Open Access. Powered by Scholars. Published by Universities.®

Computer Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Pace University

Discipline
Keyword
Publication Year
Publication
Publication Type

Articles 1 - 17 of 17

Full-Text Articles in Computer Law

Social Media Harms And The Common Law, Leslie Y. Garfield Tenzer Oct 2022

Social Media Harms And The Common Law, Leslie Y. Garfield Tenzer

Elisabeth Haub School of Law Faculty Publications

This article finds fault with the judiciaries' failure to create a set of common law norms for social media wrongs. In cases concerning social media harms, the Supreme Court and lower courts have consistently adhered to traditional pre-social media principles, failing to use the power of the common law to create a kind of Internet Justice.

Part I of this article reviews social media history and explores how judicial decisions created a fertile bed for social media harm to blossom. Part II illustrates social media harms across several doctrinal disciplines and highlights judicial reluctance to embrace the realities of social …


A 180 On Section 230: State Efforts To Erode Social Media Immunity, Leslie Y. Garfield Tenzer, Hayley Margulis Jan 2022

A 180 On Section 230: State Efforts To Erode Social Media Immunity, Leslie Y. Garfield Tenzer, Hayley Margulis

Elisabeth Haub School of Law Faculty Publications

The turmoil of the 2020 presidential election renewed controversy surrounding 47 U.S.C § 230. The law, adopted as part of the 1996 Communications Decency Act (CDA), shields Interactive Computer Services (ICS) from civil liability for third-party material posted on their Platforms--no matter how heinous and regardless of whether the material enjoys constitutional protection. Consequently, any ICS, which is broadly defined to include Internet service providers (ISPs) and social media platforms (Platforms), can police its own postings but remains free from government intervention or retribution.

In 2022, members of the Texas and Florida legislatures passed laws aiming to limit the scope …


The Indecency Of The Communications Decency Act § 230: Unjust Immunity For Monstrous Social Media Platforms, Natalie Annette Pagano Apr 2019

The Indecency Of The Communications Decency Act § 230: Unjust Immunity For Monstrous Social Media Platforms, Natalie Annette Pagano

Pace Law Review

The line between First Amendment protection and the innovation of social media platforms is hazy at best. Not only do these platforms increasingly encompass the lives of many individuals, but they provide incredible new opportunities to interact from near and far, through sharing photographs, videos, and memories. The Internet provides countless outlets that are available at the tip of users’ fingers: thriving forums to communicate nearly whenever and wherever desired. Users effortlessly interact on these platforms and are consistently exposed to numerous forms of speech, including messages through posts, chat room discussions, videos, polls, and shared statements. From 2010 to …


Platforms, The First Amendment And Online Speech: Regulating The Filters, Sofia Grafanaki Apr 2019

Platforms, The First Amendment And Online Speech: Regulating The Filters, Sofia Grafanaki

Pace Law Review

In recent years, online platforms have given rise to multiple discussions about what their role is, what their role should be, and whether they should be regulated. The complex nature of these private entities makes it very challenging to place them in a single descriptive category with existing rules. In today’s information environment, social media platforms have become a platform press by providing hosting as well as navigation and delivery of public expression, much of which is done through machine learning algorithms. This article argues that there is a subset of algorithms that social media platforms use to filter public …


Sony, Cyber Security, And Free Speech: Preserving The First Amendment In The Modern World, Conrad Wilton Jun 2017

Sony, Cyber Security, And Free Speech: Preserving The First Amendment In The Modern World, Conrad Wilton

Pace Intellectual Property, Sports & Entertainment Law Forum

Reprinted from 16 U.C. Davis Bus. L.J. 309 (2016). This paper explores the Sony hack in 2014 allegedly launched by the North Korean government in retaliation over Sony’s production of The Interview and considers the hack’s chilling impact on speech in technology. One of the most devastating cyber attacks in history, the hack exposed approximately thirty- eight million files of sensitive data, including over 170,000 employee emails, thousands of employee social security numbers and unreleased footage of upcoming movies. The hack caused Sony to censor the film and prompted members of the entertainment industry at large to tailor their communication …


Death By Bullying: A Comparative Culpability Proposal, Audrey Rogers May 2015

Death By Bullying: A Comparative Culpability Proposal, Audrey Rogers

Pace Law Review

This article explores the possibility and advisability of imposing homicide charges against bullies, a controversial approach because of the serious causation questions it poses. Nonetheless, there is precedent for holding a person criminally culpable for a victim’s suicide. A notorious case involved the head of the Ku Klux Klan who was convicted of murder after the woman he raped killed herself by swallowing poison, “distracted by pain and shame so inflicted upon her.” Some may see her shame as analogous to gay teens who commit suicide after being bullied about their sexual orientation. But perhaps the law should not demand …


Copyright And Social Media: A Tale Of Legislative Abdication, Diane Leenheer Zimmerman May 2015

Copyright And Social Media: A Tale Of Legislative Abdication, Diane Leenheer Zimmerman

Pace Law Review

The focus of this article will be on what I call DMCA 2.0. It will begin by discussing the Digital Millennium Copyright Act (DMCA) and why that statute, passed in 1998 to shore up the enforceability of copyright online by protecting content providers’ ability to engage in forms of technological self-help against online copyright infringers, has been problematic. Part II describes largely unsuccessful efforts in the form of statutes and trade agreements to shore up the DMCA. Part III turns to the latest salvo, the adoption of “voluntary agreements” whereby content owners and ISPs, in particular social media platforms, join …


Anarchy, Status Updates, And Utopia, James Grimmelmann May 2015

Anarchy, Status Updates, And Utopia, James Grimmelmann

Pace Law Review

Social software has a power problem. Actually, it has two. The first is technical. Unlike the rule of law, the rule of software is simple and brutal: whoever controls the software makes the rules. And if power corrupts, then automatic power corrupts automatically. Facebook can drop you down the memory hole; PayPal can garnish your pay. These sovereigns of software have absolute and dictatorial control over their domains.

Is it possible to create online spaces without technical power? It is not, because of social software’s second power problem. Behind technical power, there is also social power. Whenever people come together …


Global Cyber Intermediary Liability: A Legal & Cultural Strategy, Jason H. Peterson, Lydia Segal, Anthony Eonas Sep 2014

Global Cyber Intermediary Liability: A Legal & Cultural Strategy, Jason H. Peterson, Lydia Segal, Anthony Eonas

Pace Law Review

This Article fills the gap in the debate on fighting cybercrime. It considers the role of intermediaries and the legal and cultural strategies that countries may adopt. Part II.A of this Article examines the critical role of intermediaries in cybercrime. It shows that the intermediaries’ active participation by facilitating the transmission of cybercrime traffic removes a significant barrier for individual perpetrators. Part II.B offers a brief overview of legal efforts to combat cybercrime, and examines the legal liability of intermediaries in both the civil and criminal context and in varying legal regimes with an emphasis on ISPs. Aside from some …


When Copyright Can Kill: How 3d Printers Are Breaking The Barriers Between “Intellectual” Property And The Physical World, Matt Simon May 2013

When Copyright Can Kill: How 3d Printers Are Breaking The Barriers Between “Intellectual” Property And The Physical World, Matt Simon

Pace Intellectual Property, Sports & Entertainment Law Forum

This article examines copyright’s applicability to 3D printing technology, by analyzing the facts surrounding the (formerly) proposed development of a fully 3D printable firearm. Critical to this analysis however, is an understanding of how copyright has traditionally protected intellectual property, and why 3D printers do not fit into this conventional framework. As 3D printing is advancing at an extraordinarily rapid rate, any discussion of this topic would be incomplete without reference to the “moving target” that is 3D printing technology. In the short time between when this article was initially submitted for evaluation to the PIPSELF Law Forum in December …


The Need For International Laws Of War To Include Cyber Attacks Involving State And Non-State Actors, Christopher D. Deluca Jan 2013

The Need For International Laws Of War To Include Cyber Attacks Involving State And Non-State Actors, Christopher D. Deluca

Pace International Law Review Online Companion

This article argues that existing international laws of war are inadequate and need to be adjusted and clearly defined to include cyber attacks involving state and non-state actors. Part II of this article describes the different forms and increasing use of cyber attacks in international conflicts. Part III focuses on the importance and relevance of non-state actors in the international community and today’s asymmetric battlefield. Part IV discusses the applicability of current international laws of war to cyber attacks. Part V of this article suggests ways in which current international law can be improved to include and regulate cyber attacks …


From Peer-To-Peer Networks To Cloud Computing: How Technology Is Redefining Child Pornography Laws, Audrey Rogers Jan 2013

From Peer-To-Peer Networks To Cloud Computing: How Technology Is Redefining Child Pornography Laws, Audrey Rogers

Elisabeth Haub School of Law Faculty Publications

This Article traces the history of the child pornography laws and sentencing policy in Part I. Part II explains the technologies that have caused some of the current controversies, and then Part III describes how these technologies have blurred the offenses. Finally, Part IV makes suggestions as to how the law could better reflect technology and comport with a refined harm rationale. Courts, legal scholars, and medical experts have explained the harm includes the sexual abuse captured in the images and the psychological injury the victim endures knowing the images are being viewed. This Article further develops the harm rationale …


Playing The Mysterious Game Of Online Love: Examining An Emerging Trend Of Limiting § 230 Immunity Of The Communications Decency Act And The Effects On E-Dating Websites, Matthew Altenberg Nov 2012

Playing The Mysterious Game Of Online Love: Examining An Emerging Trend Of Limiting § 230 Immunity Of The Communications Decency Act And The Effects On E-Dating Websites, Matthew Altenberg

Pace Law Review

No abstract provided.


Student Comprehension Of Privacy Issues In Sns, Collaborative Project Jan 2009

Student Comprehension Of Privacy Issues In Sns, Collaborative Project

Dyson College- Seidenberg School of CSIS : Collaborative Projects and Presentations

This entry adheres to the use of the quad chart template to provide for a succint description only of the current research project undertaken by the participants. It provides for the following information:

1. Participant/s
2. Overall project goals
3. Illustrative picture/s
4.Specific research/artistic/pedagogic foci


Protecting Children On The Internet: Mission Impossible?, Audrey Rogers Jan 2009

Protecting Children On The Internet: Mission Impossible?, Audrey Rogers

Elisabeth Haub School of Law Faculty Publications

This Article posits that the Williams Court properly upheld Congress' shift in focus from the images to the speech pandering them. The majority ruled that the inability to complete a crime because of a factual error is not a defense. Its reasoning should lay to rest lingering claims that child protection statutes require an actual child. Nevertheless, the Article explains that the Williams dissent essentially relied on legal impossibility in its finding that the PROTECT Act's pandering provision was unconstitutionally overbroad. In so doing, the dissent reflects the reluctance of many to accept the extent to which adults are seeking …


The Privacy Gambit: Toward A Game Theoretic Approach To International Data Protection, Horace E. Anderson Jan 2006

The Privacy Gambit: Toward A Game Theoretic Approach To International Data Protection, Horace E. Anderson

Elisabeth Haub School of Law Faculty Publications

This article briefly explores several scenarios in which economic actors compete and cooperate in order to capture the value in personal information. The focus then shifts to one particular scenario: the ongoing interaction between the United States and the European Union in attempting to construct data protection regimes that serve the philosophies and citizens of each jurisdiction as well as provide a strategic economic advantage. A game theoretic model is presented to explain the course of dealings between the two actors, including both unilateral and bilateral actions. Part I ends with an exploration of opportunities for seizing competitive advantage, and …


Discrimination In The Laws Of Information Warfare, Mark R. Shulman Jan 1999

Discrimination In The Laws Of Information Warfare, Mark R. Shulman

Elisabeth Haub School of Law Faculty Publications

No abstract provided.