JS V. Village Voice Media Holdings, LLC, 184 Wash.2D 95

Total Page:16

File Type:pdf, Size:1020Kb

JS V. Village Voice Media Holdings, LLC, 184 Wash.2D 95 J.S. v. Village Voice Media Holdings, L.L.C., 184 Wash.2d 95 (2015) 359 P.3d 714, 43 Media L. Rep. 2346 184 Wash.2d 95 West Headnotes (9) Supreme Court of Washington, En Banc. [1] Appeal and Error J.S., S.L., and L.C., Respondents, De novo review v. A trial court's ruling to dismiss a claim for VILLAGE VOICE MEDIA HOLDINGS, failure to state a claim is reviewed de novo. CR L.L.C., d/b/a/ Backpage.com and 12(b)(6). Backpage.com, L.L.C., Petitioners, 1 Cases that cite this headnote and Baruti Hopson and New Times Media, L.L.C., d/b/a/ Backpage.com, Defendants. [2] Appeal and Error Failure to state claim, and dismissal No. 90510–0. therefor | When reviewing a trial court's ruling on Argued Oct. 21, 2014. a motion to dismiss for failure to state a | claim, the Supreme Court accepts as true the Decided Sept. 3, 2015. allegations in a plaintiff's complaint and any reasonable inferences therein. CR 12(b)(6). Synopsis Background: Minors who were featured in advertisements 3 Cases that cite this headnote for sexual services brought action against operators of website, alleging negligence, outrage, sexual exploitation of children, ratification/vicarious liability, unjust [3] Pretrial Procedure enrichment, invasion of privacy, sexual assault and Insufficiency in general battery, and civil conspiracy. The Superior Court, Pierce Pretrial Procedure County, Susan K. Serko, J., denied operators' motion to Matters considered in general dismiss. Operators sought discretionary review, which was Motions to dismiss for failure to state a claim granted. The Court of Appeals certified the case to the should be granted sparingly and with care and Supreme Court for direct review. only in the unusual case in which plaintiff includes allegations that show on the face of the complaint that there is some insuperable [Holding:] The Supreme Court, en banc, González, J., bar to relief. CR 12(b)(6). held that minors sufficiently alleged that website operators Cases that cite this headnote helped develop content of advertisements for sexual services of minors. [4] Pretrial Procedure Availability of relief under any state of Affirmed and remanded. facts provable Dismissal for failure to state a claim is Wiggins, J., filed concurring opinion. appropriate only if it appears beyond a reasonable doubt that no facts exist that McCloud, J., filed dissenting opinion. would justify recovery. CR 12(b)(6). Cases that cite this headnote [5] Telecommunications © 2018 Thomson Reuters. No claim to original U.S. Government Works. 1 J.S. v. Village Voice Media Holdings, L.L.C., 184 Wash.2d 95 (2015) 359 P.3d 714, 43 Media L. Rep. 2346 Persons and entities liable; immunity [8] Telecommunications Under the Communications Decency Act Persons and entities liable; immunity (CDA), an information content provider may be subject to state law liability in relation A website may be immune from liability under to content that it develops but an interactive the Communications Decency Act (CDA) for computer service is immune from suit for some of the content it displays to the public state law claims in relation to merely hosting but be subject to liability for other content. such content on a website. Communications Communications Decency Act of 1996, § 509, Decency Act of 1996, § 509, 47 U.S.C.A. § 230. 47 U.S.C.A. § 230. 1 Cases that cite this headnote 1 Cases that cite this headnote [6] Telecommunications [9] Telecommunications Persons and entities liable; immunity Persons and entities liable; immunity Minors sufficiently alleged that website A website operator does not “develop” operators helped develop content of content, such that it is liable under advertisements for sexual services of minors, the Communications Decency Act (CDA), rather than merely hosted such advertisements by simply maintaining neutral policies on website, and therefore operators were not prohibiting or limiting certain content. entitled to grant of motion to dismiss for Communications Decency Act of 1996, § 509, failure to state a claim based on immunity 47 U.S.C.A. § 230. pursuant to Communications Decency Act Cases that cite this headnote (CDA), where minors alleged that operators intentionally developed website to require information that allowed and encouraged illegal trafficking of underage girls, and that allowed users to evade law enforcement. Attorneys and Law Firms Communications Decency Act of 1996, § 509, **715 James Condon Grant, Ambika Kumar Doran, 47 U.S.C.A. § 230; CR 12(b)(6). Eric Stahl, Davis Wright Tremaine LLP, Elizabeth L. Cases that cite this headnote Mcdougall–Tural, Attorney at Law, Seattle, WA, for Petitioner. [7] Telecommunications Eric Stahl, Ambika Kumar Doran, James Condon Grant, Persons and entities liable; immunity Davis Wright Tremaine LLP, Seattle, WA, for Defendant. A website operator can be both a service Erik Louis Bauer, Attorney at Law, Darrell L. Cochran, provider that is immune from state law Pfau Cochran Vertetis Amala PLLC, Tacoma, WA, liability under the Communications Decency Michael Thomas Pfau, Vincent Thomas Nappo, Jason Act (CDA), and a content provider that is Paul Amala, Pfau Cochran Vertetis Amala PLLC, Seattle, not immune; if it passively displays content WA, for Respondent. that is created entirely by third parties, then it is only a service provider with respect to Venkat Balasubramani, Focal PLLC, Seattle, WA, that content, but as to content that it creates Emma Llanso, Center for Democracy and Technology, itself, or is responsible, in whole or in part for Washington, DC, amicus counsel for Democracy & creating or developing, the website is also a Technology. content provider. Communications Decency Act of 1996, § 509, 47 U.S.C.A. § 230. Venkat Balasubramani, Focal PLLC, Seattle, WA, David Greene Electronic Frontier Foundation, San Francisco, 2 Cases that cite this headnote CA, amicus counsel for Electronic Frontier Foundation. © 2018 Thomson Reuters. No claim to original U.S. Government Works. 2 J.S. v. Village Voice Media Holdings, L.L.C., 184 Wash.2d 95 (2015) 359 P.3d 714, 43 Media L. Rep. 2346 have alleged sufficient facts that, if proved, would show Jessica L. Goldman, Summit Law Group, Seattle, WA, that the defendants helped to produce the illegal content Eugene Volokh, UCLA School of Law, Los Angeles, CA, and therefore are subject to liability under state law. amicus counsel for Eugene Volokh. Accordingly, we affirm and remand to the trial court for **716 further proceedings consistent with this opinion. Anthony S. Broadman, Galanda Broadman, PLLC, Seattle, WA, Taina Bien–Aime, Coalition Against Trafficking in Women, Alexander A. Yanos, Ruth Teitelbaum, Bonnie Doyle, Freshfields Bruckhaus FACTS Deringer U.S. LLP, New York, N.Y., amicus counsel for COAlition Against Trafficking in Women. ¶ 2 Advertisements featuring three minor girls, J.S., S.L., and L.C. (collectively J.S.), allegedly were posted Kathy Ann Cochran, Wilson Smith Cochran Dickerson, on a website owned and maintained by Village Voice Seattle, WA, Robert Barnes, Oscar Ramallo, Kaye Media Holdings, d/b/a Backpage.com, Backpage.com Scholer LLP, Los Angeles, CA, amicus counsel for LLC and New Times Media LLC, d/b/a/ Backpage.com National Center for Missing and Exploited Children. (collectively Backpage). J.S. allegedly was raped multiple times by adult customers who responded to the Caitlin Kazuye Esq Hawks, Savitt Bruce & Willey LLP, advertisements. Seattle, WA, Stacey J. Rappaport, Nicole Fidler, Milbank Tweed Hadley & McCloy LLP, New York, N.Y., amicus ¶ 3 J.S. filed a complaint alleging state law claims counsel for National Crime Victim Law Institute, Shared for damages against Backpage and Baruti Hopson. 1 Hope International, Covenant House and Human Rights J.S. asserted claims for negligence, outrage, sexual Project for Girls. exploitation of children, ratification/vicarious liability, Jessica L. Goldman, Summit Law Group, Seattle, WA, unjust enrichment, *99 invasion of privacy, sexual Eugene Volokh, UCLA School of Law, Los Angeles, CA, assault and battery, and civil conspiracy. Backpage moved amicus counsel for Professors of Constitutional Law and to dismiss on the theory that it is immune from suit Related Fields. in relation to J.S.'s state law claims under the federal Communications Decency Act of 1996 (CDA), 47 U.S.C. Pellegrino L. Certa, Certa Law Group PS, Seattle, WA, § 230. 2 J.S. countered by arguing that Backpage is amicus counsel for Fair Girls. not immune from suit in part because its advertisement posting rules were “designed to help pimps develop Alan D. Copsey, Office of the Attorney General, Olympia, advertisements that can evade the unwanted attention WA, amicus counsel for State of Washington. of law enforcement, while still conveying the illegal Opinion message.” Clerk's Papers (CP) at 201. The trial court denied the motion to dismiss, allowing J.S.'s case to GONZÁLEZ, J. proceed. Backpage moved for discretionary review. The Court of Appeals granted review and certified the case *98 ¶ 1 The plaintiffs before us have been the repeated to this court for direct review. Order Certifying Case for victims of horrific acts committed in the shadows of the Transfer, J.S. v. Vill. Voice Media Holdings, LLC, No. law. They brought this suit in part to bring light to 44920–0–II (Wash.Ct.App. July 17, 2014). some of those shadows: to show how children are bought and sold for sexual services online on Backpage.com ¶ 4 J.S. allegedly was featured in Backpage advertisements in advertisements that, they allege, the defendants help posted in accordance with instructions on Backpage's develop. Federal law shields website operators from state website without any special guidance from Backpage law liability for merely hosting content developed by users personnel. J.S. alleges that all of the advertisements but does not protect those who develop the content.
Recommended publications
  • How Law Made Silicon Valley
    Emory Law Journal Volume 63 Issue 3 2014 How Law Made Silicon Valley Anupam Chander Follow this and additional works at: https://scholarlycommons.law.emory.edu/elj Recommended Citation Anupam Chander, How Law Made Silicon Valley, 63 Emory L. J. 639 (2014). Available at: https://scholarlycommons.law.emory.edu/elj/vol63/iss3/3 This Article is brought to you for free and open access by the Journals at Emory Law Scholarly Commons. It has been accepted for inclusion in Emory Law Journal by an authorized editor of Emory Law Scholarly Commons. For more information, please contact [email protected]. CHANDER GALLEYSPROOFS2 2/17/2014 9:02 AM HOW LAW MADE SILICON VALLEY Anupam Chander* ABSTRACT Explanations for the success of Silicon Valley focus on the confluence of capital and education. In this Article, I put forward a new explanation, one that better elucidates the rise of Silicon Valley as a global trader. Just as nineteenth-century American judges altered the common law in order to subsidize industrial development, American judges and legislators altered the law at the turn of the Millennium to promote the development of Internet enterprise. Europe and Asia, by contrast, imposed strict intermediary liability regimes, inflexible intellectual property rules, and strong privacy constraints, impeding local Internet entrepreneurs. This study challenges the conventional wisdom that holds that strong intellectual property rights undergird innovation. While American law favored both commerce and speech enabled by this new medium, European and Asian jurisdictions attended more to the risks to intellectual property rights holders and, to a lesser extent, ordinary individuals.
    [Show full text]
  • City Zoning & Subdivision Ordinances
    Printed via Website Updated 1/3/20 CITY ZONING & SUBDIVISION ORDINANCES (Updated: January 3, 2020) Printed via Website Updated 1/3/20 CITY ZONING & SUBDIVISION ORDINANCE INDEX Updated: January 3, 2020 SECTION 1. Title and Application Subd. 1. Title ..................................................................................... 1-1 Subd. 2. Intent and Purpose .............................................................. 1-1 Subd. 3. Relation to Comprehensive Municipal Plan ....................... 1-1 Subd. 4. Standard, Requirement ....................................................... 1-1 Subd. 5. Interpretations and Application .......................................... 1-1 Subd. 6. Conformity .......................................................................... 1-1 Subd. 7. Building Permit Conformity ............................................... 1-2 Subd. 8. Uses Not Provided For Within Zoning Districts ................ 1-2 Subd. 9. Authority ............................................................................. 1-2 Subd. 10. Separability ....................................................................... 1-2 Subd. 11. Rules ................................................................................. 1-2 SECTION 2. Definitions Subd. 1-197. .......................................................................... 2-1 – 2-24 SECTION 3. General Provisions Subd. 1. Nonconforming Buildings, Structures and Uses ................ 3-1 Subd. 2. General Building and Performance Requirements ............. 3-9 Subd.
    [Show full text]
  • Seeing the Queerness of Ec-Static Images
    Georgia State University ScholarWorks @ Georgia State University Communication Dissertations Department of Communication Fall 12-2013 Oblique Optics: Seeing the Queerness of Ec-static Images Kristopher L. Cannon Georgia State University Follow this and additional works at: https://scholarworks.gsu.edu/communication_diss Recommended Citation Cannon, Kristopher L., "Oblique Optics: Seeing the Queerness of Ec-static Images." Dissertation, Georgia State University, 2013. https://scholarworks.gsu.edu/communication_diss/48 This Dissertation is brought to you for free and open access by the Department of Communication at ScholarWorks @ Georgia State University. It has been accepted for inclusion in Communication Dissertations by an authorized administrator of ScholarWorks @ Georgia State University. For more information, please contact [email protected]. OBLIQUE OPTICS: SEEING THE QUEERNESS OF EC-STATIC IMAGES by KRISTOPHER L. CANNON Under the Direction of Alessandra Raengo ABSTRACT Oblique Optics contends that studies of visual culture must account for the queerness of images. This argument posits images as queer residents within visual culture by asking how and where the queerness of images becomes visible. These questions are interrogated by utilizing queer theories and methods to refigure how the image is conceptualized within traditional approaches to visual culture studies and media studies. Each chapter offers different approaches to see the queerness of images by torquing our vision to see "obliquely," whereby images are located beyond visible surfaces (like pictures or photographs) through ec-static movements within thresholds between bodies and beings. Chapter One rethinks how images are conceptualized through metaphorical language by exploring how images emerge from fantasies about will-be-born bodies in fetal photographs.
    [Show full text]
  • No Monitoring Obligations’ the Death of ‘No Monitoring Obligations’ a Story of Untameable Monsters by Giancarlo F
    The Death of ‘No Monitoring Obligations’ The Death of ‘No Monitoring Obligations’ A Story of Untameable Monsters by Giancarlo F. Frosio* Abstract: In imposing a strict liability regime pean Commission, would like to introduce filtering for alleged copyright infringement occurring on You- obligations for intermediaries in both copyright and Tube, Justice Salomão of the Brazilian Superior Tribu- AVMS legislations. Meanwhile, online platforms have nal de Justiça stated that “if Google created an ‘un- already set up miscellaneous filtering schemes on a tameable monster,’ it should be the only one charged voluntary basis. In this paper, I suggest that we are with any disastrous consequences generated by the witnessing the death of “no monitoring obligations,” lack of control of the users of its websites.” In order a well-marked trend in intermediary liability policy to tame the monster, the Brazilian Superior Court that can be contextualized within the emergence of had to impose monitoring obligations on Youtube; a broader move towards private enforcement online this was not an isolated case. Proactive monitoring and intermediaries’ self-intervention. In addition, fil- and filtering found their way into the legal system as tering and monitoring will be dealt almost exclusively a privileged enforcement strategy through legisla- through automatic infringement assessment sys- tion, judicial decisions, and private ordering. In multi- tems. Due process and fundamental guarantees get ple jurisdictions, recent case law has imposed proac- mauled by algorithmic enforcement, which might fi- tive monitoring obligations on intermediaries across nally slay “no monitoring obligations” and fundamen- the entire spectrum of intermediary liability subject tal rights online, together with the untameable mon- matters.
    [Show full text]
  • Video Scrambling for Privacy Protection in Video Surveillance – Recent Results and Validation Framework Frederic Dufaux
    Video Scrambling for Privacy Protection in Video Surveillance – Recent Results and Validation Framework Frederic Dufaux To cite this version: Frederic Dufaux. Video Scrambling for Privacy Protection in Video Surveillance – Recent Results and Validation Framework. Mobile Multimedia/Image Processing, Security and Applications, SPIE, Apr 2011, Orlando, United States. hal-01436403 HAL Id: hal-01436403 https://hal.archives-ouvertes.fr/hal-01436403 Submitted on 10 Jan 2020 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Video Scrambling for Privacy Protection in Video Surveillance – Recent Results and Validation Framework Frederic Dufaux Laboratoire de Traitement et Communication de l’Information – UMR 5141 CNRS Télécom ParisTech F-75634 Paris Cedex 13, France [email protected] ABSTRACT The issue of privacy in video surveillance has drawn a lot of interest lately. However, thorough performance analysis and validation is still lacking, especially regarding the fulfillment of privacy-related requirements. In this paper, we first review recent Privacy Enabling Technologies (PET). Next, we discuss pertinent evaluation criteria for effective privacy protection. We then put forward a framework to assess the capacity of PET solutions to hide distinguishing facial information and to conceal identity.
    [Show full text]
  • A User-Selectable Obscuration Framework to Censor Digital Videos for Children and Adolescents
    A User-selectable Obscuration Framework to Censor Digital Videos for Children and Adolescents Jiayan GUO, David LEONG, Jonathan SIANG, and Vikram BAHL School of Infocomm, Republic Polytechnic, Singapore ABSTRACT storyline of the film. Such harmful content is still accessible to the viewers. The children thus are exposed to There is an increasing concern from parents, educators a vast amount of inappropriate media content. and policy-makers about the negative influence that digital media exerts on children and adolescents. Such According to the Singapore Censorship Review concerns have fueled a growing need to effectively filter Committee 2010 report [2], parents are encouraged to take potentially harmful content. However, existing responsibility to protect their children against the negative technologies have limited ability in allowing users to aspects of media proliferation. In order to guide their adjust the filtering levels, or generating seamless cutting children on digital media consumption, parents have to be results. To tackle this limitation, we propose a framework empowered with effective tools to filter sex, violence and which empowers parents and teachers to censor movies profanity out of the digital media. However, existing tools and TV shows according to their level of acumen and have limited capabilities to effectively block potentially discretion. Such framework helps parents and teachers harmful content. Presently, ClearPlay and MovieMask are protect children and adolescents against obscene content. the two forefront computer programs that cleanse movies In particular, our framework enables parents and teachers containing offensive scenes. Their technologies are built to sanitize movies and TV shows by skipping over onto stand-alone DVD players and other video devices.
    [Show full text]
  • Free Speech in the Algorithmic Society: Big Data, Private Governance, and New School Speech Regulation
    Free Speech in the Algorithmic Society: Big Data, Private Governance, and New School Speech Regulation Jack M. Balkin* TABLE OF CONTENTS INTRODUCTION ................................................................................. 1151 I. BIG DATA IS SOYLENT GREEN ................................................. 1154 A. Technology Mediates (and Constitutes) Relationships of Power Between People ..................................................... 1157 B. Information Fiduciaries ................................................... 1160 C. Algorithmic Nuisance ...................................................... 1163 D. Personal Robots ............................................................... 1168 II. NEW SCHOOL SPEECH REGULATION AND PRIVATE GOVERNANCE ......................................................................... 1172 A. The Right to Be Forgotten and the Problem of Fake News 1172 B. New School Speech Regulation ......................................... 1173 1. Collateral Censorship ............................................... 1176 2. Digital Prior Restraint............................................... 1177 C. Public Private Cooperation/Cooptation ............................ 1179 III. PRIVATE GOVERNANCE ........................................................... 1182 A. From Game Gods to Social Media .................................... 1184 B. From the Dyadic to the Pluralist Model of Speech Governance ..................................................................... 1186 C. Problems of the New System of
    [Show full text]
  • Free Speech and Hostile Environments
    Reprinted from 99 Columbia L. Rev. (1999). Copyright Jack M. Balkin 1999. All rights reserved. FREE SPEECH AND HOSTILE ENVIRONMENTS J.M. Balkin* One major concern about sexual harassment law is that employers will restrict employee speech in order to avoid hostile environment liability, thus violating free speech principles. In this Essay, Professor Balkin argues that this “collateral censorship” is constitutionally permissible when there are good grounds for vicarious liability. Because employers actively control workplace culture, and because they are better able to prevent hostile environments than individual employees, vicarious liability for employee speech is more justified than in the case of distributors or common carriers. Professor Balkin also argues that captive audience doctrine, generally thought to apply only to speech in the home, is actually better suited to workplace speech. Hostile environments are a method of sex discrimination that maintains gender segregation; a hostile environment does its work precisely through making the employee a captive audience. The Essay concludes that First Amendment challenges to sexual harassment law should not become a defense of employer prerogatives presented in the guise of worker liberties. Without the incentives created by sexual harassment law, employees will not be freed from censorship; they will simply be remitted to the economic and social control of employers. Does sexual harassment law conflict with the First Amendment? A number of commentators now argue that it does.1 Generally, these * Knight Professor of Constitutional Law and the First Amendment, Yale Law School. My thanks to Bruce Ackerman, Akhil Amar, Ian Ayres, Dan Kahan, Sandy Levinson, Vicki Schultz, Reva Siegel, and Eugene Volokh for their comments on previous drafts.
    [Show full text]
  • Collateral Censorship and the Limits of Intermediary Immunity Felix T
    Notre Dame Law Review Volume 87 | Issue 1 Article 6 11-1-2011 Collateral Censorship and the Limits of Intermediary Immunity Felix T. Wu Follow this and additional works at: http://scholarship.law.nd.edu/ndlr Recommended Citation Felix T. Wu, Collateral Censorship and the Limits of Intermediary Immunity, 87 Notre Dame L. Rev. 293 (2013). Available at: http://scholarship.law.nd.edu/ndlr/vol87/iss1/6 This Article is brought to you for free and open access by NDLScholarship. It has been accepted for inclusion in Notre Dame Law Review by an authorized administrator of NDLScholarship. For more information, please contact [email protected]. COLLATERAL CENSORSHIP AND THE LIMITS OF INTERMEDIARY IMMUNITY Felix T. Wu* The law often limits the liability of an intermediaryfor the speech it carries. And rightly so, because imposing liability on intermediaries can induce them to filter out questionable content and this "collateralcensorship" risks suppressing much lawful, even highly beneficial, speech. The "collat- eral censorship" rationale has its limits, though, and correspondingly, so should the applicability of intermediary immunity. The worry with collateral censorship is not just that intermediaries censor, but that they censor more than an original speaker would in the face of potential liability. Increased censorship, in turn, is the product of applying liability targeted at original speakers to entities whose interests divergefrom original speakers. Where the "intermediary" has the interests of an original speaker, and so should be regarded as one, or where the form of liability already takes into account the intermediary's interests, collateral censorship is not the problem, and immu- nity is not the right response.
    [Show full text]
  • Automation in Moderation
    Texas A&M University School of Law Texas A&M Law Scholarship Faculty Scholarship 3-2020 Automation in Moderation Hannah Bloch-Wehba Texas A&M University School of Law, [email protected] Follow this and additional works at: https://scholarship.law.tamu.edu/facscholar Part of the First Amendment Commons, Intellectual Property Law Commons, Internet Law Commons, Privacy Law Commons, and the Science and Technology Law Commons Recommended Citation Hannah Bloch-Wehba, Automation in Moderation, 53 Cornell Int'l L.J. 42 (2020). Available at: https://scholarship.law.tamu.edu/facscholar/1448 This Article is brought to you for free and open access by Texas A&M Law Scholarship. It has been accepted for inclusion in Faculty Scholarship by an authorized administrator of Texas A&M Law Scholarship. For more information, please contact [email protected]. \\jciprod01\productn\C\CIN\53-1\CIN102.txt unknown Seq: 1 8-DEC-20 17:23 Automation in Moderation Hannah Bloch-Wehba† Introduction ..................................................... 42 R I. The Origins of Automation in Moderation ................ 48 R A. Immunity, Safe Harbor & Private Governance ......... 48 R B. Spam Filtering ........................................ 52 R 1. “Artificial Intelligence” ............................. 54 R C. Unlawful Content ..................................... 57 R D. Copyright Enforcement................................ 62 R II. From Reactive to Proactive................................ 66 R A. Copyright ............................................ 66 R B. Unlawful Speech ...................................... 69 R C. Defamation ........................................... 72 R III. The Drawbacks of Proactive Moderation .................. 74 R A. Content Moderation as Censorship .................... 75 R B. Content Moderation as Surveillance ................... 79 R C. Content Moderation as Algorithmic Control ............ 81 R D. Content Moderation as Power ......................... 85 R E. Content Moderation as Extraterritorial Governance....
    [Show full text]
  • Beyond Gatekeeping: the Normative Responsibility of Internet Intermediaries
    Vanderbilt Journal of Entertainment & Technology Law Volume 18 Issue 4 Issue 4 - Summer 2016 Article 4 2016 Beyond Gatekeeping: The Normative Responsibility of Internet Intermediaries Marcelo Thompson Follow this and additional works at: https://scholarship.law.vanderbilt.edu/jetlaw Part of the Law Commons Recommended Citation Marcelo Thompson, Beyond Gatekeeping: The Normative Responsibility of Internet Intermediaries, 18 Vanderbilt Journal of Entertainment and Technology Law 783 (2020) Available at: https://scholarship.law.vanderbilt.edu/jetlaw/vol18/iss4/4 This Article is brought to you for free and open access by Scholarship@Vanderbilt Law. It has been accepted for inclusion in Vanderbilt Journal of Entertainment & Technology Law by an authorized editor of Scholarship@Vanderbilt Law. For more information, please contact [email protected]. Beyond Gatekeeping: The Normative Responsibility of Internet Intermediaries Marcelo Thompson* ABSTRACT This Article puts forward a normative approach to the responsibility of Internet intermediaries for third-party content they host. It argues that, in thinking about intermediary liability, the focus should be on intermediaries' responsibility towards the reasoning processes in reaching decisions, rather than on the outcomes of intermediaries'decisions.What is necessary is a framework that, while attaching responsibilities to such decisions, creates a cushioning system for their decision making, mitigating the hardship of honest mistakes. Within this framework, intermediaries must be seen not as mere keepers of gates, but as designers of artifacts whose use plans settle normative questions and play a vital role in the construction of our normative reality. Accordingly, an interpretive commitment must be required toward the integrity of such a reality.
    [Show full text]
  • How India Censors The
    How India Censors the Web Kushagra Singh∗ Gurshabad Grover∗ Varun Bansal Centre for Internet and Society Centre for Internet and Society Centre for Internet and Society [email protected] [email protected] [email protected] ABSTRACT First, the regulations do not mandate ISPs to use specific filter- One of the primary ways in which India engages in online censor- ing mechanisms. Thus, ISPs are are at liberty to employ various ship is by ordering Internet Service Providers (ISPs) operating in its technical methods [47]. jurisdiction to block access to certain websites for its users. This pa- Second, website-blocking orders, especially those issued by the per reports the different techniques Indian ISPs are using to censor Government, are rarely available in the public domain. ISPs are, in websites, and investigates whether website blocklists are consistent fact, mandated by regulations to maintain confidentiality of cer- across ISPs. We propose a suite of tests that prove more robust than tain website-blocking orders issued by the Government [3].Various previous work in detecting DNS and HTTP based censorship. Our attempts by researchers and advocacy organisations to obtain the tests also discern the use of SNI inspection for blocking websites, complete list of blocked websites have failed [4, 24]. which is previously undocumented in the Indian context. Using Third, the whimsy of ISPs and the Government aggravates these information from court orders, user reports and government orders, problems. Despite strict net neutrality regulations in India that we compile the largest known list of potentially blocked websites in prohibit ISPs from arbitrarily restricting access to websites [35], India.
    [Show full text]