Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

CDA

Discipline
Institution
Publication Year
Publication
Publication Type

Articles 1 - 30 of 42

Full-Text Articles in Law

Ideology Of Disaster Education Trauma Handling Post-Earthquake In Picture Stories Book: Critical Discourse Analysis, Silvia Damayanti, I Nyoman Suarka, Maria Matildis Banda, Ketut Widya Purnawati Jan 2024

Ideology Of Disaster Education Trauma Handling Post-Earthquake In Picture Stories Book: Critical Discourse Analysis, Silvia Damayanti, I Nyoman Suarka, Maria Matildis Banda, Ketut Widya Purnawati

International Review of Humanities Studies

This research analyzes the ideology that the author intends to instill in picture storybooks for children in Japan. The study aims to explore how the author conveys the ideology of handling trauma in children after earthquake disasters. The objects of the study are two picture storybooks titled "Yuzuchan" and "Yappari Ouchi Ga Ii Na." The research was conducted qualitatively using the documentary data search method. The analysis was carried out with van Dijk's CDA theory and Peirce's Semiotics Theory. The results of the analysis reveal that "Yuzuchan" and "Yappari Ouchi Ga Ii Na" are picture storybooks produced to help children …


Cracking The Shield: Cda Section 230, Algorithms, And Product Liability, Kevin Ofchus Sep 2023

Cracking The Shield: Cda Section 230, Algorithms, And Product Liability, Kevin Ofchus

University of Arkansas at Little Rock Law Review

No abstract provided.


Analysis Of Section 230 Under A Theory Of Premises Liability: A Focus On Herrick V.Grindr And Daniel V. Armslist, Kassandra C. Cabrera Dec 2021

Analysis Of Section 230 Under A Theory Of Premises Liability: A Focus On Herrick V.Grindr And Daniel V. Armslist, Kassandra C. Cabrera

University of Miami Business Law Review

Section 230 of the Communications Decency Act (“CDA”) has been held to give online service providers acting as interactive computer services sweeping immunity for content posted on their platforms. The intention behind the creation of Section 230 was not to immunize online service providers from all liability. Rather, Section 230 was enacted to protect online intermediaries acting as “Good Samaritans” – those who made “good faith” efforts to restrict unlawful or harmful content, but due to the breadth of the internet and advancements in technology over or under-filtered content on their platforms. This note outlines an approach for courts to …


Deplatformed: Social Network Censorship, The First Amendment, And The Argument To Amend Section 230 Of The Communications Decency Act, John A. Lonigro Jan 2021

Deplatformed: Social Network Censorship, The First Amendment, And The Argument To Amend Section 230 Of The Communications Decency Act, John A. Lonigro

Touro Law Review

No abstract provided.


Section 230 Of The Communications Decency Act: Why California Courts Interpreted It Correctly And What That Says About How We Should Change It, E. Alex Murcia Nov 2020

Section 230 Of The Communications Decency Act: Why California Courts Interpreted It Correctly And What That Says About How We Should Change It, E. Alex Murcia

Loyola of Los Angeles Law Review

In 1996, Congress passed the Communications Decency Act (CDA). In 1997, the United States Supreme Court struck down most of the CDA. However, section 230, which protects providers and users of interactive computer services from liability for defamatory content posted to their platforms by third parties, remains in effect. In the California and federal judicial systems, courts interpret section 230’s immunity provisions broadly—so that the statute conveys broad immunity. This Note argues that the broad application of section 230’s protections is consistent with the intent of the statute’s drafters. However, it also contends that (1) this interpretation of section 230 …


Deep Fakes: A Looming Challenge For Privacy, Democracy, And National Security, Danielle K. Citron, Robert Chesney Dec 2019

Deep Fakes: A Looming Challenge For Privacy, Democracy, And National Security, Danielle K. Citron, Robert Chesney

Faculty Scholarship

Harmful lies are nothing new. But the ability to distort reality has taken an exponential leap forward with “deep fake” technology. This capability makes it possible to create audio and video of real people saying and doing things they never said or did. Machine learning techniques are escalating the technology’s sophistication, making deep fakes ever more realistic and increasingly resistant to detection. Deep-fake technology has characteristics that enable rapid and widespread diffusion, putting it into the hands of both sophisticated and unsophisticated actors. While deep-fake technology will bring with it certain benefits, it also will introduce many harms. The marketplace …


Reaching Through The “Ghost Doxer:” An Argument For Imposing Secondary Liability On Online Intermediaries, Natalia Homchick Nov 2019

Reaching Through The “Ghost Doxer:” An Argument For Imposing Secondary Liability On Online Intermediaries, Natalia Homchick

Washington and Lee Law Review

Imagine you have decided to run for office, to speak out publicly against an injustice, to enter the job market, or even to join a new online forum. Now, imagine after starting your chosen endeavor, you go online to discover that someone who disagrees with your position posted your personal information on the internet and called for others to harass you. To make matters worse, you realize that you cannot determine who posted your personal data. You have been doxed. Because you cannot identify the person who posted your information, where can you turn for recourse? The next logical party …


Web Of Lives: How Regulating The Dark Web Can Combat Online Human Trafficking, Christopher Campbell Jun 2019

Web Of Lives: How Regulating The Dark Web Can Combat Online Human Trafficking, Christopher Campbell

Journal of the National Association of Administrative Law Judiciary

This article argues that one of the ways to appropriately fight online human trafficking is through governmental regulation of the Dark Web. Specifically, this article argues that a new Attaching Criminal Dark Web Statute is the best method to combat human trafficking because it can incentivize prosecutors to use current human trafficking statutes to prosecute traffickers. This proposal can deter traffickers from enslaving people. Additionally, this article shows the evolution of online human trafficking laws, investigation, and prosecution (Section II); demonstrates why current and proposed laws do not effectively address the online human trafficking issue (Sections III and IV); introduces …


From Innovation To Abuse: Does The Internet Still Need Section 230 Immunity?, Benjamin Volpe Jan 2019

From Innovation To Abuse: Does The Internet Still Need Section 230 Immunity?, Benjamin Volpe

Catholic University Law Review

In 1996, Congress passed the Communications Decency Act to allow the screening of offensive material from the internet, while preserving the continued development of the internet economy without burdensome regulation. However, for years, online intermediaries have successfully used the Act as a shield from liability when third parties use their online services to commit tortious or criminal acts. This Comment argues that a wholly-unregulated internet is no longer necessary to preserve the once-fledgling internet economy. After evaluating various approaches to intermediary liability, this Comment also argues that Congress should take a more comprehensive look at consumer protection online and establish …


Developing A Model For Effective Community Development Agreements In The Extractive Industries, John Nikolaou Jan 2019

Developing A Model For Effective Community Development Agreements In The Extractive Industries, John Nikolaou

CMC Senior Theses

Natural resource development has tremendous potential to create inclusive economic growth in countries well-endowed with oil, mineral, and agricultural resources. At the same time, natural resource development can cause negative environmental externalities, and, in several cases, extractives companies can engage in labor abuse.

The intersection of the government’s and the corporation’s interest can lie in Corporate Social Responsibility Projects.This thesis will analyze an alternative model of CSR: community development agreements (CDAs). CDAs are voluntary, or sometimes government mandated, agreements between the project developer and the project affected community that define company commitments to issues such as environmental impact mitigation, benefit …


Trafficking Technology: A Look At Different Approaches To Ending Technology-Facilitated Human Trafficking, David Barney Sep 2018

Trafficking Technology: A Look At Different Approaches To Ending Technology-Facilitated Human Trafficking, David Barney

Pepperdine Law Review

In 2018, many believe that slavery is an antiquated concept. But as with anything else, if it has not become extinct, it has evolved with time. Human trafficking is no different. Each year, millions of men, women and children are trafficked in the United States, and internationally, and forced to work against their will. Through the rise of technology and an increasingly globalized world, traffickers have learned to use technology as a tool to help facilitate the trafficking of persons and to sell those victims to others they never could have reached before. But what are we doing about it? …


Combating Fake News In Social Media: U.S. And German Legal Approaches, Ryan Kraski Jun 2018

Combating Fake News In Social Media: U.S. And German Legal Approaches, Ryan Kraski

St. John's Law Review

(Excerpt)

When asking how fake news in social media can be combated under U.S. and German law, one must first take the systems’ most fundamental differences into consideration. U.S. law is characterized by its federal structure, the interaction of state laws often with the federal, U.S. Constitution, usage of pretrial discovery, as well as the role of juries in calculating damages. In contrast, Germany, as a civil law system, is characterized by its usage of separate legal actions to acquire information, lack of pretrial discovery, and broader array of available remedies, none of which allow for punitive damages. Through a …


Cyberspace…The Final Frontier: How The Communications Decency Act Allows Entrepreneurs To Boldly Go Where No Blog Has Gone Before, Aaron Jackson Sep 2017

Cyberspace…The Final Frontier: How The Communications Decency Act Allows Entrepreneurs To Boldly Go Where No Blog Has Gone Before, Aaron Jackson

Oklahoma Journal of Law and Technology

No abstract provided.


Emerging Practices In Community Development Agreements, Jennifer Loutit, Jacqueline Mandelbaum, Sam Szoke-Burke Mar 2016

Emerging Practices In Community Development Agreements, Jennifer Loutit, Jacqueline Mandelbaum, Sam Szoke-Burke

Columbia Center on Sustainable Investment Staff Publications

Community Development Agreements (CDAs) have the potential to facilitate the delivery of tangible benefits from large-scale investment projects, such as mines or forestry concessions, to affected persons and communities. To be effective, however, CDAs must be adapted to the local context, meaning that no single model agreement or process will be appropriate in every situation. Nonetheless, leading practices are emerging which can be required by governments, voluntarily adopted by companies, and demanded by communities. These practices are grounded in ensuring that all parties are sufficiently informed, capacitated, and prepared to engage in meaningful negotiations regarding how the investor’s operations should …


Emerging Practices In Community Development Agreements, Jennifer Loutit, Jacqueline Mandelbaum, Sam Szoke-Burke Feb 2016

Emerging Practices In Community Development Agreements, Jennifer Loutit, Jacqueline Mandelbaum, Sam Szoke-Burke

Columbia Center on Sustainable Investment Staff Publications

A Community Development Agreement or CDA can be a vital mechanism for ensuring that local communities benefit from large-scale investment projects, such as mines or forestry concessions. In formalizing agreements between an investor and a project-affected community, CDAs set out how the benefits of an investment project will be shared with local communities. In some countries CDAs are required by domestic legislation; in others, they are entered into voluntarily. The most effective CDAs are also adapted to the local context, meaning that no single model agreement or process will be appropriate in every situation. Nonetheless, leading practices are emerging which …


Section 230 Of The Communications Decency Act: The True Culprit Of Internet Defamation, Heather Saint Oct 2015

Section 230 Of The Communications Decency Act: The True Culprit Of Internet Defamation, Heather Saint

Loyola of Los Angeles Entertainment Law Review

This Note highlights the growing concern of Internet defamation and the lack of viable legal remedies available to its victims. Internet defamation is internet speech with the purpose to disparage another’s reputation. At common law, a victim of alleged defamation has the right to file suit against not only the original speaker of the defamatory statements, but the person or entity to give that statement further publication as well. In certain cases even the distributor, such as a newspaper stand, can be held liable for a defamation claim. However, liability due to defamatory speech on the Internet is quite different. …


Extraterritorial Application Of The United States' Trade Embargo Against Cuba: The United Nations General Assembly's Call For An End To The U.S. Trade Embargo, Jerry W. Cain Jr. Oct 2014

Extraterritorial Application Of The United States' Trade Embargo Against Cuba: The United Nations General Assembly's Call For An End To The U.S. Trade Embargo, Jerry W. Cain Jr.

Georgia Journal of International & Comparative Law

No abstract provided.


Fighting A Losing Battle To Win The War: Can States Combat Domestic Minor Sex Trafficking Despite Cda Preemption?, Stephanie Silvano Oct 2014

Fighting A Losing Battle To Win The War: Can States Combat Domestic Minor Sex Trafficking Despite Cda Preemption?, Stephanie Silvano

Fordham Law Review

The explosion of the internet and online communication has led to an alarming increase in an existing epidemic: domestic minor sex trafficking. Sex traffickers utilize websites, such as Backpage.com, to post trafficking advertisements depicting minors, which are minimally regulated as a result of the civil immunity provision of the Communications Decency Act (47 U.S.C. § 230). This immunity provision has been interpreted broadly by the courts, granting expansive immunity to websites as both publishers and distributors of content.
In an effort to combat minor sex trafficking at a local level, some state legislatures enacted statutes criminalizing the knowing publication of …


It’S Time For Revenge Porn To Get A Taste Of Its Own Medicine: An Argument For The Federal Criminalization Of Revenge Porn, Taylor Linkous Jan 2014

It’S Time For Revenge Porn To Get A Taste Of Its Own Medicine: An Argument For The Federal Criminalization Of Revenge Porn, Taylor Linkous

Richmond Journal of Law & Technology

Throughout history, pornography and technology have enjoyed a symbiotic relationship, each playing a significant role in the growth and widespread success of the other. From the VCR and camcorders to the Polaroid camera and the Internet, the pornography industry has always accelerated the growth of new technologies, paving the way for these new services to be introduced into mainstream society. Most of these new technologies were appealing to creators and consumers of pornography because the new technologies brought an increased sense of privacy. For example, much of the success of the Polaroid camera is said to come from the fact …


Secondary Liability, Isp Immunity, And Incumbent Entrenchment, Marketa Trimble, Salil K. Mehra Jan 2014

Secondary Liability, Isp Immunity, And Incumbent Entrenchment, Marketa Trimble, Salil K. Mehra

Scholarly Works

More than fifteen years have passed since the two major U.S. statutes concerning the secondary liability of Internet service providers were adopted--the Communications Decency Act and the Digital Millennium Copyright Act. The statutes have been criticized; however, very little of the criticism has come from Internet service providers, who have enjoyed the benefits of generous safe harbors and immunity from suit guaranteed by these statutes. This Article raises the question of whether these statutes contribute to incumbent entrenchment--solidifying the position of the existing Internet service providers to the detriment of potential new entrants. The current laws and industry self-regulation may …


Craigslist, The Cda, And Inconsistent International Standards Regarding Liability For Third-Party Postings On The Internet, Peter Adamo Feb 2011

Craigslist, The Cda, And Inconsistent International Standards Regarding Liability For Third-Party Postings On The Internet, Peter Adamo

Pace International Law Review Online Companion

This Comment explores the nature and purpose of the Communications Decency Act (CDA), the legislative upbringing, and the application of the CDA to Craigslist. It compares the CDA to approaches taken abroad through legislation and judicial proceedings. It explains, contrary to the one other commentator to broach the subject matter, how the CDA continues to provide robust protection to Craigslist. Finally, it explores potential avenues for redrafting the CDA as well as the difficulties and trade-offs associated with implementing such change.


Twitter Or Tweeter: Who Should Be Liable For A Right Of Publicity Violation Under The Cda?, Kristina M. Sesek Jan 2011

Twitter Or Tweeter: Who Should Be Liable For A Right Of Publicity Violation Under The Cda?, Kristina M. Sesek

Marquette Intellectual Property Law Review

The Communications Decency Act (CDA), passed in 1996, immunized Internet service providers (ISPs) from being treated as the publisher or speaker of any information posted on their website by another person and from possible subsequent liability. The CDA also carved out an exemption for violations of intellectual property‹meaning an ISP could still be liable for information posted on their website by another person that violates an intellectual property right. However, the CDA did not spell out whether it intended to include only federal intellectual property rights or both federal and state intellectual property rights.

This Comment proposes two possible reasons …


Busting Blocks: Revisiting 47 U.S.C. § 230 To Address The Lack Of Effective Legal Recourse For Wrongful Inclusion In Spam Filters, Jonathan I. Ezor Jan 2011

Busting Blocks: Revisiting 47 U.S.C. § 230 To Address The Lack Of Effective Legal Recourse For Wrongful Inclusion In Spam Filters, Jonathan I. Ezor

Richmond Journal of Law & Technology

Consider a company that uses e-mail to conduct a majority of its business, including customer and vendor communication, marketing, and filing official documents. After conducting business in this manner for several years, one day the company discovers that its most recent e-mails were not delivered to recipients using a major Internet Service Provider (“ISP”) because the company was recently listed on an automated block list as a sender of unwanted bulk commercial e-mail (“spam”).


Community Development Authorities, Andrew A. Painter Nov 2010

Community Development Authorities, Andrew A. Painter

University of Richmond Law Review

Today, CDAs of varying sizes and purposes have been authorized by at least fourteen Virginia localities, and approximately twenty have issued bonds." Despite progress, CDAs occupy anarea of Virginia law largely in its infancy. Case law directly related to their use remains limited, and many localities remain uncertain about their use since the unique marriage of private development and public power inherent in the CDA process has, at times, fostered controversy and apprehension. While this article does not directly address the public policy implications of using CDAs to finance infrastructure, the author hopes this review will generate further ideas for …


An Interpretive Framework For Narrower Immunity Under Section 230 Of The Communications Decency Act, Gregory M. Dickinson Jan 2010

An Interpretive Framework For Narrower Immunity Under Section 230 Of The Communications Decency Act, Gregory M. Dickinson

Gregory M Dickinson

Almost all courts to interpret Section 230 of the Communications Decency Act have construed its ambiguously worded immunity provision broadly, shielding Internet intermediaries from tort liability so long as they are not the literal authors of offensive content. Although this broad interpretation effects the basic goals of the statute, it ignores several serious textual difficulties and mistakenly extends protection too far by immunizing even direct participants in tortious conduct.

This analysis, which examines the text and history of Section 230 in light of two strains of pre-Internet vicarious liability defamation doctrine, concludes that the immunity provision of Section 230, though …


The Never-Ending Limits Of § 230: Extending Isp Immunity To The Sexual Exploitation Of Children, Katy Noeth Jun 2009

The Never-Ending Limits Of § 230: Extending Isp Immunity To The Sexual Exploitation Of Children, Katy Noeth

Federal Communications Law Journal

In 2006, the U.S. District Court for the Eastern District of Texas extended civil liability to Yahoo! under § 230 of the Communications Decency Act so that it could not be sued for knowingly profiting from a Web site where members exchanged sexually explicit pictures of minors. The court found that the reasoning of the seminal § 230 case, Zeran v. AOL, was analogous and that policy considerations mandated its holding.

This Note argues that a multifaceted approach is needed to prevent future courts from following that decision, including an amendment to § 230 that would impose civil liability upon …


Asking For It: A Grokster-Based Approach To Internet Sites That Distribute Offensive Content, Zac Locke Jan 2008

Asking For It: A Grokster-Based Approach To Internet Sites That Distribute Offensive Content, Zac Locke

Zac Locke

Anyone connected to the Internet can post their words, images and any other expression to millions of sites online. However, these sites are also available to tortfeasors and criminals such as defamers, sexual predators, and child pornographers. These individuals rely on interactive computer services (“ICSs”), such as Internet service providers, search engines, social networking sites, video sharing sites, and chat rooms, to disseminate their illegal and offensive messages. The fact that torts and crimes such as defamation, predation and child pornography happen in cyberspace instead of on a street corner does not shield speakers from liability for their actions. However, …


Rethinking The Communications Decency Act: Eliminating Statutory Protections Of Discriminatory Housing Advertisements On The Internet, James D. Shanahan Dec 2007

Rethinking The Communications Decency Act: Eliminating Statutory Protections Of Discriminatory Housing Advertisements On The Internet, James D. Shanahan

Federal Communications Law Journal

The recent decision in Craigslist signals a drastic reduction in the effectiveness of the prohibition on discriminatory housing advertisements under the Fair Housing Act ("FHA"). Section 230 of the Communications Decency Act gives blanket immunity to Internet Content Providers from publisher liability for content originating from third parties. One of the effects of this immunity is the creation of a monopoly for discriminatory advertisements otherwise proscribed by the FHA. This Note argues that the simplest solution for Congress is to adjust the language of § 230 by adding the FHA to the list of exceptions to statutory immunity.


Bigger Phish To Fry: Californias Anti- Phishing Statute And Its Potential Imposition Of Secondary Liability On Internet Service Providers, Camille Calman Jan 2006

Bigger Phish To Fry: Californias Anti- Phishing Statute And Its Potential Imposition Of Secondary Liability On Internet Service Providers, Camille Calman

Richmond Journal of Law & Technology

The incidence of phishing, a form of internet fraud, has increased dramatically since 2003. Identity thieves searching for vulnerabilities in internet security have realized that customers are the weak link. Using mass e-mailings and websites purporting to be those of well-known and trusted corporations, “phishers” trick customers into revealing personal and financial information.


Internet Libel And The Communications Decency Act: How The Courts Erroneously Interpreted Congressional Intent With Regard To Liability Of Internet Service Providers, Emily K. Fritts Jan 2005

Internet Libel And The Communications Decency Act: How The Courts Erroneously Interpreted Congressional Intent With Regard To Liability Of Internet Service Providers, Emily K. Fritts

Kentucky Law Journal

No abstract provided.