Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Law

How To Regulate Online Platforms: Why Common Carrier Doctrine Is Inappropriate To Regulate Social Networks And Alternate Approaches To Protect Rights, Edward W. Mclaughlin May 2022

How To Regulate Online Platforms: Why Common Carrier Doctrine Is Inappropriate To Regulate Social Networks And Alternate Approaches To Protect Rights, Edward W. Mclaughlin

Fordham Law Review Online

Concerns about the “concentrated control of so much speech in the hands of a few private parties” and their ability to suppress some user speech have led to calls to regulate online platforms like common carriers or public accommodations. Advocates of that regulation theorize that social media platforms host today’s public forum and are open to all comers and so should have a responsibility to be content neutral and allow all voices to be heard. Traditionally, the argument that private players, as opposed to only government actors, can violate individuals’ free speech rights was a progressive cause, but recently conservative …


Don't Bring A Cad File To A Gun Fight: A Technological Solution To The Legal And Practical Challenges Of Enforcing Itar On The Internet, Catherine Tremble Mar 2019

Don't Bring A Cad File To A Gun Fight: A Technological Solution To The Legal And Practical Challenges Of Enforcing Itar On The Internet, Catherine Tremble

Fordham Law Review Online

This Essay begins by outlining Cody Wilson’s motivation to found his organization, Defense Distributed, and the organization’s progress toward its goals. Then, Part II provides a brief overview of the protracted legal battle between Wilson and the State Department over the right to publish Computer-Aided Design (CAD) files on the internet that enable the 3D printing of guns and lower receivers. Part III.A takes a brief look at whether these CAD files are rightly considered speech at all and, if so, what level of protection they might receive. Part III.B then addresses the problem of even asking whether the files …