Free Speech Anupam Chander and Uyên P
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
How Law Made Silicon Valley
Emory Law Journal Volume 63 Issue 3 2014 How Law Made Silicon Valley Anupam Chander Follow this and additional works at: https://scholarlycommons.law.emory.edu/elj Recommended Citation Anupam Chander, How Law Made Silicon Valley, 63 Emory L. J. 639 (2014). Available at: https://scholarlycommons.law.emory.edu/elj/vol63/iss3/3 This Article is brought to you for free and open access by the Journals at Emory Law Scholarly Commons. It has been accepted for inclusion in Emory Law Journal by an authorized editor of Emory Law Scholarly Commons. For more information, please contact [email protected]. CHANDER GALLEYSPROOFS2 2/17/2014 9:02 AM HOW LAW MADE SILICON VALLEY Anupam Chander* ABSTRACT Explanations for the success of Silicon Valley focus on the confluence of capital and education. In this Article, I put forward a new explanation, one that better elucidates the rise of Silicon Valley as a global trader. Just as nineteenth-century American judges altered the common law in order to subsidize industrial development, American judges and legislators altered the law at the turn of the Millennium to promote the development of Internet enterprise. Europe and Asia, by contrast, imposed strict intermediary liability regimes, inflexible intellectual property rules, and strong privacy constraints, impeding local Internet entrepreneurs. This study challenges the conventional wisdom that holds that strong intellectual property rights undergird innovation. While American law favored both commerce and speech enabled by this new medium, European and Asian jurisdictions attended more to the risks to intellectual property rights holders and, to a lesser extent, ordinary individuals. -
No Monitoring Obligations’ the Death of ‘No Monitoring Obligations’ a Story of Untameable Monsters by Giancarlo F
The Death of ‘No Monitoring Obligations’ The Death of ‘No Monitoring Obligations’ A Story of Untameable Monsters by Giancarlo F. Frosio* Abstract: In imposing a strict liability regime pean Commission, would like to introduce filtering for alleged copyright infringement occurring on You- obligations for intermediaries in both copyright and Tube, Justice Salomão of the Brazilian Superior Tribu- AVMS legislations. Meanwhile, online platforms have nal de Justiça stated that “if Google created an ‘un- already set up miscellaneous filtering schemes on a tameable monster,’ it should be the only one charged voluntary basis. In this paper, I suggest that we are with any disastrous consequences generated by the witnessing the death of “no monitoring obligations,” lack of control of the users of its websites.” In order a well-marked trend in intermediary liability policy to tame the monster, the Brazilian Superior Court that can be contextualized within the emergence of had to impose monitoring obligations on Youtube; a broader move towards private enforcement online this was not an isolated case. Proactive monitoring and intermediaries’ self-intervention. In addition, fil- and filtering found their way into the legal system as tering and monitoring will be dealt almost exclusively a privileged enforcement strategy through legisla- through automatic infringement assessment sys- tion, judicial decisions, and private ordering. In multi- tems. Due process and fundamental guarantees get ple jurisdictions, recent case law has imposed proac- mauled by algorithmic enforcement, which might fi- tive monitoring obligations on intermediaries across nally slay “no monitoring obligations” and fundamen- the entire spectrum of intermediary liability subject tal rights online, together with the untameable mon- matters. -
An Empirical Analysis of Errors with Automated Dmca Takedown Notices
Santa Clara High Technology Law Journal Volume 37 Issue 2 Article 1 4-1-2021 COPYRIGHTING COPYWRONGS: AN EMPIRICAL ANALYSIS OF ERRORS WITH AUTOMATED DMCA TAKEDOWN NOTICES Seng, Daniel Follow this and additional works at: https://digitalcommons.law.scu.edu/chtlj Part of the Intellectual Property Law Commons, and the Science and Technology Law Commons Recommended Citation Seng, Daniel, COPYRIGHTING COPYWRONGS: AN EMPIRICAL ANALYSIS OF ERRORS WITH AUTOMATED DMCA TAKEDOWN NOTICES, 37 SANTA CLARA HIGH TECH. L.J. 119 (2021). Available at: https://digitalcommons.law.scu.edu/chtlj/vol37/iss2/1 This Article is brought to you for free and open access by the Journals at Santa Clara Law Digital Commons. It has been accepted for inclusion in Santa Clara High Technology Law Journal by an authorized editor of Santa Clara Law Digital Commons. For more information, please contact [email protected]. COPYRIGHTING COPYWRONGS: AN EMPIRICAL ANALYSIS OF ERRORS WITH AUTOMATED DMCA TAKEDOWN NOTICES By Daniel Seng1 Under the Digital Millennium Copyright Act (DMCA), reporters issuing takedown notices are required to identify the infringed work and the infringing material and provide their contact information (functional formalities), attest to the accuracy of such information and their authority to act on behalf of the copyright owner, and sign the notices (non-functional formalities). Online service providers will evaluate such notices for compliance with these DMCA formalities before acting on them. This paper seeks to answer questions about the quality of takedown notices, especially those generated by automated systems, which are increasingly being used by copyright owners to detect instances of online infringement and issue takedown notices on their behalf. -
Piracy, Privacy and Internet Openness: The
I N S I D E T H E M I N D S Understanding Developments in Cyberspace Law Leading Lawyers on Analyzing Recent Trends, Case Laws, and Legal Strategies Affecting the Internet Landscape 2012 EDITION 2012 Thomson Reuters/Aspatore All rights reserved. Printed in the United States of America. No part of this publication may be reproduced or distributed in any form or by any means, or stored in a database or retrieval system, except as permitted under Sections 107 or 108 of the U.S. Copyright Act, without prior written permission of the publisher. This book is printed on acid free paper. Material in this book is for educational purposes only. This book is sold with the understanding that neither any of the authors nor the publisher is engaged in rendering legal, accounting, investment, or any other professional service. Neither the publisher nor the authors assume any liability for any errors or omissions or for how this book or its contents are used or interpreted or for any consequences resulting directly or indirectly from the use of this book. For legal advice or any other, please consult your personal lawyer or the appropriate professional. The views expressed by the individuals in this book (or the individuals on the cover) do not necessarily reflect the views shared by the companies they are employed by (or the companies mentioned in this book). The employment status and affiliations of authors with the companies referenced are subject to change. For customer service inquiries, please e-mail [email protected]. If you are interested in purchasing the book this chapter was originally included in, please visit www.west.thomson.com. -
Free Speech in the Algorithmic Society: Big Data, Private Governance, and New School Speech Regulation
Free Speech in the Algorithmic Society: Big Data, Private Governance, and New School Speech Regulation Jack M. Balkin* TABLE OF CONTENTS INTRODUCTION ................................................................................. 1151 I. BIG DATA IS SOYLENT GREEN ................................................. 1154 A. Technology Mediates (and Constitutes) Relationships of Power Between People ..................................................... 1157 B. Information Fiduciaries ................................................... 1160 C. Algorithmic Nuisance ...................................................... 1163 D. Personal Robots ............................................................... 1168 II. NEW SCHOOL SPEECH REGULATION AND PRIVATE GOVERNANCE ......................................................................... 1172 A. The Right to Be Forgotten and the Problem of Fake News 1172 B. New School Speech Regulation ......................................... 1173 1. Collateral Censorship ............................................... 1176 2. Digital Prior Restraint............................................... 1177 C. Public Private Cooperation/Cooptation ............................ 1179 III. PRIVATE GOVERNANCE ........................................................... 1182 A. From Game Gods to Social Media .................................... 1184 B. From the Dyadic to the Pluralist Model of Speech Governance ..................................................................... 1186 C. Problems of the New System of -
Free Speech and Hostile Environments
Reprinted from 99 Columbia L. Rev. (1999). Copyright Jack M. Balkin 1999. All rights reserved. FREE SPEECH AND HOSTILE ENVIRONMENTS J.M. Balkin* One major concern about sexual harassment law is that employers will restrict employee speech in order to avoid hostile environment liability, thus violating free speech principles. In this Essay, Professor Balkin argues that this “collateral censorship” is constitutionally permissible when there are good grounds for vicarious liability. Because employers actively control workplace culture, and because they are better able to prevent hostile environments than individual employees, vicarious liability for employee speech is more justified than in the case of distributors or common carriers. Professor Balkin also argues that captive audience doctrine, generally thought to apply only to speech in the home, is actually better suited to workplace speech. Hostile environments are a method of sex discrimination that maintains gender segregation; a hostile environment does its work precisely through making the employee a captive audience. The Essay concludes that First Amendment challenges to sexual harassment law should not become a defense of employer prerogatives presented in the guise of worker liberties. Without the incentives created by sexual harassment law, employees will not be freed from censorship; they will simply be remitted to the economic and social control of employers. Does sexual harassment law conflict with the First Amendment? A number of commentators now argue that it does.1 Generally, these * Knight Professor of Constitutional Law and the First Amendment, Yale Law School. My thanks to Bruce Ackerman, Akhil Amar, Ian Ayres, Dan Kahan, Sandy Levinson, Vicki Schultz, Reva Siegel, and Eugene Volokh for their comments on previous drafts. -
Collateral Censorship and the Limits of Intermediary Immunity Felix T
Notre Dame Law Review Volume 87 | Issue 1 Article 6 11-1-2011 Collateral Censorship and the Limits of Intermediary Immunity Felix T. Wu Follow this and additional works at: http://scholarship.law.nd.edu/ndlr Recommended Citation Felix T. Wu, Collateral Censorship and the Limits of Intermediary Immunity, 87 Notre Dame L. Rev. 293 (2013). Available at: http://scholarship.law.nd.edu/ndlr/vol87/iss1/6 This Article is brought to you for free and open access by NDLScholarship. It has been accepted for inclusion in Notre Dame Law Review by an authorized administrator of NDLScholarship. For more information, please contact [email protected]. COLLATERAL CENSORSHIP AND THE LIMITS OF INTERMEDIARY IMMUNITY Felix T. Wu* The law often limits the liability of an intermediaryfor the speech it carries. And rightly so, because imposing liability on intermediaries can induce them to filter out questionable content and this "collateralcensorship" risks suppressing much lawful, even highly beneficial, speech. The "collat- eral censorship" rationale has its limits, though, and correspondingly, so should the applicability of intermediary immunity. The worry with collateral censorship is not just that intermediaries censor, but that they censor more than an original speaker would in the face of potential liability. Increased censorship, in turn, is the product of applying liability targeted at original speakers to entities whose interests divergefrom original speakers. Where the "intermediary" has the interests of an original speaker, and so should be regarded as one, or where the form of liability already takes into account the intermediary's interests, collateral censorship is not the problem, and immu- nity is not the right response. -
Automation in Moderation
Texas A&M University School of Law Texas A&M Law Scholarship Faculty Scholarship 3-2020 Automation in Moderation Hannah Bloch-Wehba Texas A&M University School of Law, [email protected] Follow this and additional works at: https://scholarship.law.tamu.edu/facscholar Part of the First Amendment Commons, Intellectual Property Law Commons, Internet Law Commons, Privacy Law Commons, and the Science and Technology Law Commons Recommended Citation Hannah Bloch-Wehba, Automation in Moderation, 53 Cornell Int'l L.J. 42 (2020). Available at: https://scholarship.law.tamu.edu/facscholar/1448 This Article is brought to you for free and open access by Texas A&M Law Scholarship. It has been accepted for inclusion in Faculty Scholarship by an authorized administrator of Texas A&M Law Scholarship. For more information, please contact [email protected]. \\jciprod01\productn\C\CIN\53-1\CIN102.txt unknown Seq: 1 8-DEC-20 17:23 Automation in Moderation Hannah Bloch-Wehba† Introduction ..................................................... 42 R I. The Origins of Automation in Moderation ................ 48 R A. Immunity, Safe Harbor & Private Governance ......... 48 R B. Spam Filtering ........................................ 52 R 1. “Artificial Intelligence” ............................. 54 R C. Unlawful Content ..................................... 57 R D. Copyright Enforcement................................ 62 R II. From Reactive to Proactive................................ 66 R A. Copyright ............................................ 66 R B. Unlawful Speech ...................................... 69 R C. Defamation ........................................... 72 R III. The Drawbacks of Proactive Moderation .................. 74 R A. Content Moderation as Censorship .................... 75 R B. Content Moderation as Surveillance ................... 79 R C. Content Moderation as Algorithmic Control ............ 81 R D. Content Moderation as Power ......................... 85 R E. Content Moderation as Extraterritorial Governance.... -
Beyond Gatekeeping: the Normative Responsibility of Internet Intermediaries
Vanderbilt Journal of Entertainment & Technology Law Volume 18 Issue 4 Issue 4 - Summer 2016 Article 4 2016 Beyond Gatekeeping: The Normative Responsibility of Internet Intermediaries Marcelo Thompson Follow this and additional works at: https://scholarship.law.vanderbilt.edu/jetlaw Part of the Law Commons Recommended Citation Marcelo Thompson, Beyond Gatekeeping: The Normative Responsibility of Internet Intermediaries, 18 Vanderbilt Journal of Entertainment and Technology Law 783 (2020) Available at: https://scholarship.law.vanderbilt.edu/jetlaw/vol18/iss4/4 This Article is brought to you for free and open access by Scholarship@Vanderbilt Law. It has been accepted for inclusion in Vanderbilt Journal of Entertainment & Technology Law by an authorized editor of Scholarship@Vanderbilt Law. For more information, please contact [email protected]. Beyond Gatekeeping: The Normative Responsibility of Internet Intermediaries Marcelo Thompson* ABSTRACT This Article puts forward a normative approach to the responsibility of Internet intermediaries for third-party content they host. It argues that, in thinking about intermediary liability, the focus should be on intermediaries' responsibility towards the reasoning processes in reaching decisions, rather than on the outcomes of intermediaries'decisions.What is necessary is a framework that, while attaching responsibilities to such decisions, creates a cushioning system for their decision making, mitigating the hardship of honest mistakes. Within this framework, intermediaries must be seen not as mere keepers of gates, but as designers of artifacts whose use plans settle normative questions and play a vital role in the construction of our normative reality. Accordingly, an interpretive commitment must be required toward the integrity of such a reality. -
How India Censors The
How India Censors the Web Kushagra Singh∗ Gurshabad Grover∗ Varun Bansal Centre for Internet and Society Centre for Internet and Society Centre for Internet and Society [email protected] [email protected] [email protected] ABSTRACT First, the regulations do not mandate ISPs to use specific filter- One of the primary ways in which India engages in online censor- ing mechanisms. Thus, ISPs are are at liberty to employ various ship is by ordering Internet Service Providers (ISPs) operating in its technical methods [47]. jurisdiction to block access to certain websites for its users. This pa- Second, website-blocking orders, especially those issued by the per reports the different techniques Indian ISPs are using to censor Government, are rarely available in the public domain. ISPs are, in websites, and investigates whether website blocklists are consistent fact, mandated by regulations to maintain confidentiality of cer- across ISPs. We propose a suite of tests that prove more robust than tain website-blocking orders issued by the Government [3].Various previous work in detecting DNS and HTTP based censorship. Our attempts by researchers and advocacy organisations to obtain the tests also discern the use of SNI inspection for blocking websites, complete list of blocked websites have failed [4, 24]. which is previously undocumented in the Indian context. Using Third, the whimsy of ISPs and the Government aggravates these information from court orders, user reports and government orders, problems. Despite strict net neutrality regulations in India that we compile the largest known list of potentially blocked websites in prohibit ISPs from arbitrarily restricting access to websites [35], India. -
Leiden University Law School
Special Rapporteur on the Promotion and Protection of the Right to Freedom of Opinion and Expression A Report by Students at Leiden Law School Written by Niamh Coghlan, Amalia Flenga, Carola Gioco, Lindsay McCosh, Flavia Mencarini, Guilherme Migliora, Melanie Moulder, Ona Lorda Roure, Uditi Saha, Agnese Soverini, and Ruoxin Su with Dr Mark Leiser, Leiden Law School Purpose: To inform the Special Rapporteur’s annual thematic report presented to the Human Rights Council at its 47th session in June 2021 Report on Disinformation 1 Leiden Law School Executive summary: 1. This report identifies the main challenges posed by disinformation. It analyses the impact of measures adopted by States as well as platforms to combat this phenomenon. Based on the findings of our research, the report provides a series of recommendations to the Special Rapporteur. 2. Disinformation has consequences for both individuals and society. Identified issues include population control, loss of consumer protection, as well as increasing democratic deficits and discriminatory practices. 3. States have deployed various strategies to counterbalance the negative effects of disinformation. Some have used ‘command-and-criminality' methods to punish those spreading disinformation. Often these come with disproportionate penalties. Others have launched official programmes that include platforms monitoring or using independent organizations to debunk misleading online news and information. If abused, however, these measures can encroach basic human rights like freedom of expression, the right to liberty and security, etc.. These measures can also hamper the work of journalists and the public’s right to access information. 4. The report highlights both legal provisions and guidance at the international and regional levels addressing human rights abuses arising from far-reaching and over broad measures countering disinformation. -
JS., SL, and LC V. Village Voice Media Holdings
NOTICE: SLIP OPINION (not the court’s final written decision) The opinion that begins on the next page is a slip opinion. Slip opinions are the written opinions that are originally filed by the court. A slip opinion is not necessarily the court’s final written decision. Slip opinions can be changed by subsequent court orders. For example, a court may issue an order making substantive changes to a slip opinion or publishing for precedential purposes a previously “unpublished” opinion. Additionally, nonsubstantive edits (for style, grammar, citation, format, punctuation, etc.) are made before the opinions that have precedential value are published in the official reports of court decisions: the Washington Reports 2d and the Washington Appellate Reports. An opinion in the official reports replaces the slip opinion as the official opinion of the court. The slip opinion that begins on the next page is for a published opinion, and it has since been revised for publication in the printed official reports. The official text of the court’s opinion is found in the advance sheets and the bound volumes of the official reports. Also, an electronic version (intended to mirror the language found in the official reports) of the revised opinion can be found, free of charge, at this website: https://www.lexisnexis.com/clients/wareports. For more information about precedential (published) opinions, nonprecedential (unpublished) opinions, slip opinions, and the official reports, see https://www.courts.wa.gov/opinions and the information that is linked there. This opinion was fll~. r r~ /F·I-I:E\ at B tao fl1'Vl on ph ~~c ts- IN CLERKS OFFICE IUPReMe COURT, STATE OF W«\SSII«mltf DATE SEP 0 3 2Q15 .