Open Access. Powered by Scholars. Published by Universities.®

Internet Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 8 of 8

Full-Text Articles in Internet Law

Pornography Drives Technology: Why Not To Censor The Internet, Peter Johnson Nov 1996

Pornography Drives Technology: Why Not To Censor The Internet, Peter Johnson

Federal Communications Law Journal

Historically, the development of new media has been advanced by the creators of pornography. This was evident as communications media evolved from vernacular speech to movable type, to photography, to paperback books, to videotape, to cable and pay-TV, to 900 phone lines, to the French Minitel, and to the Internet. In short, pornography, far from being an evil that the First Amendment must endure, is a positive good that encourages experimentation with new technology. Accordingly, society should not view cyberpornographers as pariahs, rather they should be viewed as explorers who pave the roads for civilization to follow.


Federal Broadband Law, John Thorne, Michael K. Kellog, Peter W. Huber, Jeffrey A. Wolfson Jan 1996

Federal Broadband Law, John Thorne, Michael K. Kellog, Peter W. Huber, Jeffrey A. Wolfson

Richmond Journal of Law & Technology

The authors of this book have brought together a vast and varied array of experience. Mr. Thorne is the Vice President & Associate General Counsel for Bell Atlantic; Mr. Huber is a Senior Fellow at the Manhattan Institute for Policy Research; and Mr. Kellogg is a Partner at Kellogg, Huber, Hansen & Todd. A reader will find the occasional use of technical jargon, such as "domsats" (domestic satellites), "coax" (coaxial cable), and "syndex" rules (syndicated exclusivity rules to protect syndicated, non-network programming) to be somewhat confusing. "Telcos" and "cablecos" are telephone and cable companies, respectively. Overall, however, technical jargon is …


Don't Shoot The Messenger: Protecting Speech On Editorially Controlled Bulletin Board Services By Applying Sullivan Malice, 14 J. Marshall J. Computer & Info. L. 347 (1996), Iris Ferosie Jan 1996

Don't Shoot The Messenger: Protecting Speech On Editorially Controlled Bulletin Board Services By Applying Sullivan Malice, 14 J. Marshall J. Computer & Info. L. 347 (1996), Iris Ferosie

UIC John Marshall Journal of Information Technology & Privacy Law

Courts must determine the standard of liability for Internet Service Providers (ISPs) that proactively edit their Bulletin Board Systems (BBSs) for defamatory content. ISPs are computer services that provide data processing and communication services to customers - individual computer users who subscribe to the ISP's service. BBSs are computer programs that act like a traditional bulletin board. They are centrally located on the ISP's computers, and people who subscribe to the ISP can access that bulletin board to publish (or "post") messages on the board, and read and respond to other people's messages. Some ISPs allow people to post messages …


The Constitutionality Of Congressional Efforts To Ban Computer-Generated Child Pornography: A First Amendment Assessment Of S. 1237, 14 J. Marshall J. Computer & Info. L. 483 (1996), Ronald W. Adelman Jan 1996

The Constitutionality Of Congressional Efforts To Ban Computer-Generated Child Pornography: A First Amendment Assessment Of S. 1237, 14 J. Marshall J. Computer & Info. L. 483 (1996), Ronald W. Adelman

UIC John Marshall Journal of Information Technology & Privacy Law

This article addressed the constitutionality of the Child Pornography Prevention Act of 1995 (Hatch Bill) in regard to computer-generated child pornography. The Bill outlaws a visual depiction that is or appears to be of a minor engaging in sexually explicit conduct. The author claims the comments of David B. Johnson and John C. Scheller regarding the constitutionality of the Bill are analytically flawed because they focus on dicta from New York v. Ferber and Osborne v. Ohio. The author then engages in his own assessment of the Bill using a First Amendment approach and suggests what findings Congress should make …


Cryptography And The First Amendment: The Right To Be Unheard, 14 J. Marshall J. Computer & Info. L. 325 (1996), Phillip E. Reiman Jan 1996

Cryptography And The First Amendment: The Right To Be Unheard, 14 J. Marshall J. Computer & Info. L. 325 (1996), Phillip E. Reiman

UIC John Marshall Journal of Information Technology & Privacy Law

The author proposes that current technology has made cryptography an important element in maintaining a society's right to free speech. Cryptography is the process of using secret codes to protect information. This protection increases society's privacy because cryptographers can limit the amount of information that is seen by others. The world is becoming a place where there is virtually no privacy. Everyone is open to surveillance through the Internet, use of a credit card or being filmed on a security camera. Cryptography is a means in which a person can protect his privacy. Through this protection, the author states that …


Commercial Exploitation Or Protected Use? Stern V. Delphi Internet Services Corporation And The Erosion Of The Right Of Publicity, Aaron J. Reber, Karin Mika Jan 1996

Commercial Exploitation Or Protected Use? Stern V. Delphi Internet Services Corporation And The Erosion Of The Right Of Publicity, Aaron J. Reber, Karin Mika

Touro Law Review

No abstract provided.


Garbage In: Emerging Media And Regulation Of Unsolicited Commercial Solicitiations, Michael W. Carroll Jan 1996

Garbage In: Emerging Media And Regulation Of Unsolicited Commercial Solicitiations, Michael W. Carroll

Articles in Law Reviews & Other Academic Journals

No abstract provided.


A Right To Read Anonymously: A Closer Look At "Copyright Management" In Cyberspace, Julie E. Cohen Jan 1996

A Right To Read Anonymously: A Closer Look At "Copyright Management" In Cyberspace, Julie E. Cohen

Georgetown Law Faculty Publications and Other Works

It has become commonplace to say that we have entered the age of information. The words conjure up images of a reader’s paradise—an era of limitless access to information resources and unlimited interpersonal communication. In truth, however, the new information age is turning out to be as much an age of information about readers as an age of information for readers. The same technologies that have made vast amounts of information accessible in digital form are enabling information providers to amass an unprecedented wealth of data about who their customers are and what they like to read. In the new …