to First Amendment challenges by plaintiffs who claim that the government has impermissibly excluded their expression based on viewpoint – only in the context of disputes involving fairly traditional forms of expression. In none of these …


Government Speech 2.0, Helen Norton, Danielle Keats Citron Jan 2010

Government Speech 2.0, Helen Norton, Danielle Keats Citron

Publications

New expressive technologies continue to transform the ways in which members of the public speak to one another. Not surprisingly, emerging technologies have changed the ways in which government speaks as well. Despite substantial shifts in how the government and other parties actually communicate, however, the Supreme Court to date has developed its government speech doctrine--which recognizes "government speech" as a defense to First Amendment challenges by plaintiffs who claim that the government has impermissibly excluded their expression based on viewpoint--only in the context of disputes involving fairly traditional forms of expression. In none of these decisions, moreover, has the …


Anonymity In Cyberspace: What Can We Learn From John Doe?, Lyrissa Lidsky Jan 2009

Anonymity In Cyberspace: What Can We Learn From John Doe?, Lyrissa Lidsky

Faculty Publications

This Article examines the evolution of the law governing libel suits against anonymous “John Doe” defendants based on Internet speech. Between 1999 and 2009, courts crafted new First Amendment doctrines to protect Internet speakers from having their anonymity automatically stripped away upon the filing of a libel action. Courts also adapted existing First Amendment protections for hyperbole, satire and other non-factual speech to protect the distinctive discourse of Internet message boards. Despite these positive developments, the current state of the law is unsatisfactory. Because the scope of protection for anonymous Internet speech varies greatly by jurisdiction, resourceful plaintiffs can make …


Anonymity In Cyberspace: What Can We Learn From John Doe?, Lyrissa Barnett Lidsky Jan 2009

Anonymity In Cyberspace: What Can We Learn From John Doe?, Lyrissa Barnett Lidsky

UF Law Faculty Publications

This Article examines the evolution of the law governing libel suits against anonymous "John Doe" defendants based on Internet speech. Between 1999 and 2009, courts crafted new First Amendment doctrines to protect Internet speakers from having their anonymity automatically stripped away upon the filing of a libel action. Courts also adapted existing First Amendment protections for hyperbole, satire, and other nonfactual speech to protect the distinctive discourse of Internet message boards. Despite these positive developments, the current state of the law is unsatisfactory. Because the scope of protection for anonymous Internet speech varies greatly by jurisdiction, resourceful plaintiffs can make …


Cyber Civil Rights (November 2008; Mp3), Danielle Keats Citron Nov 2008

Cyber Civil Rights (November 2008; Mp3), Danielle Keats Citron

Faculty Scholarship

Social networking sites and blogs have increasingly become breeding grounds for anonymous online groups that attack women, people of color, and members of other traditionally disadvantaged groups. These destructive groups target individuals with defamation, threats of violence, and technology-based attacks that silence victims and concomitantly destroy their privacy. Victims go offline or assume pseudonyms to prevent future attacks, impoverishing online dialogue and depriving victims of the social and economic opportunities associated with a vibrant online presence. Attackers manipulate search engines to reproduce their lies and threats for employers and clients to see, creating digital "scarlet letters" that ruin reputations. Today's …


Who Owns 'Hillary.Com'? Political Speech And The First Amendment In Cyberspace, Jacqueline D. Lipton Jan 2008

Who Owns 'Hillary.Com'? Political Speech And The First Amendment In Cyberspace, Jacqueline D. Lipton

Articles

In the lead-up to the next presidential election, it will be important for candidates both to maintain an online presence and to exercise control over bad faith uses of domain names and web content related to their campaigns. What are the legal implications for the domain name system? Although, for example, Senator Hillary Clinton now owns "hillaryclinton.com", the more generic "hillary.com" is registered to a software firm, Hillary Software, Inc. What about "hillary2008.com"? It is registered to someone outside the Clinton campaign and is not currently in active use. This article examines the large gaps and inconsistencies in current domain …


Celebrity In Cyberspace: A Personality Rights Paradigm For Personal Domain Name Disputes, Jacqueline D. Lipton Jan 2008

Celebrity In Cyberspace: A Personality Rights Paradigm For Personal Domain Name Disputes, Jacqueline D. Lipton

Articles

When the Oscar-winning actress, Julia Roberts, fought for control of the domain name, what was her aim? Did she want to reap economic benefits from the name? Probably not, as she has not used the name since it was transferred to her. Or did she want to prevent others from using it on either an unjust enrichment or a privacy basis? Was she, in fact, protecting a trademark interest in her name? Personal domain name disputes, particularly those in the space, implicate unique aspects of an individual's persona in cyberspace. Nevertheless, most of the legal rules developed for these disputes …


Substantive Media Regulation In Three Dimensions, Gregory P. Magarian Jan 2007

Substantive Media Regulation In Three Dimensions, Gregory P. Magarian

Scholarship@WashULaw

Changes in the political and regulatory climates are prompting calls to revive substantive government regulation of the broadcast media, specifically the now-defunct fairness doctrine. In this article, Professor Magarian attempts to sharpen the present debate over substantive regulation by closely examining earlier defenses and criticisms of the fairness doctrine. The article assesses how supporters and opponents of the fairness doctrine have characterized three issues essential for assessing the doctrine's wisdom and constitutionality: who is regulating; who is being regulated; and the goal of the regulatory scheme. As to the first issue, who is regulating, fairness doctrine supporters emphasize the democratic …


Market Triumphalism, Electoral Pathologies, And The Abiding Wisdom Of First Amendment Access Rights, Gregory P. Magarian Jan 2006

Market Triumphalism, Electoral Pathologies, And The Abiding Wisdom Of First Amendment Access Rights, Gregory P. Magarian

Scholarship@WashULaw

Forty years ago, Professor Jerome Barron made the classic case that the First Amendment requires not merely protection of speech against government interference but provision of access to the means of mass communication. The Supreme Court in the ensuing decades has largely rejected Barron's approach. In this article, Professor Magarian defends Barron's case for access rights against the two theoretical critiques that have underwritten its doctrinal rejection. The libertarian critique attacks the normative underpinnings of access rights, maintaining that the First Amendment insulates market-driven distributions of expressive opportunities. Professor Magarian demonstrates that politically progressive and conservative libertarian critics of access …


Initial Interest Confusion: Standing At The Crossroads Of Trademark Law, Jennifer E. Rothman Oct 2005

Initial Interest Confusion: Standing At The Crossroads Of Trademark Law, Jennifer E. Rothman

All Faculty Scholarship

While the benchmark of trademark infringement traditionally has been a demonstration that consumers are likely to be confused by the use of a similar or identical trademark to identify the goods or services of another, a court-created doctrine called initial interest confusion allows liability for trademark infringement solely on the basis that a consumer might initially be interested, attracted, or distracted by a competitor's, or even a non-competitor's, product or service. Initial interest confusion is being used with increasing frequency, especially on the Internet, to shut down speech critical of trademark holders and their products and services, to prevent comparative …


Society’S Software, Beth Simone Noveck, David R. Johnson Jan 2005

Society’S Software, Beth Simone Noveck, David R. Johnson

Articles & Chapters

No abstract provided.


Your Money Or Your Speech: The Children's Internet Protection Act And The Congressional Assault On The First Amendment In Public Libraries, Steven D. Hinckley Jan 2002

Your Money Or Your Speech: The Children's Internet Protection Act And The Congressional Assault On The First Amendment In Public Libraries, Steven D. Hinckley

Journal Articles

This article examines the inherent conflict between This article examines the inherent conflict between two Congressional approaches to public access to the Internet - the provision of federal funding support to schools and public libraries to ensure broad access to online information regardless of financial means, and federal restrictions on children's use of school and public library computers to access content that the government feels could be harmful to them. It analyzes the efficacy and constitutionality of the Children's Internet Protection Act (CIPA), Congress's attempt to use its powers of the purse to control objectionable online content in the very …


Law And Information Platforms, Philip J. Weiser Jan 2002

Law And Information Platforms, Philip J. Weiser

Publications

No abstract provided.


Resolving Tensions Between Copyright And The Internet, Walter Effross Jan 2000

Resolving Tensions Between Copyright And The Internet, Walter Effross

Articles in Law Reviews & Other Academic Journals

No abstract provided.


Application-Centered Internet Analysis, Tim Wu Jan 1999

Application-Centered Internet Analysis, Tim Wu

Faculty Scholarship

There is a now-standard debate about law and the Internet. One side asserts that the Internet is so new and different that it calls for new legal approaches, even its own sovereign law. The other side argues that, although it is a new technology, the Internet nonetheless presents familiar legal problems. It is a battle of analogies: One side refers to Cyberspace as a place, while the other essentially equates the Internet and the telephone.

In my view, these two positions are both wrong and right: wrong in their characterization of the Internet as a whole, yet potentially right about …


Commercial Exploitation Or Protected Use? Stern V. Delphi Internet Services Corporation And The Erosion Of The Right Of Publicity, Karin M. Mika, Aaron J. Reber Jan 1996

Commercial Exploitation Or Protected Use? Stern V. Delphi Internet Services Corporation And The Erosion Of The Right Of Publicity, Karin M. Mika, Aaron J. Reber

Law Faculty Articles and Essays

This article addresses the repercussions of Stern v. Delphi Internet Services Corporation and argues that the decision in Stern opens the door to a broader interpretation of “newsworthiness” and “public interest” that will enable advertisers broader First Amendment protections when using “unauthorized” likenesses. This article posits that artful advertisers could very well use the theory of Stern as a basis for virtually ensuring that every “unauthorized likeness” will enjoy First Amendment protection and not be considered as violative of the right of publicity.


Garbage In: Emerging Media And Regulation Of Unsolicited Commercial Solicitiations, Michael W. Carroll Jan 1996

Garbage In: Emerging Media And Regulation Of Unsolicited Commercial Solicitiations, Michael W. Carroll

Articles in Law Reviews & Other Academic Journals

No abstract provided.


Closing The Barn Door After The Genie Is Out Of The Bag: Recognizing A "Futility Principle" In First Amendment Jurisprudence, Eric Easton Oct 1995

Closing The Barn Door After The Genie Is Out Of The Bag: Recognizing A "Futility Principle" In First Amendment Jurisprudence, Eric Easton

All Faculty Scholarship

This article argues for a simple proposition: the First Amendment imposes a presumption against the suppression of speech when suppression would be futile. Suppression is futile when the speech is available to the same audience through some other medium or at some other place. The government can overcome this presumption of futility only when it asserts an important interest that is unrelated to the content of the speech in question, and only when the suppression directly advances that interest.

In Part I, the article explores the role that this unarticulated "futility principle" has played in Supreme Court and other decisions …