Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 8 of 8

Full-Text Articles in Law

The U.S. Supreme Court Addresses The Child Pornography Prevention Act And Child Online Protection Act In Ashcroft V. Free Speech Coalition And Ashcroft V. American Civil Liberties Union, Sue Ann Mota Dec 2002

The U.S. Supreme Court Addresses The Child Pornography Prevention Act And Child Online Protection Act In Ashcroft V. Free Speech Coalition And Ashcroft V. American Civil Liberties Union, Sue Ann Mota

Federal Communications Law Journal

Both the Child Pornography Prevention Act ("CPPA") and the Child Online Protection Act ("COPA") were intended by Congress to protect minors. The CPPA was intended to protect minors from the harmful effects of virtual child pornography. The COPA was intended to protect minors from pornography currently available commercially on the World Wide Web. However, in 2002, the U.S. Supreme Court addressed the constitutionality of both statutes: The Court struck down sections of the CPPA as overbroad and unconstitutional in Ashcroft v. Free Speech Coalition. In Ashcroft v. ACLU, the Court upheld some sections of COPA as not unconstitutionally overbroad, but …


What’S In A Name?, Jonathan Zittrain Dec 2002

What’S In A Name?, Jonathan Zittrain

Federal Communications Law Journal

Book Review: Ruling the Root, Milton L. Mueller, Cambridge, Mass.: MIT Press, 2002, 301 pages.

A review of Milton L. Mueller's Ruling the Root, The MIT Press, 2002. In the spring of 1998, the U.S. government told the Internet: Govern yourself. This unfocused order-a blandishment, really, expressed as an awkward "statement of policy" by the Department of Commerce, carrying no direct force of law-came about because the management of obscure but critical centralized Internet functions was at a political crossroads. In Ruling the Root, Mueller thoroughly documents the colorful history both before and after this moment of inflection, and gives …


Protecting The E-Marketplace Of Ideas By Protecting Employers: Immunity For Employers Under Section 230 Of The Communications Decency Act, Eric M.D. Zion May 2002

Protecting The E-Marketplace Of Ideas By Protecting Employers: Immunity For Employers Under Section 230 Of The Communications Decency Act, Eric M.D. Zion

Federal Communications Law Journal

While we credit employers that provide employees with free Internet access, such access comes at a price to the public because employers are one of the traditional defendents in defamation suits. Complicating matters, Congress enacted the Communications Decency Act. Its section 230 provides broad federal immunity for ISPs when defamatory material of a third party is published using their services. With the passage of section 230, Congress rendered employers immune for the same tort which they are so closely associated. Some argue that employers should not be capable of invoking the immunity because it would allow employers to defame with …


Carnivore, The Fbi’S E-Mail Surveillance System: Devouring Criminals, Not Privacy, Griffin S. Dunham May 2002

Carnivore, The Fbi’S E-Mail Surveillance System: Devouring Criminals, Not Privacy, Griffin S. Dunham

Federal Communications Law Journal

On July 11, 2000, the FBI intorduced Carnivore, an Internet monitoring system. It was designed, and is used exclusively, to carry out court-ordered surveillance of electronic communications. It is a tangible, portable device, tantamount to a phone tap, that allows the FBI to intercept and collect criminal suspects' e-mail without their knowledge or consent. This Note addresses competing and parallel interests between the government and society to determine the legitimacy and necessity of Carnivore. The purpose of this Note is twofold: first, to demonstrate the need for Carnivore to enable law enforcement to keep up with criminals who utilize cyberspace …


Injunctive Relief In The Internet Age: The Battle Between Free Speech And Trade Secrets, Adam W. Johnson May 2002

Injunctive Relief In The Internet Age: The Battle Between Free Speech And Trade Secrets, Adam W. Johnson

Federal Communications Law Journal

The information revolution has led to technological innovations in the movement, storage, and dissemination of information. The Internet allows a person, with good or bad intent, to distribute information to millions of people. This ability raises serious implications when trade secret information is the subject of Internet postings. Once a trade secret becomes publicly available, it loses its legal secrecy, and special legal protection. Additionally, competitors and everyone else on the Internet can gain access to the information. For those who rely on trade secret protection to guard their inventions, this presents a growing concern.

This Note will illustrate the …


Indecent Exposures In An Electronic Regime, Natalie L. Regoli Mar 2002

Indecent Exposures In An Electronic Regime, Natalie L. Regoli

Federal Communications Law Journal

As the topic of data privacy is vast and the subject of much scrutiny, this Comment focuses narrowly on commercial cyber-activities relating to the nonconsensual Internet acquisition of personally identifiable user data. Beginning with a brief examination of the technology that has exacerbated privacy law's inadequacies, it briefly discusses failed attempts to safeguard privacy rights through the market and federal agency management. It then addresses current U.S. privacy legislation and the 1995 European Privacy Directive. Finally, this Comment proposes the creation of a new legislative system to effectively combat the surreptitious collection, storage, use, and sale of personal data.


A Common Carrier Approach To Internet Interconnection, James B. Speta Mar 2002

A Common Carrier Approach To Internet Interconnection, James B. Speta

Federal Communications Law Journal

This Article argues that some generalized interconnection rules are broadly appropriate. Specifically, some lessons learned from the ancient regime of common carrier regulation provide the appropriate regulatory foundation for the modern Internet. Since at least the middle ages, most significant carriers of communications and commerce have been regulated as common carriers. Common carrier rules have resolved the disputed issues of duty to serve, nondiscrimination, and interconnection. These were the problems of seventeenth-century ferry owners and innkeepers, eighteenth-century steamships, nineteenth-century railroads, and twentieth-century telephone networks. They are similar to the problems of the twenty-first-century Internet, and similar rules can govern its …


The Defamation Of Choice-Of-Law In Cyberspace: Countering The View That The Restatement (Second) Of Conflict Of Laws Is Inadequate To Navigate The Borderless Reaches Of The Intangible Frontier, Philip Adam Davis Mar 2002

The Defamation Of Choice-Of-Law In Cyberspace: Countering The View That The Restatement (Second) Of Conflict Of Laws Is Inadequate To Navigate The Borderless Reaches Of The Intangible Frontier, Philip Adam Davis

Federal Communications Law Journal

This Note examines the adequacy of the traditional choice-of-law rules, including the Restatement (Second), in interstate cyber-defamation disputes, and argues that there is nothing different or unique about cyberspace which warrants the modification or abandonment of traditional choice-of-law regimes for cyber-defamation disputes.