Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Law

The New Governors: The People, Rules And Processes Governing Online Speech, Kate Klonick Jan 2018

The New Governors: The People, Rules And Processes Governing Online Speech, Kate Klonick

Faculty Publications

Private online platforms have an increasingly essential role in free speech and participation in democratic culture. But while it might appear that any internet user can publish freely and instantly online, many platforms actively curate the content posted by their users. How and why these platforms operate to moderate speech is largely opaque.

This Article provides the first analysis of what these platforms are actually doing to moderate online speech under a regulatory and First Amendment framework. Drawing from original interviews, archived materials, and internal documents, this Article describes how three major online platforms — Facebook, Twitter, and YouTube — …


A New Taxonomy For Online Harms, Kate Klonick Jan 2015

A New Taxonomy For Online Harms, Kate Klonick

Faculty Publications

(Excerpt)

Bullying is generally understood among academics and educators as having to meet three criteria: (1) it must be verbal or physical aggression; (2) it must be repeated over time; and (3) it must involve a power differential. When talking about cyber bullying, the aggression is mostly verbal, using “threats, blackmail. . . gossip and rumors” and online personas or messages can be more cruel, vindictive and mean. Though cyber bullying typically describes acts between children, the same acts by adults could also be considered cyber harassment. Unlike harassment, however, bullying does not have a history of criminal liability—though all …


Incendiary Speech And Social Media, Lyrissa Lidsky Jan 2011

Incendiary Speech And Social Media, Lyrissa Lidsky

Faculty Publications

Incidents illustrating the incendiary capacity of social media have rekindled concerns about the "mismatch" between existing doctrinal categories and new types of dangerous speech. This Essay examines two such incidents, one in which an offensive tweet and YouTube video led a hostile audience to riot and murder, and the other in which a blogger urged his nameless, faceless audience to murder federal judges. One incident resulted in liability for the speaker even though no violence occurred; the other did not lead to liability for the speaker even though at least thirty people died as a result of his words. An …


Proving Fair Use: Burden Of Proof As Burden Of Speech, Ned Snow Apr 2010

Proving Fair Use: Burden Of Proof As Burden Of Speech, Ned Snow

Faculty Publications

Courts have created a burden of proof in copyright that chills protected speech. The doctrine of fair use purports to ensure that copyright law does not trample rights of speakers whose expression employs copyrighted material. Yet those speakers face a burden of proof that weighs heavily in the fair use analysis, where factual inquiries are often subjective and speculative. Failure to satisfy the burden means severe penalties, which prospect quickly chills the free exercise of speech that constitutes a fair use. The fair-use burden of proof is repugnant to the fair use purpose. Today, copyright holders are exploiting the burden …


The Constitutional Failing Of The Anticybersquatting Act, Ned Snow Jan 2005

The Constitutional Failing Of The Anticybersquatting Act, Ned Snow

Faculty Publications

Eminent domain and thought control are occurring in cyberspace. Through the Anticybersquatting Consumer Protection Act (ACPA), the government transfers domain names from domain-name owners to private parties based on the owners' bad-faith intent. The owners receive no just compensation. The private parties who are recipients of the domain names are trademark holders whose trademarks correspond with the domain names. Often the trademark holders have no property rights in those domain names: trademark law only allows mark holders to exclude others from making commercial use of their marks; it does not allow mark holders to reserve the marks for their own …


Silencing John Doe: Defamation And Discourse In Cyberspace, Lyrissa Lidsky Jan 2000

Silencing John Doe: Defamation And Discourse In Cyberspace, Lyrissa Lidsky

Faculty Publications

John Doe has become a popular defamation defendant as corporations and their officers bring defamation suits for statements made about them in Internet discussion fora. These new suits are not even arguably about recovering money damages but instead are brought for symbolic reasons — some worthy, some not so worthy. If the only consequence of these suits were that Internet users were held accountable for their speech, the suits would be an unalloyed good. However, these suits threaten to suppress legitimate criticism along with intentional and reckless falsehoods, and existing First Amendment law doctrines are not responsive to the threat …