Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 35

Full-Text Articles in Law

Delineating Victims From Perpetrators: Prosecuting Self-Produced Child Pornography In Youth Criminal Justice Systems, Bryce Westlake Oct 2018

Delineating Victims From Perpetrators: Prosecuting Self-Produced Child Pornography In Youth Criminal Justice Systems, Bryce Westlake

Faculty Publications

Video recording technology advancements and accessibility has been paralleled by a growth in self-produced child pornography (SPCP). Although social and judicial attention has been given to instances of teenage sexting, Internet-based forms of SPCP, such as webcam/website sex tourism, have almost been ignored. While some of the proposed legislation reform has referenced video-based SPCP, the majority has focused on SPCP distributed through cellular phones; excluding that which is manifested online or through entrepreneurial efforts. The purpose of this article is to introduce non-sexting SPCP, using the case study of Justin Berry (in the United States), and to propose a broad …


A Legal Perspective On The Trials And Tribulations Of Ai: How Artificial Intelligence, The Internet Of Things, Smart Contracts, And Other Technologies Will Affect The Law, Iria Giuffrida, Fredric Lederer, Nicolas Vermeys Apr 2018

A Legal Perspective On The Trials And Tribulations Of Ai: How Artificial Intelligence, The Internet Of Things, Smart Contracts, And Other Technologies Will Affect The Law, Iria Giuffrida, Fredric Lederer, Nicolas Vermeys

Faculty Publications

No abstract provided.


The New Governors: The People, Rules And Processes Governing Online Speech, Kate Klonick Jan 2018

The New Governors: The People, Rules And Processes Governing Online Speech, Kate Klonick

Faculty Publications

Private online platforms have an increasingly essential role in free speech and participation in democratic culture. But while it might appear that any internet user can publish freely and instantly online, many platforms actively curate the content posted by their users. How and why these platforms operate to moderate speech is largely opaque.

This Article provides the first analysis of what these platforms are actually doing to moderate online speech under a regulatory and First Amendment framework. Drawing from original interviews, archived materials, and internal documents, this Article describes how three major online platforms — Facebook, Twitter, and YouTube — …


Empowering Consumers Through Online Dispute Resolution, Amy J. Schmitz Oct 2017

Empowering Consumers Through Online Dispute Resolution, Amy J. Schmitz

Faculty Publications

We transact online every day, hoping that no problems will occur. However, our purchases are not always perfect: goods may not arrive; products may be faulty; expectations may go unmet. When this occurs, we are often left frustrated, with no means for seeking redress. Phone calls to customer service are generally unappealing and ineffective, and traditional face-to-face or judicial processes for asserting claims are impractical after weighing costs against likely recovery. This is especially true when seeking redress requires travel, or for crossborder claims involving jurisdictional complexities. This situation has created a need for online dispute resolution (“ODR”), which brings …


A New Taxonomy For Online Harms, Kate Klonick Jan 2015

A New Taxonomy For Online Harms, Kate Klonick

Faculty Publications

(Excerpt)

Bullying is generally understood among academics and educators as having to meet three criteria: (1) it must be verbal or physical aggression; (2) it must be repeated over time; and (3) it must involve a power differential. When talking about cyber bullying, the aggression is mostly verbal, using “threats, blackmail. . . gossip and rumors” and online personas or messages can be more cruel, vindictive and mean. Though cyber bullying typically describes acts between children, the same acts by adults could also be considered cyber harassment. Unlike harassment, however, bullying does not have a history of criminal liability—though all …


Trial By Google: Judicial Notice In The Information Age, Jeffrey Bellin, Andrew Guthrie Ferguson Jul 2014

Trial By Google: Judicial Notice In The Information Age, Jeffrey Bellin, Andrew Guthrie Ferguson

Faculty Publications

This Article presents a theory of judicial notice for the information age. It argues that the ease of accessing factual data on the Internet allows judges and litigants to expand the use of judicial notice in ways that raise significant concerns about admissibility, reliability, and fair process. State and federal courts are already applying the surprisingly pliant judicial notice rules to bring websites ranging from Google Maps to Wikipedia into the courtroom, and these decisions will only increase in frequency in coming years. This rapidly emerging judicial phenomenon is notable for its ad hoc and conclusory nature—attributes that have the …


The Implications Of Excluding State Crimes From 47 U.S.C. §230’S Immunity, Eric Goldman Jul 2013

The Implications Of Excluding State Crimes From 47 U.S.C. §230’S Immunity, Eric Goldman

Faculty Publications

In June 2013, the State Attorneys General signaled their intent to ask Congress to amend 47 U.S.C. 230, the federal law that says websites aren't liable for third party content. The State AGs want to exclude state criminal prosecutions from the immunity. This essay explains the problems such an amendment would create for the Internet user-generated content community.


Technology Drives The Law: A Foreword To Trends And Issues In Techology & The Law, Ralph D. Clifford Jan 2012

Technology Drives The Law: A Foreword To Trends And Issues In Techology & The Law, Ralph D. Clifford

Faculty Publications

Technology has always been a motivating force of change in the law. The creation of new machines and development of novel methods of achieving goals force the law to adapt with new and responsive rules. This is particularly true whenever a new technology transforms society. Whether it is increasing industrialization or computerization, pre-existing legal concepts rarely survive the transition unaltered - new prescriptions are announced while old ones disappear.


Incendiary Speech And Social Media, Lyrissa Lidsky Jan 2011

Incendiary Speech And Social Media, Lyrissa Lidsky

Faculty Publications

Incidents illustrating the incendiary capacity of social media have rekindled concerns about the "mismatch" between existing doctrinal categories and new types of dangerous speech. This Essay examines two such incidents, one in which an offensive tweet and YouTube video led a hostile audience to riot and murder, and the other in which a blogger urged his nameless, faceless audience to murder federal judges. One incident resulted in liability for the speaker even though no violence occurred; the other did not lead to liability for the speaker even though at least thirty people died as a result of his words. An …


Public Forum 2.0, Lyrissa Lidsky Jan 2011

Public Forum 2.0, Lyrissa Lidsky

Faculty Publications

Social media have the potential to revolutionize discourse between American citizens and their governments. At present, however, the U.S. Supreme Court's public forum jurisprudence frustrates rather than fosters that potential. This article navigates the notoriously complex body of public forum doctrine to provide guidance for those who must develop or administer government-sponsored social media or adjudicate First Amendment questions concerning them. Next, the article marks out a new path for public forum doctrine that will allow it to realize the potential of Web 2.0 technologies to enhance democratic discourse between the governors and the governed. Along the way, this article …


Not In My Atlantic Yards: Examining Netroots’ Role In Eminent Domain Reform, Kate Klonick Jan 2011

Not In My Atlantic Yards: Examining Netroots’ Role In Eminent Domain Reform, Kate Klonick

Faculty Publications

(Excerpt)

Since the Supreme Court's decision in Kelo v. City of New London, which expanded the state's power to condemn private property and transfer it to other private owners under the Fifth Amendment, there have been significant calls to curb the power of eminent domain through statutory reform. Scholars and jurists in favor of eminent domain reform have asserted that legislation is needed to protect private property rights against the rising tide of state power, with many arguing that such reform should incorporate a public approval process into land use decisions. Those opposed to eminent-domain reform argue that empowering …


Proving Fair Use: Burden Of Proof As Burden Of Speech, Ned Snow Apr 2010

Proving Fair Use: Burden Of Proof As Burden Of Speech, Ned Snow

Faculty Publications

Courts have created a burden of proof in copyright that chills protected speech. The doctrine of fair use purports to ensure that copyright law does not trample rights of speakers whose expression employs copyrighted material. Yet those speakers face a burden of proof that weighs heavily in the fair use analysis, where factual inquiries are often subjective and speculative. Failure to satisfy the burden means severe penalties, which prospect quickly chills the free exercise of speech that constitutes a fair use. The fair-use burden of proof is repugnant to the fair use purpose. Today, copyright holders are exploiting the burden …


Wikipedia's Labor Squeeze And Its Consequences, Eric Goldman Jan 2010

Wikipedia's Labor Squeeze And Its Consequences, Eric Goldman

Faculty Publications

This Essay explains why Wikipedia will not be able to maintain a credible website while simultaneously letting anyone freely edit it. To date, Wikipedia editors have successfully defended against malicious attacks from spammers and vandals, but as editors turn over, Wikipedia will need to recruit replacements. However, Wikipedia will have difficulty with this recruiting task due to its limited incentives for participation. Faced with a potential labor squeeze, Wikipedia will choose to restrict users’ ability to contribute to the site as a way of preserving site credibility. Wikipedia’s specific configuration choices make it an interesting test case to evaluate the …


That Guy's A Batterer!: A Scarlet Letter Approach To Domestic Violence In The Information Age, Elaine M. Chiu Jan 2010

That Guy's A Batterer!: A Scarlet Letter Approach To Domestic Violence In The Information Age, Elaine M. Chiu

Faculty Publications

(Excerpt)

We have all seen the ads and heard the jingles. Some of us may have even visited the websites. "Come meet your soul mate, come meet your future spouse, come find true love, at Match.com, at eHarmony.com, at Yahoo." Internet dating is a booming business. In 2005, an estimated sixteen million Americans spent more than $245 million looking for love on the Internet. Approximately ten-million Americans are current online daters. In addition to these digital matchmakers, social networking sites like Facebook and MySpace and You Tube offer amazing online communities where folks can advertise their best features. Then, there …


Anonymity In Cyberspace: What Can We Learn From John Doe?, Lyrissa Lidsky Jan 2009

Anonymity In Cyberspace: What Can We Learn From John Doe?, Lyrissa Lidsky

Faculty Publications

This Article examines the evolution of the law governing libel suits against anonymous “John Doe” defendants based on Internet speech. Between 1999 and 2009, courts crafted new First Amendment doctrines to protect Internet speakers from having their anonymity automatically stripped away upon the filing of a libel action. Courts also adapted existing First Amendment protections for hyperbole, satire and other non-factual speech to protect the distinctive discourse of Internet message boards. Despite these positive developments, the current state of the law is unsatisfactory. Because the scope of protection for anonymous Internet speech varies greatly by jurisdiction, resourceful plaintiffs can make …


Fifteen Minutes Of Infamy: Privileged Reporting And The Problem Of Perpetual Reputational Harm, Richard J. Peltz-Steele Jan 2008

Fifteen Minutes Of Infamy: Privileged Reporting And The Problem Of Perpetual Reputational Harm, Richard J. Peltz-Steele

Faculty Publications

This Article provides an overview of the labyrinth of media tort defenses, specifically the four privileges – fair comment, fair report, neutral reportage, and wire service – that come into play when the media republish defamatory content about criminal suspects and defendants without specific intent to injure. The Article then discusses these privileges in light of a hypothetical case involving a highly publicized crime and an indicted suspect, against whom charges are later dropped, but who suffers perpetual reputational harm from the out-of-context republication online of news related to his indictment. The Article demonstrates how the four privileges would operate …


Social Isolation And American Workers: Employee "Blogging" And Legal Reform, Rafael Gely, Leonard Bierman Apr 2007

Social Isolation And American Workers: Employee "Blogging" And Legal Reform, Rafael Gely, Leonard Bierman

Faculty Publications

This article further demonstrates that state common law exceptions to the employment-at-will doctrine are not providing significant redress to employees fired or otherwise disciplined for blogging.


A Copyright Conundrum: Protecting Email Privacy, Ned Snow Apr 2007

A Copyright Conundrum: Protecting Email Privacy, Ned Snow

Faculty Publications

The practice of email forwarding deprives email senders of privacy. Expression meant for only a specific recipient often finds its way into myriad inboxes or onto a public website, exposed for all to see. Simply by clicking the "forward" button, email recipients routinely strip email senders of expressive privacy. The common law condemns such conduct. Beginning over two-hundred-fifty years ago, courts recognized that authors of personal correspondence hold property rights in their expression. Under common-law copyright, authors held a right to control whether their correspondence was published to third parties. This common-law protection of private expression was nearly absolute, immune …


In Sickness, Health And Cyberspace: Protecting The Security Of Electronic Private Health Information, Sharona Hoffman, Andy Podgurski Jan 2007

In Sickness, Health And Cyberspace: Protecting The Security Of Electronic Private Health Information, Sharona Hoffman, Andy Podgurski

Faculty Publications

The electronic processing of health information provides considerable benefits to patients and health care providers at the same time that it creates serious risks to the confidentiality, integrity, and availability of the data. The Internet provides a conduit for rapid and uncontrolled dispersion and trafficking of illicitly-obtained private health information, with far-reaching consequences to the unsuspecting victims. In order to address such threats to electronic private health information, the U.S. Department of Health and Human Services enacted the HIPAA Security Rule, which thus far has received little attention in the legal literature. This article presents a critique of the Security …


Workplace Blogs And Workers' Privacy, Rafael Gely, Leonard Bierman Jul 2006

Workplace Blogs And Workers' Privacy, Rafael Gely, Leonard Bierman

Faculty Publications

In this article we focus on a related issue. We discuss the development of blogs, and the virtual “space” where blogs and bloggers interact the “blogosphere” and their impact on the issue of workers' privacy. To some extent it would seem a bit of a contradiction to talk about privacy and blogging in the same article. Blogging, as we will discuss below, does not appear to be the most private of enterprises. There are, we argue, a number of interesting privacy issues raised by the development of blogs as an employee communication tool and by the way employers have reacted …


Accessing The Internet Through The Neighbor's Wireless Internet Connection: Physical Trespass In Virtual Reality, Ned Snow Jan 2006

Accessing The Internet Through The Neighbor's Wireless Internet Connection: Physical Trespass In Virtual Reality, Ned Snow

Faculty Publications

As wireless computer networks are becoming commonplace, so also is the practice of accessing the Internet through another's wireless network. The practice raises a simple question of law: Does accessing a wireless network, without express authorization, violate the property rights of the network operator? This Article argues that it does. A neighbor who intentionally accesses the Internet through a network operator's connection appears to trespass on physical property of the operator - the operator's router. Recent Internet jurisprudence suggests that the electronic signals that the neighbor sends through the router are sufficient to find trespassory physical contact. The same jurisprudence …


Jurisdiction And The Internet: Returning To Traditional Principles To Analyze Network-Mediated Contacts, A. Benjamin Spencer Jan 2006

Jurisdiction And The Internet: Returning To Traditional Principles To Analyze Network-Mediated Contacts, A. Benjamin Spencer

Faculty Publications

Courts have been evaluating the issue of personal jurisdiction based on Internet or "network-mediated" contacts for some time. The U.S. Supreme Court has remained silent on this issue, permitting the federal appeals courts to develop standards for determining when personal jurisdiction based on network-mediated contacts is appropriate. Unfortunately, the circuit approaches-which emphasize a Web site's "interactivity" and "target audience" -are flawed because they are premised on an outdated view of Internet activity as uncontrollably ubiquitous. This view has led courts to depart from traditional jurisdictional analysis and impose elevated and misguided jurisdictional standards. This article argues that courts should reinstitute …


Relative Access To Corrective Speech: A New Test For Requiring Actual Malice, Aaron K. Perzanowski Jan 2006

Relative Access To Corrective Speech: A New Test For Requiring Actual Malice, Aaron K. Perzanowski

Faculty Publications

This Article reexamines the First Amendment protections provided by the public figure doctrine. It suggests that the doctrine is rooted in a set of out-dated assumptions regarding the media landscape and, as a result, has failed to adapt in a manner that accounts for our changing communications environment.

The public figure doctrine, which imposes the more rigorous actual malice standard of fault on defamation plaintiffs who enjoy greater access to mass media, was constructed in an era defined by one-to-many communications media. Newspapers, broadcasters, and traditional publishers exhausted the Court's understanding of the means of communicating with mass audiences. As …


The Constitutional Failing Of The Anticybersquatting Act, Ned Snow Jan 2005

The Constitutional Failing Of The Anticybersquatting Act, Ned Snow

Faculty Publications

Eminent domain and thought control are occurring in cyberspace. Through the Anticybersquatting Consumer Protection Act (ACPA), the government transfers domain names from domain-name owners to private parties based on the owners' bad-faith intent. The owners receive no just compensation. The private parties who are recipients of the domain names are trademark holders whose trademarks correspond with the domain names. Often the trademark holders have no property rights in those domain names: trademark law only allows mark holders to exclude others from making commercial use of their marks; it does not allow mark holders to reserve the marks for their own …


A Symposium Précis, Thomas E. Baker Jan 2001

A Symposium Précis, Thomas E. Baker

Faculty Publications

This article is an introduction to and overview of the Drake University Law School symposium The Constitution and the Internet, held in February of 2001. It highlights important issues including the Constitution and the Internet, civil liberty and the application of a 200 year old document to the modern age of rapidly changing technology.


A Roundtable Discussion With Lawrence Lessig, David G. Post & Jeffrey Rosen, Thomas E. Baker Jan 2001

A Roundtable Discussion With Lawrence Lessig, David G. Post & Jeffrey Rosen, Thomas E. Baker

Faculty Publications

This article is a transcript of a discussion between Lawrence Lessig, David G. Post and Jeffrey Rosen on a variety of issues surrounding law, technology and the Internet. The moderator was Thomas E. Baker and the discussion was part of a Drake University Law School symposium in February of 2001.


Electronic Billboards Along The Information Superhighway: Liability Under The Lanham Act For Using Trademarks To Key Internet Banner Ads, Christine Galbraith Davik Jul 2000

Electronic Billboards Along The Information Superhighway: Liability Under The Lanham Act For Using Trademarks To Key Internet Banner Ads, Christine Galbraith Davik

Faculty Publications

With almost one billion web pages on the Internet today, a search engine is a necessity at times. But search engines are also for-profit ventures and the financial success of these sites hinges on advertising revenue. One of the ways in which these sites generate income is by selling “keywords” to advertisers. Although there has been only one judicial decision – Playboy Enterprises, Inc. v. Netscape Communications – involving banner ads keyed to trademarks, it will undoubtedly not be the last. This article argues that despite the invisible nature of this unauthorized trademark use, the common practice of keying a …


Media Law & Ethics Enter The 21st Century, Introduction To Symposium, Richard J. Peltz-Steele Jan 2000

Media Law & Ethics Enter The 21st Century, Introduction To Symposium, Richard J. Peltz-Steele

Faculty Publications

We stand now on the verge of the twenty-first century: an artificial construct yes, but a culturally significant time nonetheless. We are the world the Hutchins Commission foresaw: the world of nations seeking understanding, seeking destiny. We will not predict the future with perfect accuracy, though we will try, because that is out nature. In our effort, we must be mindful that the questions we are asking are not new; they have been asked before and will be asked again. But let us see what we have to say about them today.


Symposium Presentation: Doing Internet Co-Branding Agreements, Eric Goldman Jan 2000

Symposium Presentation: Doing Internet Co-Branding Agreements, Eric Goldman

Faculty Publications

Co-brand agreements are what I do. I am the self-titled "King of CoBrands," as this is what I've been doing with my life.

So, let's talk a little about co-branding agreements and about why they might matter. First let's define our terms.

Now, where there used to be one site, the provider site, there will be two sites, the provider site and co-branded site, which contains the branding of the portal, but contains all the same functionality, or similar functionality, as is in the provider's site.

Then the portal will drive traffic to this co-branding site, for purposes that we'll …


Silencing John Doe: Defamation And Discourse In Cyberspace, Lyrissa Lidsky Jan 2000

Silencing John Doe: Defamation And Discourse In Cyberspace, Lyrissa Lidsky

Faculty Publications

John Doe has become a popular defamation defendant as corporations and their officers bring defamation suits for statements made about them in Internet discussion fora. These new suits are not even arguably about recovering money damages but instead are brought for symbolic reasons — some worthy, some not so worthy. If the only consequence of these suits were that Internet users were held accountable for their speech, the suits would be an unalloyed good. However, these suits threaten to suppress legitimate criticism along with intentional and reckless falsehoods, and existing First Amendment law doctrines are not responsive to the threat …