Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- University of Colorado Law School (11)
- Boston University School of Law (6)
- New York Law School (5)
- American University Washington College of Law (4)
- Schulich School of Law, Dalhousie University (4)
-
- Georgetown University Law Center (2)
- Penn State Law (2)
- University at Buffalo School of Law (2)
- University of Florida Levin College of Law (2)
- University of Maryland Francis King Carey School of Law (2)
- University of Missouri School of Law (2)
- University of Pittsburgh School of Law (2)
- Washington University in St. Louis (2)
- Cleveland State University (1)
- Columbia Law School (1)
- Seattle University School of Law (1)
- St. John's University School of Law (1)
- Texas A&M University School of Law (1)
- University of Baltimore Law (1)
- University of Georgia School of Law (1)
- University of Pennsylvania Carey Law School (1)
- University of Rhode Island (1)
- Virginia Community College System (1)
- Publication Year
- Publication
-
- Publications (11)
- Faculty Scholarship (10)
- Articles & Chapters (5)
- Articles, Book Chapters, & Popular Press (4)
- Journal Articles (4)
-
- Articles in Law Reviews & Other Academic Journals (3)
- Faculty Publications (3)
- All Faculty Scholarship (2)
- Articles (2)
- Georgetown Law Faculty Publications and Other Works (2)
- Scholarship@WashULaw (2)
- UF Law Faculty Publications (2)
- Amicus Briefs (1)
- Law Faculty Articles and Essays (1)
- Scholarly Works (1)
- Seattle University Law Review SUpra (1)
- Senior Honors Projects (1)
- Student Writing (1)
Articles 1 - 30 of 56
Full-Text Articles in Law
Of Systems Thinking And Straw Men, Kate Klonick
Of Systems Thinking And Straw Men, Kate Klonick
Faculty Publications
(Excerpt)
In Content Moderation as Systems Thinking, Professor Evelyn Douek, as the title suggests, endorses an approach to the people, rules, and processes governing online speech as one not of anecdote and doctrine but of systems thinking. She constructs this concept as a novel and superior understanding of the problems of online-speech governance as compared to those existent in what she calls the “standard [scholarly] picture of content moderation.” This standard picture of content moderation — which is roughly five years old — is “outdated and incomplete,” she argues. It is preoccupied with anecdotal, high-profile adjudications in which platforms …
Free Speech On Social Media: Unrestricted Or Regulated?, Alessandra Garcia Guevara
Free Speech On Social Media: Unrestricted Or Regulated?, Alessandra Garcia Guevara
Student Writing
Social media has evolved into an essential mode of communication in recent years, allowing people to express their thoughts with the audience of their choice by sending private messages, posting their thoughts, or sharing their opinions. Such audiences can come from all over the world because this online technology breaks down geographic, linguistic, and cultural barriers. As a result, social media has evolved into a powerful tool for self-expression, allowing anyone with an Internet connection to participate in global debates. However, its misuse has had disastrous consequences in the real world, such as the attack on the Capitol that occurred …
Understanding Chilling Effects, Jonathon Penney
Understanding Chilling Effects, Jonathon Penney
Articles, Book Chapters, & Popular Press
With digital surveillance and censorship on the rise, the amount of data available online unprecedented, and corporate and governmental actors increasingly employing emerging technologies like artificial intelligence (AI), machine learning, and facial recognition technology (FRT) for surveillance and data analytics, concerns about “chilling effects”, that is, the capacity for these activities “chill” or deter people from exercising their rights and freedoms have taken on greater urgency and importance. Yet, there remains a clear dearth in systematic theoretical and empirical work point. This has left significant gaps in understanding. This article has attempted to fill that void, synthesizing theoretical and empirical …
Absolute Publishing Power And Bulletproof Immunity: How Section 230 Shields Internet Service Providers From Liability And Makes It Impossible To Protect Your Reputation Online, Victoria Anderson
Seattle University Law Review SUpra
No abstract provided.
Free Speech In The Internet Era: Reviewing Policies Seeking To Modify Section 230 Of The Communications Decency Act Of 1996, Jacob Cordeiro
Free Speech In The Internet Era: Reviewing Policies Seeking To Modify Section 230 Of The Communications Decency Act Of 1996, Jacob Cordeiro
Senior Honors Projects
Section 230 of the Communications Decency Act (CDA), has for over two decades provided “interactive computer services” a legal liability shield for defamatory or otherwise actionable user-generated content posted on their platforms and, for lawsuits stemming over unequal enforcement of their content policies provided enforcement efforts are taken in “good faith.” This law, passed in the early days of the Internet, incubated the Internet and social media, giving it the regulatory freedom it needed to grow into a platform where hundreds of millions of Americans can exchange ideas and engage in political and social discourse. Yet, for all the good …
Agonistic Privacy & Equitable Democracy, Scott Skinner-Thompson
Agonistic Privacy & Equitable Democracy, Scott Skinner-Thompson
Publications
This Essay argues that legal privacy protections—which enable individuals to control their visibility within public space—play a vital role in disrupting the subordinating, antidemocratic impacts of surveillance and should be at the forefront of efforts to reform the operation of both digital and physical public space. Robust privacy protections are a touchstone for empowering members of different marginalized groups with the ability to safely participate in both the physical and digital public squares, while also preserving space for vibrant subaltern counterpublics. By increasing heterogeneity within the public sphere, privacy can also help decrease polarization by breaking down echo chambers and …
Free Speech And Democracy: A Primer For Twenty-First Century Reformers, Toni M. Massaro, Helen Norton
Free Speech And Democracy: A Primer For Twenty-First Century Reformers, Toni M. Massaro, Helen Norton
Publications
Left unfettered, the twenty-first-century speech environment threatens to undermine critical pieces of the democratic project. Speech operates today in ways unimaginable not only to the First Amendment’s eighteenth-century writers but also to its twentieth-century champions. Key among these changes is that speech is cheaper and more abundant than ever before, and can be exploited — by both government and powerful private actors alike — as a tool for controlling others’ speech and frustrating meaningful public discourse and democratic outcomes.
The Court’s longstanding First Amendment doctrine rests on a model of how speech works that is no longer accurate. This invites …
Symposium: The California Consumer Privacy Act, Margot Kaminski, Jacob Snow, Felix Wu, Justin Hughes
Symposium: The California Consumer Privacy Act, Margot Kaminski, Jacob Snow, Felix Wu, Justin Hughes
Publications
This symposium discussion of the Loyola of Los Angeles Law Review focuses on the newly enacted California Consumer Privacy Act (CPPA), a statute signed into state law by then-Governor Jerry Brown on June 28, 2018 and effective as of January 1, 2020. The panel was held on February 20, 2020.
The panelists discuss how businesses are responding to the new law and obstacles for consumers to make effective use of the law’s protections and rights. Most importantly, the panelists grapple with questions courts are likely to have to address, including the definition of personal information under the CCPA, the application …
Internet Architecture And Disability, Blake E. Reid
Internet Architecture And Disability, Blake E. Reid
Publications
The Internet is essential for education, employment, information, and cultural and democratic participation. For tens of millions of people with disabilities in the United States, barriers to accessing the Internet—including the visual presentation of information to people who are blind or visually impaired, the aural presentation of information to people who are deaf or hard of hearing, and the persistence of Internet technology, interfaces, and content without regard to prohibitive cognitive load for people with cognitive and intellectual disabilities—collectively pose one of the most significant civil rights issues of the information age. Yet disability law lacks a comprehensive theoretical approach …
The Internet As A Speech Machine And Other Myths Confounding Section 230 Reform, Danielle K. Citron, Mary Anne Franks
The Internet As A Speech Machine And Other Myths Confounding Section 230 Reform, Danielle K. Citron, Mary Anne Franks
Faculty Scholarship
A robust public debate is currently underway about the responsibility of online platforms. We have long called for this discussion, but only recently has it been seriously taken up by legislators and the public. The debate begins with a basic question: should platforms should be responsible for user-generated content? If so, under what circumstances? What exactly would such responsibility look like? Under consideration is Section 230 of the Communications Decency Act—a provision originally designed to encourage tech companies to clean up “offensive” online content. The public discourse around Section 230, however, is riddled with misconceptions. As an initial matter, many …
Platforms And The Fall Of The Fourth Estate: Looking Beyond The First Amendment To Protect Watchdog Journalism, Erin C. Carroll
Platforms And The Fall Of The Fourth Estate: Looking Beyond The First Amendment To Protect Watchdog Journalism, Erin C. Carroll
Georgetown Law Faculty Publications and Other Works
Journalists see the First Amendment as an amulet, and with good reason. It has long protected the Fourth Estate—an independent institutional press—in its exercise of editorial discretion to check government power. This protection helped the Fourth Estate flourish in the second half of the twentieth century and ably perform its constitutional watchdog role.
But in the last two decades, the media ecology has changed. The Fourth Estate has been subsumed by a Networked Press in which journalists are joined by engineers, algorithms, audience, and other human and non-human actors in creating and distributing news. The Networked Press’s most powerful members …
Deep Fakes: A Looming Challenge For Privacy, Democracy, And National Security, Danielle K. Citron, Robert Chesney
Deep Fakes: A Looming Challenge For Privacy, Democracy, And National Security, Danielle K. Citron, Robert Chesney
Faculty Scholarship
Harmful lies are nothing new. But the ability to distort reality has taken an exponential leap forward with “deep fake” technology. This capability makes it possible to create audio and video of real people saying and doing things they never said or did. Machine learning techniques are escalating the technology’s sophistication, making deep fakes ever more realistic and increasingly resistant to detection. Deep-fake technology has characteristics that enable rapid and widespread diffusion, putting it into the hands of both sophisticated and unsophisticated actors. While deep-fake technology will bring with it certain benefits, it also will introduce many harms. The marketplace …
Speech Across Borders, Jennifer Daskal
Speech Across Borders, Jennifer Daskal
Articles in Law Reviews & Other Academic Journals
As both governments and tech companies seek to regulate speech online, these efforts raise critical, and contested, questions about how far those regulations can and should extend. Is it enough to take down or delink material in a geographically segmented way? Or can and should tech companies be ordered to takedown or delink unsavory content across their entire platforms—no matter who is posting the material or where the unwanted content is viewed? How do we deal with conflicting speech norms across borders? And how do we protect against the most censor-prone nation effectively setting global speech rules? These questions were …
The Problem Isn't Just Backpage: Revising Section 230 Immunity, Danielle K. Citron, Benjamin Wittes
The Problem Isn't Just Backpage: Revising Section 230 Immunity, Danielle K. Citron, Benjamin Wittes
Faculty Scholarship
Backpage is a classifieds hub that hosts “80 percent of the online advertising for illegal commercial sex in the United States.” This is not by happenstance but rather by design. Evidence suggests that the advertising hub selectively removed postings discouraging sex trafficking. The site also tailored its rules to protect the practice from detection, including allowing anonymized email and photographs stripped of metadata. Under the prevailing interpretation of 47 U.S.C. § 230 (“Section 230”) of the CDA, however, Backpage would be immune from liability connected to sex trafficking even though it proactively helped sex traffickers from getting caught. No matter …
Can Cyber Harassment Laws Encourage Online Speech?, Jonathon Penney
Can Cyber Harassment Laws Encourage Online Speech?, Jonathon Penney
Articles, Book Chapters, & Popular Press
Do laws criminalizing online harassment and cyberbullying "chill" online speech? Critics often argue that they do. However, this article discusses findings from a new empirical legal study that suggests, counter-intuitively, that while such legal interventions likely have some dampening effect, they may also facilitate and encourage more speech, expression, and sharing by those who are most often the targets of online harassment: women. Relevant findings on this point from this first-of-its-kind study are set out and discussed along with their implications.
Robotic Speakers And Human Listeners, Helen Norton
Robotic Speakers And Human Listeners, Helen Norton
Publications
In their new book, Robotica, Ron Collins and David Skover assert that we protect speech not so much because of its value to speakers but instead because of its affirmative value to listeners. If we assume that the First Amendment is largely, if not entirely, about serving listeners’ interests—in other words, that it’s listeners all the way down—what would a listener-centered approach to robotic speech require? This short symposium essay briefly discusses the complicated and sometimes even dark side of robotic speech from a listener-centered perspective.
The Internet Will Not Break: Denying Bad Samaritans Section 230 Immunity, Danielle K. Citron, Benjamin Wittes
The Internet Will Not Break: Denying Bad Samaritans Section 230 Immunity, Danielle K. Citron, Benjamin Wittes
Faculty Scholarship
What do a revenge pornographer, gossip-site curator, and platform pairing predators with young people in one-on-one chats have in common? Blanket immunity from liability, thanks to lower courts’ interpretation of section 230 of the Communications Decency Act (CDA) beyond what the text, context, and purpose support. The CDA was part of a campaign — rather ironically in retrospect — to restrict access to sexually explicit material online. Lawmakers thought they were devising a safe harbor for online providers engaged in self-regulation. The CDA’s origins in the censorship of “offensive” material are inconsistent with outlandishly broad interpretations that have served to …
Standing After Snowden: Lessons On Privacy Harm From National Security Surveillance Litigation, Margot E. Kaminski
Standing After Snowden: Lessons On Privacy Harm From National Security Surveillance Litigation, Margot E. Kaminski
Publications
Article III standing is difficult to achieve in the context of data security and data privacy claims. Injury in fact must be "concrete," "particularized," and "actual or imminent"--all characteristics that are challenging to meet with information harms. This Article suggests looking to an unusual source for clarification on privacy and standing: recent national security surveillance litigation. There we can find significant discussions of what rises to the level of Article III injury in fact. The answers may be surprising: the interception of sensitive information; the seizure of less sensitive information and housing of it in a database for analysis; and …
Triggering Tinker: Student Speech In The Age Of Cyberharassment, Ari Ezra Waldman
Triggering Tinker: Student Speech In The Age Of Cyberharassment, Ari Ezra Waldman
Articles & Chapters
This essay challenges the common assumption that public schools have limited authority to regulate cyberbullying that originates and takes place off campus. That argument presumes a level of myopia, clarity, and literalism in the law that simply does not exist. First, even assuming it existed, a geographic requirement is an outdated creature of a preinternet age. Cyberbullying poses unique challenges to young people, educators, and schools not contemplated when the Court decided its student speech cases. If it existed then, it should adapt to today’s realities. Second, I argue that a campus presence requirement for regulating any kind of off-campus …
The “Sovereigns Of Cyberspace” And State Action: The First Amendment’S Application (Or Lack Thereof) To Third-Party Platforms, Jonathan Peters
The “Sovereigns Of Cyberspace” And State Action: The First Amendment’S Application (Or Lack Thereof) To Third-Party Platforms, Jonathan Peters
Scholarly Works
Many scholars have commented that the state action doctrine forecloses use of the First Amendment to constrain the policies and practices of online service providers. But few have comprehensively studied this issue, and the seminal article exploring “[c]yberspace and the [s]tate [a]ction [d]ebate” is fifteen years old, published before the U.S. Supreme Court reformulated the federal approach to state action. It is important to give the state action doctrine regular scholarly attention, not least because it is increasingly clear that “the private sector has a shared responsibility to help safeguard free expression.” It is critical to understand whether the First …
Making News: Balancing Newsworthiness And Privacy In The Age Of Algorithms, Erin C. Carroll
Making News: Balancing Newsworthiness And Privacy In The Age Of Algorithms, Erin C. Carroll
Georgetown Law Faculty Publications and Other Works
In deciding privacy lawsuits against media defendants, courts have for decades deferred to the media. They have given it wide berth to determine what is newsworthy and so, what is protected under the First Amendment. And in doing so, they have often spoken reverently of the editorial process and journalistic decision-making.
Yet, in just the last several years, news production and consumption has changed dramatically. As we get more of our news from digital and social media sites, the role of information gatekeeper is shifting from journalists to computer engineers, programmers, and app designers. The algorithms that the latter write …
Sex, Videos, And Insurance: How Gawker Could Have Avoided Financial Responsibility For The $140 Million Hulk Hogan Sex Tape Verdict, Christopher French
Sex, Videos, And Insurance: How Gawker Could Have Avoided Financial Responsibility For The $140 Million Hulk Hogan Sex Tape Verdict, Christopher French
Journal Articles
On March 18, 2016, and March 22, 2016, a jury awarded Terry Bollea (a.k.a Hulk Hogan) a total of $140 million in compensatory and punitive damages against Gawker Media for posting less than two minutes of a video of Hulk Hogan having sex with his best friend’s wife. The award was based upon a finding that Gawker intentionally had invaded Hulk Hogan’s privacy by posting the video online. The case has been receiving extensive media coverage because it is a tawdry tale involving a celebrity, betrayal, adultery, sex, and the First Amendment. The case likely will be remembered by most …
Addressing Cyber Harassment: An Overview Of Hate Crimes In Cyberspace, Danielle K. Citron
Addressing Cyber Harassment: An Overview Of Hate Crimes In Cyberspace, Danielle K. Citron
Faculty Scholarship
This short piece will take a step back and give an overhead view of the problem of cyber harassment and the destructive impact it can have on victims’ lives. Then, it will address about what the law can do to combat online harassment and how a legal agenda can be reconciled with the First Amendment. Finally, it will turn to recent changes in social media companies’ treatment of online abuse and what that might mean for our system of free expression.
Sharing Stupid $H*T With Friends And Followers: The First Amendment Rights Of College Athletes To Use Social Media, Meg Penrose
Sharing Stupid $H*T With Friends And Followers: The First Amendment Rights Of College Athletes To Use Social Media, Meg Penrose
Faculty Scholarship
This paper takes a closer look at the First Amendment rights of college athletes to access social media while simultaneously participating in intercollegiate athletics. The question posed is quite simple: can a coach or athletic department at a public university legally restrict a student-athlete's use of social media? If so, does the First Amendment provide any restraints on the type or length of restrictions that can be imposed? Thus far, neither question has been presented to a court for resolution. However, the answers are vital, as college coaches and athletic directors seek to regulate their athletes in a constitutional manner.
Warrant Canaries Beyond The First Amendment: A Comment, Jonathon Penney
Warrant Canaries Beyond The First Amendment: A Comment, Jonathon Penney
Articles, Book Chapters, & Popular Press
Warrant canaries have emerged as an intriguing tool for Internet companies to provide some measure of transparency for users while also complying with national security laws. Though there is at least a reasonable argument for the legality of warrant canaries in the U.S. based primarily on First Amendment "compelled speech" doctrine, the same cannot be said for the use of warrant canaries in other "Five Eyes” intelligence agency countries — United Kingdom, Canada, New Zealand, and Australia — where the legality of warrant canaries has yet to be examined in either cases or scholarship. This comment, which provides an overview …
From Google To Tolstoy Bot: Should The First Amendment Protect Speech Generated By Algorithms?, Margot Kaminski
From Google To Tolstoy Bot: Should The First Amendment Protect Speech Generated By Algorithms?, Margot Kaminski
Publications
No abstract provided.
Warrant Canaries Beyond The First Amendment: A Comment, Jonathon Penney
Warrant Canaries Beyond The First Amendment: A Comment, Jonathon Penney
Articles, Book Chapters, & Popular Press
Warrant canaries have emerged as an intriguing tool for Internet companies to provide some measure of transparency for users while also complying with national security laws. Though there is at least a reasonable argument for the legality of warrant canaries in the U.S. based primarily on First Amendment "compelled speech" doctrine, the same cannot be said for the use of warrant canaries in other "Five Eyes” intelligence agency countries — United Kingdom, Canada, New Zealand, and Australia — where the legality of warrant canaries has yet to be examined in either cases or scholarship. This comment, which provides an overview …
Striking A Balance Between Privacy And Online Commerce, Mark Bartholomew
Striking A Balance Between Privacy And Online Commerce, Mark Bartholomew
Journal Articles
It is becoming commonplace to note that privacy and online commerce are on a collision course. Corporate entities archive and monetize more and more personal information. Citizens increasingly resent the intrusive nature of such data collection and use. Just noticing this conflict, however, tells us little. In "Informing and Reforming the Marketplace of Ideas: The Public-Private Model for Data Production and the First Amendment" Professor Shubha Ghosh not only notes the tension between the costs and benefits of data commercialization, but suggests three normative perspectives for balancing privacy and commercial speech. This is valuable because without a rich theoretical framework …
An Intersystemic View Of Intellectual Property And Free Speech, Mark Bartholomew, John Tehranian
An Intersystemic View Of Intellectual Property And Free Speech, Mark Bartholomew, John Tehranian
Journal Articles
Intellectual property regimes operate in the shadow of the First Amendment. By deeming a particular activity as infringing, the law of copyright, trademark, and the right of publicity all limit communication. As a result, judges and lawmakers must delicately balance intellectual property rights with expressive freedoms. Interestingly, each intellectual property regime strikes the balance between ownership rights and free speech in a dramatically different way. Despite a large volume of scholarship on intellectual property rights and free speech considerations, this Article represents the first systematic effort to detail, analyze, and explain the divergent evolution of expression-based defenses in copyright, trademark, …
Durkheim's Internet: Social And Political Theory In Online Society, Ari Ezra Waldman
Durkheim's Internet: Social And Political Theory In Online Society, Ari Ezra Waldman
Articles & Chapters
While the Internet has changed dramatically since the early 1990s, the legal regime governing the right to privacy online and Internet speech is still steeped in a myth of the Internet user, completely hidden from others, in total control of his online experience, and free to come and go as he pleases. This false image of the “virtual self” has also contributed to an ethos of lawlessness, irresponsibility, and radical individuation online, allowing the evisceration of online privacy and the proliferation of hate and harassment.
I argue that the myth of the online anonym is not only false as a …