JS., SL, and LC V. Village Voice Media Holdings
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
How Law Made Silicon Valley
Emory Law Journal Volume 63 Issue 3 2014 How Law Made Silicon Valley Anupam Chander Follow this and additional works at: https://scholarlycommons.law.emory.edu/elj Recommended Citation Anupam Chander, How Law Made Silicon Valley, 63 Emory L. J. 639 (2014). Available at: https://scholarlycommons.law.emory.edu/elj/vol63/iss3/3 This Article is brought to you for free and open access by the Journals at Emory Law Scholarly Commons. It has been accepted for inclusion in Emory Law Journal by an authorized editor of Emory Law Scholarly Commons. For more information, please contact [email protected]. CHANDER GALLEYSPROOFS2 2/17/2014 9:02 AM HOW LAW MADE SILICON VALLEY Anupam Chander* ABSTRACT Explanations for the success of Silicon Valley focus on the confluence of capital and education. In this Article, I put forward a new explanation, one that better elucidates the rise of Silicon Valley as a global trader. Just as nineteenth-century American judges altered the common law in order to subsidize industrial development, American judges and legislators altered the law at the turn of the Millennium to promote the development of Internet enterprise. Europe and Asia, by contrast, imposed strict intermediary liability regimes, inflexible intellectual property rules, and strong privacy constraints, impeding local Internet entrepreneurs. This study challenges the conventional wisdom that holds that strong intellectual property rights undergird innovation. While American law favored both commerce and speech enabled by this new medium, European and Asian jurisdictions attended more to the risks to intellectual property rights holders and, to a lesser extent, ordinary individuals. -
City Zoning & Subdivision Ordinances
Printed via Website Updated 1/3/20 CITY ZONING & SUBDIVISION ORDINANCES (Updated: January 3, 2020) Printed via Website Updated 1/3/20 CITY ZONING & SUBDIVISION ORDINANCE INDEX Updated: January 3, 2020 SECTION 1. Title and Application Subd. 1. Title ..................................................................................... 1-1 Subd. 2. Intent and Purpose .............................................................. 1-1 Subd. 3. Relation to Comprehensive Municipal Plan ....................... 1-1 Subd. 4. Standard, Requirement ....................................................... 1-1 Subd. 5. Interpretations and Application .......................................... 1-1 Subd. 6. Conformity .......................................................................... 1-1 Subd. 7. Building Permit Conformity ............................................... 1-2 Subd. 8. Uses Not Provided For Within Zoning Districts ................ 1-2 Subd. 9. Authority ............................................................................. 1-2 Subd. 10. Separability ....................................................................... 1-2 Subd. 11. Rules ................................................................................. 1-2 SECTION 2. Definitions Subd. 1-197. .......................................................................... 2-1 – 2-24 SECTION 3. General Provisions Subd. 1. Nonconforming Buildings, Structures and Uses ................ 3-1 Subd. 2. General Building and Performance Requirements ............. 3-9 Subd. -
Seeing the Queerness of Ec-Static Images
Georgia State University ScholarWorks @ Georgia State University Communication Dissertations Department of Communication Fall 12-2013 Oblique Optics: Seeing the Queerness of Ec-static Images Kristopher L. Cannon Georgia State University Follow this and additional works at: https://scholarworks.gsu.edu/communication_diss Recommended Citation Cannon, Kristopher L., "Oblique Optics: Seeing the Queerness of Ec-static Images." Dissertation, Georgia State University, 2013. https://scholarworks.gsu.edu/communication_diss/48 This Dissertation is brought to you for free and open access by the Department of Communication at ScholarWorks @ Georgia State University. It has been accepted for inclusion in Communication Dissertations by an authorized administrator of ScholarWorks @ Georgia State University. For more information, please contact [email protected]. OBLIQUE OPTICS: SEEING THE QUEERNESS OF EC-STATIC IMAGES by KRISTOPHER L. CANNON Under the Direction of Alessandra Raengo ABSTRACT Oblique Optics contends that studies of visual culture must account for the queerness of images. This argument posits images as queer residents within visual culture by asking how and where the queerness of images becomes visible. These questions are interrogated by utilizing queer theories and methods to refigure how the image is conceptualized within traditional approaches to visual culture studies and media studies. Each chapter offers different approaches to see the queerness of images by torquing our vision to see "obliquely," whereby images are located beyond visible surfaces (like pictures or photographs) through ec-static movements within thresholds between bodies and beings. Chapter One rethinks how images are conceptualized through metaphorical language by exploring how images emerge from fantasies about will-be-born bodies in fetal photographs. -
No Monitoring Obligations’ the Death of ‘No Monitoring Obligations’ a Story of Untameable Monsters by Giancarlo F
The Death of ‘No Monitoring Obligations’ The Death of ‘No Monitoring Obligations’ A Story of Untameable Monsters by Giancarlo F. Frosio* Abstract: In imposing a strict liability regime pean Commission, would like to introduce filtering for alleged copyright infringement occurring on You- obligations for intermediaries in both copyright and Tube, Justice Salomão of the Brazilian Superior Tribu- AVMS legislations. Meanwhile, online platforms have nal de Justiça stated that “if Google created an ‘un- already set up miscellaneous filtering schemes on a tameable monster,’ it should be the only one charged voluntary basis. In this paper, I suggest that we are with any disastrous consequences generated by the witnessing the death of “no monitoring obligations,” lack of control of the users of its websites.” In order a well-marked trend in intermediary liability policy to tame the monster, the Brazilian Superior Court that can be contextualized within the emergence of had to impose monitoring obligations on Youtube; a broader move towards private enforcement online this was not an isolated case. Proactive monitoring and intermediaries’ self-intervention. In addition, fil- and filtering found their way into the legal system as tering and monitoring will be dealt almost exclusively a privileged enforcement strategy through legisla- through automatic infringement assessment sys- tion, judicial decisions, and private ordering. In multi- tems. Due process and fundamental guarantees get ple jurisdictions, recent case law has imposed proac- mauled by algorithmic enforcement, which might fi- tive monitoring obligations on intermediaries across nally slay “no monitoring obligations” and fundamen- the entire spectrum of intermediary liability subject tal rights online, together with the untameable mon- matters. -
Video Scrambling for Privacy Protection in Video Surveillance – Recent Results and Validation Framework Frederic Dufaux
Video Scrambling for Privacy Protection in Video Surveillance – Recent Results and Validation Framework Frederic Dufaux To cite this version: Frederic Dufaux. Video Scrambling for Privacy Protection in Video Surveillance – Recent Results and Validation Framework. Mobile Multimedia/Image Processing, Security and Applications, SPIE, Apr 2011, Orlando, United States. hal-01436403 HAL Id: hal-01436403 https://hal.archives-ouvertes.fr/hal-01436403 Submitted on 10 Jan 2020 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Video Scrambling for Privacy Protection in Video Surveillance – Recent Results and Validation Framework Frederic Dufaux Laboratoire de Traitement et Communication de l’Information – UMR 5141 CNRS Télécom ParisTech F-75634 Paris Cedex 13, France [email protected] ABSTRACT The issue of privacy in video surveillance has drawn a lot of interest lately. However, thorough performance analysis and validation is still lacking, especially regarding the fulfillment of privacy-related requirements. In this paper, we first review recent Privacy Enabling Technologies (PET). Next, we discuss pertinent evaluation criteria for effective privacy protection. We then put forward a framework to assess the capacity of PET solutions to hide distinguishing facial information and to conceal identity. -
A User-Selectable Obscuration Framework to Censor Digital Videos for Children and Adolescents
A User-selectable Obscuration Framework to Censor Digital Videos for Children and Adolescents Jiayan GUO, David LEONG, Jonathan SIANG, and Vikram BAHL School of Infocomm, Republic Polytechnic, Singapore ABSTRACT storyline of the film. Such harmful content is still accessible to the viewers. The children thus are exposed to There is an increasing concern from parents, educators a vast amount of inappropriate media content. and policy-makers about the negative influence that digital media exerts on children and adolescents. Such According to the Singapore Censorship Review concerns have fueled a growing need to effectively filter Committee 2010 report [2], parents are encouraged to take potentially harmful content. However, existing responsibility to protect their children against the negative technologies have limited ability in allowing users to aspects of media proliferation. In order to guide their adjust the filtering levels, or generating seamless cutting children on digital media consumption, parents have to be results. To tackle this limitation, we propose a framework empowered with effective tools to filter sex, violence and which empowers parents and teachers to censor movies profanity out of the digital media. However, existing tools and TV shows according to their level of acumen and have limited capabilities to effectively block potentially discretion. Such framework helps parents and teachers harmful content. Presently, ClearPlay and MovieMask are protect children and adolescents against obscene content. the two forefront computer programs that cleanse movies In particular, our framework enables parents and teachers containing offensive scenes. Their technologies are built to sanitize movies and TV shows by skipping over onto stand-alone DVD players and other video devices. -
Free Speech in the Algorithmic Society: Big Data, Private Governance, and New School Speech Regulation
Free Speech in the Algorithmic Society: Big Data, Private Governance, and New School Speech Regulation Jack M. Balkin* TABLE OF CONTENTS INTRODUCTION ................................................................................. 1151 I. BIG DATA IS SOYLENT GREEN ................................................. 1154 A. Technology Mediates (and Constitutes) Relationships of Power Between People ..................................................... 1157 B. Information Fiduciaries ................................................... 1160 C. Algorithmic Nuisance ...................................................... 1163 D. Personal Robots ............................................................... 1168 II. NEW SCHOOL SPEECH REGULATION AND PRIVATE GOVERNANCE ......................................................................... 1172 A. The Right to Be Forgotten and the Problem of Fake News 1172 B. New School Speech Regulation ......................................... 1173 1. Collateral Censorship ............................................... 1176 2. Digital Prior Restraint............................................... 1177 C. Public Private Cooperation/Cooptation ............................ 1179 III. PRIVATE GOVERNANCE ........................................................... 1182 A. From Game Gods to Social Media .................................... 1184 B. From the Dyadic to the Pluralist Model of Speech Governance ..................................................................... 1186 C. Problems of the New System of -
Free Speech and Hostile Environments
Reprinted from 99 Columbia L. Rev. (1999). Copyright Jack M. Balkin 1999. All rights reserved. FREE SPEECH AND HOSTILE ENVIRONMENTS J.M. Balkin* One major concern about sexual harassment law is that employers will restrict employee speech in order to avoid hostile environment liability, thus violating free speech principles. In this Essay, Professor Balkin argues that this “collateral censorship” is constitutionally permissible when there are good grounds for vicarious liability. Because employers actively control workplace culture, and because they are better able to prevent hostile environments than individual employees, vicarious liability for employee speech is more justified than in the case of distributors or common carriers. Professor Balkin also argues that captive audience doctrine, generally thought to apply only to speech in the home, is actually better suited to workplace speech. Hostile environments are a method of sex discrimination that maintains gender segregation; a hostile environment does its work precisely through making the employee a captive audience. The Essay concludes that First Amendment challenges to sexual harassment law should not become a defense of employer prerogatives presented in the guise of worker liberties. Without the incentives created by sexual harassment law, employees will not be freed from censorship; they will simply be remitted to the economic and social control of employers. Does sexual harassment law conflict with the First Amendment? A number of commentators now argue that it does.1 Generally, these * Knight Professor of Constitutional Law and the First Amendment, Yale Law School. My thanks to Bruce Ackerman, Akhil Amar, Ian Ayres, Dan Kahan, Sandy Levinson, Vicki Schultz, Reva Siegel, and Eugene Volokh for their comments on previous drafts. -
Collateral Censorship and the Limits of Intermediary Immunity Felix T
Notre Dame Law Review Volume 87 | Issue 1 Article 6 11-1-2011 Collateral Censorship and the Limits of Intermediary Immunity Felix T. Wu Follow this and additional works at: http://scholarship.law.nd.edu/ndlr Recommended Citation Felix T. Wu, Collateral Censorship and the Limits of Intermediary Immunity, 87 Notre Dame L. Rev. 293 (2013). Available at: http://scholarship.law.nd.edu/ndlr/vol87/iss1/6 This Article is brought to you for free and open access by NDLScholarship. It has been accepted for inclusion in Notre Dame Law Review by an authorized administrator of NDLScholarship. For more information, please contact [email protected]. COLLATERAL CENSORSHIP AND THE LIMITS OF INTERMEDIARY IMMUNITY Felix T. Wu* The law often limits the liability of an intermediaryfor the speech it carries. And rightly so, because imposing liability on intermediaries can induce them to filter out questionable content and this "collateralcensorship" risks suppressing much lawful, even highly beneficial, speech. The "collat- eral censorship" rationale has its limits, though, and correspondingly, so should the applicability of intermediary immunity. The worry with collateral censorship is not just that intermediaries censor, but that they censor more than an original speaker would in the face of potential liability. Increased censorship, in turn, is the product of applying liability targeted at original speakers to entities whose interests divergefrom original speakers. Where the "intermediary" has the interests of an original speaker, and so should be regarded as one, or where the form of liability already takes into account the intermediary's interests, collateral censorship is not the problem, and immu- nity is not the right response. -
Automation in Moderation
Texas A&M University School of Law Texas A&M Law Scholarship Faculty Scholarship 3-2020 Automation in Moderation Hannah Bloch-Wehba Texas A&M University School of Law, [email protected] Follow this and additional works at: https://scholarship.law.tamu.edu/facscholar Part of the First Amendment Commons, Intellectual Property Law Commons, Internet Law Commons, Privacy Law Commons, and the Science and Technology Law Commons Recommended Citation Hannah Bloch-Wehba, Automation in Moderation, 53 Cornell Int'l L.J. 42 (2020). Available at: https://scholarship.law.tamu.edu/facscholar/1448 This Article is brought to you for free and open access by Texas A&M Law Scholarship. It has been accepted for inclusion in Faculty Scholarship by an authorized administrator of Texas A&M Law Scholarship. For more information, please contact [email protected]. \\jciprod01\productn\C\CIN\53-1\CIN102.txt unknown Seq: 1 8-DEC-20 17:23 Automation in Moderation Hannah Bloch-Wehba† Introduction ..................................................... 42 R I. The Origins of Automation in Moderation ................ 48 R A. Immunity, Safe Harbor & Private Governance ......... 48 R B. Spam Filtering ........................................ 52 R 1. “Artificial Intelligence” ............................. 54 R C. Unlawful Content ..................................... 57 R D. Copyright Enforcement................................ 62 R II. From Reactive to Proactive................................ 66 R A. Copyright ............................................ 66 R B. Unlawful Speech ...................................... 69 R C. Defamation ........................................... 72 R III. The Drawbacks of Proactive Moderation .................. 74 R A. Content Moderation as Censorship .................... 75 R B. Content Moderation as Surveillance ................... 79 R C. Content Moderation as Algorithmic Control ............ 81 R D. Content Moderation as Power ......................... 85 R E. Content Moderation as Extraterritorial Governance.... -
Beyond Gatekeeping: the Normative Responsibility of Internet Intermediaries
Vanderbilt Journal of Entertainment & Technology Law Volume 18 Issue 4 Issue 4 - Summer 2016 Article 4 2016 Beyond Gatekeeping: The Normative Responsibility of Internet Intermediaries Marcelo Thompson Follow this and additional works at: https://scholarship.law.vanderbilt.edu/jetlaw Part of the Law Commons Recommended Citation Marcelo Thompson, Beyond Gatekeeping: The Normative Responsibility of Internet Intermediaries, 18 Vanderbilt Journal of Entertainment and Technology Law 783 (2020) Available at: https://scholarship.law.vanderbilt.edu/jetlaw/vol18/iss4/4 This Article is brought to you for free and open access by Scholarship@Vanderbilt Law. It has been accepted for inclusion in Vanderbilt Journal of Entertainment & Technology Law by an authorized editor of Scholarship@Vanderbilt Law. For more information, please contact [email protected]. Beyond Gatekeeping: The Normative Responsibility of Internet Intermediaries Marcelo Thompson* ABSTRACT This Article puts forward a normative approach to the responsibility of Internet intermediaries for third-party content they host. It argues that, in thinking about intermediary liability, the focus should be on intermediaries' responsibility towards the reasoning processes in reaching decisions, rather than on the outcomes of intermediaries'decisions.What is necessary is a framework that, while attaching responsibilities to such decisions, creates a cushioning system for their decision making, mitigating the hardship of honest mistakes. Within this framework, intermediaries must be seen not as mere keepers of gates, but as designers of artifacts whose use plans settle normative questions and play a vital role in the construction of our normative reality. Accordingly, an interpretive commitment must be required toward the integrity of such a reality. -
How India Censors The
How India Censors the Web Kushagra Singh∗ Gurshabad Grover∗ Varun Bansal Centre for Internet and Society Centre for Internet and Society Centre for Internet and Society [email protected] [email protected] [email protected] ABSTRACT First, the regulations do not mandate ISPs to use specific filter- One of the primary ways in which India engages in online censor- ing mechanisms. Thus, ISPs are are at liberty to employ various ship is by ordering Internet Service Providers (ISPs) operating in its technical methods [47]. jurisdiction to block access to certain websites for its users. This pa- Second, website-blocking orders, especially those issued by the per reports the different techniques Indian ISPs are using to censor Government, are rarely available in the public domain. ISPs are, in websites, and investigates whether website blocklists are consistent fact, mandated by regulations to maintain confidentiality of cer- across ISPs. We propose a suite of tests that prove more robust than tain website-blocking orders issued by the Government [3].Various previous work in detecting DNS and HTTP based censorship. Our attempts by researchers and advocacy organisations to obtain the tests also discern the use of SNI inspection for blocking websites, complete list of blocked websites have failed [4, 24]. which is previously undocumented in the Indian context. Using Third, the whimsy of ISPs and the Government aggravates these information from court orders, user reports and government orders, problems. Despite strict net neutrality regulations in India that we compile the largest known list of potentially blocked websites in prohibit ISPs from arbitrarily restricting access to websites [35], India.