Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Law

Plotting The Return Of An Ancient Tort To Cyberspace: Towards A New Federal Standard Of Responsibility For Defamation For Internet Service Providers, Christopher Butler Jun 2000

Plotting The Return Of An Ancient Tort To Cyberspace: Towards A New Federal Standard Of Responsibility For Defamation For Internet Service Providers, Christopher Butler

Michigan Telecommunications & Technology Law Review

Though the rapid development of the Internet has created a fertile ground for legal innovation, more often than not legislators and courts have sought to address this relatively new medium by attempting to squeeze it into precedents and paradigms better suited to older forms of communication, technology, and media. Part I of this article looks back at the courts' initial efforts at addressing defamation via the Internet. From the start the courts attempted to fit the role of the ISP into the common law's categorizing of print media as either "publishers" or "distributors" of information. One court's misstep in overextending …


Don’T Talk To Strangers: An Analysis Of Government And Industry Efforts To Protect A Child’S Privacy Online, Dorothy A. Hertzel Mar 2000

Don’T Talk To Strangers: An Analysis Of Government And Industry Efforts To Protect A Child’S Privacy Online, Dorothy A. Hertzel

Federal Communications Law Journal

Studies indicate that nearly two-thirds of children use the Internet. Children online users have created unique concerns for Internet providers and lawmakers. The collection, storage, and sale of a child online user's personal information without the child or parent's knowledge or consent has elicited much concern. Such a practice is commonplace in the world of the Internet. Congress, through the Child Online Privacy Protection Act, and the Internet industry have addressed how to curb this practice. In addition to these efforts, technological tools are currently available that block the transfer of personally identifiable information from the user to the computer. …