Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Legislation

PDF

Seattle University Law Review

Internet

Articles 1 - 5 of 5

Full-Text Articles in Law

The Internet Never Forgets: A Federal Solution To The Dissemination Of Nonconsensual Pornography, Alexis Santiago Jan 2020

The Internet Never Forgets: A Federal Solution To The Dissemination Of Nonconsensual Pornography, Alexis Santiago

Seattle University Law Review

As technology evolves, new outlets for interpersonal conflict and crime evolve with it. The law is notorious for its inability to keep pace with this evolution. This Comment focuses on one area that the law urgently needs to regulate—the dissemination of “revenge porn,” otherwise known as nonconsensual pornography. Currently, no federal law exists in the U.S. that criminalizes the dissemination of nonconsensual pornography. Most U.S. states have criminalized the offense, but with vastly different degrees of severity, resulting in legal inconsistencies and jurisdictional conflicts. This Comment proposes a federal solution to the dissemination of nonconsensual pornography that carefully balances the …


Curtailing Online Service Provider Immunity From Liability: An Advocacy For The Entension Of Roommates.Com, Corey Patton Jun 2018

Curtailing Online Service Provider Immunity From Liability: An Advocacy For The Entension Of Roommates.Com, Corey Patton

Seattle University Law Review

Section 230 of the Communications Decency Act (CDA) was enacted following the controversial decision in Stratton Oakmont, Inc. v. Prodigy Servs. Co., where an interactive computer service provider was held liable for a libelous message posted by a user on one of its financial message boards. The court determined that the service provider was a “publisher” of the libelous message for the purposes of state law because it had engaged in screening and moderating of other objectionable posts on its message boards but failed to remove the libelous message in question. Because the service provider voluntarily self-policed some of the …


The Communication Decency Act Gone Wild: A Case For Renewing The Presumption Against Preemption, Ryan J.P. Dyer Mar 2014

The Communication Decency Act Gone Wild: A Case For Renewing The Presumption Against Preemption, Ryan J.P. Dyer

Seattle University Law Review

Since its inception, the Internet has disseminated the most vital commodity known to man—information. But not all information is societally desirable. In fact, much of what the Internet serves to disseminate is demonstrably criminal. Nevertheless, in the effort to unbind the “vibrant and competitive free market” of ideas on the Internet, Congress enacted section 230 of the Communications Decency Act, which essentially grants immunity to interactive computer service providers from liability for information provided by a third party. This Comment suggests that, in certain contexts, courts applying section 230 immunity should reexamine the preemptive effect Congress intended section 230 to …


Oh, What A Tangled World Wide Web We Weave: An Analysis Of Washington's Computer Spyware Act In A National Context, Laura L. Edwards Jan 2008

Oh, What A Tangled World Wide Web We Weave: An Analysis Of Washington's Computer Spyware Act In A National Context, Laura L. Edwards

Seattle University Law Review

Spyware affects businesses as well as individuals. Spyware can expose a company's confidential information, slow down computers and networks, and destroy data. Employees lose efficiency while waiting for IT staff to fix the various problems caused by spyware, which increases costs. Accordingly, spyware is not just a minor annoyance suffered by individual Internet users; rather, it harms American businesses and the economy as well.


E-Law4: Computer Information Systems Law And System Operator Liability, David J. Loundy Jan 1998

E-Law4: Computer Information Systems Law And System Operator Liability, David J. Loundy

Seattle University Law Review

This Article gives a summary of the current regulatory structure in the United States governing a few of the "Empires of Cyberspace," such as bulletin board systems, electronic databases, file servers, networks (such as the Internet) and the like. Different legal analogies that may apply will be illustrated, and some of their strengths, weaknesses, and alternatives will be analyzed. I will begin by looking at different types of computer information systems, and then the major legal issues surrounding computer information systems will be surveyed in brief. Next, the different legal analogies which could be applied to computer information systems will …