Abusive Language on Social Media Through the Legal Looking Glass

Total Page:16

File Type:pdf, Size:1020Kb

Abusive Language on Social Media Through the Legal Looking Glass Abusive Language on Social Media Through the Legal Looking Glass Thales Bertaglia1,3, Andreea Grigoriu2, Michel Dumontier 1, and Gijs van Dijck 2 {t.costabertaglia,a.grigoriu,michel.dumontier,gijs.vandijck}@maastrichtuniversity.nl 1Institute of Data Science, Maastricht, The Netherlands 2Maastricht Law and Tech Lab, Maastricht, The Netherlands 3Studio Europa, Maastricht, The Netherlands Abstract Automatic detection tools for detecting abusive language are used for combating online harassment. Abusive language is a growing phenomenon These tools are mainly based on machine learning on social media platforms. Its effects can reach beyond the online context, contributing algorithms that rely on training data. Therefore, to mental or emotional stress on users. Au- there is a need for good quality datasets to create tomatic tools for detecting abuse can allevi- high performing algorithms to alleviate online ha- ate the issue. In practice, developing auto- rassment. There are various datasets in the field mated methods to detect abusive language re- of online harassment research. However, there is lies on good quality data. However, there a lack of standards for developing these resources. is currently a lack of standards for creating These standards include the definitions used to de- datasets in the field. These standards include termine what content is abusive and the steps of the definitions of what is considered abusive lan- guage, annotation guidelines and reporting on annotation process (including the annotators). The the process. This paper introduces an anno- lack of standards leads to conflicting definitions, tation framework inspired by legal concepts which ultimately results in disagreement within to define abusive language in the context of the field regarding which tasks to solve, creating online harassment. The framework uses a 7- annotation guidelines, and terminology. point Likert scale for labelling instead of class Our Contribution In this project, we introduce labels. We also present ALYT – a dataset ALYT – a dataset of 20k YouTube comments in En- of Abusive Language on YouTube. ALYT includes YouTube comments in English ex- glish labelled for abusive language. The dataset and 2 tracted from videos on different controversial its data statement are available online . We man- topics and labelled by Law students. The com- ually selected videos focusing on a range of con- ments were sampled from the actual collected troversial topics and included different video types. data, without artificial methods for increasing Rather than artificially balancing the data for abu- the abusive content. The paper describes the sive content, we randomly sampled the collected annotation process thoroughly, including all its data. We developed an annotation framework in- guidelines and training steps. spired by legal definitions by analysing various 1 Introduction European provisions and case law ranging from insults, defamation and incitement to hatred. In- The increased use of social media can worsen the stead of class labels, we use a 7-point Likert scale issue of online harassment. Nowadays, more than to encapsulate the complexity of the labelling de- half of online harassment cases happen on social cisions. We analyse the n-grams in our corpus to media platforms (Center, 2017). A specific popular characterise its content and understand the abusive form of online harassment is the use of abusive language’s nature. The results show that the dataset language. One abusive or toxic statement is being contains diverse topics, targets, and expressions of 1 sent every 30 seconds across the globe . The use abuse. of abusive language on social media contributes to mental or emotional stress, with one in ten people 2 Related Work developing such issues (Center, 2017). Creating dataset for online harassment research, 1https://decoders.amnesty.org/ including abusive language, has been a challeng- projects/troll-patrol/findings. For all links, the content refers to the page version last accessed on 8 2https://github.com/thalesbertaglia/ June 2021. ALYT 191 Proceedings of the Fifth Workshop on Online Abuse and Harms, pages 191–200 August 6, 2021. ©2021 Association for Computational Linguistics ing task. Vidgen and Derczynski(2020) review movement and influencers deciding to become ve- a wide range of datasets – and their creation pro- gan. In WD, the videos illustrate the gender wage cess – within the field and identify many issues. gap and its implications. Various approaches have been explored over the We searched for content in one language; there- years, including different data collection strategies, fore, the videos and majority of the comments are labelling methodologies and employing different in English. We manually searched for videos us- views and definitions of online harassment. ing the topics as keywords. We selected popular In terms of annotation methods, crowdsourc- videos (considering the number of views) made by ing is a popular option for labelling abusive lan- well-known influencers posting controversial con- guage data (Burnap and Williams, 2015; Zhong tent. We included three types of videos: personal et al., 2016; Chatzakou et al., 2017; Ribeiro et al., videos (posted by influencers on the topic), reac- 2017; Zampieri et al., 2019). However, in some tion videos (videos in which the author reacts to instances, a small group of non-experts in harass- another video) and official videos (posted by news ment research (Bretschneider et al., 2014; Mathew and media channels). et al., 2018; van Rosendaal et al., 2020) or domain To create our dataset, we retrieved all comments experts annotate the data (Golbeck et al., 2017; from the selected videos, excluding replies. We re- Waseem and Hovy, 2016). The definitions used to moved comments containing URLs because these label the data can vary as well. At times, defini- are often spam or make reference to external con- tions are derived from literature (Chatzakou et al., tent. We also removed comments with fewer than 2017) on the topic, or existing social media plat- three tokens. In total, we obtained 879,000 com- form’s guidelines (Ribeiro et al., 2017). In other ments after these steps. Out of this sample, we instances, annotators decide by themselves when selected 20,215 to annotate. We randomly sampled abuse is present in the text (Walker et al., 2012). comments from the total distribution, not attempt- A recent direction in the field has been applying ing to balance the data according to content. We legal provisions to decide whether content should aimed to balance video topics and types equally, be removed, given criminal law provisions on hate but as the total number of comments was not even speech or incitement to hatred. These approaches per video category, the final sample was not per- represent legal provisions as decision trees that fectly balanced. Table 1 shows the distribution per guide the annotation process. Zufall et al.(2020) video category of the comments included in the apply this methodology focusing on the German dataset. provision related to incitement to hatred. Two non- expert annotators label the data, guided by the cre- Category % # ated decision tree. The experiments show that there VG 34.75 6967 was little difference between using expert and non- GI 34.46 7024 expert annotators in this case. WD 30.79 6224 3 Data Collection Official 50.31 10171 Personal 31.38 6343 We aimed to include a representative sample of Reaction 18.31 3701 abusive language on social media in our dataset. Therefore, we did not search directly for abusive Table 1: Distribution of comments per video category content. Instead, we chose topics likely to con- tain abusive comments. We chose three different topics before the video selection: Gender Iden- Collecting Abusive Content tity (GI), Veganism (VG), and Workplace Diversity Searching for keywords related to harassment is a (WD). The topics generate controversial videos on common approach to increase the amount of abu- YouTube while not being limited to one type of con- sive content in datasets. We do not employ any troversy (e.g. gender identity, diet choices, socio- method to balance the data artificially – i.e., we economical issues). The videos in GI focus on the do not try to search for abusive content directly. disclosure of transgender identity and the impact Instead, we randomly select comments from the of transgender people in sports. The videos in the total distribution of comments, resulting in a real- VG category concentrate on describing the vegan istic data sample, similar to what is available on 192 the platform. To compare our sampling approach words. However, the content may still correlate to to keyword search, we conduct two experiments the hashtags or accounts being used to search for comparing our dataset to others. First, we compare tweets. Our approach is similar in the sense that the the final distribution of abusive content. Then, we video topics delimit the scope of the comments, but compare the prevalence of hateful keywords. We the comments are not filtered; thus, they provide use Hatebase3 as a source of keywords, limiting it a representative sample of the entire data. To fur- to the 500 most frequent terms (by the number of ther investigate the prevalence of hateful keywords sightings). on the datasets, we analyse the proportion of con- We compare our dataset to three others, all con- tent that contains at least one term from Hatebase. taining tweets: Davidson et al.(2017) (HSOL), Table 3 presents the results. Waseem and Hovy(2016) (HSHP), and Zampieri et al.(2019) (OLID). Twitter is the most popular Dataset % # social media platform for online harassment re- ALYT 8.81 246 search, so most datasets contain tweets. HSHP is HSOL 87.55 1252 distributed as tweet ids, so all experiments refer HSHP 7.51 204 to the distribution of the tweets we were able to OLID 6.43 263 retrieve in April 2021. These datasets use differ- ent definitions of abusive content.
Recommended publications
  • Warmsley Cornellgrad 0058F 1
    ON THE DETECTION OF HATE SPEECH, HATE SPEAKERS AND POLARIZED GROUPS IN ONLINE SOCIAL MEDIA A Dissertation Presented to the Faculty of the Graduate School of Cornell University in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy by Dana Warmsley December 2017 c 2017 Dana Warmsley ALL RIGHTS RESERVED ON THE DETECTION OF HATE SPEECH, HATE SPEAKERS AND POLARIZED GROUPS IN ONLINE SOCIAL MEDIA Dana Warmsley, Ph.D. Cornell University 2017 The objective of this dissertation is to explore the use of machine learning algorithms in understanding and detecting hate speech, hate speakers and po- larized groups in online social media. Beginning with a unique typology for detecting abusive language, we outline the distinctions and similarities of dif- ferent abusive language subtasks (offensive language, hate speech, cyberbully- ing and trolling) and how we might benefit from the progress made in each area. Specifically, we suggest that each subtask can be categorized based on whether or not the abusive language being studied 1) is directed at a specific individ- ual, or targets a generalized “Other” and 2) the extent to which the language is explicit versus implicit. We then use knowledge gained from this typology to tackle the “problem of offensive language” in hate speech detection. A key challenge for automated hate speech detection on social media is the separation of hate speech from other instances of offensive language. We present a Logistic Regression classifier, trained on human annotated Twitter data, that makes use of a uniquely derived lexicon of hate terms along with features that have proven successful in the detection of offensive language, hate speech and cyberbully- ing.
    [Show full text]
  • How Informal Justice Systems Can Contribute
    United Nations Development Programme Oslo Governance Centre The Democratic Governance Fellowship Programme Doing Justice: How informal justice systems can contribute Ewa Wojkowska, December 2006 United Nations Development Programme – Oslo Governance Centre Contents Contents Contents page 2 Acknowledgements page 3 List of Acronyms and Abbreviations page 4 Research Methods page 4 Executive Summary page 5 Chapter 1: Introduction page 7 Key Definitions: page 9 Chapter 2: Why are informal justice systems important? page 11 UNDP’s Support to the Justice Sector 2000-2005 page 11 Chapter 3: Characteristics of Informal Justice Systems page 16 Strengths page 16 Weaknesses page 20 Chapter 4: Linkages between informal and formal justice systems page 25 Chapter 5: Recommendations for how to engage with informal justice systems page 30 Examples of Indicators page 45 Key features of selected informal justice systems page 47 United Nations Development Programme – Oslo Governance Centre Acknowledgements Acknowledgements I am grateful for the opportunity provided by UNDP and the Oslo Governance Centre (OGC) to undertake this fellowship and thank all OGC colleagues for their kindness and support throughout my stay in Oslo. I would especially like to thank the following individuals for their contributions and support throughout the fellowship period: Toshihiro Nakamura, Nina Berg, Siphosami Malunga, Noha El-Mikawy, Noelle Rancourt, Noel Matthews from UNDP, and Christian Ranheim from the Norwegian Centre for Human Rights. Special thanks also go to all the individuals who took their time to provide information on their experiences of working with informal justice systems and UNDP Indonesia for releasing me for the fellowship period. Any errors or omissions that remain are my responsibility alone.
    [Show full text]
  • VIRGINIA LAWS LAW ENFORCEMENT Your Guide To
    Your guide to VIRGINIA LAWS and LAW ENFORCEMENT eamwork approach to building relationships T with police emoving barriers to communication R with youth U nified approach to mutual understanding S eparating out individual and group prejudice eaching the benefits of recognizing and T reporting crime TABLE OF CONTENTS 4 Message from Chesterfield Police 5 Our Mission and Goals 6 Police Encounters 7 Laws 8 Alcohol-Related Crimes 9 Group Offenses 10 Crimes Against Others 12 Crimes Against Property 13 Drug Crimes 14 Weapons Crimes 15 Cyber Crimes 16 Crimes Against Peace 17 Traffic Infractions 18 Social Media 19 Crime and the Community 21 Law Enforcement Vocabulary message from us The Chesterfield County Police Department’s most important goal is the constant safety of you, your families, friends, and neighbors. You are the future leaders of our county and the United States as a whole; therefore, we place special emphasis on providing this service to young people such as yourself. The officers of Chesterfield County are people just like you; they are your neighbors, friends, and family. Therefore, we believe that by creating a partnership with our neighborhoods, community policing will become everybody’s job and a responsibility that we all share. This guide is designed to help you understand how police work, explain how officers enforce the law, and help you make good decisions when meeting police officers at any time. Inside you will find definitions of the law, information about the most common types of crimes, how to safely report criminal activity, and several different ways to keep you and your family safe.
    [Show full text]
  • In Quest for a Culture of Peace in the IGAD Region: the Role Intellectuals and Scholars Somalia Stability
    Cover Final.pdf 6/15/06 10:54:43 AM The Intergovernmental Authority on Development (IGAD) region com- prising Kenya, Uganda, Sudan, Somalia, Ethiopia, Eritrea and Djibouti faces a distinct set of problems stemming from diverse historical, social, economic, political and cultural factors. Despite the socio-cultural affinities and economic interdependence between the peoples of this Eritrea region, the IGAD nations have not developed coherent policies for Sudan Djibouti regional integration, economic cooperation and lasting peace and of Peace in the IGAD Region: In Quest for a Culture Somalia stability. Ethiopia Intermittent conflicts between and within nations, poor governance, Uganda low economic performance, and prolonged drought which affects food Kenya security, are the key problems that bedevil the region. But in recent years the IGAD countries have made great strides towards finding lasting solutions to these problems. The African Union Peace and Security Council and IGAD have gained significant mileage in con- flict resolution. Major milestones include the signing of the Compre- hensive Peace Agreement between the Government of Sudan and the C Sudan People’s Liberation Movement (SPLA/SPLM) in January 2005. M Ethiopia held democratic multi-party elections in May 2005 and Kenya Y carried out a referendum on the draft constitution in November 2005. In Quest for a Culture of Peace CM Somalia’s newly established Transitional Federal Government was able to relocate to Somalia in 2005 as a first step towards establishing lasting MY peace. CY in the IGAD Region: The Role of Intellectuals and Scholars CMY The East African sub-region countries of Kenya, Uganda and Tanzania K have made progress towards economic and eventual political integra- tion through the East African Community and Customs Union treaties.
    [Show full text]
  • Classification and Its Consequences for Online Harassment: Design Insights from Heartmob
    Classification and Its Consequences for Online Harassment: Design Insights from HeartMob LINDSAY BLACKWELL, University of Michigan School of Information JILL DIMOND, Sassafras Tech Collective SARITA SCHOENEBECK, University of Michigan School of Information CLIFF LAMPE, University of Michigan School of Information Online harassment is a pervasive and pernicious problem. Techniques like natural language processing and machine learning are promising approaches for identifying abusive language, but they fail to address structural power imbalances perpetuated by automated labeling and classification. Similarly, platform policies and reporting tools are designed for a seemingly homogenous user base and do not account for individual experiences and systems of social oppression. This paper describes the design and evaluation of HeartMob, a platform built by and for people who are disproportionately affected by the most severe forms of online harassment. We conducted interviews with 18 HeartMob users, both targets and supporters, about their harassment experiences and their use of the site. We examine systems of classification enacted by technical systems, platform policies, and users to demonstrate how 1) labeling serves to validate (or invalidate) harassment experiences; 2) labeling motivates bystanders to provide support; and 3) labeling content as harassment is critical for surfacing community norms around appropriate user behavior. We discuss these results through the lens of Bowker and Star’s classification theories and describe implications
    [Show full text]
  • 16-40. Status in Police Department
    POLICE DEPARTMENT PLL § 16-40 PARK POLICE § 16-40. Status in Police Department. Any person who became a member of the Baltimore City Police Department as a result of the merger of the Park Police, a Division of the Department of Recreation and Parks, of the City of Baltimore, with the Police Department shall be deemed to have been a member of the Baltimore City Police Department for the period such person was employed as a member of the said Park Police Division; and the period of each person’s employment time spent with the Park Police Division prior to the effective date of the merger on January 1, 1961, shall be held to have been spent in the service of the Baltimore City Police Department for purposes of probationary period, seniority rating, length of service for compensation, or additional compensation, eligibility for promotion and all other purposes except eligibility for membership in the Special Fund for Widows; and each person shall continue in the rank attained in the Park Police Division during his tenure in the Baltimore City Police Department, until promoted, reduced, retired, dropped, dismissed, or otherwise altered, according to law, and in the same manner as other members of the Baltimore City Police Department. Any person who is a member of the Baltimore City Police Department shall be given credit for all the purposes aforesaid for all time spent as a member of the said Park Police Division. (P.L.L., 1969, §16-40.) (1961, ch. 290.) CIVILIAN REVIEW BOARD § 16-41. Definitions. (a) In general. In this subheading the following words have the meanings indicated.
    [Show full text]
  • The Right to Insult in International Law
    THE RIGHT TO INSULT IN INTERNATIONAL LAW Amal Clooney and Philippa Webb* ABSTRACT States all over the world are enacting new laws that criminalize insults, and using existing insult laws with renewed vigour. In this article, we examine state practice, treaty provisions, and case law on insulting speech. We conclude that insulting speech is currently insufficiently protected under international law and regulatedby confused case law and commentary. We explain that the three principal internationaltreaties that regulate speech provide conflicting guidance on the right to insult in internationallaw, and the treaty provisions have been interpreted in inconsistent ways by international courts and United Nations bodies. We conclude by recommending that internationallaw should recognize a "rightto insult"and, drawingon US practice under the FirstAmendment, we propose eight recommendations to guide consideration of insulting speech in internationallaw. These recommendations would promote coherence in international legal standards and offer greater protection to freedom of speech. * Amal Clooney is a barrister at Doughty Street Chambers and a Visiting Professor at Columbia Law School. Philippa Webb is a barrister at 20 Essex Street Chambers and Reader (Associate Professor) in Public International Law at King's College London. We thank Matthew Nelson, Anna Bonini, Katarzyna Lasinska, Raphaelle Rafin, Tiffany Chan, Deborah Tang, Ollie Persey, and Mirka Fries for excellent research assistance. We are grateful to Professor Guglielmo Verdirame, Professor Michael Posner, Professor Vince Blasi, and Nani Jansen for comments. COL UMBIA HUMAN RIGHTS LAW RE VIE W [48.2 INTRODUCTION Freedom of speech is under attack. States all over the world are enacting new laws that criminalize insults and are using existing insult laws with renewed vigour.
    [Show full text]
  • Civil Rights Remedies for Battered Women: Axiomatic & (And) Ignored
    Minnesota Journal of Law & Inequality Volume 11 Issue 1 Article 1 June 1993 Civil Rights Remedies for Battered Women: Axiomatic & (and) Ignored Andrea Brenneke Follow this and additional works at: https://lawandinequality.org/ Recommended Citation Andrea Brenneke, Civil Rights Remedies for Battered Women: Axiomatic & (and) Ignored, 11(1) LAW & INEQ. 1 (1993). Available at: https://scholarship.law.umn.edu/lawineq/vol11/iss1/1 Minnesota Journal of Law & Inequality is published by the University of Minnesota Libraries Publishing. Civil Rights Remedies for Battered Women: Axiomatic & Ignored Andrea Brenneke* ** I. Introduction: Civil Rights Remedies for Battered Women Axiomatic and Ignored ..................................... 3 II. Battering Deprives Women of Rights That Should Be Protected By Civil Rights Law ............................. 5 A. The Facts: BatteringDisproportionately Affects Women and Can Be Motivated By Gender........... 5 B. Situating Domestic Violence in a System of 'GenderedPower Relations':A FeministApproach 7 1. Gendered Power .................................. 8 2. Intersecting Continua of Violence Against Women and the Struggle For Power and Control 11 3. Establishing the Civil Rights Claim Supports a Survivor Theory .................................. 14 4. Listening and Challenging: Feminist Legal Theory, Subjectivity and Social Change .......... 16 C. Federal Remedies Are Appropriate to Protect the Civil Rights of Battered Women ..................... 18 * Andrea Brenneke is an attorney at the law firm of MacDonald, Hoague & Bayless in Seattle. Her practice is in general litigation with an emphasis in civil rights, personal injury and employment discrimination. In addition, Ms. Brenneke serves on the board of the Northwest Women's Law Center. Ms. Brenneke gradu- ated cum laude from Harvard Law School in 1992 where she was a member of the Harvard Legal Aid Bureau and an articles editor of the HarvardHuman Rights Journal.
    [Show full text]
  • Discriminatory Speech and the Tort of Intentional Infliction of Emotional Distress, 47 Wash
    Washington and Lee Law Review Volume 47 | Issue 1 Article 5 Winter 1-1-1990 Discriminatory Speech And The orT t Of Intentional Infliction Of Emotional Distress Jean C. Love Follow this and additional works at: https://scholarlycommons.law.wlu.edu/wlulr Part of the Torts Commons Recommended Citation Jean C. Love, Discriminatory Speech And The Tort Of Intentional Infliction Of Emotional Distress, 47 Wash. & Lee L. Rev. 123 (1990), https://scholarlycommons.law.wlu.edu/wlulr/vol47/iss1/5 This Article is brought to you for free and open access by the Washington and Lee Law Review at Washington & Lee University School of Law Scholarly Commons. It has been accepted for inclusion in Washington and Lee Law Review by an authorized editor of Washington & Lee University School of Law Scholarly Commons. For more information, please contact [email protected]. DISCRIMINATORY SPEECH AND THE TORT OF INTENTIONAL INFLICTION OF EMOTIONAL DISTRESS JEAN C. LovE* I. SECTION 6-103 OF TME MODEL ComMUmCATIVE TORTS ACT Section 6-103 of the Model Communicative Torts Act (Model Act) recognizes a tort action whenever a person "intentionally engages in a course of conduct (i.e., "a pattern of communication evincing a continuity of purpose") that is addressed to an individual, that is specifically intended and reasonably likely to harass or intimidate the individual because of the individual's race, sex, [ethnic origin], or religion, and that directly causes serious emotional distress."' The Model Act provides two remedies for such tortious conduct: injunctive relief and damages for proven losses, including pecuniary loss and emotional distress.2 The comment to Section 6-103 states that the Section is "bracketed" to indicate "divisions of opinion" among the drafters as to "whether freedom from harassment based on an indivi- dual's race, sex, ethnic origin, or religion is an interest that the drafters wished to protect in the context of tort liability based on communication.
    [Show full text]
  • Page 1 of 35 UNITED NATIONS DISPUTE TRIBUNAL Before
    Case No.: UNDT/NY/2015/062 Judgment No.: UNDT/2017/007 NITED ATIONS ISPUTE RIBUNAL U N D T Date: 1 February 2017 Original: English Before: Judge Alexander W. Hunter, Jr. Registry: New York Registrar: Hafida Lahiouel AUDA v. SECRETARY-GENERAL OF THE UNITED NATIONS JUDGMENT Counsel for Applicant: Self-represented Counsel for Respondent: Alan Gutman, ALS/OHRM, UN Secretariat Pallavi Sekhri, ALS/OHRM, UN Secretariat Page 1 of 35 Case No. UNDT/NY/2015/062 Judgment No. UNDT/2017/007 Introduction 1. The Applicant, a former Principal Officer at the D-1 level in the Department of General Assembly and Conference Management (“DGACM”), filed two applications pertaining to a complaint he submitted on 19 April 2012 to Mr. Shaaban Muhammad Shaaban, the then Under-Secretary-General, DGACM, alleging that Mr. Franz Baumann, then Assistant Secretary-General, DGACM, had engaged in conduct prohibited under ST/SGB/2008/5 (Prohibition of discrimination, harassment, including sexual harassment, and abuse of authority). 2. The present judgment concerns the Applicant’s challenge to the decision of Mr. Tegegnework Gettu, the then USG/DGACM, dated 8 September 2015, based on the report of a second fact-finding panel (“second FFP”) to close his complaint without taking any further action. The Applicant seeks rescission of the decision to close his case or, in the alternative, an order that the report of the second FFP be transferred to the Office of Human Resources Management (“OHRM”) for action. The Applicant also seeks compensation for the inordinate delay in the investigation of his complaint and the violation of his right to due process.
    [Show full text]
  • 1 State of Minnesota in Supreme Court A15-0005
    STATE OF MINNESOTA IN SUPREME COURT A15-0005 Court of Appeals Stras, J. Dissenting, Anderson, J., Gildea, C.J. Took no part, Lillehaug, J. State of Minnesota, Respondent, vs. Filed: September 13, 2017 Office of Appellate Courts Robin Lyne Hensel, Appellant. ________________________ Lori Swanson, Attorney General, Saint Paul, Minnesota; and Paul D. Reuvers, Nathan C. Midolo, Iverson Reuvers Condon, Bloomington, Minnesota, for respondent. Kevin C. Riach, David D. Coyle, Fredrikson & Byron, P.A., Minneapolis, Minnesota, for appellant. Teresa Nelson, American Civil Liberties Union of Minnesota, Saint Paul, Minnesota; and Scott M. Flaherty, Briggs and Morgan, P.A., Minneapolis, Minnesota, for amicus curiae American Civil Liberties Union of Minnesota. Cort C. Holten, Jeffrey D. Bores, Gary K. Luloff, Chestnut Cambronne PA, Minneapolis, Minnesota, for amicus curiae Minnesota Police and Peace Officers Association Legal Defense Fund. Susan L. Naughton, League of Minnesota Cities, Saint Paul, Minnesota, for amici curiae League of Minnesota Cities, Association of Minnesota Counties, and Minnesota Association of Townships. ________________________ 1 S Y L L A B U S 1. Minnesota Statutes § 609.72, subd. 1(2) (2016), is facially unconstitutional under the First Amendment to the United States Constitution because it is substantially overbroad. 2. Because there is no reasonable narrowing construction of Minn. Stat. § 609.72, subd. 1(2), the remedy for the First Amendment violation is to invalidate the statute. Reversed and remanded. O P I N I O N STRAS, Justice. This case requires us to determine whether the part of Minnesota’s disorderly- conduct statute that prohibits “disturb[ing]” assemblies or meetings, Minn. Stat.
    [Show full text]
  • Torts: Assault, Battery W
    Notre Dame Law Review Volume 17 | Issue 1 Article 1 11-1-1941 Torts: Assault, Battery W. D. Rollison Follow this and additional works at: http://scholarship.law.nd.edu/ndlr Part of the Law Commons Recommended Citation W. D. Rollison, Torts: Assault, Battery, 17 Notre Dame L. Rev. 1 (1941). Available at: http://scholarship.law.nd.edu/ndlr/vol17/iss1/1 This Article is brought to you for free and open access by NDLScholarship. It has been accepted for inclusion in Notre Dame Law Review by an authorized administrator of NDLScholarship. For more information, please contact [email protected]. NOTRE DAME LAWYER A Quarterly Law Review VOL. XVII NOVEMBER, 1941 NO. 1 TORTS: ASSAULT; BATTERY BATTERY Definition. A harmful, or an offensive, touching of the plaintiff's person, caused directly or indirectly by a volun- tary act .of the defendant with an intention to inflict a harm- ful or an offensive touching, is a battery. Offensive Touching. A touching of another's person may be both offensive and harmful, or it may be merely offensive and not inflict substantial harm. A touching which is not harmful but which is offensive to a normal or reasonable person is a battery, and it subjects the actor to liability if the touching is not consented to or privileged. In this type of battery, it is the insult or offensiveness of the touching that is important and not damage in fact. A certain amount of contact with one's person must be tolerated in decent society. Thus, "if two or more meet in a narrow passage, and without any violence or design of harm, the one touches the other gently, it will be no battery."1 But "if any of them 1 Per Holt, C.
    [Show full text]