Open Access. Powered by Scholars. Published by Universities.®

First Amendment Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 9 of 9

Full-Text Articles in First Amendment

Law School News: Logan To Serve As Adviser On Restatement Third Of Torts 11-07-2019, Michael M. Bowden Nov 2019

Law School News: Logan To Serve As Adviser On Restatement Third Of Torts 11-07-2019, Michael M. Bowden

Life of the Law School (1993- )

No abstract provided.


Brief Amici Curiae Of Electronic Frontier Foundation, 1851 Center For Constitutional Law, And Profs. Jonathan Entin, David F. Forte, Andrew Geronimo, Raymond Ku, Stephen Lazarus, Kevin Francis O’Neill, Margaret Tarkington, Aaron H. Caplan, And Eugene Volokh In Support Of Respondent-Appellant, Joni Bey And Rebecca Rasawehr V. Jeffrey Rasawehr, Supreme Court Of Ohio (Case No. 2019-0295), David Forte, Stephen R. Lazarus, Kevin F. O'Neill, Jonathan L. Entin, Andrew Geronimo, Raymond Ku, Margaret Tarkington, Aaron H. Kaplan, Eugene Volokh Jul 2019

Brief Amici Curiae Of Electronic Frontier Foundation, 1851 Center For Constitutional Law, And Profs. Jonathan Entin, David F. Forte, Andrew Geronimo, Raymond Ku, Stephen Lazarus, Kevin Francis O’Neill, Margaret Tarkington, Aaron H. Caplan, And Eugene Volokh In Support Of Respondent-Appellant, Joni Bey And Rebecca Rasawehr V. Jeffrey Rasawehr, Supreme Court Of Ohio (Case No. 2019-0295), David Forte, Stephen R. Lazarus, Kevin F. O'Neill, Jonathan L. Entin, Andrew Geronimo, Raymond Ku, Margaret Tarkington, Aaron H. Kaplan, Eugene Volokh

Law Faculty Briefs and Court Documents

The brief argues that the Third District Court of Appeals, in violation of the First Amendment, erred in upholding an injunction that barred defendant from any online postings regarding plaintiff, whether or not those postings were to plaintiff or to third parties.


Web Of Lives: How Regulating The Dark Web Can Combat Online Human Trafficking, Christopher Campbell Jun 2019

Web Of Lives: How Regulating The Dark Web Can Combat Online Human Trafficking, Christopher Campbell

Journal of the National Association of Administrative Law Judiciary

This article argues that one of the ways to appropriately fight online human trafficking is through governmental regulation of the Dark Web. Specifically, this article argues that a new Attaching Criminal Dark Web Statute is the best method to combat human trafficking because it can incentivize prosecutors to use current human trafficking statutes to prosecute traffickers. This proposal can deter traffickers from enslaving people. Additionally, this article shows the evolution of online human trafficking laws, investigation, and prosecution (Section II); demonstrates why current and proposed laws do not effectively address the online human trafficking issue (Sections III and IV); introduces …


The Indecency Of The Communications Decency Act § 230: Unjust Immunity For Monstrous Social Media Platforms, Natalie Annette Pagano Apr 2019

The Indecency Of The Communications Decency Act § 230: Unjust Immunity For Monstrous Social Media Platforms, Natalie Annette Pagano

Pace Law Review

The line between First Amendment protection and the innovation of social media platforms is hazy at best. Not only do these platforms increasingly encompass the lives of many individuals, but they provide incredible new opportunities to interact from near and far, through sharing photographs, videos, and memories. The Internet provides countless outlets that are available at the tip of users’ fingers: thriving forums to communicate nearly whenever and wherever desired. Users effortlessly interact on these platforms and are consistently exposed to numerous forms of speech, including messages through posts, chat room discussions, videos, polls, and shared statements. From 2010 to …


When You Give A Terrorist A Twitter: Holding Social Media Companies Liable For Their Support Of Terrorism, Anna Elisabeth Jayne Goodman Jan 2019

When You Give A Terrorist A Twitter: Holding Social Media Companies Liable For Their Support Of Terrorism, Anna Elisabeth Jayne Goodman

Pepperdine Law Review

In the electronic age, the internet—and—social media specifically, can be a tool for good but, abused and unchecked, can lead to great harm. Terrorist organizations utilize social media as a means of recruiting and training new members, urging them to action, and creating public terror. These platforms serve as the catalyst for equipping the growing number of “lone wolf” attackers taking action across the United States. Under civil liability provisions created under JASTA and the ATA, material supporters of terrorism can be held liable for their actions, and with the key role social media sites now play in supporting terrorism, …


Speech Across Borders, Jennifer Daskal Jan 2019

Speech Across Borders, Jennifer Daskal

Articles in Law Reviews & Other Academic Journals

As both governments and tech companies seek to regulate speech online, these efforts raise critical, and contested, questions about how far those regulations can and should extend. Is it enough to take down or delink material in a geographically segmented way? Or can and should tech companies be ordered to takedown or delink unsavory content across their entire platforms—no matter who is posting the material or where the unwanted content is viewed? How do we deal with conflicting speech norms across borders? And how do we protect against the most censor-prone nation effectively setting global speech rules? These questions were …


Marketplace Of Ideas, Privacy, And The Digital Audience, Alexander Tsesis Jan 2019

Marketplace Of Ideas, Privacy, And The Digital Audience, Alexander Tsesis

Faculty Publications & Other Works

The availability of almost limitless sets of digital information has opened a vast marketplace of ideas. Information service providers like Facebook and Twitter provide users with an array of personal information about products, friends, acquaintances, and strangers. While this data enriches the lives of those who share content on the internet, it comes at the expense of privacy. Social media companies disseminate news, advertisements, and political messages, while also capitalizing on consumers' private shopping, surfing, and traveling habits. Companies like Cambridge Analytica, Amazon, and Apple rely on algorithmic programs to mash up and scrape enormous amounts of online and otherwise …


The Trouble With Tinker: An Examination Of Student Free Speech Rights In The Digital Age, Allison N. Sweeney Jan 2019

The Trouble With Tinker: An Examination Of Student Free Speech Rights In The Digital Age, Allison N. Sweeney

Fordham Intellectual Property, Media and Entertainment Law Journal

The boundaries of the schoolyard were once clearly delineated by the physical grounds of the school. In those days, it was relatively easy to determine what sort of student behavior fell within an educator’s purview, and what lay beyond the school’s control. Technological developments have all but erased these confines and extended the boundaries of the school environment somewhat infinitely, as the internet and social media allow students to interact seemingly everywhere and at all times. As these physical boundaries of the schoolyard have disappeared, so too has the certainty with which an educator might supervise a student’s behavior.

Because …


Digitizing Brandenburg: Common Law Drift Toward A Causal Theory Of Imminence, J. Remy Green Jan 2019

Digitizing Brandenburg: Common Law Drift Toward A Causal Theory Of Imminence, J. Remy Green

Faculty Scholarship

The Supreme Court’s Brandenburg v. Ohio test provides an exception to the First Amendment’s broad guarantee of freedom of speech. Where speech is (1) directed to inciting or producing imminent lawless action, and (2) is likely to incite or produce such action, the First Amendment withdraws its promise of protection. Thus, where the “imminence” of lawless action cannot be shown, free speech cannot be restricted. Since Brandenburg, Courts have applied a test for imminence that turns on proximity in space and in time — that is, the test evaluates how spatiotemporally imminent lawless activity is. In this Article, I argue …