Open Access. Powered by Scholars. Published by Universities.®

Computer Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Constitutional Law

First Amendment

Institution
Publication Year
Publication
Publication Type
File Type

Articles 1 - 26 of 26

Full-Text Articles in Computer Law

Absolute Publishing Power And Bulletproof Immunity: How Section 230 Shields Internet Service Providers From Liability And Makes It Impossible To Protect Your Reputation Online, Victoria Anderson Oct 2021

Absolute Publishing Power And Bulletproof Immunity: How Section 230 Shields Internet Service Providers From Liability And Makes It Impossible To Protect Your Reputation Online, Victoria Anderson

Seattle University Law Review SUpra

No abstract provided.


The Small-Er Screen: Youtube Vlogging And The Unequipped Child Entertainment Labor Laws, Amanda G. Riggio Jan 2021

The Small-Er Screen: Youtube Vlogging And The Unequipped Child Entertainment Labor Laws, Amanda G. Riggio

Seattle University Law Review

Family vloggers are among the millions of content creators on YouTube. In general, vloggers frequently upload recorded videos of their daily lives. Family vloggers are unique because they focus their content around their familial relationships and the lives of their children. One set of family vloggers, the Ace Family, has recorded their children’s lives from the day they were born and continue to upload videos of each milestone, including “Elle Cries on Her First Rollercoaster Ride” and “Elle and Alaïa Get Caught Doing What!! **Hidden Camera**.” Another vlogging couple, Cole and Savannah LaBrant, post similar content, including videos titled “Baby …


The Itunes Of Downloadable Guns: Firearms As A First Amendment Right, Sandra Sawan Lara Jan 2019

The Itunes Of Downloadable Guns: Firearms As A First Amendment Right, Sandra Sawan Lara

Catholic University Journal of Law and Technology

As society becomes more technology driven, legal issues continue to arise around the world. From privacy to national security, technology develops at a rate the law simply cannot keep up with. In the United States, one of the biggest legal issues is how the new risks technology brings will interfere with our individual liberties.

Technologies like three-dimensional (“3D”) printing have transformed everything from lifesaving surgeries to gun manufacturing. This technology has led to a whole new way of communicating via computer coding, with the online open source movement leading innovation by allowing for the sharing and editing of files freely. …


From Innovation To Abuse: Does The Internet Still Need Section 230 Immunity?, Benjamin Volpe Jan 2019

From Innovation To Abuse: Does The Internet Still Need Section 230 Immunity?, Benjamin Volpe

Catholic University Law Review

In 1996, Congress passed the Communications Decency Act to allow the screening of offensive material from the internet, while preserving the continued development of the internet economy without burdensome regulation. However, for years, online intermediaries have successfully used the Act as a shield from liability when third parties use their online services to commit tortious or criminal acts. This Comment argues that a wholly-unregulated internet is no longer necessary to preserve the once-fledgling internet economy. After evaluating various approaches to intermediary liability, this Comment also argues that Congress should take a more comprehensive look at consumer protection online and establish …


Social Media And The Government: Why It May Be Unconstitutional For Government Officials To Moderate Their Social Media, Alex Hadjian Jan 2018

Social Media And The Government: Why It May Be Unconstitutional For Government Officials To Moderate Their Social Media, Alex Hadjian

Loyola of Los Angeles Law Review

No abstract provided.


Can Cyber Harassment Laws Encourage Online Speech?, Jonathon Penney Jan 2018

Can Cyber Harassment Laws Encourage Online Speech?, Jonathon Penney

Articles, Book Chapters, & Popular Press

Do laws criminalizing online harassment and cyberbullying "chill" online speech? Critics often argue that they do. However, this article discusses findings from a new empirical legal study that suggests, counter-intuitively, that while such legal interventions likely have some dampening effect, they may also facilitate and encourage more speech, expression, and sharing by those who are most often the targets of online harassment: women. Relevant findings on this point from this first-of-its-kind study are set out and discussed along with their implications.


Panel 1: Robotic Speech And The First Amendment, Bruce E. H. Johnson, Helen Norton, David Skover Jan 2018

Panel 1: Robotic Speech And The First Amendment, Bruce E. H. Johnson, Helen Norton, David Skover

Publications

Moderator: Professor Gregory Silverman.

Book discussed: Ronald L. Collins & David M. Skover, Robotica: Speech Rights and Artificial Intelligence (Cambridge Univ. Press 2018).


Siri-Ously? Free Speech Rights And Artificial Intelligence, Toni M. Massaro, Helen Norton Oct 2016

Siri-Ously? Free Speech Rights And Artificial Intelligence, Toni M. Massaro, Helen Norton

Northwestern University Law Review

Computers with communicative artificial intelligence (AI) are pushing First Amendment theory and doctrine in profound and novel ways. They are becoming increasingly self-directed and corporal in ways that may one day make it difficult to call the communication ours versus theirs. This, in turn, invites questions about whether the First Amendment ever will (or ever should) cover AI speech or speakers even absent a locatable and accountable human creator. In this Article, we explain why current free speech theory and doctrine pose surprisingly few barriers to this counterintuitive result; their elasticity suggests that speaker humanness no longer may be …


The Amplified Need For Supreme Court Guidance On Student Speech Rights In The Digital Age, William Calve Jan 2016

The Amplified Need For Supreme Court Guidance On Student Speech Rights In The Digital Age, William Calve

St. Mary's Law Journal

Abstract forthcoming.


The Doctrinal Toll Of "Information As Speech", Kyle Langvardt Aug 2015

The Doctrinal Toll Of "Information As Speech", Kyle Langvardt

Kyle Langvardt

The courts over the past two decades have reached a near-consensus that computer code, along with virtually every flow of data on the Internet, is “speech” for First Amendment purposes. Today, newer information technologies such as 3D printing, synthetic biology, and digital currencies promise to remake whole other spheres of non-expressive economic activity in the Internet's image. The rush to claim First Amendment protections for these non-expressive but code-dependent technologies has already begun with a lawsuit claiming First Amendment privileges for the Internet distribution of 3D-printable guns. Many similar suits will surely follow, all pursuing the common dream of a …


Can A One Star Review Get You Sued? The Right To Anonymous Speech On The Internet And The Future Of Internet “Unmasking” Statutes, Jesse D. Lively Jan 2015

Can A One Star Review Get You Sued? The Right To Anonymous Speech On The Internet And The Future Of Internet “Unmasking” Statutes, Jesse D. Lively

Jesse D Lively

This Comment argues that the Supreme Court of Virginia should first reverse the Virginia Court of Appeal’s decision when it hears the Yelp case later this year. Secondly, the court hold that the Virginia statute for identifying persons communicating anonymously over the Internet violates the First Amendment's required showing of merit on both law and facts before a subpoena duces tecum to identify an anonymous speaker can be enforced. Lastly, it should adopt a new “unveiling standard” similar to the standards used in either Dendrite or Cahill. Part II examines the jurisprudential history of identifying anonymous Internet speakers in defamation …


The Replicator And The First Amendment, Kyle Langvardt Aug 2014

The Replicator And The First Amendment, Kyle Langvardt

Kyle Langvardt

As 3D printing technology improves, the theoretical endpoint comes into view: a machine that, like the “replicators” of Star Trek, can produce anything the user asks for out of thin air from a digital blueprint. Real-life technology may never reach that endpoint, but our progress toward it has accelerated sharply over the past few years—sharply enough, indeed, for legal scholars to weigh in on the phenomenon’s disruptive potential in areas ranging from intellectual property to gun rights. This paper is concerned with the First Amendment status of the digital blueprints. As of August 2014, it is the first law review …


Omnipresent Student Speech And The Schoolhouse Gate: Interpreting Tinker In The Digital Age, Watt L. Black Jr. Feb 2014

Omnipresent Student Speech And The Schoolhouse Gate: Interpreting Tinker In The Digital Age, Watt L. Black Jr.

Watt Lesley Black Jr.

This paper focuses primarily on federal circuit level decisions regarding public school district's ability to discipline students who engage in electronic speech while off-campus and not involved in school activities. Particular attention is paid to the question of whether and how appeals courts have been willing to apply the "material and substantial disruption" standard from the Supreme Court's 1969 Tinker v. Des Moines decision to speech occurring off-campus. The paper, which is targeted toward both legal scholars and school administrators, draws together the common threads from the various circuits and weaves them into a set of guidelines for school administrators …


The Evolution Of The Digital Millennium Copyright Act; Changing Interpretations Of The Dmca And Future Implications For Copyright Holders, Hillary A. Henderson Jan 2014

The Evolution Of The Digital Millennium Copyright Act; Changing Interpretations Of The Dmca And Future Implications For Copyright Holders, Hillary A. Henderson

Hillary A Henderson

Copyright law rewards an artificial monopoly to individual authors for their creations. This reward is based on the belief that, by granting authors the exclusive right to reproduce their works, they receive an incentive and means to create, which in turn advances the welfare of the general public by “promoting the progress of science and useful arts.” Copyright protection subsists . . . in original works of authorship fixed in any tangible medium of expression, now known or later developed, from which they can be perceived, reproduced, or otherwise communicated, either directly or with the aid of a machine or …


A Comprehensive Approach To Bridging The Gap Between Cyberbullying Rules And Regulations And The Protections Offered By The First Amendment For Off-Campus Student Speech, Vahagn Amirian Aug 2013

A Comprehensive Approach To Bridging The Gap Between Cyberbullying Rules And Regulations And The Protections Offered By The First Amendment For Off-Campus Student Speech, Vahagn Amirian

Vahagn Amirian

No abstract provided.


When The Classroom Is Not In The Schoolhouse: Applying Tinker To Student Speech At Online Schools, Brett T. Macintyre May 2013

When The Classroom Is Not In The Schoolhouse: Applying Tinker To Student Speech At Online Schools, Brett T. Macintyre

Seattle University Law Review

Despite the overwhelming increase in students’ Internet use and the growing popularity of online public schools, the United States Supreme Court has never addressed how, or if, schools can discipline students for disruptive online speech without violating the students’ First Amendment rights. What the Supreme Court has addressed is how school administrators can constitutionally discipline students within traditional schools. In a landmark decision, Tinker v. Des Moines Independent Community School District, the Supreme Court announced the now famous principle that students do not “shed their constitutional rights to freedom of speech or expression at the schoolhouse gate.” Still, the Court …


Testing The Social Media Waters - First Amendment Entanglement Beyond The Schoolhouse Gates, Lily M. Strumwasser Jan 2013

Testing The Social Media Waters - First Amendment Entanglement Beyond The Schoolhouse Gates, Lily M. Strumwasser

Lily M Strumwasser

Dear Editor:

I am a third-year student at The John Marshall Law School in Chicago, Illinois, where I serve as the executive student publications editor of The John Marshall Law Review. In September 2013, I will work as an associate at Seyfarth Shaw in its labor and employment practice group. I am writing to submit my article, "Testing The Social Media Waters - First Amendment Entanglement Beyond The Schoolhouse Gates" My article considers the contours of student free speech rights within the context of public schools. I think and hope you will find it to be interesting and …


Striking A Balance Between Privacy And Online Commerce, Mark Bartholomew Jan 2013

Striking A Balance Between Privacy And Online Commerce, Mark Bartholomew

Utah OnLaw: The Utah Law Review Online Supplement

It is becoming commonplace to note that privacy and online commerce are on a collision course. Corporate entities archive and monetize more and more personal information. Citizens increasingly resent the intrusive nature of such data collection and use. Just noticing this conflict, however, tells us little. In Informing and Reforming the Marketplace of Ideas: The Public-Private Model for Data Production and the First Amendment, Professor Shubha Ghosh not only notes the tension between the costs and benefits of data commercialization, but suggests three normative perspectives for balancing privacy and commercial speech. This is valuable because without a rich theoretical framework …


Machine Speech, Tim Wu Jan 2013

Machine Speech, Tim Wu

Faculty Scholarship

Computers are making an increasing number of important decisions in our lives. They fly airplanes, navigate traffic, and even recommend books. In the process, computers reason through automated algorithms and constantly send and receive information, sometimes in ways that mimic human expression. When can such communications, called here “algorithmic outputs,” claim First Amendment protection?


Emerging Technologies And Dwindling Speech, Jorge R. Roig Dec 2012

Emerging Technologies And Dwindling Speech, Jorge R. Roig

Jorge R Roig

Inspired in part by the recent holding in Bland v. Roberts that the use of the “Like” feature in Facebook is not covered by the Free Speech Clause, this article makes a brief foray into the approach that courts have taken in the recent past towards questions of First Amendment coverage in the context of emerging technologies. Specifically, this article will take a closer look at how courts have dealt with the issue of functionality in the context of First Amendment coverage of computer source code. The analysis of this and other recent experiences, when put in a larger context, …


Disclosure's Effects: Wikileaks And Transparency, Mark Fenster Feb 2012

Disclosure's Effects: Wikileaks And Transparency, Mark Fenster

Mark Fenster

Constitutional, criminal, and administrative laws regulating government transparency, and the theories that support them, rest on the assumption that the disclosure of information has transformative effects: disclosure can inform, enlighten, and energize the public, or it can create great harm or stymie government operations. To resolve disputes over difficult cases, transparency laws and theories typically balance disclosure’s beneficial effects against its harmful ones. WikiLeaks and its vigilante approach to massive document leaks challenge the underlying assumption about disclosure’s effects in two ways. First, WikiLeaks’s ability to receive and distribute leaked information cheaply, quickly, and seemingly unstoppably enables it to bypass …


Decoding First Amendment Coverage Of Computer Source Code In The Age Of Youtube, Facebook And The Arab Spring, Jorge R. Roig Dec 2011

Decoding First Amendment Coverage Of Computer Source Code In The Age Of Youtube, Facebook And The Arab Spring, Jorge R. Roig

Jorge R Roig

Computer source code is the lifeblood of the Internet. It is also the brick and mortar of cyberspace. As such, it has been argued that the degree of control that a government can wield over code can be a powerful tool for controlling new technologies. With the advent and proliferation in the Internet of social networking media and platforms for the publication and sharing of user-generated content, the ability of individuals across the world to communicate with each other has reached truly revolutionary dimensions.
The influence of Facebook in the popular revolutions of the Arab Spring has been well documented. …


In The Matter Of Ottinger V. Non-Party The Journal News, Daniel Haier Jan 2009

In The Matter Of Ottinger V. Non-Party The Journal News, Daniel Haier

NYLS Law Review

No abstract provided.


Censorship By Proxy: The First Amendment, Internet Intermediaries, And The Problem Of The Weakest Link, Seth F. Kreimer Nov 2006

Censorship By Proxy: The First Amendment, Internet Intermediaries, And The Problem Of The Weakest Link, Seth F. Kreimer

All Faculty Scholarship

The rise of the Internet has changed the First Amendment drama, for governments confront technical and political obstacles to sanctioning either speakers or listeners in cyberspace. Faced with these challenges, regulators have fallen back on alternatives, predicated on the fact that, in contrast to the usual free expression scenario, the Internet is not dyadic. The Internet's resistance to direct regulation of speakers and listeners rests on a complex chain of connections, and emerging regulatory mechanisms have begun to focus on the weak links in that chain. Rather than attacking speakers or listeners directly, governments have sought to enlist private actors …


Constitutional Issues In Information Privacy, Fred H. Cate, Robert E. Litan Jan 2002

Constitutional Issues In Information Privacy, Fred H. Cate, Robert E. Litan

Articles by Maurer Faculty

The U.S. Constitution has been largely ignored in the recent flurry of privacy laws and regulations designed to protect personal information from incursion by the private sector, despite the fact that many of these enactments and efforts to enforce them significantly implicate the First Amendment. Questions about the role of the Constitution have assumed new importance in the aftermath of the September 11 terrorist attacks on the World Trade Center and the Pentagon. Efforts to identify and bring to justice the perpetrators and to protect against future terrorist attacks, while threatening to weaken constitutional protections against government intrusions into personal …


First Amendment Freedoms And The Encryption Export Battle: Deciphering The Importance Of Bernstein V. United States Department Of Justice, 176 F.3d 1132 (9th Cir. 1999), David Mcclure Jan 2000

First Amendment Freedoms And The Encryption Export Battle: Deciphering The Importance Of Bernstein V. United States Department Of Justice, 176 F.3d 1132 (9th Cir. 1999), David Mcclure

Scholarly Works

For many years, a battle has raged over export restrictions on strong encryption products. Encryption ensures confidential and secure communications among individuals, and the Commerce Department and the State Department have long restricted its export because of national security concerns. Industry and privacy groups have fought against the restrictions for various reasons, ranging from the desire to sell encryption software in new markets to preventing government from accessing personal communications between individuals. Daniel Bernstein, a computer science graduate student, challenged these restrictions in 1996, placing himself in the center of this ongoing battle. In 1999, the Ninth Circuit Court of …