Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- University of Michigan Law School (16)
- Maurer School of Law: Indiana University (8)
- New York Law School (8)
- Pepperdine University (8)
- Selected Works (8)
-
- American University Washington College of Law (5)
- Touro University Jacob D. Fuchsberg Law Center (5)
- Cleveland State University (4)
- The University of Akron (4)
- University of Florida Levin College of Law (4)
- William & Mary Law School (4)
- Boston University School of Law (3)
- Northwestern Pritzker School of Law (3)
- Roger Williams University (3)
- Seattle University School of Law (3)
- SelectedWorks (3)
- St. John's University School of Law (3)
- University of Pennsylvania Carey Law School (3)
- University of Rhode Island (3)
- Fordham Law School (2)
- Marquette University Law School (2)
- Pace University (2)
- SJ Quinney College of Law, University of Utah (2)
- University of Baltimore Law (2)
- University of Colorado Law School (2)
- University of Georgia School of Law (2)
- University of Maryland Francis King Carey School of Law (2)
- University of Missouri School of Law (2)
- University of Nevada, Las Vegas -- William S. Boyd School of Law (2)
- University of Oklahoma College of Law (2)
- Publication Year
- Publication
-
- Michigan Telecommunications & Technology Law Review (10)
- Faculty Publications (6)
- Federal Communications Law Journal (6)
- Pepperdine Law Review (6)
- All Faculty Scholarship (5)
-
- Articles in Law Reviews & Other Academic Journals (5)
- NYLS Law Review (5)
- Touro Law Review (5)
- Akron Law Review (4)
- Faculty Scholarship (4)
- UF Law Faculty Publications (4)
- Articles & Chapters (3)
- Dignity: A Journal of Analysis of Exploitation and Violence (3)
- Michigan Law Review (3)
- Articles by Maurer Faculty (2)
- Cleveland State Law Review (2)
- Fordham Intellectual Property, Media and Entertainment Law Journal (2)
- Jorge R Roig (2)
- Journal Articles (2)
- Journal of the National Association of Administrative Law Judiciary (2)
- Lyrissa Barnett Lidsky (2)
- Marquette Law Review (2)
- Maryland Law Review (2)
- Northwestern University Law Review (2)
- Oklahoma Journal of Law and Technology (2)
- Pace Law Review (2)
- Publications (2)
- Scholarly Works (2)
- Seattle University Law Review (2)
- University of Michigan Journal of Law Reform (2)
- Publication Type
- File Type
Articles 61 - 90 of 138
Full-Text Articles in Law
Silencing John Doe: Defamation & Discourse In Cyberspace, Lyrissa Barnett Lidsky
Silencing John Doe: Defamation & Discourse In Cyberspace, Lyrissa Barnett Lidsky
Lyrissa Barnett Lidsky
John Doe has become a popular defamation defendant as corporations and their officers bring defamation suits for statements made about them in Internet discussion fora. These new suits are not even arguably about recovering money damages but instead are brought for symbolic reasons-some worthy, some not so worthy. If the only consequence of these suits were that Internet users were held accountable for their speech, the suits would be an unalloyed good. However, these suits threaten to suppress legitimate criticism along with intentional and reckless falsehoods, and existing First Amendment law doctrines are not responsive to the threat these suits …
Introducing A Takedown For Trade Secrets On The Internet, Elizabeth Rowe
Introducing A Takedown For Trade Secrets On The Internet, Elizabeth Rowe
Elizabeth A Rowe
This Article explores, for the first time, an existing void in trade-secret law. When a trade-secret owner discovers that its trade secrets have been posted on the Internet, there is currently no legislative mechanism by which the owner can request that the information be taken down. The only remedy to effectuate removal of the material is to obtain a court order, usually either a temporary restraining order or a preliminary injunction. When a trade secret appears on the Internet, the owner often loses the ability to continue to claim it as a trade secret and to prevent others from using …
How Much Spam Can Can-Spam Can?: Evaluating The Effectiveness Of The Can-Spam Act In The Wake Of White Buffalo Ventures V. University Of Texas, Fay Katayama
Touro Law Review
No abstract provided.
Anonymous Speech On The Internet: Why Current Efforts By States To Regulate Anonymous Speech Fail Constitutional Scrutiny, And How Courts Should Protect First Amendment Rights, Conor Francis Linehan
Anonymous Speech On The Internet: Why Current Efforts By States To Regulate Anonymous Speech Fail Constitutional Scrutiny, And How Courts Should Protect First Amendment Rights, Conor Francis Linehan
Conor Francis Linehan
The legislatures in New York and Illinois have attempted to regulate the speech of individuals on the Internet and threaten to void their anonymity. The legislatures are trying to reach the actionable or harmful speech that often shows up on websites like Reddit.com. However, the bills have reached too far, and encompass much speech that is absolutely protected. This note argues that the right of anonymous speech on the Internet should be protected from government encroachment, and the proper way to protect the interests of individuals who are the subject of libelous or damaging speech should be through a re-working …
Surveillance, Speech Suppression And Degradation Of The Rule Of Law In The “Post-Democracy Electronic State”, David Barnhizer
Surveillance, Speech Suppression And Degradation Of The Rule Of Law In The “Post-Democracy Electronic State”, David Barnhizer
David Barnhizer
None of us can claim the quality of original insight achieved by Alexis de Tocqueville in his early 19th Century classic Democracy in America in his observation that the “soft” repression of democracy was unlike that in any other political form. It is impossible to deny that we in the US, the United Kingdom and Western Europe are experiencing just such a “gentle” drift of the kind that Tocqueville describes, losing our democratic integrity amid an increasingly “pretend” democracy. He explained: “[T]he supreme power [of government] then extends its arm over the whole community. It covers the surface of society …
Tollbooths And Newsstands On The Information Superhighway, Brad A. Greenberg
Tollbooths And Newsstands On The Information Superhighway, Brad A. Greenberg
Michigan Telecommunications & Technology Law Review
Countering the perception that speech limitations affecting distribution necessarily reduce access to information, this Essay proffers that copyright expansions actually can increase access and thereby serve important copyright and First Amendment values. In doing so, this discussion contributes to the growing literature and two recent Supreme Court opinions discussing whether copyright law and First Amendment interests can coexist.
When The Classroom Is Not In The Schoolhouse: Applying Tinker To Student Speech At Online Schools, Brett T. Macintyre
When The Classroom Is Not In The Schoolhouse: Applying Tinker To Student Speech At Online Schools, Brett T. Macintyre
Seattle University Law Review
Despite the overwhelming increase in students’ Internet use and the growing popularity of online public schools, the United States Supreme Court has never addressed how, or if, schools can discipline students for disruptive online speech without violating the students’ First Amendment rights. What the Supreme Court has addressed is how school administrators can constitutionally discipline students within traditional schools. In a landmark decision, Tinker v. Des Moines Independent Community School District, the Supreme Court announced the now famous principle that students do not “shed their constitutional rights to freedom of speech or expression at the schoolhouse gate.” Still, the Court …
Net Neutrality: Preparing For The Future, Jennifer Wong
Net Neutrality: Preparing For The Future, Jennifer Wong
Journal of the National Association of Administrative Law Judiciary
No abstract provided.
The Digital Accountability And Transparency Act Of 2011 (Data): Using Open Data Principles To Revamp Spending Transparency Legislation, Jillian Raines '12
The Digital Accountability And Transparency Act Of 2011 (Data): Using Open Data Principles To Revamp Spending Transparency Legislation, Jillian Raines '12
NYLS Law Review
No abstract provided.
Durkheim's Internet: Social And Political Theory In Online Society, Ari Ezra Waldman
Durkheim's Internet: Social And Political Theory In Online Society, Ari Ezra Waldman
Articles & Chapters
While the Internet has changed dramatically since the early 1990s, the legal regime governing the right to privacy online and Internet speech is still steeped in a myth of the Internet user, completely hidden from others, in total control of his online experience, and free to come and go as he pleases. This false image of the “virtual self” has also contributed to an ethos of lawlessness, irresponsibility, and radical individuation online, allowing the evisceration of online privacy and the proliferation of hate and harassment.
I argue that the myth of the online anonym is not only false as a …
Emerging Technologies And Dwindling Speech, Jorge R. Roig
Emerging Technologies And Dwindling Speech, Jorge R. Roig
Jorge R Roig
Obscenity, Internet, Free Press And Free Speech - Constitutions Of India And The United States, Khagesh Gautam Prof.
Obscenity, Internet, Free Press And Free Speech - Constitutions Of India And The United States, Khagesh Gautam Prof.
Khagesh Gautam
No abstract provided.
After Privacy: The Rise Of Facebook, The Fall Of Wikileaks, And Singapore’S Personal Data Protection Act 2012, Simon Chesterman
After Privacy: The Rise Of Facebook, The Fall Of Wikileaks, And Singapore’S Personal Data Protection Act 2012, Simon Chesterman
Simon Chesterman
This article discusses the changing ways in which information is produced, stored, and shared — exemplified by the rise of social-networking sites like Facebook and controversies over the activities of WikiLeaks — and the implications for privacy and data protection. Legal protections of privacy have always been reactive, but the coherence of any legal regime has also been undermined by the lack of a strong theory of what privacy is. There is more promise in the narrower field of data protection. Singapore, which does not recognise a right to privacy, has positioned itself as an e-commerce hub but had no …
Smoking Out Big Tobacco: Some Lessons About Academic Freedom, The World Wide Web, Media Conglomeration, And Public Service Pedagogy From The Battle Over The Brown & Williamson Documents, Clay Calvert
Pepperdine Law Review
No abstract provided.
The Disappearing Schoolhouse Gate: Applying Tinker In The Internet Age , John T. Ceglia
The Disappearing Schoolhouse Gate: Applying Tinker In The Internet Age , John T. Ceglia
Pepperdine Law Review
No abstract provided.
Corporate Criticism On The Internet: The Fine Line Between Anonymous Speech And Cybersmear, Scot Wilson
Corporate Criticism On The Internet: The Fine Line Between Anonymous Speech And Cybersmear, Scot Wilson
Pepperdine Law Review
No abstract provided.
Building Universal Digital Libraries: An Agenda For Copyright Reform, Hannibal Travis
Building Universal Digital Libraries: An Agenda For Copyright Reform, Hannibal Travis
Pepperdine Law Review
This article proposes a series of copyright reforms to pave the way for digital library projects like Project Gutenberg, the Internet Archive, and Google Print, which promise to make much of the world's knowledge easily searchable and accessible from anywhere. Existing law frustrates digital library growth and development by granting overlapping, overbroad, and near-perpetual copyrights in books, art, audiovisual works, and digital content. Digital libraries would benefit from an expanded public domain, revitalized fair use doctrine and originality requirement, rationalized systems for copyright registration and transfer, and a new framework for compensating copyright owners for online infringement without imposing derivative …
Wiretapping The Internet: The Expansion Of The Communications Assistance To Law Enforcement Act To Extend Government Surveillance, Christa M. Hibbard
Wiretapping The Internet: The Expansion Of The Communications Assistance To Law Enforcement Act To Extend Government Surveillance, Christa M. Hibbard
Federal Communications Law Journal
Criminal use of the Internet to circumvent traditional government phone wiretaps has inspired the Obama Administration to create a proposal to expand the Communications Assistance to Law Enforcement Act ("CALEA"). CALEA was passed in 1994 to regulate telephone and broadband companies to ensure compliance with standards to enable government wiretapping. The proposed amendment of CALEA would allow the government to require all communications service providers to meet technical standards necessary to comply with a wiretap order. The expansion of CALEA would likely widen its scope to social networking sites, instant messaging, gaming consoles that allow conversation among multiple players, and …
The Future Of Free Expression In A Digital Age, Jack M. Balkin
The Future Of Free Expression In A Digital Age, Jack M. Balkin
Pepperdine Law Review
In the twenty-first century, at the very moment that our economic and social lives are increasingly dominated by information technology and information flows, the judge-made doctrines of the First Amendment seem increasingly irrelevant to the key free speech battles of the future. The most important decisions affecting the future of freedom of speech will not occur in constitutional law; they will be decisions about technological design, legislative and administrative regulations, the formation of new business models, and the collective activities of end-users. Moreover, the values of freedom of expression will become subsumed within a larger set of concerns that I …
Exploring The First Amendment Rights Of Teens In Relationship To Sexting And Censorship, Julia Halloran Mclaughlin
Exploring The First Amendment Rights Of Teens In Relationship To Sexting And Censorship, Julia Halloran Mclaughlin
University of Michigan Journal of Law Reform
This Article explores child pornography law in relation to teen sexting conduct. Recently, some teens who engaged in teen sexting have been convicted under child pornography laws and have been required to register as sexual predators. The criminalization of teens for developmentally typical behavior, mimicking the conduct of adults, can result in grave harm to most teens. Furthermore, the application of child pornography laws to teen sexting conduct demonstrates the constitutional overbreadth of the current definition of child pornography. Photographs have an emblematic role in society-capturing and celebrating youth. Moreover, the creation of teen sexting images accompanies a teen's developmental …
All Those Like You: Identity Aggression And Student Speech, Ari Ezra Waldman
All Those Like You: Identity Aggression And Student Speech, Ari Ezra Waldman
Articles & Chapters
Online and face-to-face harassment in schools requires a coordinated response from the school, parents, students, and government. In this Article, I address a particular subset of online and face-to-face harassment, or identity-based harassment. Identity-based aggressors highlight a quality intrinsic to someone’s personhood and demean it, deprive it of value, and use it as a weapon. They attack women, racial minorities, religious minorities, and other traditionally victimized groups. And, as such, they attack not only their particular victims but also their victims’ communities. Identity-based aggressors com- mit a constitutional evil not only because their behavior interferes with victims’ access to education, …
Incitement To Riot In The Age Of Flash Mobs, Margot E. Kaminski
Incitement To Riot In The Age Of Flash Mobs, Margot E. Kaminski
Publications
As people increasingly use social media to organize both protests and robberies, government will try to regulate these calls to action. With an eye to this intensifying dynamic, this Article reviews First Amendment jurisprudence on incitement and applies it to existing statutes on incitement to riot at a common law, state, and federal level. The article suggests that First Amendment jurisprudence has a particularly tortuous relationship with regulating speech directed to crowds. It examines current crowd psychology to suggest which crowd behavior, if any, should as a matter of policy be subject to regulation. It concludes that many existing incitement-to-riot …
Layshock Ex Rel. Layshock V. Hermitage School District, Matthew Beatus
Layshock Ex Rel. Layshock V. Hermitage School District, Matthew Beatus
NYLS Law Review
No abstract provided.
Incendiary Speech And Social Media, Lyrissa Barnett Lidsky
Incendiary Speech And Social Media, Lyrissa Barnett Lidsky
UF Law Faculty Publications
Incidents illustrating the incendiary capacity of social media have rekindled concerns about the "mismatch" between existing doctrinal categories and new types of dangerous speech. This Essay examines two such incidents, one in which an offensive tweet and YouTube video led a hostile audience to riot and murder, and the other in which a blogger urged his nameless, faceless audience to murder federal judges. One incident resulted in liability for the speaker, even though no violence occurred; the other did not lead to liability for the speaker even though at least thirty people died as a result of his words. An …
Decoding First Amendment Coverage Of Computer Source Code In The Age Of Youtube, Facebook And The Arab Spring, Jorge R. Roig
Decoding First Amendment Coverage Of Computer Source Code In The Age Of Youtube, Facebook And The Arab Spring, Jorge R. Roig
Jorge R Roig
Protecting Anonymous Expression: The Internet's Role In Washington State's Disclosure Laws And The Direct Democracy Process, Karen Cullinane
Protecting Anonymous Expression: The Internet's Role In Washington State's Disclosure Laws And The Direct Democracy Process, Karen Cullinane
University of Michigan Journal of Law Reform
This Note proposes that the Washington State Legislature amend its Public Records Act to exempt from public disclosure personal information legally required to be disclosed by signers of referendum petitions. This Note also proposes that the Washington State Legislature designate an electronic system, to be detailed in its election law, by which referendum petitions can be checked for fraud without violating the right to anonymous expression protected by the First Amendment. Part I describes Washington State's referendum process and the path of Doe v. Reed, the case animating the reform presented in this Note. Part II illustrates how the rise …
It’S A Mad, Mad Internet: Globalization And The Challenges Presented By Internet Censorship, Jessica E. Bauml
It’S A Mad, Mad Internet: Globalization And The Challenges Presented By Internet Censorship, Jessica E. Bauml
Federal Communications Law Journal
The advent of the Internet has brought tremendous technological advancements and growth to the world. However, it has also become a source of conflict, particularly when different countries attempt to regulate this very ubiquitous and amorphous medium. The most notable controversy has arisen in China home to the world's most advanced system of Internet censorship, which levies harsh penalties on those who violate the country's strict censorship laws. China's "Great Firewall" has raised many eyebrows and is garnishing substantial criticism in response to the human rights abuses that result from the jailing and reported torture of Chinese dissidents. Yet the …
Incendiary Speech And Social Media, Lyrissa Lidsky
Incendiary Speech And Social Media, Lyrissa Lidsky
Faculty Publications
Incidents illustrating the incendiary capacity of social media have rekindled concerns about the "mismatch" between existing doctrinal categories and new types of dangerous speech. This Essay examines two such incidents, one in which an offensive tweet and YouTube video led a hostile audience to riot and murder, and the other in which a blogger urged his nameless, faceless audience to murder federal judges. One incident resulted in liability for the speaker even though no violence occurred; the other did not lead to liability for the speaker even though at least thirty people died as a result of his words. An …
Cohen V. Google, Inc., Eirik Cheverud
Tweaking Tinker: Redefining An Outdated Standard For The Internet Era, Shannon M. Raley
Tweaking Tinker: Redefining An Outdated Standard For The Internet Era, Shannon M. Raley
Cleveland State Law Review
This Note argues that the Tinker standard needs to be reevaluated to encompass Internet-related cases both by eliminating the “on-campus” requirement and by further defining what constitutes a “substantial disruption.” The “on-campus” requirement should be eliminated for the following reasons: 1) lower federal courts already disregard this condition for Internet-related cases; 2) it leads students to abuse their First Amendment rights; and 3) this requirement threatens the safety of teachers, students, and other school personnel. Additionally, Tinker's “substantial disruption” prong would be better understood as a factors test. This ensures that schools utilize the same criteria in determining whether a …