Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Series

Internet

Communications Law

2006

University of Pennsylvania Carey Law School

Articles 1 - 2 of 2

Full-Text Articles in Law

Censorship By Proxy: The First Amendment, Internet Intermediaries, And The Problem Of The Weakest Link, Seth F. Kreimer Nov 2006

Censorship By Proxy: The First Amendment, Internet Intermediaries, And The Problem Of The Weakest Link, Seth F. Kreimer

All Faculty Scholarship

The rise of the Internet has changed the First Amendment drama, for governments confront technical and political obstacles to sanctioning either speakers or listeners in cyberspace. Faced with these challenges, regulators have fallen back on alternatives, predicated on the fact that, in contrast to the usual free expression scenario, the Internet is not dyadic. The Internet's resistance to direct regulation of speakers and listeners rests on a complex chain of connections, and emerging regulatory mechanisms have begun to focus on the weak links in that chain. Rather than attacking speakers or listeners directly, governments have sought to enlist private actors …


Common Law Property Metaphors On The Internet: The Real Problem With The Doctrine Of Cybertrespass, Shyamkrishna Balganesh Apr 2006

Common Law Property Metaphors On The Internet: The Real Problem With The Doctrine Of Cybertrespass, Shyamkrishna Balganesh

All Faculty Scholarship

The doctrine of cybertrespass represents one of the most recent attempts by courts to apply concepts and principles from the real world to the virtual world of the Internet. A creation of state common law, the doctrine essentially involved extending the tort of trespass to chattels to the electronic world. Consequently, unauthorized electronic interferences are deemed trespassory intrusions and rendered actionable. The present paper aims to undertake a conceptual study of the evolution of the doctrine, examining the doctrinal modifications courts were required to make to mould the doctrine to meet the specificities of cyberspace. It then uses cybertrespass to …