Open Access. Powered by Scholars. Published by Universities.®

Privacy Law Commons

Open Access. Powered by Scholars. Published by Universities.®

First Amendment

UIC John Marshall Journal of Information Technology & Privacy Law

Articles 1 - 18 of 18

Full-Text Articles in Privacy Law

Following In The European Union’S Footsteps: Why The United States Should Adopt Its Own “Right To Be Forgotten” Law For Crime Victims, 32 J. Marshall J. Info. Tech. & Privacy L. 185 (2016), Erin Cooper Jan 2016

Following In The European Union’S Footsteps: Why The United States Should Adopt Its Own “Right To Be Forgotten” Law For Crime Victims, 32 J. Marshall J. Info. Tech. & Privacy L. 185 (2016), Erin Cooper

UIC John Marshall Journal of Information Technology & Privacy Law

This comment aims to look at this intersection between Google search results, their lack of removal options in the United States, and the potential harm this can cause crime victims. The comment will begin by assessing Google’s method for delivering search results, and its general removal process for most non-European nations. Then, this comment will continue by looking at the European Union and its “right to be forgotten” ruling that allows people in certain circumstances to remove their personal information from the Internet, and what the United States can learn from its implementation. Moreover, we will then contrast the European …


Tweet Tweet: A First Amendment Wake Up Call Regarding Social Media In The Sports Arena, 30 J. Marshall J. Info. Tech. & Privacy L. 117 (2013), Samantha Levin Jan 2013

Tweet Tweet: A First Amendment Wake Up Call Regarding Social Media In The Sports Arena, 30 J. Marshall J. Info. Tech. & Privacy L. 117 (2013), Samantha Levin

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


"Tinkering" With The First Amendment's Protection Of Student Speech On The Internet, 29 J. Marshall J. Computer & Info. L. 167 (2012), Steven M. Puiszis Jan 2012

"Tinkering" With The First Amendment's Protection Of Student Speech On The Internet, 29 J. Marshall J. Computer & Info. L. 167 (2012), Steven M. Puiszis

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


My Teacher Sux! [Censored]: Protecting Students' Right To Free Speech On The Internet, 28 J. Marshall J. Computer & Info. L. 385 (2011), Katherine Hokenson Jan 2011

My Teacher Sux! [Censored]: Protecting Students' Right To Free Speech On The Internet, 28 J. Marshall J. Computer & Info. L. 385 (2011), Katherine Hokenson

UIC John Marshall Journal of Information Technology & Privacy Law

This comment will discusses the problem posed by student speech made on the Internet, how free speech issues are generally addressed by courts, the Supreme Court cases that have specifically addressed the First Amendment rights of students, and factors that courts dealing with student speech made on the Internet have attempted to use in their decisions. The comment will further look at how courts have analyzed online student speech cases in light of available Supreme Court precedent, and will propose that the Court adopt a hybrid of the Tinker test when addressing student speech made on the Internet, which will …


The Federal Election Commission & Political Blogging: A Perfect Balance Or Just Not Enough?, 24 J. Marshall J. Computer & Info. L. 611 (2006), Niki Vlachos Jan 2006

The Federal Election Commission & Political Blogging: A Perfect Balance Or Just Not Enough?, 24 J. Marshall J. Computer & Info. L. 611 (2006), Niki Vlachos

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


First Amendment Implications For E-Mail Threats: Are There Any Free Speech Protections?, 23 J. Marshall J. Computer & Info. L. 845 (2005), Joshua Azriel Jan 2005

First Amendment Implications For E-Mail Threats: Are There Any Free Speech Protections?, 23 J. Marshall J. Computer & Info. L. 845 (2005), Joshua Azriel

UIC John Marshall Journal of Information Technology & Privacy Law

In this article, Azriel explores how the First Amendment protects or does not provide protections to threatening e-mail communications. The article begins by examining seminal U.S. Supreme Court cases that dealt with threatening speech. The factors that provide the First Amendment protections are described, as well as the particular facts of each case and the Court’s findings. Azriel then looks at the Federal Threat Law and the factors that are enunciated in that legislation with regard to the protections afforded threatening communications, in addition to federal court cases that have interpreted the statute. The article then looks at several cases …


Congress And The Courts Battle Over The First Amendment: Can The Law Really Protect Children From Pornography On The Internet?, 21 J. Marshall J. Computer & Info. L. 141 (2003), Mitchell P. Goldstein Jan 2003

Congress And The Courts Battle Over The First Amendment: Can The Law Really Protect Children From Pornography On The Internet?, 21 J. Marshall J. Computer & Info. L. 141 (2003), Mitchell P. Goldstein

UIC John Marshall Journal of Information Technology & Privacy Law

Litigation and court action have provided little in the way of providing solutions to anyone dealing with inappropriate content on the Internet. In Miller v. California, 413 U.S. 15 (1973). The court refused to establish a national standard and instead relied on community standards. Because the Internet has no geographic limitations, one cannot determine community standards because the Internet is so far reaching. Goldstein discusses in detail these Congressional enactments: Communications Decency Act of 1996, the Child Online Protection Act, and the Child Pornography Prevention Act of 1996, finding that none of them give children protection from pornography. The challenge …


Caging The Bird Does Not Cage The Song: How The International Covenant On Civil And Political Rights Fails To Protect Free Expression Over The Internet, 21 J. Marshall J. Computer & Info. L. 371 (2003), Antoine L. Collins Jan 2003

Caging The Bird Does Not Cage The Song: How The International Covenant On Civil And Political Rights Fails To Protect Free Expression Over The Internet, 21 J. Marshall J. Computer & Info. L. 371 (2003), Antoine L. Collins

UIC John Marshall Journal of Information Technology & Privacy Law

This comment addresses the right to free speech on the Internet. The International Covenant on Civil and Political Rights, an instrument designed to protect the rights of individuals to free speech and expression, is analyzed for effectiveness. The author argues that the “ICCPR”, the most recent international human rights agreement, does not adequately protect Internet users, particularly from governments that may choose to violate citizens’ rights by interfering with computerized communications. The analysis of the “ICCPR” illustrates the purpose, capabilities and weaknesses of the agreement, and offers proposed changes to the act, to protect the rights of both the individual …


Content-Based Regulation Of Electronic Media: Indecent Speech On The Internet, 21 J. Marshall J. Computer & Info. L. 19 (2002), Kelly M. Slavitt, Matthew Knorr Jan 2002

Content-Based Regulation Of Electronic Media: Indecent Speech On The Internet, 21 J. Marshall J. Computer & Info. L. 19 (2002), Kelly M. Slavitt, Matthew Knorr

UIC John Marshall Journal of Information Technology & Privacy Law

Using an airing of the Victoria Secret fashion show as an example, the author explores the definition of "indecency" in media. She first discusses the how FCC treats indecency in traditional media (radio, broadcast TV and cable). Then, she addresses numerous failed attempts of applying indecency on the Internet. Consequently, she compares and contrasts the different media. Lastly, she suggests a solution in this regard that would likely pass constitutional muster. The FCC can impose fines or prison sentences on radio and broadcasting licensees for "uttering any obscene, indecent or profane language by means of radio communications." As for cable …


Yesterday's Love Letters Are Today's Best Sellers: Fair Use & The War Among Authors, 18 J. Marshall J. Computer & Info. L.141 (1999), Sonali R. Kolhatkar Jan 1999

Yesterday's Love Letters Are Today's Best Sellers: Fair Use & The War Among Authors, 18 J. Marshall J. Computer & Info. L.141 (1999), Sonali R. Kolhatkar

UIC John Marshall Journal of Information Technology & Privacy Law

This Comment will analyze how courts should interpret the four statutory factors in determining a fair use defense for once private documents, such as love letters, and how the courts need to add First Amendment and public policy concerns in deciding whether to allow the fair use. First, this Comment addresses the current definition of the fair use doctrine and its impact on unpublished works. This Comment will also address the need to create a new fair use defense test to include the First Amendment concerns of secondary authors who cannot create their works without the copyrighted information. Secondly, this …


Cable Tv Users Taxes: A First Amendment Challenge, 8 Computer L.J. 257 (1988), Carlos Victor Yguico Jan 1998

Cable Tv Users Taxes: A First Amendment Challenge, 8 Computer L.J. 257 (1988), Carlos Victor Yguico

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Free Speech On The Information Superhighway: European Perspectives, 16 J. Marshall J. Computer & Info. L. 905 (1998), Caroline Uyttendaele, Joseph Dumortier Jan 1998

Free Speech On The Information Superhighway: European Perspectives, 16 J. Marshall J. Computer & Info. L. 905 (1998), Caroline Uyttendaele, Joseph Dumortier

UIC John Marshall Journal of Information Technology & Privacy Law

This article focuses on the need for free speech legislation on the information superhighway. Two issues are addressed in this article. First, whether additional measures are needed for protecting free speech on the Internet. Second, whether the existing restrictions on free speech are relevant. The information superhighway in the United States is referred as a growing economic interest in information. In contract, the emphasis in Europe lies more on the "information society." In both instances, the government recognizes that the Internet has become a powerful medium of expression. Additionally, the Internet is a true testing ground for regulating the information …


The Best Of Both Worlds: Financing Software Filters For The Classroom And Avoiding First Amendment Liability, 16 J. Marshall J. Computer & Info. L. 659 (1998), Peter G. Drever Iii Jan 1997

The Best Of Both Worlds: Financing Software Filters For The Classroom And Avoiding First Amendment Liability, 16 J. Marshall J. Computer & Info. L. 659 (1998), Peter G. Drever Iii

UIC John Marshall Journal of Information Technology & Privacy Law

As the Internet expands, educational institutions have become interested in the medium for the purpose of expanding learning opportunities. Information that may be objectionable to some members of the community, however, would then be available to children in schools with Internet access. Attempts to regulate the content of the Internet have yet to pass a First Amendment challenge. Concern over what children will be exposed to when the Internet is introduced in the classroom is currently being addressed by educators and legislators alike. The Communications Decency Act was the first to attempt to address the issue of Internet access in …


Don't Shoot The Messenger: Protecting Speech On Editorially Controlled Bulletin Board Services By Applying Sullivan Malice, 14 J. Marshall J. Computer & Info. L. 347 (1996), Iris Ferosie Jan 1996

Don't Shoot The Messenger: Protecting Speech On Editorially Controlled Bulletin Board Services By Applying Sullivan Malice, 14 J. Marshall J. Computer & Info. L. 347 (1996), Iris Ferosie

UIC John Marshall Journal of Information Technology & Privacy Law

Courts must determine the standard of liability for Internet Service Providers (ISPs) that proactively edit their Bulletin Board Systems (BBSs) for defamatory content. ISPs are computer services that provide data processing and communication services to customers - individual computer users who subscribe to the ISP's service. BBSs are computer programs that act like a traditional bulletin board. They are centrally located on the ISP's computers, and people who subscribe to the ISP can access that bulletin board to publish (or "post") messages on the board, and read and respond to other people's messages. Some ISPs allow people to post messages …


The Constitutionality Of Congressional Efforts To Ban Computer-Generated Child Pornography: A First Amendment Assessment Of S. 1237, 14 J. Marshall J. Computer & Info. L. 483 (1996), Ronald W. Adelman Jan 1996

The Constitutionality Of Congressional Efforts To Ban Computer-Generated Child Pornography: A First Amendment Assessment Of S. 1237, 14 J. Marshall J. Computer & Info. L. 483 (1996), Ronald W. Adelman

UIC John Marshall Journal of Information Technology & Privacy Law

This article addressed the constitutionality of the Child Pornography Prevention Act of 1995 (Hatch Bill) in regard to computer-generated child pornography. The Bill outlaws a visual depiction that is or appears to be of a minor engaging in sexually explicit conduct. The author claims the comments of David B. Johnson and John C. Scheller regarding the constitutionality of the Bill are analytically flawed because they focus on dicta from New York v. Ferber and Osborne v. Ohio. The author then engages in his own assessment of the Bill using a First Amendment approach and suggests what findings Congress should make …


Cryptography And The First Amendment: The Right To Be Unheard, 14 J. Marshall J. Computer & Info. L. 325 (1996), Phillip E. Reiman Jan 1996

Cryptography And The First Amendment: The Right To Be Unheard, 14 J. Marshall J. Computer & Info. L. 325 (1996), Phillip E. Reiman

UIC John Marshall Journal of Information Technology & Privacy Law

The author proposes that current technology has made cryptography an important element in maintaining a society's right to free speech. Cryptography is the process of using secret codes to protect information. This protection increases society's privacy because cryptographers can limit the amount of information that is seen by others. The world is becoming a place where there is virtually no privacy. Everyone is open to surveillance through the Internet, use of a credit card or being filmed on a security camera. Cryptography is a means in which a person can protect his privacy. Through this protection, the author states that …


Computer Networks, Libel And The First Amendment, 11 Computer L.J. 555 (1992), Terri A. Cutrera Jan 1992

Computer Networks, Libel And The First Amendment, 11 Computer L.J. 555 (1992), Terri A. Cutrera

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Video Games And The First Amendment: Are Restrictive Regulations Constitutional?, 5 Computer L.J. 493 (1985), Lisa E. Kranitz Jan 1985

Video Games And The First Amendment: Are Restrictive Regulations Constitutional?, 5 Computer L.J. 493 (1985), Lisa E. Kranitz

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.