Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- First Amendment (3)
- Internet (2)
- Broadband Media (1)
- Cable Act (1)
- Civil Rights Law (1)
-
- Coax (1)
- Commercial Exploitation (1)
- Communications Act (1)
- Communications Decency Act of 1996 (1)
- Consumer Protection Law (1)
- Copyright Act (1)
- Copyright management (1)
- Crimes (1)
- Domsats (1)
- Email (1)
- FCC (1)
- Federal Broadband Law (1)
- Federal Communications Commission (1)
- Garbage (1)
- ITU (1)
- International Telecommunications Union (1)
- Internet Services Corporation (1)
- LMDS (1)
- Local multipoint distribution services (1)
- Mail (1)
- Online privacy (1)
- Pornography (1)
- Public Interest (1)
- Regulation (1)
- Right Of Publicity (1)
- Publication
- Publication Type
Articles 1 - 8 of 8
Full-Text Articles in Internet Law
Pornography Drives Technology: Why Not To Censor The Internet, Peter Johnson
Pornography Drives Technology: Why Not To Censor The Internet, Peter Johnson
Federal Communications Law Journal
Historically, the development of new media has been advanced by the creators of pornography. This was evident as communications media evolved from vernacular speech to movable type, to photography, to paperback books, to videotape, to cable and pay-TV, to 900 phone lines, to the French Minitel, and to the Internet. In short, pornography, far from being an evil that the First Amendment must endure, is a positive good that encourages experimentation with new technology. Accordingly, society should not view cyberpornographers as pariahs, rather they should be viewed as explorers who pave the roads for civilization to follow.
Federal Broadband Law, John Thorne, Michael K. Kellog, Peter W. Huber, Jeffrey A. Wolfson
Federal Broadband Law, John Thorne, Michael K. Kellog, Peter W. Huber, Jeffrey A. Wolfson
Richmond Journal of Law & Technology
The authors of this book have brought together a vast and varied array of experience. Mr. Thorne is the Vice President & Associate General Counsel for Bell Atlantic; Mr. Huber is a Senior Fellow at the Manhattan Institute for Policy Research; and Mr. Kellogg is a Partner at Kellogg, Huber, Hansen & Todd. A reader will find the occasional use of technical jargon, such as "domsats" (domestic satellites), "coax" (coaxial cable), and "syndex" rules (syndicated exclusivity rules to protect syndicated, non-network programming) to be somewhat confusing. "Telcos" and "cablecos" are telephone and cable companies, respectively. Overall, however, technical jargon is …
Don't Shoot The Messenger: Protecting Speech On Editorially Controlled Bulletin Board Services By Applying Sullivan Malice, 14 J. Marshall J. Computer & Info. L. 347 (1996), Iris Ferosie
UIC John Marshall Journal of Information Technology & Privacy Law
Courts must determine the standard of liability for Internet Service Providers (ISPs) that proactively edit their Bulletin Board Systems (BBSs) for defamatory content. ISPs are computer services that provide data processing and communication services to customers - individual computer users who subscribe to the ISP's service. BBSs are computer programs that act like a traditional bulletin board. They are centrally located on the ISP's computers, and people who subscribe to the ISP can access that bulletin board to publish (or "post") messages on the board, and read and respond to other people's messages. Some ISPs allow people to post messages …
The Constitutionality Of Congressional Efforts To Ban Computer-Generated Child Pornography: A First Amendment Assessment Of S. 1237, 14 J. Marshall J. Computer & Info. L. 483 (1996), Ronald W. Adelman
UIC John Marshall Journal of Information Technology & Privacy Law
This article addressed the constitutionality of the Child Pornography Prevention Act of 1995 (Hatch Bill) in regard to computer-generated child pornography. The Bill outlaws a visual depiction that is or appears to be of a minor engaging in sexually explicit conduct. The author claims the comments of David B. Johnson and John C. Scheller regarding the constitutionality of the Bill are analytically flawed because they focus on dicta from New York v. Ferber and Osborne v. Ohio. The author then engages in his own assessment of the Bill using a First Amendment approach and suggests what findings Congress should make …
Cryptography And The First Amendment: The Right To Be Unheard, 14 J. Marshall J. Computer & Info. L. 325 (1996), Phillip E. Reiman
Cryptography And The First Amendment: The Right To Be Unheard, 14 J. Marshall J. Computer & Info. L. 325 (1996), Phillip E. Reiman
UIC John Marshall Journal of Information Technology & Privacy Law
The author proposes that current technology has made cryptography an important element in maintaining a society's right to free speech. Cryptography is the process of using secret codes to protect information. This protection increases society's privacy because cryptographers can limit the amount of information that is seen by others. The world is becoming a place where there is virtually no privacy. Everyone is open to surveillance through the Internet, use of a credit card or being filmed on a security camera. Cryptography is a means in which a person can protect his privacy. Through this protection, the author states that …
Commercial Exploitation Or Protected Use? Stern V. Delphi Internet Services Corporation And The Erosion Of The Right Of Publicity, Aaron J. Reber, Karin Mika
Commercial Exploitation Or Protected Use? Stern V. Delphi Internet Services Corporation And The Erosion Of The Right Of Publicity, Aaron J. Reber, Karin Mika
Touro Law Review
No abstract provided.
Garbage In: Emerging Media And Regulation Of Unsolicited Commercial Solicitiations, Michael W. Carroll
Garbage In: Emerging Media And Regulation Of Unsolicited Commercial Solicitiations, Michael W. Carroll
Articles in Law Reviews & Other Academic Journals
No abstract provided.
A Right To Read Anonymously: A Closer Look At "Copyright Management" In Cyberspace, Julie E. Cohen
A Right To Read Anonymously: A Closer Look At "Copyright Management" In Cyberspace, Julie E. Cohen
Georgetown Law Faculty Publications and Other Works
It has become commonplace to say that we have entered the age of information. The words conjure up images of a reader’s paradise—an era of limitless access to information resources and unlimited interpersonal communication. In truth, however, the new information age is turning out to be as much an age of information about readers as an age of information for readers. The same technologies that have made vast amounts of information accessible in digital form are enabling information providers to amass an unprecedented wealth of data about who their customers are and what they like to read. In the new …