Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Publication
- Publication Type
Articles 1 - 13 of 13
Full-Text Articles in Law
After Privacy: The Rise Of Facebook, The Fall Of Wikileaks, And Singapore’S Personal Data Protection Act 2012, Simon Chesterman
After Privacy: The Rise Of Facebook, The Fall Of Wikileaks, And Singapore’S Personal Data Protection Act 2012, Simon Chesterman
Simon Chesterman
This article discusses the changing ways in which information is produced, stored, and shared — exemplified by the rise of social-networking sites like Facebook and controversies over the activities of WikiLeaks — and the implications for privacy and data protection. Legal protections of privacy have always been reactive, but the coherence of any legal regime has also been undermined by the lack of a strong theory of what privacy is. There is more promise in the narrower field of data protection. Singapore, which does not recognise a right to privacy, has positioned itself as an e-commerce hub but had no …
Smoking Out Big Tobacco: Some Lessons About Academic Freedom, The World Wide Web, Media Conglomeration, And Public Service Pedagogy From The Battle Over The Brown & Williamson Documents, Clay Calvert
Pepperdine Law Review
No abstract provided.
The Disappearing Schoolhouse Gate: Applying Tinker In The Internet Age , John T. Ceglia
The Disappearing Schoolhouse Gate: Applying Tinker In The Internet Age , John T. Ceglia
Pepperdine Law Review
No abstract provided.
Corporate Criticism On The Internet: The Fine Line Between Anonymous Speech And Cybersmear, Scot Wilson
Corporate Criticism On The Internet: The Fine Line Between Anonymous Speech And Cybersmear, Scot Wilson
Pepperdine Law Review
No abstract provided.
Building Universal Digital Libraries: An Agenda For Copyright Reform, Hannibal Travis
Building Universal Digital Libraries: An Agenda For Copyright Reform, Hannibal Travis
Pepperdine Law Review
This article proposes a series of copyright reforms to pave the way for digital library projects like Project Gutenberg, the Internet Archive, and Google Print, which promise to make much of the world's knowledge easily searchable and accessible from anywhere. Existing law frustrates digital library growth and development by granting overlapping, overbroad, and near-perpetual copyrights in books, art, audiovisual works, and digital content. Digital libraries would benefit from an expanded public domain, revitalized fair use doctrine and originality requirement, rationalized systems for copyright registration and transfer, and a new framework for compensating copyright owners for online infringement without imposing derivative …
Wiretapping The Internet: The Expansion Of The Communications Assistance To Law Enforcement Act To Extend Government Surveillance, Christa M. Hibbard
Wiretapping The Internet: The Expansion Of The Communications Assistance To Law Enforcement Act To Extend Government Surveillance, Christa M. Hibbard
Federal Communications Law Journal
Criminal use of the Internet to circumvent traditional government phone wiretaps has inspired the Obama Administration to create a proposal to expand the Communications Assistance to Law Enforcement Act ("CALEA"). CALEA was passed in 1994 to regulate telephone and broadband companies to ensure compliance with standards to enable government wiretapping. The proposed amendment of CALEA would allow the government to require all communications service providers to meet technical standards necessary to comply with a wiretap order. The expansion of CALEA would likely widen its scope to social networking sites, instant messaging, gaming consoles that allow conversation among multiple players, and …
The Future Of Free Expression In A Digital Age, Jack M. Balkin
The Future Of Free Expression In A Digital Age, Jack M. Balkin
Pepperdine Law Review
In the twenty-first century, at the very moment that our economic and social lives are increasingly dominated by information technology and information flows, the judge-made doctrines of the First Amendment seem increasingly irrelevant to the key free speech battles of the future. The most important decisions affecting the future of freedom of speech will not occur in constitutional law; they will be decisions about technological design, legislative and administrative regulations, the formation of new business models, and the collective activities of end-users. Moreover, the values of freedom of expression will become subsumed within a larger set of concerns that I …
Exploring The First Amendment Rights Of Teens In Relationship To Sexting And Censorship, Julia Halloran Mclaughlin
Exploring The First Amendment Rights Of Teens In Relationship To Sexting And Censorship, Julia Halloran Mclaughlin
University of Michigan Journal of Law Reform
This Article explores child pornography law in relation to teen sexting conduct. Recently, some teens who engaged in teen sexting have been convicted under child pornography laws and have been required to register as sexual predators. The criminalization of teens for developmentally typical behavior, mimicking the conduct of adults, can result in grave harm to most teens. Furthermore, the application of child pornography laws to teen sexting conduct demonstrates the constitutional overbreadth of the current definition of child pornography. Photographs have an emblematic role in society-capturing and celebrating youth. Moreover, the creation of teen sexting images accompanies a teen's developmental …
All Those Like You: Identity Aggression And Student Speech, Ari Ezra Waldman
All Those Like You: Identity Aggression And Student Speech, Ari Ezra Waldman
Articles & Chapters
Online and face-to-face harassment in schools requires a coordinated response from the school, parents, students, and government. In this Article, I address a particular subset of online and face-to-face harassment, or identity-based harassment. Identity-based aggressors highlight a quality intrinsic to someone’s personhood and demean it, deprive it of value, and use it as a weapon. They attack women, racial minorities, religious minorities, and other traditionally victimized groups. And, as such, they attack not only their particular victims but also their victims’ communities. Identity-based aggressors com- mit a constitutional evil not only because their behavior interferes with victims’ access to education, …
Incitement To Riot In The Age Of Flash Mobs, Margot E. Kaminski
Incitement To Riot In The Age Of Flash Mobs, Margot E. Kaminski
Publications
As people increasingly use social media to organize both protests and robberies, government will try to regulate these calls to action. With an eye to this intensifying dynamic, this Article reviews First Amendment jurisprudence on incitement and applies it to existing statutes on incitement to riot at a common law, state, and federal level. The article suggests that First Amendment jurisprudence has a particularly tortuous relationship with regulating speech directed to crowds. It examines current crowd psychology to suggest which crowd behavior, if any, should as a matter of policy be subject to regulation. It concludes that many existing incitement-to-riot …
Layshock Ex Rel. Layshock V. Hermitage School District, Matthew Beatus
Layshock Ex Rel. Layshock V. Hermitage School District, Matthew Beatus
NYLS Law Review
No abstract provided.
Incendiary Speech And Social Media, Lyrissa Barnett Lidsky
Incendiary Speech And Social Media, Lyrissa Barnett Lidsky
UF Law Faculty Publications
Incidents illustrating the incendiary capacity of social media have rekindled concerns about the "mismatch" between existing doctrinal categories and new types of dangerous speech. This Essay examines two such incidents, one in which an offensive tweet and YouTube video led a hostile audience to riot and murder, and the other in which a blogger urged his nameless, faceless audience to murder federal judges. One incident resulted in liability for the speaker, even though no violence occurred; the other did not lead to liability for the speaker even though at least thirty people died as a result of his words. An …
Decoding First Amendment Coverage Of Computer Source Code In The Age Of Youtube, Facebook And The Arab Spring, Jorge R. Roig
Decoding First Amendment Coverage Of Computer Source Code In The Age Of Youtube, Facebook And The Arab Spring, Jorge R. Roig
Jorge R Roig