Don't shoot the messenger: protecting free speech on editorially controlled bulletin board services by applying Sullivan malice
Article Abstract:
The malice standard for defamation established in New York Times v. Sullivan should be applied in suits against information service providers that operate edited computer bulletin boards. When the postings on computer bulletin board are edited, the operator is considered a primary publisher for purposes of defamation law. Since computer bulletin boards serve an essential free speech function by providing an editorial forum, the operators of these bulletin boards should be given the same protections that are provided to the press by the Sullivan malice standard.
Publication Name: The John Marshall Journal of Computer & Information Law
Subject: Library and information science
ISSN: 1078-4128
Year: 1996
User Contributions:
Comment about this article or add new information about this topic:
RIAA v. Napster: a window onto the future of copyright law in the Internet age
Article Abstract:
The author reviews the issue of Napster's liability for copyright infringement for allowing users to download music on the Internet. He concludes that Napster is not liable according to the Online Copyright Infringement Liability Limitation Act.
Publication Name: The John Marshall Journal of Computer & Information Law
Subject: Library and information science
ISSN: 1078-4128
Year: 2000
User Contributions:
Comment about this article or add new information about this topic:
Service provider liability for acts committed by users: what you don't know can hurt you
Article Abstract:
The liability of online services for acts committed by their users is an issue that has expanded in importance in recent years. This article examines this issue as it has played out in court decisions and legislation.
Publication Name: The John Marshall Journal of Computer & Information Law
Subject: Library and information science
ISSN: 1078-4128
Year: 2000
User Contributions:
Comment about this article or add new information about this topic:
- Abstracts: Invasion of the information snatchers: creating liability for corporations with vulnerable computer networks. Privacy on federal civilian computer networks: a Fourth Amendment analysis of the Federal Instrusion Detection Network
- Abstracts: The calculation and application of composite telecommunications service price indexes. Factor prices, factor substitution, and the relative demand for telecommunications across US industries
- Abstracts: Access pricing with unregulated downstream competition. The scope for collusion in a regulated vertically integrated telecommunications industry
- Abstracts: Free speech on the information superhighway: European perspectives. It's 1996: do you know where your cyberkids are? Captive audiences and content regulation on the Internet
- Abstracts: An economic analysis of the receiver pays principle. Price ceilings and firm-specific quantity restrictions in posted-offer markets