Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 5 of 5
Full-Text Articles in Law
The Internet Never Forgets: A Federal Solution To The Dissemination Of Nonconsensual Pornography, Alexis Santiago
The Internet Never Forgets: A Federal Solution To The Dissemination Of Nonconsensual Pornography, Alexis Santiago
Seattle University Law Review
As technology evolves, new outlets for interpersonal conflict and crime evolve with it. The law is notorious for its inability to keep pace with this evolution. This Comment focuses on one area that the law urgently needs to regulate—the dissemination of “revenge porn,” otherwise known as nonconsensual pornography. Currently, no federal law exists in the U.S. that criminalizes the dissemination of nonconsensual pornography. Most U.S. states have criminalized the offense, but with vastly different degrees of severity, resulting in legal inconsistencies and jurisdictional conflicts. This Comment proposes a federal solution to the dissemination of nonconsensual pornography that carefully balances the …
Curtailing Online Service Provider Immunity From Liability: An Advocacy For The Entension Of Roommates.Com, Corey Patton
Curtailing Online Service Provider Immunity From Liability: An Advocacy For The Entension Of Roommates.Com, Corey Patton
Seattle University Law Review
Section 230 of the Communications Decency Act (CDA) was enacted following the controversial decision in Stratton Oakmont, Inc. v. Prodigy Servs. Co., where an interactive computer service provider was held liable for a libelous message posted by a user on one of its financial message boards. The court determined that the service provider was a “publisher” of the libelous message for the purposes of state law because it had engaged in screening and moderating of other objectionable posts on its message boards but failed to remove the libelous message in question. Because the service provider voluntarily self-policed some of the …
The Communication Decency Act Gone Wild: A Case For Renewing The Presumption Against Preemption, Ryan J.P. Dyer
The Communication Decency Act Gone Wild: A Case For Renewing The Presumption Against Preemption, Ryan J.P. Dyer
Seattle University Law Review
Since its inception, the Internet has disseminated the most vital commodity known to man—information. But not all information is societally desirable. In fact, much of what the Internet serves to disseminate is demonstrably criminal. Nevertheless, in the effort to unbind the “vibrant and competitive free market” of ideas on the Internet, Congress enacted section 230 of the Communications Decency Act, which essentially grants immunity to interactive computer service providers from liability for information provided by a third party. This Comment suggests that, in certain contexts, courts applying section 230 immunity should reexamine the preemptive effect Congress intended section 230 to …
Oh, What A Tangled World Wide Web We Weave: An Analysis Of Washington's Computer Spyware Act In A National Context, Laura L. Edwards
Oh, What A Tangled World Wide Web We Weave: An Analysis Of Washington's Computer Spyware Act In A National Context, Laura L. Edwards
Seattle University Law Review
Spyware affects businesses as well as individuals. Spyware can expose a company's confidential information, slow down computers and networks, and destroy data. Employees lose efficiency while waiting for IT staff to fix the various problems caused by spyware, which increases costs. Accordingly, spyware is not just a minor annoyance suffered by individual Internet users; rather, it harms American businesses and the economy as well.
E-Law4: Computer Information Systems Law And System Operator Liability, David J. Loundy
E-Law4: Computer Information Systems Law And System Operator Liability, David J. Loundy
Seattle University Law Review
This Article gives a summary of the current regulatory structure in the United States governing a few of the "Empires of Cyberspace," such as bulletin board systems, electronic databases, file servers, networks (such as the Internet) and the like. Different legal analogies that may apply will be illustrated, and some of their strengths, weaknesses, and alternatives will be analyzed. I will begin by looking at different types of computer information systems, and then the major legal issues surrounding computer information systems will be surveyed in brief. Next, the different legal analogies which could be applied to computer information systems will …