Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Internet Law (29)
- Communications Law (10)
- Computer Law (7)
- First Amendment (7)
- Intellectual Property Law (6)
-
- Legislation (6)
- International Law (5)
- Torts (4)
- Constitutional Law (3)
- International Trade Law (3)
- Oil, Gas, and Mineral Law (3)
- Privacy Law (3)
- Administrative Law (2)
- Antitrust and Trade Regulation (2)
- Criminal Law (2)
- Environmental Law (2)
- Human Rights Law (2)
- Land Use Law (2)
- Litigation (2)
- Natural Resources Law (2)
- Securities Law (2)
- Sexuality and the Law (2)
- Social and Behavioral Sciences (2)
- Transnational Law (2)
- Anthropology (1)
- Art and Design (1)
- Arts and Humanities (1)
- Business Organizations Law (1)
- Civic and Community Engagement (1)
- Institution
-
- University of Richmond (13)
- Maurer School of Law: Indiana University (3)
- Columbia Law School (2)
- Loyola Marymount University and Loyola Law School (2)
- Pepperdine University (2)
-
- SelectedWorks (2)
- Touro University Jacob D. Fuchsberg Law Center (2)
- Boston University School of Law (1)
- Claremont Colleges (1)
- Florida State University College of Law (1)
- Fordham Law School (1)
- Marquette University Law School (1)
- Pace University (1)
- St. John's University School of Law (1)
- The Catholic University of America, Columbus School of Law (1)
- Universitas Indonesia (1)
- University of Arkansas at Little Rock William H. Bowen School of Law (1)
- University of Georgia School of Law (1)
- University of Kentucky (1)
- University of Miami Law School (1)
- University of Nevada, Las Vegas -- William S. Boyd School of Law (1)
- University of Oklahoma College of Law (1)
- Washington and Lee University School of Law (1)
- Publication Year
- Publication
-
- Richmond Journal of Law & Technology (11)
- Federal Communications Law Journal (3)
- Columbia Center on Sustainable Investment Staff Publications (2)
- Touro Law Review (2)
- University of Richmond Law Review (2)
-
- CMC Senior Theses (1)
- Catholic University Law Review (1)
- Faculty Scholarship (1)
- Florida State University Journal of Transnational Law & Policy (1)
- Fordham Law Review (1)
- Georgia Journal of International & Comparative Law (1)
- Gregory M Dickinson (1)
- International Review of Humanities Studies (1)
- Journal of the National Association of Administrative Law Judiciary (1)
- Kentucky Law Journal (1)
- Loyola of Los Angeles Entertainment Law Review (1)
- Loyola of Los Angeles Law Review (1)
- Marquette Intellectual Property Law Review (1)
- Oklahoma Journal of Law and Technology (1)
- Pace International Law Review Online Companion (1)
- Pepperdine Law Review (1)
- Scholarly Works (1)
- St. John's Law Review (1)
- University of Arkansas at Little Rock Law Review (1)
- University of Miami Business Law Review (1)
- Washington and Lee Law Review (1)
- Zac Locke (1)
- Publication Type
Articles 1 - 30 of 42
Full-Text Articles in Law
Ideology Of Disaster Education Trauma Handling Post-Earthquake In Picture Stories Book: Critical Discourse Analysis, Silvia Damayanti, I Nyoman Suarka, Maria Matildis Banda, Ketut Widya Purnawati
Ideology Of Disaster Education Trauma Handling Post-Earthquake In Picture Stories Book: Critical Discourse Analysis, Silvia Damayanti, I Nyoman Suarka, Maria Matildis Banda, Ketut Widya Purnawati
International Review of Humanities Studies
This research analyzes the ideology that the author intends to instill in picture storybooks for children in Japan. The study aims to explore how the author conveys the ideology of handling trauma in children after earthquake disasters. The objects of the study are two picture storybooks titled "Yuzuchan" and "Yappari Ouchi Ga Ii Na." The research was conducted qualitatively using the documentary data search method. The analysis was carried out with van Dijk's CDA theory and Peirce's Semiotics Theory. The results of the analysis reveal that "Yuzuchan" and "Yappari Ouchi Ga Ii Na" are picture storybooks produced to help children …
Cracking The Shield: Cda Section 230, Algorithms, And Product Liability, Kevin Ofchus
Cracking The Shield: Cda Section 230, Algorithms, And Product Liability, Kevin Ofchus
University of Arkansas at Little Rock Law Review
No abstract provided.
Analysis Of Section 230 Under A Theory Of Premises Liability: A Focus On Herrick V.Grindr And Daniel V. Armslist, Kassandra C. Cabrera
Analysis Of Section 230 Under A Theory Of Premises Liability: A Focus On Herrick V.Grindr And Daniel V. Armslist, Kassandra C. Cabrera
University of Miami Business Law Review
Section 230 of the Communications Decency Act (“CDA”) has been held to give online service providers acting as interactive computer services sweeping immunity for content posted on their platforms. The intention behind the creation of Section 230 was not to immunize online service providers from all liability. Rather, Section 230 was enacted to protect online intermediaries acting as “Good Samaritans” – those who made “good faith” efforts to restrict unlawful or harmful content, but due to the breadth of the internet and advancements in technology over or under-filtered content on their platforms. This note outlines an approach for courts to …
Deplatformed: Social Network Censorship, The First Amendment, And The Argument To Amend Section 230 Of The Communications Decency Act, John A. Lonigro
Deplatformed: Social Network Censorship, The First Amendment, And The Argument To Amend Section 230 Of The Communications Decency Act, John A. Lonigro
Touro Law Review
No abstract provided.
Section 230 Of The Communications Decency Act: Why California Courts Interpreted It Correctly And What That Says About How We Should Change It, E. Alex Murcia
Section 230 Of The Communications Decency Act: Why California Courts Interpreted It Correctly And What That Says About How We Should Change It, E. Alex Murcia
Loyola of Los Angeles Law Review
In 1996, Congress passed the Communications Decency Act (CDA). In 1997, the United States Supreme Court struck down most of the CDA. However, section 230, which protects providers and users of interactive computer services from liability for defamatory content posted to their platforms by third parties, remains in effect. In the California and federal judicial systems, courts interpret section 230’s immunity provisions broadly—so that the statute conveys broad immunity. This Note argues that the broad application of section 230’s protections is consistent with the intent of the statute’s drafters. However, it also contends that (1) this interpretation of section 230 …
Deep Fakes: A Looming Challenge For Privacy, Democracy, And National Security, Danielle K. Citron, Robert Chesney
Deep Fakes: A Looming Challenge For Privacy, Democracy, And National Security, Danielle K. Citron, Robert Chesney
Faculty Scholarship
Harmful lies are nothing new. But the ability to distort reality has taken an exponential leap forward with “deep fake” technology. This capability makes it possible to create audio and video of real people saying and doing things they never said or did. Machine learning techniques are escalating the technology’s sophistication, making deep fakes ever more realistic and increasingly resistant to detection. Deep-fake technology has characteristics that enable rapid and widespread diffusion, putting it into the hands of both sophisticated and unsophisticated actors. While deep-fake technology will bring with it certain benefits, it also will introduce many harms. The marketplace …
Reaching Through The “Ghost Doxer:” An Argument For Imposing Secondary Liability On Online Intermediaries, Natalia Homchick
Reaching Through The “Ghost Doxer:” An Argument For Imposing Secondary Liability On Online Intermediaries, Natalia Homchick
Washington and Lee Law Review
Imagine you have decided to run for office, to speak out publicly against an injustice, to enter the job market, or even to join a new online forum. Now, imagine after starting your chosen endeavor, you go online to discover that someone who disagrees with your position posted your personal information on the internet and called for others to harass you. To make matters worse, you realize that you cannot determine who posted your personal data. You have been doxed. Because you cannot identify the person who posted your information, where can you turn for recourse? The next logical party …
Web Of Lives: How Regulating The Dark Web Can Combat Online Human Trafficking, Christopher Campbell
Web Of Lives: How Regulating The Dark Web Can Combat Online Human Trafficking, Christopher Campbell
Journal of the National Association of Administrative Law Judiciary
This article argues that one of the ways to appropriately fight online human trafficking is through governmental regulation of the Dark Web. Specifically, this article argues that a new Attaching Criminal Dark Web Statute is the best method to combat human trafficking because it can incentivize prosecutors to use current human trafficking statutes to prosecute traffickers. This proposal can deter traffickers from enslaving people. Additionally, this article shows the evolution of online human trafficking laws, investigation, and prosecution (Section II); demonstrates why current and proposed laws do not effectively address the online human trafficking issue (Sections III and IV); introduces …
From Innovation To Abuse: Does The Internet Still Need Section 230 Immunity?, Benjamin Volpe
From Innovation To Abuse: Does The Internet Still Need Section 230 Immunity?, Benjamin Volpe
Catholic University Law Review
In 1996, Congress passed the Communications Decency Act to allow the screening of offensive material from the internet, while preserving the continued development of the internet economy without burdensome regulation. However, for years, online intermediaries have successfully used the Act as a shield from liability when third parties use their online services to commit tortious or criminal acts. This Comment argues that a wholly-unregulated internet is no longer necessary to preserve the once-fledgling internet economy. After evaluating various approaches to intermediary liability, this Comment also argues that Congress should take a more comprehensive look at consumer protection online and establish …
Developing A Model For Effective Community Development Agreements In The Extractive Industries, John Nikolaou
Developing A Model For Effective Community Development Agreements In The Extractive Industries, John Nikolaou
CMC Senior Theses
Natural resource development has tremendous potential to create inclusive economic growth in countries well-endowed with oil, mineral, and agricultural resources. At the same time, natural resource development can cause negative environmental externalities, and, in several cases, extractives companies can engage in labor abuse.
The intersection of the government’s and the corporation’s interest can lie in Corporate Social Responsibility Projects.This thesis will analyze an alternative model of CSR: community development agreements (CDAs). CDAs are voluntary, or sometimes government mandated, agreements between the project developer and the project affected community that define company commitments to issues such as environmental impact mitigation, benefit …
Trafficking Technology: A Look At Different Approaches To Ending Technology-Facilitated Human Trafficking, David Barney
Trafficking Technology: A Look At Different Approaches To Ending Technology-Facilitated Human Trafficking, David Barney
Pepperdine Law Review
In 2018, many believe that slavery is an antiquated concept. But as with anything else, if it has not become extinct, it has evolved with time. Human trafficking is no different. Each year, millions of men, women and children are trafficked in the United States, and internationally, and forced to work against their will. Through the rise of technology and an increasingly globalized world, traffickers have learned to use technology as a tool to help facilitate the trafficking of persons and to sell those victims to others they never could have reached before. But what are we doing about it? …
Combating Fake News In Social Media: U.S. And German Legal Approaches, Ryan Kraski
Combating Fake News In Social Media: U.S. And German Legal Approaches, Ryan Kraski
St. John's Law Review
(Excerpt)
When asking how fake news in social media can be combated under U.S. and German law, one must first take the systems’ most fundamental differences into consideration. U.S. law is characterized by its federal structure, the interaction of state laws often with the federal, U.S. Constitution, usage of pretrial discovery, as well as the role of juries in calculating damages. In contrast, Germany, as a civil law system, is characterized by its usage of separate legal actions to acquire information, lack of pretrial discovery, and broader array of available remedies, none of which allow for punitive damages. Through a …
Cyberspace…The Final Frontier: How The Communications Decency Act Allows Entrepreneurs To Boldly Go Where No Blog Has Gone Before, Aaron Jackson
Cyberspace…The Final Frontier: How The Communications Decency Act Allows Entrepreneurs To Boldly Go Where No Blog Has Gone Before, Aaron Jackson
Oklahoma Journal of Law and Technology
No abstract provided.
Emerging Practices In Community Development Agreements, Jennifer Loutit, Jacqueline Mandelbaum, Sam Szoke-Burke
Emerging Practices In Community Development Agreements, Jennifer Loutit, Jacqueline Mandelbaum, Sam Szoke-Burke
Columbia Center on Sustainable Investment Staff Publications
Community Development Agreements (CDAs) have the potential to facilitate the delivery of tangible benefits from large-scale investment projects, such as mines or forestry concessions, to affected persons and communities. To be effective, however, CDAs must be adapted to the local context, meaning that no single model agreement or process will be appropriate in every situation. Nonetheless, leading practices are emerging which can be required by governments, voluntarily adopted by companies, and demanded by communities. These practices are grounded in ensuring that all parties are sufficiently informed, capacitated, and prepared to engage in meaningful negotiations regarding how the investor’s operations should …
Emerging Practices In Community Development Agreements, Jennifer Loutit, Jacqueline Mandelbaum, Sam Szoke-Burke
Emerging Practices In Community Development Agreements, Jennifer Loutit, Jacqueline Mandelbaum, Sam Szoke-Burke
Columbia Center on Sustainable Investment Staff Publications
A Community Development Agreement or CDA can be a vital mechanism for ensuring that local communities benefit from large-scale investment projects, such as mines or forestry concessions. In formalizing agreements between an investor and a project-affected community, CDAs set out how the benefits of an investment project will be shared with local communities. In some countries CDAs are required by domestic legislation; in others, they are entered into voluntarily. The most effective CDAs are also adapted to the local context, meaning that no single model agreement or process will be appropriate in every situation. Nonetheless, leading practices are emerging which …
Section 230 Of The Communications Decency Act: The True Culprit Of Internet Defamation, Heather Saint
Section 230 Of The Communications Decency Act: The True Culprit Of Internet Defamation, Heather Saint
Loyola of Los Angeles Entertainment Law Review
This Note highlights the growing concern of Internet defamation and the lack of viable legal remedies available to its victims. Internet defamation is internet speech with the purpose to disparage another’s reputation. At common law, a victim of alleged defamation has the right to file suit against not only the original speaker of the defamatory statements, but the person or entity to give that statement further publication as well. In certain cases even the distributor, such as a newspaper stand, can be held liable for a defamation claim. However, liability due to defamatory speech on the Internet is quite different. …
Extraterritorial Application Of The United States' Trade Embargo Against Cuba: The United Nations General Assembly's Call For An End To The U.S. Trade Embargo, Jerry W. Cain Jr.
Extraterritorial Application Of The United States' Trade Embargo Against Cuba: The United Nations General Assembly's Call For An End To The U.S. Trade Embargo, Jerry W. Cain Jr.
Georgia Journal of International & Comparative Law
No abstract provided.
Fighting A Losing Battle To Win The War: Can States Combat Domestic Minor Sex Trafficking Despite Cda Preemption?, Stephanie Silvano
Fighting A Losing Battle To Win The War: Can States Combat Domestic Minor Sex Trafficking Despite Cda Preemption?, Stephanie Silvano
Fordham Law Review
The explosion of the internet and online communication has led to an alarming increase in an existing epidemic: domestic minor sex trafficking. Sex traffickers utilize websites, such as Backpage.com, to post trafficking advertisements depicting minors, which are minimally regulated as a result of the civil immunity provision of the Communications Decency Act (47 U.S.C. § 230). This immunity provision has been interpreted broadly by the courts, granting expansive immunity to websites as both publishers and distributors of content.
In an effort to combat minor sex trafficking at a local level, some state legislatures enacted statutes criminalizing the knowing publication of …
It’S Time For Revenge Porn To Get A Taste Of Its Own Medicine: An Argument For The Federal Criminalization Of Revenge Porn, Taylor Linkous
It’S Time For Revenge Porn To Get A Taste Of Its Own Medicine: An Argument For The Federal Criminalization Of Revenge Porn, Taylor Linkous
Richmond Journal of Law & Technology
Throughout history, pornography and technology have enjoyed a symbiotic relationship, each playing a significant role in the growth and widespread success of the other. From the VCR and camcorders to the Polaroid camera and the Internet, the pornography industry has always accelerated the growth of new technologies, paving the way for these new services to be introduced into mainstream society. Most of these new technologies were appealing to creators and consumers of pornography because the new technologies brought an increased sense of privacy. For example, much of the success of the Polaroid camera is said to come from the fact …
Secondary Liability, Isp Immunity, And Incumbent Entrenchment, Marketa Trimble, Salil K. Mehra
Secondary Liability, Isp Immunity, And Incumbent Entrenchment, Marketa Trimble, Salil K. Mehra
Scholarly Works
More than fifteen years have passed since the two major U.S. statutes concerning the secondary liability of Internet service providers were adopted--the Communications Decency Act and the Digital Millennium Copyright Act. The statutes have been criticized; however, very little of the criticism has come from Internet service providers, who have enjoyed the benefits of generous safe harbors and immunity from suit guaranteed by these statutes. This Article raises the question of whether these statutes contribute to incumbent entrenchment--solidifying the position of the existing Internet service providers to the detriment of potential new entrants. The current laws and industry self-regulation may …
Craigslist, The Cda, And Inconsistent International Standards Regarding Liability For Third-Party Postings On The Internet, Peter Adamo
Pace International Law Review Online Companion
This Comment explores the nature and purpose of the Communications Decency Act (CDA), the legislative upbringing, and the application of the CDA to Craigslist. It compares the CDA to approaches taken abroad through legislation and judicial proceedings. It explains, contrary to the one other commentator to broach the subject matter, how the CDA continues to provide robust protection to Craigslist. Finally, it explores potential avenues for redrafting the CDA as well as the difficulties and trade-offs associated with implementing such change.
Twitter Or Tweeter: Who Should Be Liable For A Right Of Publicity Violation Under The Cda?, Kristina M. Sesek
Twitter Or Tweeter: Who Should Be Liable For A Right Of Publicity Violation Under The Cda?, Kristina M. Sesek
Marquette Intellectual Property Law Review
The Communications Decency Act (CDA), passed in 1996, immunized Internet service providers (ISPs) from being treated as the publisher or speaker of any information posted on their website by another person and from possible subsequent liability. The CDA also carved out an exemption for violations of intellectual property‹meaning an ISP could still be liable for information posted on their website by another person that violates an intellectual property right. However, the CDA did not spell out whether it intended to include only federal intellectual property rights or both federal and state intellectual property rights.
This Comment proposes two possible reasons …
Busting Blocks: Revisiting 47 U.S.C. § 230 To Address The Lack Of Effective Legal Recourse For Wrongful Inclusion In Spam Filters, Jonathan I. Ezor
Busting Blocks: Revisiting 47 U.S.C. § 230 To Address The Lack Of Effective Legal Recourse For Wrongful Inclusion In Spam Filters, Jonathan I. Ezor
Richmond Journal of Law & Technology
Consider a company that uses e-mail to conduct a majority of its business, including customer and vendor communication, marketing, and filing official documents. After conducting business in this manner for several years, one day the company discovers that its most recent e-mails were not delivered to recipients using a major Internet Service Provider (“ISP”) because the company was recently listed on an automated block list as a sender of unwanted bulk commercial e-mail (“spam”).
Community Development Authorities, Andrew A. Painter
Community Development Authorities, Andrew A. Painter
University of Richmond Law Review
Today, CDAs of varying sizes and purposes have been authorized by at least fourteen Virginia localities, and approximately twenty have issued bonds." Despite progress, CDAs occupy anarea of Virginia law largely in its infancy. Case law directly related to their use remains limited, and many localities remain uncertain about their use since the unique marriage of private development and public power inherent in the CDA process has, at times, fostered controversy and apprehension. While this article does not directly address the public policy implications of using CDAs to finance infrastructure, the author hopes this review will generate further ideas for …
An Interpretive Framework For Narrower Immunity Under Section 230 Of The Communications Decency Act, Gregory M. Dickinson
An Interpretive Framework For Narrower Immunity Under Section 230 Of The Communications Decency Act, Gregory M. Dickinson
Gregory M Dickinson
Almost all courts to interpret Section 230 of the Communications Decency Act have construed its ambiguously worded immunity provision broadly, shielding Internet intermediaries from tort liability so long as they are not the literal authors of offensive content. Although this broad interpretation effects the basic goals of the statute, it ignores several serious textual difficulties and mistakenly extends protection too far by immunizing even direct participants in tortious conduct.
This analysis, which examines the text and history of Section 230 in light of two strains of pre-Internet vicarious liability defamation doctrine, concludes that the immunity provision of Section 230, though …
The Never-Ending Limits Of § 230: Extending Isp Immunity To The Sexual Exploitation Of Children, Katy Noeth
The Never-Ending Limits Of § 230: Extending Isp Immunity To The Sexual Exploitation Of Children, Katy Noeth
Federal Communications Law Journal
In 2006, the U.S. District Court for the Eastern District of Texas extended civil liability to Yahoo! under § 230 of the Communications Decency Act so that it could not be sued for knowingly profiting from a Web site where members exchanged sexually explicit pictures of minors. The court found that the reasoning of the seminal § 230 case, Zeran v. AOL, was analogous and that policy considerations mandated its holding.
This Note argues that a multifaceted approach is needed to prevent future courts from following that decision, including an amendment to § 230 that would impose civil liability upon …
Asking For It: A Grokster-Based Approach To Internet Sites That Distribute Offensive Content, Zac Locke
Asking For It: A Grokster-Based Approach To Internet Sites That Distribute Offensive Content, Zac Locke
Zac Locke
Anyone connected to the Internet can post their words, images and any other expression to millions of sites online. However, these sites are also available to tortfeasors and criminals such as defamers, sexual predators, and child pornographers. These individuals rely on interactive computer services (“ICSs”), such as Internet service providers, search engines, social networking sites, video sharing sites, and chat rooms, to disseminate their illegal and offensive messages. The fact that torts and crimes such as defamation, predation and child pornography happen in cyberspace instead of on a street corner does not shield speakers from liability for their actions. However, …
Rethinking The Communications Decency Act: Eliminating Statutory Protections Of Discriminatory Housing Advertisements On The Internet, James D. Shanahan
Rethinking The Communications Decency Act: Eliminating Statutory Protections Of Discriminatory Housing Advertisements On The Internet, James D. Shanahan
Federal Communications Law Journal
The recent decision in Craigslist signals a drastic reduction in the effectiveness of the prohibition on discriminatory housing advertisements under the Fair Housing Act ("FHA"). Section 230 of the Communications Decency Act gives blanket immunity to Internet Content Providers from publisher liability for content originating from third parties. One of the effects of this immunity is the creation of a monopoly for discriminatory advertisements otherwise proscribed by the FHA. This Note argues that the simplest solution for Congress is to adjust the language of § 230 by adding the FHA to the list of exceptions to statutory immunity.
Bigger Phish To Fry: Californias Anti- Phishing Statute And Its Potential Imposition Of Secondary Liability On Internet Service Providers, Camille Calman
Bigger Phish To Fry: Californias Anti- Phishing Statute And Its Potential Imposition Of Secondary Liability On Internet Service Providers, Camille Calman
Richmond Journal of Law & Technology
The incidence of phishing, a form of internet fraud, has increased dramatically since 2003. Identity thieves searching for vulnerabilities in internet security have realized that customers are the weak link. Using mass e-mailings and websites purporting to be those of well-known and trusted corporations, “phishers” trick customers into revealing personal and financial information.
Internet Libel And The Communications Decency Act: How The Courts Erroneously Interpreted Congressional Intent With Regard To Liability Of Internet Service Providers, Emily K. Fritts
Kentucky Law Journal
No abstract provided.