An Overview of the Communication Decency Act's Section
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Technical Report
Cost-Effective Cloud Edge Traffic Engineering with CASCARA Rachee Singh Sharad Agarwal Matt Calder Victor Bahl Microsoft Abstract Inter-domain bandwidth costs comprise a significant amount of the operating expenditure of cloud providers. Traffic engi- neering systems at the cloud edge must strike a fine balance between minimizing costs and maintaining the latency ex- pected by clients. The nature of this tradeoff is complex due to non-linear pricing schemes prevalent in the market for inter-domain bandwidth. We quantify this tradeoff and un- cover several key insights from the link-utilization between a large cloud provider and Internet service providers. Based Figure 1: Present-day and CASCARA-optimized bandwidth allo- on these insights, we propose CASCARA, a cloud edge traffic cation distributions for one week, across a pair of links between a engineering framework to optimize inter-domain bandwidth large cloud provider and tier-1 North American ISPs. Costs depend allocations with non-linear pricing schemes. CASCARA lever- on the 95th-percentile of the allocation distributions (vertical lines). ages the abundance of latency-equivalent peer links on the CASCARA-optimized allocations reduce total costs by 35% over the cloud edge to minimize costs without impacting latency sig- present-day allocations while satisfying the same demand. nificantly. Extensive evaluation on production traffic demands of a commercial cloud provider shows that CASCARA saves In this work, we show that recent increases in interconnec- 11–50% in bandwidth costs per cloud PoP, while bounding tion and infrastructure scale enable significant potential to re- the increase in client latency by 3 milliseconds1. duce the costs of inter-domain traffic. -
Section 230 of the Communications Decency Act: Research Library Perspectives June 2021 by Katherine Klosek
Issue Brief Section 230 of the Communications Decency Act: Research Library Perspectives June 2021 By Katherine Klosek With thanks to Jonathan Band, General Counsel at ARL; Greg Cram, Director of Copyright, Permissions & Information Policy at New York Public Library; and Judy Ruttenberg, Senior Director of Scholarship and Policy at ARL Introduction 3 Background 3 Section 230 of the Communications Decency Act 5 Libraries and Section 230 7 FOSTA: The Allow States and Victims to Fight Online Sex Trafcking Act 9 Discussion 10 Appendix: Discussion Guide 12 Access to Information 12 Afordability 12 Anti-harassment 12 Diversity 13 Open Internet 13 Political Neutrality/Freedom of Expression 14 Privacy 14 Issue Brief: Section 230 of the Communications Decency Act—June 2021 2 Introduction The 117th US Congress is holding hearings and debating bills on changes to Section 230 of the Communications Decency Act (CDA), a 1996 law that protects internet service providers and internet users from liability for content shared by third parties. When it was enacted, Section 230 ofered liability protections for then- nascent services that are integral to the development of the internet we have today. But Section 230 has come under fre from Democrats who believe internet service providers are not engaging in responsible content moderation, and from Republicans who believe that large social media companies censor conservative voices. This myopic debate ignores the longstanding role that research libraries have played as internet service providers, and the vast experience research libraries have in moderating and publishing content. More information on this topic can be found in the “Discussion” section of this brief. -
Player, Pirate Or Conducer? a Consideration of the Rights of Online Gamers
ARTICLE PLAYER,PIRATE OR CONDUCER? A CONSIDERATION OF THE RIGHTS OF ONLINE GAMERS MIA GARLICK I. INTRODUCTION.................................................................. 423 II. BACKGROUND ................................................................. 426 A. KEY FEATURES OF ONLINE GAMES ............................ 427 B. AGAMER’S RIGHT OF OUT-OF-GAME TRADING?......... 428 C. AGAMER’S RIGHT OF IN-GAME TECHNICAL ADVANCEMENT?......................................................... 431 D. A GAMER’S RIGHTS OF CREATIVE GAME-RELATED EXPRESSION? ............................................................ 434 III. AN INITIAL REVIEW OF LIKELY LEGAL RIGHTS IN ONLINE GAMES............................................................................ 435 A. WHO OWNS THE GAME? .............................................. 436 B. DO GAMERS HAVE RIGHTS TO IN-GAME ELEMENTS? .... 442 C. DO GAMERS CREATE DERIVATIVE WORKS?................ 444 1. SALE OF IN-GAME ITEMS - TOO COMMERCIAL? ...... 449 2. USE OF ‘CHEATS’MAY NOT INFRINGE. .................. 450 3. CREATIVE FAN EXPRESSION –ASPECTRUM OF INFRINGEMENT LIKELIHOOD?.............................. 452 IV. THE CHALLENGES GAMER RIGHTS POSE. ....................... 454 A. THE PROBLEM OF THE ORIGINAL AUTHOR. ................ 455 B. THE DERIVATIVE WORKS PARADOX............................ 458 C. THE PROBLEM OF CULTURAL SIGNIFICATION OF COPYRIGHTED MATERIALS. ....................................... 461 V. CONCLUSION .................................................................. 462 © 2005 YALE -
Google V. Hood
Case 3:14-cv-00981-HTW-LRA Document 37-1 Filed 01/22/15 Page 1 of 15 IN THE UNITED STATES DISTRICT COURT FOR THE SOUTHERN DISTRICT OF MISSISSIPPI NORTHERN DIVISION GOOGLE, INC. PLAINTIFF VS. CIVIL ACTION NO. 3:14-cv-981-HTW-LRA JIM HOOD, ATTORNEY GENERAL OF THE STATE OF MISSISSIPPI, IN HIS OFFICIAL CAPACITY DEFENDANT PROPOSED MEMORANDUM OF AMICUS CURIAE INTERNATIONAL ANTICOUNTERFEITING COALITION I. INTEREST OF AMICUS CURIAE The International AntiCounterfeiting Coalition (“IACC”) is a nonprofit corporation recognized as tax-exempt under Internal Revenue Code § 501(c)(6). It has no parent corporation, and no publicly held corporation owns 10% or more of its stock. The IACC was established in 1979 to combat counterfeiting and piracy by promoting laws, regulations, directives, and relationships designed to render the theft of intellectual property undesirable and unprofitable. 1 Counterfeiting and piracy are scourges that threaten consumer health and safety and drain billions of dollars from the U.S. economy. The IACC is the oldest and largest organization in the country devoted exclusively to combating these threats. Today the IACC’s members include more than 230 companies in the pharmaceutical, health and beauty, automotive, fashion, food and beverage, computer and electronics, and entertainment industries, among others. The IACC offers anti-counterfeiting programs designed to increase protection for patents, trademarks, copyrights, service marks, trade dress and trade secrets. Critical to the IACC's 1 IACC states that no party’s counsel authored this brief in whole or in part; no party or party’s counsel contributed money that was intended to fund preparing or submitting this brief; and no person, other than the amicus curiae and its members, contributed money that was intended to fund preparing or submitting this brief. -
Social Media Immunity in 2021 and Beyond: Will Platforms Continue to Avoid Litigation Exposure Faced by Offline Counterparts
Social Media Immunity in 2021 and Beyond: Will Platforms Continue to Avoid Litigation Exposure Faced by Offline Counterparts By: Peter J. Pizzi Peter J. Pizzi, CIPPE/US, is a business trial lawyer with decades of experience in commercial litigation, internal investigations, technology litigation, eDiscovery, and labor and employment law. A Certified Civil Trial Attorney, Peter represents corporate clients in a broad array of industries, including healthcare, pharmaceuticals, financial services, information technology, cosmetics, industrial equipment, food service and others. Recent highlights include a federal court jury verdict on a contract claim arising from an acquisition and pre-discovery dismissals of consumer class actions in the convenience store retail and private aviation industries. A member of the New Jersey, New York and Pennsylvania bars, Peter is former Chair of IADC’s Cyber Security, Data Privacy and Technology Committee. URING the 2020 election cycle, companies from being held liable for both the United States transmitting or taking down user- D presidential candidates generated content (UGC). Twice in called for changes to Section 230 of 2020, the Senate held hearings, with the Communications Decency Act of both sides demanding change to the 1996, which protects online service statute and to platform moderation providers like social media practices.1 Then, following the 1 Cat Zakrzewski and Rachel Lerman, The election was a chance for Facebook and Twitter to show they could control misinformation. Now lawmakers are grilling them on it, WASH. POST (Nov. 17, 2020), https://www.washingtonpost.com/techno 2 DEFENSE COUNSEL JOURNAL | JULY 2021 January 6, 2021 Capitol Hill riot, I. Origins Donald Trump and others within his circle were de-platformed by Defamation actions brought in Twitter, Facebook, and YouTube. -
Reevaluating Internet Service Providers' Liability for Third Party Content and Copyright Infringement Lucy H
Roger Williams University Law Review Volume 7 Issue 1 Symposium: Information and Electronic Article 6 Commerce Law: Comparative Perspectives Fall 2001 Making Waves in Statutory Safe Harbors: Reevaluating Internet Service Providers' Liability for Third Party Content and Copyright Infringement Lucy H. Holmes Roger Williams University School of Law Follow this and additional works at: http://docs.rwu.edu/rwu_LR Recommended Citation Holmes, Lucy H. (2001) "Making Waves in Statutory Safe Harbors: Reevaluating Internet Service Providers' Liability for Third Party Content and Copyright Infringement," Roger Williams University Law Review: Vol. 7: Iss. 1, Article 6. Available at: http://docs.rwu.edu/rwu_LR/vol7/iss1/6 This Notes and Comments is brought to you for free and open access by the Journals at DOCS@RWU. It has been accepted for inclusion in Roger Williams University Law Review by an authorized administrator of DOCS@RWU. For more information, please contact [email protected]. Notes and Comments Making Waves In Statutory Safe Harbors: Reevaluating Internet Service Providers' Liability for Third-Party Content and Copyright Infringement With the growth of the Internet" as a medium of communica- tion, the appropriate standard of liability for access providers has emerged as an international legal debate. 2 Internet Service Prov- iders (ISPs) 3 have faced, and continue to face, potential liability for the acts of individuals using their services to access, post, or download information.4 Two areas of law where this potential lia- bility has been discussed extensively are defamation and copyright 5 law. In the United States, ISP liability for the content of third- party postings has been dramatically limited by the Communica- tions Decency Act of 1996 (CDA). -
Section 230 Legislation in the 117Th Congress
Section 230 Legislation in the 117th Congress 47 USC 230, commonly referred to as Section 230, was passed as part of the Communications Decency Act of 1996. Section 230 provides immunity for website platforms for third-party content posted on their platforms and allows platforms to remove or restrict content the service provider finds objectionable. This immunity has allowed the ad-supported internet to grow over the past 25 years without publishers facing crippling lawsuits for user-posted content. Both parties have raised issues about this immunity and support repeal or modification – for different reasons. Republicans, including Senators Josh Hawley (R-MO) and Ted Cruz (R-TX), believe that platforms use Section 230 to censor the views of conservatives. Democrats, such as Senators Mark Warner (D-VA) and Amy Klobuchar (D-MN), want to remove the protections of Section 230 from ads and paid content, while allowing users to sue over content that threatens them with harassment or discrimination. Senate Bill Number Bill Title S. 47 Adversarial Platform Prevention Act of 2021 (APP Act) Sponsor Description Rubio (R-FL) This bill would require owners and operators of covered foreign software to provide consumers with a warning prior to the download of the software and requires annual reports to the FTC and DOJ on the privacy practices of the owner concerning US users. It would also remove Section 230 protection from owners of covered foreign software. Cosponsors History None 1.26.2021: Introduced in Senate 1.26.2021: Referred to the Senate Committee on Commerce, Science, and Transportation Bill Number Bill Title S. -
Platform Justice: Content Moderation at an Inflection Point 3
A HOOVER INSTITUTION ESSAY ON Platform Justice C ONTENT MODERATION at an INFLECTION POINT DANIELLE CITRON & QUINTA JURECIC Aegis Series Paper No. 1811 In June 2016, Facebook Vice President Andrew Bosworth circulated an internal memorandum describing the company’s mission. “We connect people,” he wrote. “Maybe someone finds love. Maybe [Facebook] even saves the life of someone on the brink of suicide. Maybe it costs a life by exposing someone to bullies. Maybe someone dies in a terrorist attack coordinated on our tools.”1 Bosworth was not speaking metaphorically. The month after he distributed the memo, Facebook was sued by the parents of five victims of terrorist attacks conducted by Hamas, which had made extensive use of the company’s platform to recruit and organize. Days before, the social media platform had inadvertently broadcast a murder over the streaming app Facebook Live. National Security, Technology, and Law and Technology, Security, National Yet the outrage Facebook weathered in the aftermath of this violence was nothing compared to the scathing criticism it endured two years later after Buzzfeed News published Bosworth’s memo. When the memo leaked in March 2018, Facebook was neck-deep in controversies over its influence on the 2016 presidential election, including the use of the platform’s ad-targeting function by Russian trolls to sow political discord and the harvesting of user data under false pretenses by the Trump-affiliated political consultancy Cambridge Analytica.2 Meanwhile, Facebook’s competitors, Twitter and Google, faced mounting criticism over their failure to curb disinformation and abusive content.3 In 2016, Bosworth’s memo might have been an awkward attempt at self-reflection. -
Corynne Mcsherry, Ph.D
The Subcommittee on Communications and Technology and the Subcommittee on Consumer Protection and Commerce of the Committee on Energy and Commerce Joint Hearing: “Fostering a Healthier Internet to Protect Consumers” Statement of Corynne McSherry, Ph.D. Legal Director Electronic Frontier Foundation October 16, 2019 As Legal Director for the Electronic Frontier Foundation, I thank Chairman Pallone, Ranking Member Walden and Members of the Subcommittee on Communications and Technology and the Subcommittee on Consumer Protection and Commerce for the opportunity to share EFF’s views on how to create a healthier Internet and protect all of its users. EFF is a donor-funded nonprofit, with contributions from more than 30,000 dues-paying members from around the world forming the backbone of our financial support. The majority of EFF’s funding comes from ordinary individuals, and over 80% of that funding consists of donations under $10,000. We receive less than six and a half percent of our funding from corporate sponsors.1 For nearly 30 years, EFF has represented the interests of technology users both in court cases and in broader policy debates to help ensure that law and technology support our civil liberties. From that vantage point, we are well aware that online speech is not always pretty—sometimes it’s extremely ugly and causes real-world harm. The effects of this kind of speech are often disproportionately felt by communities for whom the Internet has also provided invaluable tools to organize, educate, and connect. Systemic discrimination does not disappear and can even be amplified online. Given the paucity and inadequacy of tools for users themselves to push back, it’s no surprise that many would look to Internet intermediaries to do more to limit such speech. -
Lake Service Provider Training Manual for Preventing the Spread of Aquatic Invasive Species Version 3.3
Lake Service Provider Training Manual for Preventing the Spread of Aquatic Invasive Species Version 3.3 Lake Service Provider Training Manual developed by: Minnesota Department of Natural Resources 500 Lafayette Road St. Paul, MN 55155-4025 1-888-646-6367 www.mndnr.gov Contributing authors: Minnesota Department of Natural Resources Darrin Hoverson, Nathan Olson, Jay Rendall, April Rust, Dan Swanson Minnesota Waters Carrie Maurer-Ackerman All photographs and illustrations in this manual are owned by the Minnesota DNR unless otherwise credited. Thank you to the many contributors who edited copy and provided comments during the development of this manual, and other training materials. Some portions of this training manual were adapted with permission from a publication originally produced by the Colorado Division of Wildlife and State Parks with input from many other partners in Colorado and other states. Table of Contents Section 1 : Lake Service Provider Basics. 1 What is a Lake “Service Provider”?. 2 What are Aquatic Invasive Species (AIS)?. .2 Why a training and permit?. 3 How do you know if you are a service provider and need a permit?. .3 How to get your service provider permit. .3 Service Provider Vehicle Stickers. 4 Online AIS Training for Your Employees. 4 Follow-up After Training. .5 Contact. .6 Section 2: Aquatic Invasive Species (AIS). .7 Aquatic Invasive Species (AIS) . 8 Zebra mussels and Quagga mussels . 9 Spiny waterflea and Fishhook waterflea . 11 Faucet snail . 12 Eurasian watermilfoil . 13 Curly-leaf pondweed. .14 Flowering rush . .15 Invasive Fish Diseases. 16 Other Aquatic Invasive Species . 16 Section 3: Minnesota Aquatic Invasive Species Laws . -
Section 230 and the Twitter Presidency
Copyright 2020 by Michael A. Cheah Vol. 115 Northwestern University Law Review SECTION 230 AND THE TWITTER PRESIDENCY Michael A. Cheah ABSTRACT—In response to Twitter’s decision to label one of the President’s tweets misleading, the Trump White House issued an executive order to limit the scope of Section 230 of the Communications Decency Act via agency rulemaking. In the Order, Trump calls for the Federal Communications Commission (FCC) to “interpret” Section 230 in a manner that curtails websites’ ability to remove and restrict user speech. This Essay analyzes the Order and concludes that the President’s effort to limit Section 230 will fail. First, the FCC does not have rulemaking authority to issue the proposed rules. Second, the proposed rules cannot be issued because they are inconsistent with the statute. Finally, this Essay will discuss the policy implications of the proposed rules and argue that they would lead to less speech and engagement on the Internet, not more of it. AUTHOR—General Counsel of Vimeo, Inc. and adjunct faculty at the University of Miami School of Law. A big thank you to my colleague Erika Barros Sierra Cordera at Vimeo for help in researching and editing, Professor Caroline Mala Corbin at the University of Miami School of Law for her excellent feedback, and the Northwestern University Law Review for their diligent and timely work in shepherding this Essay to publication. 192 115:192 (2020) Section 230 and the Twitter Presidency INTRODUCTION ............................................................................................................. 193 I. SECTION 230 OF THE COMMUNICATIONS DECENCY ACT ....................................... 196 A. The Genesis of Section 230 ......................................................................... -
ACTA's Abandoned Third-Party Liability Provisions and What They Mean for the Future
American University Washington College of Law Digital Commons @ American University Washington College of Law Joint PIJIP/TLS Research Paper Series 9-2010 ACTA's Abandoned Third-Party Liability Provisions and What They Mean for the Future Michael R. Morris University of Edinburgh, [email protected] Follow this and additional works at: https://digitalcommons.wcl.american.edu/research Part of the Intellectual Property Law Commons, and the International Trade Law Commons Recommended Citation Morris, Michael. 2010. ACTA's Abandoned Third-Party Liability Provisions and What They Mean for the Future. PIJIP Research Paper no. 10. American University Washington College of Law, Washington, DC. This Article is brought to you for free and open access by the Program on Information Justice and Intellectual Property and Technology, Law, & Security Program at Digital Commons @ American University Washington College of Law. It has been accepted for inclusion in Joint PIJIP/TLS Research Paper Series by an authorized administrator of Digital Commons @ American University Washington College of Law. For more information, please contact [email protected]. NAVIGATING THE ACTA SHOALS TO A FUTURE SAFE HARBOR: LIBRARY AND HOTSPOT INTERNET ACCESS 1 LIABILITY IN A POST-ACTA UNIVERSE 2 Michael R. Morris ABSTRACT This white paper examines issues potentially created both by the expansion of third-party liability mandated by ACTA and the safe harbor provisions designed to provide some protection against that third-party liability. 1 At the time this paper was researched and written, the July 1, 2010 draft of ACTA was the most recent draft of the text. Any references to ―the most recent text‖ and related analysis refer to the July 1, 2010 draft.