Open Access. Powered by Scholars. Published by Universities.®

First Amendment Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in First Amendment

Today's Porn: Not A Constitutional Right; Not A Human Right, Patrick Trueman Jul 2017

Today's Porn: Not A Constitutional Right; Not A Human Right, Patrick Trueman

Dignity: A Journal of Analysis of Exploitation and Violence

No abstract provided.


Amend The Communications Decency Act To Protect Victims Of Sexual Exploitation, Samantha Vardaman Jul 2017

Amend The Communications Decency Act To Protect Victims Of Sexual Exploitation, Samantha Vardaman

Dignity: A Journal of Analysis of Exploitation and Violence

No abstract provided.


The Freedom From Sexploitation Agenda: Policy And Legislative Recommendations To Curb Sexual Exploitation, Dawn Hawkins Jul 2017

The Freedom From Sexploitation Agenda: Policy And Legislative Recommendations To Curb Sexual Exploitation, Dawn Hawkins

Dignity: A Journal of Analysis of Exploitation and Violence

No abstract provided.


Prisoner's Rights And The Correctional Scheme: The Legal Controversy And Problems Of Implementation - A Symposium - Introduction, Donald W. Dowd Jun 2017

Prisoner's Rights And The Correctional Scheme: The Legal Controversy And Problems Of Implementation - A Symposium - Introduction, Donald W. Dowd

Donald W. Dowd

No abstract provided.


Manipulation Of Suspects And Unrecorded Questioning, Christopher Slobogin May 2017

Manipulation Of Suspects And Unrecorded Questioning, Christopher Slobogin

Vanderbilt Law School Faculty Publications

Fifty years after Miranda, courts still do not have clear guidance on the types oftechniques police may use during interrogation. While first-generation tactics (a.k.a. the third degree) are banned, second-generation tactics such as those found in the famous Reid Manual continue to be used by interrogators. The Supreme Court has sent only vague signals as to which of these second- generation techniques, if any, are impermissible, and has made no mention of newly developed third-generation tactics that are much less reliant on manipulation. This Article divides second-generation techniques into four categories: impersonation, rationalization, fabrication, and negotiation. After concluding, based on …


Updating The Social Network: How Outdated And Unclear State Legislation Violates Sex Offenders’ First Amendment Rights, Elizabeth Tolon Mar 2017

Updating The Social Network: How Outdated And Unclear State Legislation Violates Sex Offenders’ First Amendment Rights, Elizabeth Tolon

Fordham Law Review

Readily available on computers, phones, tablets, or television, social media has become a necessary platform of expression for many. But, for others, social media is an inaccessible tool whose very use has criminal repercussions. To protect innocent children, many states have enacted legislation restricting sex offenders’ access to social media. Unfortunately, this legislation is often outdated, overly restrictive, and unconstitutional under the First Amendment. North Carolina has recently attracted national attention, as its statute highlights the potential constitutional issues states face in drafting such legislation. To avoid the constitutional concerns that North Carolina faces, state legislators must draft statutes narrowly …