Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Publication
-
- Jonathan Peters (3)
- Jorge R Roig (3)
- Danielle Keats Citron (2)
- A. Michael Froomkin (1)
- Anthony J. King (1)
-
- Casey J Cooper (1)
- Christopher C. French (1)
- Conor Francis Linehan (1)
- Dan Massoglia (1)
- Jeffrey Li (1)
- JoAnne Sweeny (1)
- Lily M Strumwasser (1)
- Lyrissa Barnett Lidsky (1)
- Mark Fenster (1)
- Meg Penrose (1)
- Megan M Carpenter (1)
- Rob Frieden (1)
- Robert Hupf Jr (1)
- Roger M. Groves (1)
- Steven D. Hinckley (1)
- Vahagn Amirian (1)
- Watt Lesley Black Jr. (1)
Articles 1 - 27 of 27
Full-Text Articles in Law
Trapped In Public: The Regulation Of Street Harassment And Cyber-Harassment Under The Captive Audience Doctrine, Joanne Sweeny
Trapped In Public: The Regulation Of Street Harassment And Cyber-Harassment Under The Captive Audience Doctrine, Joanne Sweeny
JoAnne Sweeny
No abstract provided.
Sex, Videos, And Insurance: How Gawker Could Have Avoided Financial Responsibility For The $140 Million Hulk Hogan Sex Tape Verdict, Christopher French
Sex, Videos, And Insurance: How Gawker Could Have Avoided Financial Responsibility For The $140 Million Hulk Hogan Sex Tape Verdict, Christopher French
Christopher C. French
Can Dna Be Speech?, Jorge R. Roig
Can Dna Be Speech?, Jorge R. Roig
Jorge R Roig
Sharing Stupid $H*T With Friends And Followers: The First Amendment Rights Of College Athletes To Use Social Media, Meg Penrose
Sharing Stupid $H*T With Friends And Followers: The First Amendment Rights Of College Athletes To Use Social Media, Meg Penrose
Meg Penrose
This paper takes a closer look at the First Amendment rights of college athletes to access social media while simultaneously participating in intercollegiate athletics. The question posed is quite simple: can a coach or athletic department at a public university legally restrict a student-athlete's use of social media? If so, does the First Amendment provide any restraints on the type or length of restrictions that can be imposed? Thus far, neither question has been presented to a court for resolution. However, the answers are vital, as college coaches and athletic directors seek to regulate their athletes in a constitutional manner.
Nsfw: An Empirical Study Of Scandalous Trademarks, Megan M. Carpenter
Nsfw: An Empirical Study Of Scandalous Trademarks, Megan M. Carpenter
Megan M Carpenter
This project is an empirical analysis of trademarks that have received rejections based on the judgment that they are “scandalous." It is the first of its kind. The Lanham Act bars registration for trademarks that are “scandalous” and “immoral.” While much has been written on the morality provisions in the Lanham Act generally, this piece is the first scholarly project that engages an empirical analysis of 2(a) rejections based on scandalousness; it contains a look behind the scenes at how the morality provisions are applied throughout the trademark registration process. We study which marks are being rejected, what evidence is …
Incendiary Speech And Social Media, Lyrissa Barnett Lidsky
Incendiary Speech And Social Media, Lyrissa Barnett Lidsky
Lyrissa Barnett Lidsky
Incidents illustrating the incendiary capacity of social media have rekindled concerns about the "mismatch" between existing doctrinal categories and new types of dangerous speech. This Essay examines two such incidents, one in which an offensive tweet and YouTube video led a hostile audience to riot and murder, and the other in which a blogger urged his nameless, faceless audience to murder federal judges. One incident resulted in liability for the speaker, even though no violence occurred; the other did not lead to liability for the speaker even though at least thirty people died as a result of his words. An …
"Step Into The Game": Assessing The Interactive Nature Of Virtual Reality Video Games Through The Context Of "Terroristic Speech", Robert Hupf Jr
"Step Into The Game": Assessing The Interactive Nature Of Virtual Reality Video Games Through The Context Of "Terroristic Speech", Robert Hupf Jr
Robert Hupf Jr
This article will begin the discussion on video gaming’s next interactive jump – total VR immersion – and examine whether the interactivity of VR changes the ordinary First Amendment analysis . . . . Yet, even with the “terroristic speech” component, involving everything from instructions on bomb-making to anti-American “terrorist” recruitment messaging, the Court should affirm the speech-protective logic of Justice Learned Hand and Justice Brandeis and hold that the First Amendment protects the freedom of video game developers in making VR video games with problematic content. The video game medium and its depictions have already been recognized as “speech” …
“Can I Profit From My Own Name And Likeness As A College Athlete?” The Predictive Legal Analytics Of A College Player’S Publicity Rights Vs. First Amendment Rights Of Others, Roger M. Groves
Roger M. Groves
Two federal court decisions during 2013 have changed the game for college students versus the schools, the NCAA and video game makers. This article explores whether for the first time in history these athletes can profit from their own name and likeness and prevent others from doing so. But those cases still leave many untested applications to new facts – facts that the courts have not faced. Particularly intriguing is how 21st Century technology will apply to this area in future litigation. No publicity rights case or article to date has explored the application of predictive analytics, computer programs, algorithms, …
Balancing The Scales: Adhuc Sub Judice Li Est Or Trial By Media, Casey J. Cooper
Balancing The Scales: Adhuc Sub Judice Li Est Or Trial By Media, Casey J. Cooper
Casey J Cooper
The right to freedom of expression and free press is recognized under almost all major human rights instruments and domestic legal systems—common and civil—in the world. However, what do you do when a fundamental right conflicts with another equally fundamental right, like the right to a fair trial? In the United States, the freedom of speech, encompassing the freedom of the press, goes nearly unfettered: the case is not the same for other common law countries. In light of cultural and historic facts, institutional factors, modern realities, and case-law, this Article contends that current American jurisprudence does not take into …
Regulating Mass Surveillance As Privacy Pollution: Learning From Environmental Impact Statements, A. Michael Froomkin
Regulating Mass Surveillance As Privacy Pollution: Learning From Environmental Impact Statements, A. Michael Froomkin
A. Michael Froomkin
US law has remarkably little to say about mass surveillance in public, a failure which has allowed the surveillance to grow at an alarming rate – a rate that is only set to increase. This article proposes ‘Privacy Impact Notices’ (PINs) — modeled on Environmental Impact Statements — as an initial solution to this problem. Data collection in public (and in the home via public spaces) resembles an externality imposed on the person whose privacy is reduced involuntarily; it can also be seen as a market failure caused by an information asymmetry. Current doctrinal legal tools available to respond to …
Omnipresent Student Speech And The Schoolhouse Gate: Interpreting Tinker In The Digital Age, Watt L. Black Jr.
Omnipresent Student Speech And The Schoolhouse Gate: Interpreting Tinker In The Digital Age, Watt L. Black Jr.
Watt Lesley Black Jr.
This paper focuses primarily on federal circuit level decisions regarding public school district's ability to discipline students who engage in electronic speech while off-campus and not involved in school activities. Particular attention is paid to the question of whether and how appeals courts have been willing to apply the "material and substantial disruption" standard from the Supreme Court's 1969 Tinker v. Des Moines decision to speech occurring off-campus. The paper, which is targeted toward both legal scholars and school administrators, draws together the common threads from the various circuits and weaves them into a set of guidelines for school administrators …
Anonymous Speech On The Internet: Why Current Efforts By States To Regulate Anonymous Speech Fail Constitutional Scrutiny, And How Courts Should Protect First Amendment Rights, Conor Francis Linehan
Anonymous Speech On The Internet: Why Current Efforts By States To Regulate Anonymous Speech Fail Constitutional Scrutiny, And How Courts Should Protect First Amendment Rights, Conor Francis Linehan
Conor Francis Linehan
The legislatures in New York and Illinois have attempted to regulate the speech of individuals on the Internet and threaten to void their anonymity. The legislatures are trying to reach the actionable or harmful speech that often shows up on websites like Reddit.com. However, the bills have reached too far, and encompass much speech that is absolutely protected. This note argues that the right of anonymous speech on the Internet should be protected from government encroachment, and the proper way to protect the interests of individuals who are the subject of libelous or damaging speech should be through a re-working …
Anonymity Is The Battlefield: Practical And Legal Considerations In The Fight For Free Expression On The Web, Dan Massoglia
Anonymity Is The Battlefield: Practical And Legal Considerations In The Fight For Free Expression On The Web, Dan Massoglia
Dan Massoglia
No abstract provided.
A Comprehensive Approach To Bridging The Gap Between Cyberbullying Rules And Regulations And The Protections Offered By The First Amendment For Off-Campus Student Speech, Vahagn Amirian
Vahagn Amirian
No abstract provided.
Internet Control Or Internet Censorship? Comparing The Control Models Of China, Singapore, And The United States To Guide Taiwan’S Choice, Jeffrey Li
Jeffrey Li
Internet censorship generally refers to unjustified online speech scrutiny and control by the government or government-approved measures for Internet control. The danger of Internet censorship is the chilling effect and the substantial harm on free speech, a cornerstone of democracy, in cyberspace. This paper compares China’s blocking and filtering system, the class license system of Singapore, and the government-private partnership model of the United States to identify the features, and pros and cons of each model on the international human rights. By finding lessons from each of the model, this paper suggests Taiwan should remain its current meager internet control …
Testing The Social Media Waters - First Amendment Entanglement Beyond The Schoolhouse Gates, Lily M. Strumwasser
Testing The Social Media Waters - First Amendment Entanglement Beyond The Schoolhouse Gates, Lily M. Strumwasser
Lily M Strumwasser
Dear Editor:
I am a third-year student at The John Marshall Law School in Chicago, Illinois, where I serve as the executive student publications editor of The John Marshall Law Review. In September 2013, I will work as an associate at Seyfarth Shaw in its labor and employment practice group. I am writing to submit my article, "Testing The Social Media Waters - First Amendment Entanglement Beyond The Schoolhouse Gates" My article considers the contours of student free speech rights within the context of public schools. I think and hope you will find it to be interesting and …
Emerging Technologies And Dwindling Speech, Jorge R. Roig
Emerging Technologies And Dwindling Speech, Jorge R. Roig
Jorge R Roig
Explicating The Concept Of Journalist: How Scholars, Legal Experts And The Industry Define Who Is And Who Isn’T, Jonathan Peters
Explicating The Concept Of Journalist: How Scholars, Legal Experts And The Industry Define Who Is And Who Isn’T, Jonathan Peters
Jonathan Peters
This paper explicates the concept of journalist by exploring the scholarly, legal and industry domains. For the scholarly domain, we reviewed studies defining journalists. For the legal domain, we reviewed cases and statutes defining journalists. And for the industry domain, we reviewed membership criteria of journalism organizations. We did not intend to devise a normative definition. We intended to explore the dimensions used by others, and to use them to explicate the concept of journalist.
Your Money Or Your Speech: The Children's Internet Protection Act And The Congressional Assault On The First Amendment In Public Libraries, Steven D. Hinckley
Your Money Or Your Speech: The Children's Internet Protection Act And The Congressional Assault On The First Amendment In Public Libraries, Steven D. Hinckley
Steven D. Hinckley
This article examines the inherent conflict between This article examines the inherent conflict between two Congressional approaches to public access to the Internet - the provision of federal funding support to schools and public libraries to ensure broad access to online information regardless of financial means, and federal restrictions on children's use of school and public library computers to access content that the government feels could be harmful to them. It analyzes the efficacy and constitutionality of the Children's Internet Protection Act (CIPA), Congress's attempt to use its powers of the purse to control objectionable online content in the very …
Disclosure's Effects: Wikileaks And Transparency, Mark Fenster
Disclosure's Effects: Wikileaks And Transparency, Mark Fenster
Mark Fenster
Regulating From Typewriters In An Internet Age: The Development & Regulation Of Mass Media Usage In Presidential Campaigns, Anthony J. King
Regulating From Typewriters In An Internet Age: The Development & Regulation Of Mass Media Usage In Presidential Campaigns, Anthony J. King
Anthony J. King
The American election process has become a misleading process of campaign promises and self-promotion, thus diluting its primary and most fundamental purpose. This discrepancy can be traced to three primary groups; (1) the candidates, who supplied the motive; (2) the mass media, who supplied the means; and (3) the electorate, who so far have allowed it to happen. Seeking to remedy the situation lawmakers have turned to regulations of the media in attempt to assure fairness and nurture the marketplace of ideas. These numerous attempts at fairness have been met with a mixed reception and mixed results leading to questions …
Decoding First Amendment Coverage Of Computer Source Code In The Age Of Youtube, Facebook And The Arab Spring, Jorge R. Roig
Decoding First Amendment Coverage Of Computer Source Code In The Age Of Youtube, Facebook And The Arab Spring, Jorge R. Roig
Jorge R Roig
Wikileaks Would Not Qualify To Claim Federal Reporter’S Privilege In Any Form, Jonathan Peters
Wikileaks Would Not Qualify To Claim Federal Reporter’S Privilege In Any Form, Jonathan Peters
Jonathan Peters
This article addresses whether WikiLeaks could claim a federal reporter’s privilege if the U.S. government or a U.S. entity tried to compel one of the site’s staff members to disclose the source(s) of any documents it has released. After exploring the origins of the First Amendment-based privilege, I argue that WikiLeaks would not be able to claim it. First, the website does not engage in investigative reporting. Second, it has not taken steps consistently to minimize harm. I also discuss congressional attempts to pass a federal shield law, paying special attention to H.R. 985 and S. 448, the two most …
Wikileaks, The First Amendment, And The Press, Jonathan Peters
Wikileaks, The First Amendment, And The Press, Jonathan Peters
Jonathan Peters
This article focuses on one question: When can the government, consonant with the First Amendment, punish the publication of classified information related to national security? To that end, Part I outlines the constitutional standards that could apply to such a prosecution of WikiLeaks. Part II discusses whether WikiLeaks is part of the press and whether that matters for constitutional purposes. Part III concludes by urging the Justice Department to consider carefully whether it should prosecute WikiLeaks.
Government Speech 2.0, Helen L. Norton, Danielle Keats Citron
Government Speech 2.0, Helen L. Norton, Danielle Keats Citron
Danielle Keats Citron
New expressive technologies continue to transform the ways in which members of the public speak to one another. Not surprisingly, emerging technologies have changed the ways in which government speaks as well. Despite substantial shifts in how the government and other parties actually communicate, however, the Supreme Court to date has developed its government speech doctrine – which recognizes “government speech” as a defense to First Amendment challenges by plaintiffs who claim that the government has impermissibly excluded their expression based on viewpoint – only in the context of disputes involving fairly traditional forms of expression. In none of these …
Invoking And Avoiding The First Amendment: How Internet Service Providers Leverage Their Status As Both Content Creators And Neutral Conduits, Rob M. Frieden
Invoking And Avoiding The First Amendment: How Internet Service Providers Leverage Their Status As Both Content Creators And Neutral Conduits, Rob M. Frieden
Rob Frieden
Much of the policy debate and scholarly literature on network neutrality has addressed whether the Federal Communications Commission (“FCC”) has statutory authority to require Internet Service Providers (“ISPs”) to operate in a nondiscriminatory manner. Such analysis largely focuses on questions about jurisdiction, the scope of lawful regulation, and the balance of power between stakeholders, generally adverse to government oversight, and government agencies, apparently willing to overcome the same inclination. The public policy debate primarily considers micro-level issues, without much consideration of broader concerns such as First Amendment values. While professing to support marketplace resource allocation and a regulation-free Internet, the …
Cyber Civil Rights (November 2008; Mp3), Danielle Keats Citron
Cyber Civil Rights (November 2008; Mp3), Danielle Keats Citron
Danielle Keats Citron
Social networking sites and blogs have increasingly become breeding grounds for anonymous online groups that attack women, people of color, and members of other traditionally disadvantaged groups. These destructive groups target individuals with defamation, threats of violence, and technology-based attacks that silence victims and concomitantly destroy their privacy. Victims go offline or assume pseudonyms to prevent future attacks, impoverishing online dialogue and depriving victims of the social and economic opportunities associated with a vibrant online presence. Attackers manipulate search engines to reproduce their lies and threats for employers and clients to see, creating digital "scarlet letters" that ruin reputations. Today's …