Issue Brief July 2020 How Section 230 Enhances the First Amendment
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Preparing for a More Fractured Web the Central Services Under Siege Built Global-Scale Networks
Preparing for a More Fractured Web The central services under siege built global-scale networks. If policy trends hold, what comes next? Andrea O’Sullivan hat’s your worry about Silicon ad-based business model supporting much Valley? Most everyone has one. of big tech. Maybe you’re concerned about For some, it allows impolitic privacy. It could be a combination of many Wspeech to flourish online. If you’re like things. Whatever your persuasion, there me, you’re more bothered by the threat of is usually some good reason to resist big targeted content controls. Or you might American technology companies. fear that some companies have just gotten This essay will not debate the merits or a little too big. Maybe you dislike the entire demerits of any particular tech criticism. The JOURNAL of The JAMES MADISON INSTITUTE Readers can find many such commentaries These trends herald a future where data tailored to their own liking elsewhere on localization, which limits how information the world wide web. Instead, I will discuss can be used across borders, is the norm.5 how the many forces converging against Regulating data means regulating American technology companies may result commerce. Although framed as a way in a new web that is less, well, worldwide. to bring tech companies in line, data What might such an internet look like? regulations affect anyone who engages in We already have a good inkling. Most online commerce: that is to say, almost people have heard of one longstanding everyone with a computer and a connection. internet faultline: the so-called Great To a foreign retailer, for instance, data Firewall of China.1 Residents of China controls might as well be a trade control.6 cannot easily access major parts of the Then there are content controls. -
House of Representatives Staff Analysis Bill #: Hb 7013
HOUSE OF REPRESENTATIVES STAFF ANALYSIS BILL #: HB 7013 PCB COM 21-01 Technology Transparency SPONSOR(S): Commerce Committee, Ingoglia TIED BILLS: HB 7015 IDEN./SIM. BILLS: REFERENCE ACTION ANALYST STAFF DIRECTOR or BUDGET/POLICY CHIEF Orig. Comm.: Commerce Committee 16 Y, 8 N Wright Hamon 1) Appropriations Committee 19 Y, 8 N Topp Pridgeon 2) Judiciary Committee SUMMARY ANALYSIS A section of the Federal Communications Decency Act (Section 230) provides immunity from liability for information service providers and social media platforms that, in good faith, remove or restrict from their services information deemed “obscene, lewd, lascivious, filthy, excessively violent, harassing, or otherwise objectionable, whether or not such material is constitutionally protected.” While this immunity has fostered the growth of certain parts of the internet, recently, there have been criticisms of the broad federal immunity provision due to actions taken or not taken regarding the censorship of users by internet platforms. Government regulators have recently investigated and initiated cases against certain platforms for antitrust activities. The bill provides that a social media platform must: publish standards used for determining how to censor, deplatform, and shadow ban users, and apply such standards in a consistent manner. inform each user about any changes to its user rules, terms, and agreements before implementing the changes and may not make changes more than once every 30 days. notify the user within 30 days of censoring or deplatforming. provide a user with information relating to the number of other individuals who were provided or shown the user's content or posts upon request by the user. -
Social Justice Sampler
SAA SAAMPLER SAA SAASAMPLER MPLER LAWSOCIAL & ETHICS LAW & LAW & 6” 11/16” LAW6” JU &S TICE6” ETHICS.78” 6” PRIVACY & CONFIDENTIALITY PERSPECTIVES MPLER “ Today, legal issues are pervading archival administration more intensively and in more areas ETHICS ETHICS than ever before. Fortunately, a superb new manual, Navigating Legal Issues in Archives, “Privacy and Confidentiality Perspectives brings together a diverse selection of thoughtful and provocative essays that explore the legal, ethical, written by Menzi Behrnd-Klodt and published by the Society of American Archivists, is now administrative, and institutional considerations that shape archival available to guide archivists in facing such problems. While its predecessor, Archives and debates concerning the administration of access to records containing Manuscripts: Law, by Gary and Trudy Peterson, served the last generation well, the current personal information. It is essential reading for archivists, records impact of the law on archives has changed in both detail and extent. The coverage of this new managers, archival educators and students who wish to gain a deeper under-standing of this difficult archival issue—and it is bound to stimu- book reflects these changes well—its presentation is clear, thorough, and well-documented. late broader reflection and debate.” 9” The organization, index, and notes make the book easy to use and give assurance to its quality. — Nadine Strossen Its author and publisher are to be commended for an outstanding aid to their profession.” President, American Civil Liberties Union, and ORRIS OHEN Professor of Law, New York Law School – M L. C 9” ARCHIVISTS & ARCHIVAL RECORDS Professor Emeritus of Law, and Librarian (Retired), Yale Law School “Privacy and Confidentiality Perspectives fills a crucial void in the corpus of archival literature. -
The Long Arm of China: Exporting Authoritarianism with Chinese Characteristics
THE LONG ARM OF CHINA: EXPORTING AUTHORITARIANISM WITH CHINESE CHARACTERISTICS HEARING BEFORE THE CONGRESSIONAL-EXECUTIVE COMMISSION ON CHINA ONE HUNDRED FIFTEENTH CONGRESS SECOND SESSION DECEMBER 13, 2017 Printed for the use of the Congressional-Executive Commission on China ( Available at www.cecc.gov or www.govinfo.gov U.S. GOVERNMENT PUBLISHING OFFICE 28–385 PDF WASHINGTON : 2018 VerDate Nov 24 2008 15:36 Sep 16, 2018 Jkt 081003 PO 00000 Frm 00001 Fmt 5011 Sfmt 5011 C:\USERS\DSHERMAN1\DESKTOP\28385 DAVID CONGRESSIONAL-EXECUTIVE COMMISSION ON CHINA LEGISLATIVE BRANCH COMMISSIONERS Senate House MARCO RUBIO, Florida, Chairman CHRIS SMITH, New Jersey, Cochairman TOM COTTON, Arkansas ROBERT PITTENGER, North Carolina STEVE DAINES, Montana RANDY HULTGREN, Illinois JAMES LANKFORD, Oklahoma MARCY KAPTUR, Ohio TODD YOUNG, Indiana TIM WALZ, Minnesota DIANNE FEINSTEIN, California TED LIEU, California JEFF MERKLEY, Oregon GARY PETERS, Michigan ANGUS KING, Maine EXECUTIVE BRANCH COMMISSIONERS Not yet appointed ELYSE B. ANDERSON, Staff Director PAUL B. PROTIC, Deputy Staff Director (ii) VerDate Nov 24 2008 15:36 Sep 16, 2018 Jkt 081003 PO 00000 Frm 00002 Fmt 0486 Sfmt 0486 C:\USERS\DSHERMAN1\DESKTOP\28385 DAVID C O N T E N T S STATEMENTS Page Opening Statement of Hon. Marco Rubio, a U.S. Senator from Florida; Chair- man, Congressional-Executive Commission on China ...................................... 1 Kalathil, Shanthi, Director of the International Forum for Democratic Studies at the National Endowment for Democracy (NED) ........................................... 4 Tiffert, Glenn, Ph.D., an expert in modern Chinese legal history and a visiting fellow at Stanford University’s Hoover Institution ........................................... 6 Richardson, Sophie, Ph.D., Director of China Research at Human Rights Watch ................................................................................................................... -
Selected Federal Asset Forfeiture Statutes
U.S. Department of Justice Criminal Division Asset Forfeiture and Money Laundering Section Selected Federal Asset Forfeiture Statutes Including Statutes Amended by the Trafficking Victims Protection Reauthorization Act, the Stop Counterfeiting in Manufactured Goods Act, and the USA PATRIOT Improvement and Reauthorization Act May 2006 Table of Contents Table of Contents • 16 U.S.C. § 1376. Seizure and Forfeiture of Cargo Title 7 (Marine Mammal Protection Act) ..........................10 • 7 U.S.C. §§ 2024(g) and (h). Forfeiture of Property • 16 U.S.C. § 1377. Enforcement (Marine Mammal Involved in Illegal Food Stamp Transactions; Protection Act) ........................................................11 Criminal Forfeiture ...................................................1 • 16 U.S.C. § 1540. Penalties and Enforcement Title 8 (Endangered Species) .............................................12 • 8 U.S.C. § 1324(b). Seizure and Forfeiture of • 16 U.S.C. § 1860. Civil Forfeitures (National Fishery Conveyances, Gross Proceeds, and Property Management Program) ...........................................17 Traceable to Such Conveyances or Proceeds ...........3 • 16 U.S.C. § 3374. Forfeiture (Lacey Act) ..............18 Title 15 • 16 U.S.C. § 3606. Violations and Penalties (North • 15 U.S.C. § 715f. Forfeiture of Contraband Oil Atlantic Salmon Fishing) .......................................18 Shipped in Violation of Law; Procedure ..................5 • 16 U.S.C. § 3637. Prohibited Acts and Penalties (Pacific • 15 U.S.C. § 1177. Civil Forfeiture -
Scholarship Suppression: Theoretical Perspectives and Emerging Trends
societies Review Scholarship Suppression: Theoretical Perspectives and Emerging Trends Sean T. Stevens 1, Lee Jussim 2,* and Nathan Honeycutt 2 1 The Foundation for Individual Rights in Education, Philadelphia, PA 19106, USA; sean.stevens@thefire.org 2 Department of Psychology Rutgers, The State University of New Jersey—New Brunswick, New Brunswick, NJ 08901-8554, Canada; [email protected] * Correspondence: [email protected] Received: 8 September 2020; Accepted: 9 October 2020; Published: 27 October 2020 Abstract: This paper explores the suppression of ideas within an academic scholarship by academics, either by self-suppression or because of the efforts of other academics. Legal, moral, and social issues distinguishing freedom of speech, freedom of inquiry, and academic freedom are reviewed. How these freedoms and protections can come into tension is then explored by an analysis of denunciation mobs that exercise their legal free speech rights to call for punishing scholars who express ideas they disapprove of and condemn. When successful, these efforts, which constitute legally protected speech, will suppress certain ideas. Real-world examples over the past five years of academics that have been sanctioned or terminated for scholarship targeted by a denunciation mob are then explored. Keywords: free speech; academic freedom; free inquiry; censorship; conformity; moral panics; witch hunts; heresy 1. Introduction “Protection, therefore, against the tyranny of the magistrate is not enough; there needs protection also against the tyranny of the prevailing opinion and feeling; against the tendency of society to impose, by other means than civil penalties, its own ideas and practices as rules of conduct on those who dissent from them ::: ” -John Stuart Mill (1859) The suppression of a scholarship is well documented throughout human history. -
The “Right to Be Forgotten”: Asserting Control Over Our Digital Identity Or Re-Writing History?
The “right to be forgotten”: Asserting control over our digital identity or re-writing history? The case of Google Spain and Google Inc. v. AEPD & Mario Costeja González Alice Pease1, CNR-IRPPS Abstract The dramatic expansion of the Internet over the past twenty years has presented society with fresh dilemmas regarding the balance of non-absolute fundamental rights, specifically the conflict between the right to freedom of expression on the one hand, and the right to privacy and data protection on the other. In this context, this article analyses the recent case of Google Spain, concerning a Spanish citizen’s request to have personal information de-listed from internet search engines. Following a description of the case, the implications, as well as the controversies, surrounding the ECJ’s ruling on the “right to be forgotten” will be explored. The article concludes that despite the many grey areas left by the ECJ’s decision, the case has ignited an important discussion regarding individuals’ relationship with the Internet, which has moved beyond the legal arena and permeated civil society. Keywords “right to be forgotten”, right to privacy, freedom of expression, balancing of rights in the Internet age, search engines, Articles 7 and 8 Charter of Fundamental Rights of the European Union, Data Protection Directive (95/46/EC). Introduction Typing one’s name into Google, however little famous we may consider ourselves to be, can wield a whole of host of results, from personal Facebook and Twitter pages to other more obscure memories, which we may have buried in the past. In this day and age, most of us have a digital identity made up of fragments of past and present accounts, comments, posts and photos. -
Reframing the Crypto Wars
CONTENTS Introduction 1 A Highlights Reel of the U.S. Encryption Debate 2 The Early “Crypto Wars” and the Clipper Chip 2 The Encryption Debate Sequel: Snowden and Surveillance 3 Privacy and the Encryption Debate 3 Earn It: Encryption Controversy Over Section 230 3 The Current International Debate Around Encryption 4 The Impact of International Encryption Policy on Domestic Policy 5 Security Versus Privacy or Security Versus Security 5 Challenges to Making Progress on the Encryption Debate 6 The Increased Availability of User-friendly Encryption Services 6 A Lack of a Common Language 6 A Lack of a Whole of Government Approach to Cybersecurity 7 Disagreement About Backdoor Alternatives 8 Conclusion 9 About the Authors 10 R STREET POLICY STUDY NO. 237 The debate was seemingly set to be answered by the courts in July 2021 2016, when Apple refused to craft new software at the behest of the Federal Bureau of Investigation (FBI) that would allow the agency to access encrypted information on a phone belonging to one of the shooters in a 2015 terrorist attack on Inland Regional Center in San Bernardino, California. REFRAMING THE CRYPTO WARS But the “going dark” encryption debate shares a key charac- By Kathryn Waldron and Sofia Lesmes teristic with the walking dead: no matter how many times you try to put it to rest, it keeps coming back. In October 2020, the Department of Justice (DOJ) issued an international INTRODUCTION statement calling for companies to “[e]nable law enforce- ment access to content in a readable and usable format where or the past several decades, policymakers, law enforce- authorisation is lawfully issued, is necessary and proportion- ment, private companies, civil liberties advocates and ate, and is subject to strong safeguards and oversight.”2 Both cybersecurity specialists have been locked in a pas- at home and abroad, there are increased government calls to sionate yet seemingly unending battle over encryp- weaken encryption in the name of national security. -
„Estetika Nepřítomnosti“ Heinera Goebbelse Diplomová Práce
JANÁČKOVA AKADEMIE MÚZICKÝCH UMĚNÍ V BRNĚ Divadelní fakulta Ateliér scénografie Scénografie „Estetika nepřítomnosti“ Heinera Goebbelse Diplomová práce Autor práce: BcA. Jana Tkáčová Vedoucí práce: Doc. MgA. Marie Jirásková, Ph. D. Oponent práce: Doc. Mgr. Jan Štěpánek Brno 2017 Bibliografický záznam TKÁČOVÁ, Jana. „Estetika nepřítomnosti“ Heinera Goebbelse [Heiner Goebbels' “Aesthetics of Absence”]. Brno: Janáčkova akademie múzických umění v Brně, Divadelní fakulta, Ateliér scénografie, 2017, 83 s. Vedoucí práce Doc. MgA. Marie Jirásková, Ph. D. Anotace Diplomová práce „Estetika nepřítomnosti“ Heinera Goebbelse se zabývá analýzou přístupu Heinera Goebbelse k divadlu a jeho metodami tvorby s důrazem na teze, které prezentuje ve svých přednáškách a ve své práci. Goebbels se za 30 let své praxe dopracoval k principům otevřeného divadla „estetiky nepřítomnosti“, které dále rozvíjí ve své divadelní a pedagogické činnosti. Práce popisuje tyto principy v představeních Heinera Goebbelse, v moderním a současném umění a jejich prvky v reflexi vlastních projektů autorky práce. Annotation Diploma thesis Heiner Goebbels' “Aesthetics of Absence” deals with the analysis of Heinrich Goebbels' approach to the theater and its methods of production with emphasis on the theses presented in his lectures and his work. In thirty years of his practice, Goebbels worked on the principles of an open theater of "aesthetics of absence", which is further developed in his theatrical and pedagogical activities. The work describes these principles in the Heiner Goebbels' shows, in modern and contemporary art and their elements in the reflection of author's own projects. Klíčová slova Absence, hudební divadlo, prázdný střed, umělecké vzdělávání, nicota v umění. Keywords Absence, musical theater, empty center, artistic education, nothingness in art. -
Documents That Would Establish Malwarebytes’ Deep Relationship with Bleeping and Its Collaboration with Bleeping’S Efforts to Divert Sales from Enigma to 6
No. 19-1284 IN THE Supreme Court of the United States __________ MALWAREBYTES, INC., Petitioner, v. ENIGMA SOFTWARE GROUP USA, LLC, Respondent. __________ On Petition for a Writ of Certiorari to the United States Court of Appeals for the Ninth Circuit __________ BRIEF IN OPPOSITION FOR RESPONDENT __________ CHRISTOPHER M. VERDINI TERRY BUDD ANNA SHABALOV Counsel of Record K&L GATES LLP BUDD LAW, PLLC 210 Sixth Avenue 120 Lyndhurst Circle Pittsburgh, PA 15222 Wexford, PA 15090 (412) 355-6500 (412) 613-2541 ([email protected]) July 27, 2020 QUESTION PRESENTED Whether the Ninth Circuit correctly held that 47 U.S.C. § 230(c)(2), titled “Protection for ‘Good Samaritan’ blocking and screening of offensive material,” does not provide immunity from liability for companies engaging in predatory practices that intentionally target competitors for anticompetitive reasons. ii RULE 29.6 DISCLOSURE STATEMENT Enigma Software Group USA, LLC is a Florida limited liability company with its principal place of business in Florida. Enigma Software Group USA, LLC is 100% owned by Globalist LLC, a Delaware limited liability company. Globalist LLC has no parent corporation, and no publicly held corporation owns 10% or more of its stock. iii TABLE OF CONTENTS Page QUESTION PRESENTED .......................................... i RULE 29.6 DISCLOSURE STATEMENT ................. ii TABLE OF AUTHORITIES ........................................v INTRODUCTION ....................................................... 1 STATEMENT ............................................................. -
We Love Big Brother: an Analysis of the Relationship Between Orwell's Nineteen Eighty-Four and Modern Politics in the United S
University of Connecticut OpenCommons@UConn Honors Scholar Theses Honors Scholar Program Spring 5-4-2018 We Love Big Brother: An Analysis of the Relationship between Orwell’s Nineteen Eighty- Four And Modern Politics in the United States and Europe Edward Pankowski [email protected] Follow this and additional works at: https://opencommons.uconn.edu/srhonors_theses Part of the Literature in English, North America Commons, and the Political Theory Commons Recommended Citation Pankowski, Edward, "We Love Big Brother: An Analysis of the Relationship between Orwell’s Nineteen Eighty-Four And Modern Politics in the United States and Europe" (2018). Honors Scholar Theses. 559. https://opencommons.uconn.edu/srhonors_theses/559 We Love Big Brother: An Analysis of the Relationship between Orwell’s Nineteen Eighty-Four And Modern Politics in the United States and Europe By Edward Pankowski Professor Jennifer Sterling-Folker Thesis Adviser: Professor Sarah Winter 5/4/2018 POLS 4497W Abstract: In recent months since the election of Donald Trump to the Presidency of the United States in November 2016, George Orwell’s Nineteen Eighty-Four has seen a resurgence in sales, and terms invented by Orwell or brought about by his work, such as “Orwellian,” have re- entered the popular discourse. This is not a new phenomenon, however, as Nineteen Eighty-Four has had a unique impact on each of the generations that have read it, and the impact has stretched across racial, ethnic, political, and gender lines. This thesis project will examine the critical, popular, and scholarly reception of Nineteen Eighty-Four since its publication 1949. Reviewers’ and commentators’ references common ideas, themes, and settings from the novel will be tracked using narrative theory concepts in order to map out an understanding of how the interpretations of the novel changed over time relative to major events in both American and Pankowski 1 world history. -
Chapter 3 Section 5
SECTION 5: CHINA’S DOMESTIC INFORMATION CONTROLS, GLOBAL MEDIA INFLUENCE, AND CYBER DIPLOMACY Key Findings • China’s current information controls, including the govern- ment’s new social credit initiative, represent a significant es- calation in censorship, surveillance, and invasion of privacy by the authorities. • The Chinese state’s repression of journalists has expanded to target foreign reporters and their local Chinese staff. It is now much more difficult for all journalists to investigate politically sensitive stories. • The investment activities of large, Chinese Communist Par- ty-linked corporations in the U.S. media industry risk under- mining the independence of film studios by forcing them to consider self-censorship in order to gain access to the Chinese market. • China’s overseas influence operations to pressure foreign media have become much more assertive. In some cases, even without direct pressure by Chinese entities, Western media companies now self-censor out of deference to Chinese sensitivity. • Beijing is promoting its concept of “Internet sovereignty” to jus- tify restrictions on freedom of expression in China. These poli- cies act as trade barriers to U.S. companies through both cen- sorship and restrictions on cross-border data transfers, and they are fundamental points of disagreement between Washington and Beijing. • In its participation in international negotiations on global Inter- net governance, norms in cyberspace, and cybersecurity, Beijing seeks to ensure continued control of networks and information in China and to reduce the risk of actions by other countries that are not in its interest. Fearing that international law will be used by other countries against China, Beijing is unwilling to agree on specific applications of international law to cyberspace.