Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 10 of 10

Full-Text Articles in Law

Unmasking The Teen Cyberbully: A First Amendment-Compliant Approach To Protecting Child Victims Of Anonymous, School-Related Internet Harassment, Benjamin A. Holden Nov 2017

Unmasking The Teen Cyberbully: A First Amendment-Compliant Approach To Protecting Child Victims Of Anonymous, School-Related Internet Harassment, Benjamin A. Holden

Akron Law Review

In proposing a new rule under the First Amendment to adjudicate anonymous Cyberbullying cases, this Article first reviews and summarizes the First Amendment precedents governing regulation of speech by minors and student speech in the school environment. Second, it reviews and discusses the prevalence of minors’ online harassment or Cyberbullying, including pre-litigation disputes reported in the press. Third, it reviews and summarizes the First Amendment precedents governing the “unmasking” of anonymous speakers. Finally, the Cyberbully Unmasking Test is proposed and applied.


"To Hell In A Handbasket": Teachers, Free Speech, And Matters Of Public Concern In The Social Media World, Jessica O. Laurin Oct 2017

"To Hell In A Handbasket": Teachers, Free Speech, And Matters Of Public Concern In The Social Media World, Jessica O. Laurin

Indiana Law Journal

This Note argues that courts should narrow the scope of examined speech and place little weight on the amount of media attention that the speech received. Although courts sometimes reject First Amendment protection on the Pickering balancing test instead of the public concern issue, the public concern requirement is a threshold issue that plays a critical role in successful First Amendment claims. Accordingly, courts need to revisit the public concern doctrine to ensure that its analysis is sound and yields the correct outcome.

Part I provides background concerning retaliation claims, criticism of the public concern requirement, and special issues that …


Electronic Social Media: Friend Or Foe For Judges, M. Sue Kurita Oct 2017

Electronic Social Media: Friend Or Foe For Judges, M. Sue Kurita

St. Mary's Journal on Legal Malpractice & Ethics

The use of electronic social communication has grown at a phenomenal rate. Facebook, the most popular social networking website, has over 1,968,000,000 users—a number that has exponentially grown since its inception in 2004. The number of judges accessing and using electronic social media (ESM) has also increased. However, unlike the general population, judges must consider constitutional, ethical, technical, and evidentiary implications when they use and access ESM. The First Amendment forbids “abridging the freedom of speech” and protects the expression of personal ideas, positions, and views. However, the American Bar Association’s Model Code of Judicial Conduct and the Texas Code …


Courthouses, Bookshelves, And Portals: The Implications Of U.S. V. American Library Association On First Amendment Forum Analysis And Future Internet-Based Litigation Strategies, Alexandra R. Harrington Sep 2017

Courthouses, Bookshelves, And Portals: The Implications Of U.S. V. American Library Association On First Amendment Forum Analysis And Future Internet-Based Litigation Strategies, Alexandra R. Harrington

Oklahoma Journal of Law and Technology

No abstract provided.


The Internet Will Not Break: Denying Bad Samaritans Section 230 Immunity, Danielle K. Citron, Benjamin Wittes Jul 2017

The Internet Will Not Break: Denying Bad Samaritans Section 230 Immunity, Danielle K. Citron, Benjamin Wittes

Faculty Scholarship

What do a revenge pornographer, gossip-site curator, and platform pairing predators with young people in one-on-one chats have in common? Blanket immunity from liability, thanks to lower courts’ interpretation of section 230 of the Communications Decency Act (CDA) beyond what the text, context, and purpose support. The CDA was part of a campaign — rather ironically in retrospect — to restrict access to sexually explicit material online. Lawmakers thought they were devising a safe harbor for online providers engaged in self-regulation. The CDA’s origins in the censorship of “offensive” material are inconsistent with outlandishly broad interpretations that have served to …


Trending Now: The Role Of Defamation Law In Remedying Harm From Social Media Backlash, Cory Batza Apr 2017

Trending Now: The Role Of Defamation Law In Remedying Harm From Social Media Backlash, Cory Batza

Pepperdine Law Review

Defamatory comments on social media have become commonplace. When the online community is outraged by some event, social media users often flood the Internet with hateful and false comments about the alleged perpetrator, feeling empowered by their numbers and anonymity. This wave of false and harmful information about an individual’s reputation has caused many individuals to lose their jobs and suffer severe emotional trauma. This Comment explores whether the target of social media backlash can bring a successful defamation claim against the users who have destroyed their reputations on and offline. Notably, one of the biggest hurdles these plaintiffs will …


Standing After Snowden: Lessons On Privacy Harm From National Security Surveillance Litigation, Margot E. Kaminski Jan 2017

Standing After Snowden: Lessons On Privacy Harm From National Security Surveillance Litigation, Margot E. Kaminski

Publications

Article III standing is difficult to achieve in the context of data security and data privacy claims. Injury in fact must be "concrete," "particularized," and "actual or imminent"--all characteristics that are challenging to meet with information harms. This Article suggests looking to an unusual source for clarification on privacy and standing: recent national security surveillance litigation. There we can find significant discussions of what rises to the level of Article III injury in fact. The answers may be surprising: the interception of sensitive information; the seizure of less sensitive information and housing of it in a database for analysis; and …


The “Sovereigns Of Cyberspace” And State Action: The First Amendment’S Application (Or Lack Thereof) To Third-Party Platforms, Jonathan Peters Jan 2017

The “Sovereigns Of Cyberspace” And State Action: The First Amendment’S Application (Or Lack Thereof) To Third-Party Platforms, Jonathan Peters

Scholarly Works

Many scholars have commented that the state action doctrine forecloses use of the First Amendment to constrain the policies and practices of online service providers. But few have comprehensively studied this issue, and the seminal article exploring “[c]yberspace and the [s]tate [a]ction [d]ebate” is fifteen years old, published before the U.S. Supreme Court reformulated the federal approach to state action. It is important to give the state action doctrine regular scholarly attention, not least because it is increasingly clear that “the private sector has a shared responsibility to help safeguard free expression.” It is critical to understand whether the First …


Making News: Balancing Newsworthiness And Privacy In The Age Of Algorithms, Erin C. Carroll Jan 2017

Making News: Balancing Newsworthiness And Privacy In The Age Of Algorithms, Erin C. Carroll

Georgetown Law Faculty Publications and Other Works

In deciding privacy lawsuits against media defendants, courts have for decades deferred to the media. They have given it wide berth to determine what is newsworthy and so, what is protected under the First Amendment. And in doing so, they have often spoken reverently of the editorial process and journalistic decision-making.

Yet, in just the last several years, news production and consumption has changed dramatically. As we get more of our news from digital and social media sites, the role of information gatekeeper is shifting from journalists to computer engineers, programmers, and app designers. The algorithms that the latter write …


Triggering Tinker: Student Speech In The Age Of Cyberharassment, Ari Ezra Waldman Jan 2017

Triggering Tinker: Student Speech In The Age Of Cyberharassment, Ari Ezra Waldman

Articles & Chapters

This essay challenges the common assumption that public schools have limited authority to regulate cyberbullying that originates and takes place off campus. That argument presumes a level of myopia, clarity, and literalism in the law that simply does not exist. First, even assuming it existed, a geographic requirement is an outdated creature of a preinternet age. Cyberbullying poses unique challenges to young people, educators, and schools not contemplated when the Court decided its student speech cases. If it existed then, it should adapt to today’s realities. Second, I argue that a campus presence requirement for regulating any kind of off-campus …