메뉴 건너뛰기




Volumn 98, Issue 2, 1999, Pages 395-429

Zoning speech on the internet: A legal and technical model

(2)  Lessig, Lawrence a   Resnick, Paul a  

a NONE

Author keywords

[No Author keywords available]

Indexed keywords


EID: 0005470307     PISSN: 00262234     EISSN: None     Source Type: Journal    
DOI: 10.2307/1290343     Document Type: Article
Times cited : (19)

References (113)
  • 2
    • 84923762038 scopus 로고    scopus 로고
    • See Ginsberg v. New York, 390 U.S. 629 (1968)
    • See Ginsberg v. New York, 390 U.S. 629 (1968).
  • 3
    • 84923762037 scopus 로고    scopus 로고
    • note
    • We reserve the term "censorship" for blanket restrictions on the distribution of speech that apply regardless of the recipient or the context. Access control is a broader concept that includes not only censorship but also restrictions on speech that may depend on the recipient or context.
  • 4
    • 0345942237 scopus 로고    scopus 로고
    • See Communications Decency Act of 1996, § 502, 110 Stat. 133, invalidated by Reno v. ACLU, 521 U.S. 844 (1997); § 1403, U.S.C.A. § Supp.
    • See Communications Decency Act of 1996, § 502, 110 Stat. 133, invalidated by Reno v. ACLU, 521 U.S. 844 (1997); Child Online Protection Act, § 1403, 47 U.S.C.A. § 231 (Supp. 1999).
    • (1999) Child Online Protection Act , vol.47 , pp. 231
  • 5
    • 84923762036 scopus 로고    scopus 로고
    • "Spam" signifies unsolicited commercial email. See infra Part IV
    • "Spam" signifies unsolicited commercial email. See infra Part IV.
  • 6
    • 84923762035 scopus 로고    scopus 로고
    • See Kim L. Rappaport, In the Wake of Reno v. ACLU: The Continued Struggle in Western Constitutional Democracies with Internet Censorship and Freedom of Speech Online, 13 AM. U. INT'L L. REV. 765, 766-67, 788-90 (1998)
    • See Kim L. Rappaport, In the Wake of Reno v. ACLU: The Continued Struggle in Western Constitutional Democracies with Internet Censorship and Freedom of Speech Online, 13 AM. U. INT'L L. REV. 765, 766-67, 788-90 (1998).
  • 7
    • 0003336455 scopus 로고    scopus 로고
    • WIRED, June
    • See Geremie R. Barmé & Sang Ye, The Great Firewall of China, WIRED, June 1997, at 138, 147; Philip Shenon, 2-Edged Sword: Asian Regimes on the Internet, N.Y. TIMES, May 29, 1995, at 1.
    • (1997) The Great Firewall of China , pp. 138
    • Barmé, G.R.1    Ye, S.2
  • 8
    • 0039422968 scopus 로고
    • 2-Edged Sword: Asian Regimes on the Internet
    • May 29
    • See Geremie R. Barmé & Sang Ye, The Great Firewall of China, WIRED, June 1997, at 138, 147; Philip Shenon, 2-Edged Sword: Asian Regimes on the Internet, N.Y. TIMES, May 29, 1995, at 1.
    • (1995) N.Y. Times , pp. 1
    • Shenon, P.1
  • 9
    • 0345942237 scopus 로고    scopus 로고
    • U.S.C.A. § Supp.
    • Child Online Protection Act, 47 U.S.C.A. § 231 (Supp. 1999).
    • (1999) Child Online Protection Act , vol.47 , pp. 231
  • 10
    • 0345942238 scopus 로고    scopus 로고
    • § 502, Stat. Reno v. ACLU, 521 U.S. 844
    • Communications Decency Act of 1996, § 502, 110 Stat. 133, invalidated by Reno v. ACLU, 521 U.S. 844 (1997).
    • (1997) Communications Decency Act of 1996 , vol.110 , pp. 133
  • 11
    • 84923762034 scopus 로고    scopus 로고
    • See Reno v. ACLU, 521 U.S. 844 (1997)
    • See Reno v. ACLU, 521 U.S. 844 (1997).
  • 12
    • 84923762033 scopus 로고    scopus 로고
    • See ACLU v. Reno, 31 F. Supp. 2d 473 (E.D. Pa. 1999)
    • See ACLU v. Reno, 31 F. Supp. 2d 473 (E.D. Pa. 1999).
  • 13
    • 84923762032 scopus 로고    scopus 로고
    • note
    • A cynic might believe that this repetition is no accident. After all, Congress gets rewarded for what it passes, not what sticks. Protecting kids is great politics. Why do it only once, the cynic might ask, when one can do it every two years?
  • 14
    • 84923762031 scopus 로고    scopus 로고
    • See the cases cited in Lessig, supra note 1, at 638 nn.26 & 27
    • See the cases cited in Lessig, supra note 1, at 638 nn.26 & 27.
  • 15
    • 84923762030 scopus 로고    scopus 로고
    • note
    • We describe this model below in Section II.D. Congress was aware of this alternative. See 144 CONG. REC. S12795 (daily ed. Oct. 21, 1998) (comments of Sen. Leahy).
  • 16
    • 84923762029 scopus 로고    scopus 로고
    • note
    • There is an important ambiguity in the concept of "jurisdiction" that we ignore here. Some rules depend upon where the person acts, rather than where the person is a citizen. If the drinking age in one state is 21, it does not matter that in the jurisdiction where X comes from, the drinking age is 18. But some rules may depend upon where someone comes from. We do not distinguish those cases in this version of the argument.
  • 17
    • 84923762028 scopus 로고    scopus 로고
    • An example would be Cyber Patrol's CyberNOT list. See Cyber Patrol Main Page (visited Sept. 9, 1999)
    • An example would be Cyber Patrol's CyberNOT list. See Cyber Patrol Main Page (visited Sept. 9, 1999) 〈http://www.cyberpatrol.com/〉.
  • 18
    • 84923762027 scopus 로고    scopus 로고
    • See Paris Adult Theatre I v. Slaton, 413 U.S. 49, 55 (1972), which held that an injunction could be used so long as adequate procedures to determine obscenity had been used. This would probably not be permitted absent a judicial finding. See Rowan v. United States Post Office Dep't, 397 U.S. 728, 738-39 (1970)
    • See Paris Adult Theatre I v. Slaton, 413 U.S. 49, 55 (1972), which held that an injunction could be used so long as adequate procedures to determine obscenity had been used. This would probably not be permitted absent a judicial finding. See Rowan v. United States Post Office Dep't, 397 U.S. 728, 738-39 (1970).
  • 19
    • 84923762026 scopus 로고    scopus 로고
    • note
    • Again, the sender does not know the recipient; the recipient does not know the content of the item; the intermediary does not know either. See supra Section I.A. This does not mean that there would not be extreme, and therefore easy, cases. The speaker would certainly know, therefore, whether some kinds of speech were highly likely to be permitted. Banalities about the weather constitute fairly safe speech acts anywhere; sadistic child porn is fairly unsafe in most jurisdictions.
  • 20
    • 37849186539 scopus 로고    scopus 로고
    • HARV. L. REV.
    • For an excellent analysis of a property regime for dealing with access control, see Developments in the Law - The Law of Cyberspace, 112 HARV. L. REV. 1574, 1634-57 (1999).
    • (1999) Developments in the Law - The Law of Cyberspace , vol.112 , pp. 1574
  • 21
    • 84923762025 scopus 로고    scopus 로고
    • See infra Part II
    • See infra Part II.
  • 22
    • 84923762024 scopus 로고    scopus 로고
    • note
    • By "uncertainty" we mean simply not having a given type of information - for example, information about the jurisdiction from which a receiver comes.
  • 23
    • 0009305817 scopus 로고
    • B.U. L. REV.
    • We do not claim at this point that either default would, for all types of speech, be constitutional under the U.S. Constitution. Nor do we speak about the burdens of proof under a particular statute. We assume throughout that the state bears the burden for all elements of the charge. Cf. Smith v. California, 361 U.S. 147 (1959) (finding it unconstitutional to hold a bookseller criminally liable regardless of the bookseller's knowledge of the obscene contents of books sold). Rather than claim what is constitutionally possible, our defaults help clarify the relationship between the proscription and uncertainty. Like Schauer's article, our objective is to further explore this relationship, and the constitutional implications of uncertainty. See Frederick Schauer, Fear, Risk and the First Amendment: Unraveling the "Chilling Effect," 58 B.U. L. REV. 685, 725-29 (1978).
    • (1978) Fear, Risk and the First Amendment: Unraveling the "Chilling Effect," , vol.58 , pp. 685
    • Schauer, F.1
  • 24
    • 84923762023 scopus 로고    scopus 로고
    • note
    • It is distinct because there exists no requirement to not send, but rather simply a punishment for sending without indication that the sending is legal. We concede this is a fine line, but with our defaults we aim, as we have explained above, not so much to limn the contours of American constitutionalism, but to understand the relationship between these rules and uncertainty.
  • 25
    • 84923762022 scopus 로고    scopus 로고
    • note
    • The Model Penal Code equates specific intent with "acting knowingly." The relevant section reads: A person acts knowingly with respect to a material element of an offense when: (i) if the element involves the nature of his conduct or the attendant circumstances, he is aware that his conduct is of that nature or that such circumstances exist; and (ii) if the element involves a result of his conduct, he is aware that it is practically certain that his conduct will cause such a result. MODEL PENAL CODE § 2.02(2)(b) (1962).
  • 26
    • 84923762021 scopus 로고    scopus 로고
    • See infra Section II.A
    • See infra Section II.A.
  • 27
    • 84923762019 scopus 로고    scopus 로고
    • note
    • The RESTATEMENT (SECOND) OF TORTS §282 (1965) defines negligence as "conduct which falls below the standard established by law for the protection of others against unreasonable risk of harm."
  • 28
    • 84923762017 scopus 로고    scopus 로고
    • note
    • Our conclusion, however, will be that the social costs of enabling blocking by intermediaries are in fact quite high. See infra text accompanying notes 58-60.
  • 29
    • 84923762008 scopus 로고    scopus 로고
    • See, e.g., Reno v. ACLU, 521 U.S. 844, 887 & n.2 (1997) (O'Connor, J., concurring in the judgment in part and dissenting in part)
    • See, e.g., Reno v. ACLU, 521 U.S. 844, 887 & n.2 (1997) (O'Connor, J., concurring in the judgment in part and dissenting in part).
  • 30
    • 84923762007 scopus 로고    scopus 로고
    • note
    • A web server, for example, knows the IP address of the client computer that requests a web page, but usually knows little else about the recipient. An IP address does not readily identify a geographic location, because the administrative practices surrounding IP address allocation have not been based solely on geography. By analogy with the telephone numbering system, IP addresses have been allocated more like 800-numbers than like the numbers in regular area codes. Moreover, there is currently no single up-to-date database indicating the location of the computer using each IP address. (In practice, to facilitate routing, address allocations do roughly follow geography, which means that such a database might not be too unwieldy if it were assembled.) An IP address does not even uniquely identify a recipient computer, since dial-up connections through an Internet service provider typically are assigned a different address each time they dial.
  • 31
    • 84923762006 scopus 로고    scopus 로고
    • note
    • Though the use of the word has become quite general, we attempt in this essay to follow Schauer's definition of "chill," which refers "only to those examples of deterrence which result from the indirect governmental restriction of protected expression." Schauer, supra note 22, at 693.
  • 32
    • 84923762005 scopus 로고    scopus 로고
    • See Hamling v. United States, 418 U.S. 87, 104-06 (1974)
    • See Hamling v. United States, 418 U.S. 87, 104-06 (1974).
  • 33
    • 84923762004 scopus 로고    scopus 로고
    • Reno v. ACLU, 521 U.S. at 876
    • Reno v. ACLU, 521 U.S. at 876.
  • 34
    • 84923762003 scopus 로고    scopus 로고
    • See e.g., Upper Midwest Booksellers Ass'n v. City of Minneapolis, 780 F.2d 1389, 1394 (8th Cir. 1986); see also M.S. News Co. v. Casado, 721 F.2d 1281, 1287-91, 1295 (10th Cir. 1983) (upholding a requirement that obscene-as-to-minors magazines be placed in "blinder racks"). Under Ginsberg, "minors may constitutionally be denied access to material that is obscene as to minors," but adults may not. Reno v. ACLU, 521 U.S. at 895 (O'Connor, J., concurring in the judgment in part and dissenting in part) (citing Ginsberg v. New York, 390 U.S. 629, 633 (1968)). Material is obscene as to minors if it is patently offensive, appeals to minors' prurient interest, and completely lacks socially redeeming value for minors. See id.
    • See e.g., Upper Midwest Booksellers Ass'n v. City of Minneapolis, 780 F.2d 1389, 1394 (8th Cir. 1986); see also M.S. News Co. v. Casado, 721 F.2d 1281, 1287-91, 1295 (10th Cir. 1983) (upholding a requirement that obscene-as-to-minors magazines be placed in "blinder racks"). Under Ginsberg, "minors may constitutionally be denied access to material that is obscene as to minors," but adults may not. Reno v. ACLU, 521 U.S. at 895 (O'Connor, J., concurring in the judgment in part and dissenting in part) (citing Ginsberg v. New York, 390 U.S. 629, 633 (1968)). Material is obscene as to minors if it is patently offensive, appeals to minors' prurient interest, and completely lacks socially redeeming value for minors. See id.
  • 36
    • 84923762002 scopus 로고    scopus 로고
    • See id. at 58-62
    • See id. at 58-62.
  • 37
    • 0347148927 scopus 로고    scopus 로고
    • visited Sept. 16
    • See VeriSign Digital ID Center (visited Sept. 16, 1999) 〈http://www.verisign.com/ client/index.html〉.
    • (1999) VeriSign Digital ID Center
  • 39
    • 84923762001 scopus 로고    scopus 로고
    • note
    • Note that even though the technology for this solution is already in place, we refer to it as a possible architectural change because a widespread change in social practices would be necessary for the technology to be used in this way.
  • 40
    • 84923761999 scopus 로고    scopus 로고
    • note
    • One version of this regime would have recipients provide child-IDs, which we discuss below when considering COPA. See infra Section II.D.
  • 41
    • 84923761997 scopus 로고    scopus 로고
    • note
    • Another possibility would be for the server to send a request of the form "if you are in jurisdiction X or Y and you are under 18, please provide a child ID," which would further reduce the burden of the system.
  • 42
    • 0347148909 scopus 로고    scopus 로고
    • app. 5 visited Sept. 16
    • Currently, the InterNIC maintains a database of the assignations of IP addresses to organizations. This database is public, and a copy of it may be queried from any computer on the Internet. Unfortunately, some entries in the database are incomplete or out of date, and they do not necessarily identify the location of computers using the IP addresses. It has been suggested, however, that such a database be used as a starting point for developing an IP to jurisdiction mapping. See Philip McCrea et al., Blocking Content on the Internet: A Technical Perspective, app. 5 (visited Sept. 16, 1999) 〈http://www.noie.gov.au/〉.
    • (1999) Blocking Content on the Internet: A Technical Perspective
    • McCrea, P.1
  • 43
    • 84923761988 scopus 로고    scopus 로고
    • See, e.g., Paris Adult Theater I v. Slaton, 413 U.S. 49, 55 (1972)
    • See, e.g., Paris Adult Theater I v. Slaton, 413 U.S. 49, 55 (1972).
  • 44
    • 84923761987 scopus 로고    scopus 로고
    • note
    • See Schauer, supra note 22, at 725-29. The closest case is perhaps Bantam Books v. Sullivan, 372 U.S. 58 (1963), where the Court invalidated a "blacklist" Commission. The preclearance idea is not quite a blacklist - the result of the submission would be a promise not to prosecute, not a determination that the material was "obscene." Again, however, we concede that the line is a difficult one to sustain.
  • 45
    • 84923761986 scopus 로고    scopus 로고
    • See supra Section I.B
    • See supra Section I.B.
  • 46
    • 84923761985 scopus 로고    scopus 로고
    • note
    • It would be different, of course, if the sender were considered as a bookstore, without knowledge, or any simple way to get knowledge, about the content of its books. See Cubby, Inc. v. Compuserve, Inc., 776 F. Supp. 135, 139-40 (S.D.N.Y. 1991). We would consider such a "sender" to be an intermediary in our analysis.
  • 47
    • 84923761984 scopus 로고    scopus 로고
    • note
    • This depends upon the level of knowledge required for someone to be guilty under such a provision. If the statute were criminal, the knowledge requirement would be quite strong, so inadvertent liability would not be possible. But for a lesser prohibition, the knowledge requirement may be less.
  • 48
    • 84923761983 scopus 로고    scopus 로고
    • See supra Section II.A.1
    • See supra Section II.A.1.
  • 49
    • 84923761982 scopus 로고    scopus 로고
    • See id.
    • See id.
  • 50
    • 0346573368 scopus 로고    scopus 로고
    • last modified Aug. 4
    • The labels could be expressed in PICS format, see generally Platform for Internet Content Selection (last modified Aug. 4, 1999) 〈http://www.w3.org/PICS/〉, or the new RDF format, see generally Resource Description Framework (last modified Aug. 9, 1999) 〈http://www.w3.org/RDF〉, and distributed along with the items.
    • (1999) Platform for Internet Content Selection
  • 51
    • 0012923277 scopus 로고    scopus 로고
    • last modified Aug. 9, distributed along with the items
    • The labels could be expressed in PICS format, see generally Platform for Internet Content Selection (last modified Aug. 4, 1999) 〈http://www.w3.org/PICS/〉, or the new RDF format, see generally Resource Description Framework (last modified Aug. 9, 1999) 〈http://www.w3.org/RDF〉, and distributed along with the items.
    • (1999) Resource Description Framework
  • 52
    • 84923761981 scopus 로고    scopus 로고
    • note
    • If many people voluntarily adopted a "prohibited unless permitted" filter, then the market demand for labels might sufficiently encourage sender self-labeling, even if the state mandated only the less strict "permitted unless prohibited" regime. For example, consumers might turn on the facilities in Microsoft's Internet Explorer (version 3 and higher) or Netscape Navigator (version 4.5) to voluntarily block access based on senders' PICS-formatted self-labels.
  • 53
    • 0003638780 scopus 로고
    • 2d ed. and the cases cited therein
    • The "compelled speech" doctrine forbids the government from forcing individuals to assert the views of the government. See LAURENCE H. TRIBE, AMERICAN CONSTITUTIONAL LAW 804-06 (2d ed. 1988) and the cases cited therein.
    • (1988) American Constitutional Law , pp. 804-806
    • Tribe, L.H.1
  • 55
    • 84923761979 scopus 로고    scopus 로고
    • note
    • The government's own ratings are not always determinative of whether speech was delivered or not, absent a judicial finding. See Rowan v. United States Post Office Dep't 397 U.S. 728, 738-39 (1970). To force individuals to label their content would, we believe, often require them to make judgments about the character of the material they were labeling. But the labels in this context are not objective, nor independent of a viewpoint about the nature of the material. To have to assert the character of the material, then, can be to require individuals to make what is in essence a political statement. If a newspaper cannot be forced to publish a story it does not otherwise want to print, see Miami Herald Publishing Co. v. Tornillo, 418 U.S. 241 (1974), then neither should a web site be forced to publish a story about itself (i.e., that it carries materials of type X) that it does not otherwise want to print.
  • 56
    • 84923761977 scopus 로고    scopus 로고
    • note
    • A URL identifies both a computer to connect to and a path or file name to request. Thus, URL blocking enables some files from a Web server to be blocked, while others are not blocked.
  • 57
    • 84923761968 scopus 로고    scopus 로고
    • note
    • For a more complete description of application layer and network layer blocking, see McCrea et al., supra note 41, at 25-31.
  • 58
    • 84923761967 scopus 로고    scopus 로고
    • note
    • It would be possible, though expensive, to make an international phone call to access an IAP in another jurisdiction.
  • 59
    • 84923761966 scopus 로고    scopus 로고
    • note
    • McCrea et al. detail these and other ways that senders and recipients might bypass intermediaries' blocks. See McCrea et al., supra note 41, at 35, 37.
  • 61
    • 0347148917 scopus 로고    scopus 로고
    • visited Sept. 9
    • ICQ ("I Seek You") maintains a worldwide registry of users and their status (online, busy, away, etc.), allowing users an easy way to keep track of friends and acquaintances. The ICQ client software interacts with the registry updating a user's information and receiving information about others on that user's "contact list." The ICQ client also acts as a platform for chat and other message exchange between any two registered ICQ users. See How to Use ICQ (visited Sept. 9, 1999) 〈http://www.icq.com/icqtour/〉; What Is ICQ? (visited Sept. 9, 1999) 〈http://www.icq.com/products/whatisicq.html〉.
    • (1999) How to use ICQ
  • 62
    • 0345887721 scopus 로고    scopus 로고
    • visited Sept. 9
    • ICQ ("I Seek You") maintains a worldwide registry of users and their status (online, busy, away, etc.), allowing users an easy way to keep track of friends and acquaintances. The ICQ client software interacts with the registry updating a user's information and receiving information about others on that user's "contact list." The ICQ client also acts as a platform for chat and other message exchange between any two registered ICQ users. See How to Use ICQ (visited Sept. 9, 1999) 〈http://www.icq.com/icqtour/〉; What Is ICQ? (visited Sept. 9, 1999) 〈http://www.icq.com/products/whatisicq.html〉.
    • (1999) What Is ICQ?
  • 63
    • 84923761965 scopus 로고    scopus 로고
    • See McCrea et al., supra note 41, at 31
    • See McCrea et al., supra note 41, at 31.
  • 64
    • 84923761964 scopus 로고    scopus 로고
    • note
    • They are a special case as well in that, relative to other mandated access control, the content here is easier to identify. The model becomes far more complex if content such as "defamatory" or "seditious" speech were considered. Likewise, the problem becomes far more difficult if the recipient always has an incentive to evade the regulation. Regulating "kids" is a special case because, at least sometimes, the parent has an interest in enforcing the regulation.
  • 65
    • 84923761963 scopus 로고    scopus 로고
    • note
    • The Court in Reno v. ACLU made it clear that the relevant question is whether parents are enabled in protecting kids, not whether the state is. 521 U.S. 844, 865 & n.31 (1997). If a parent decides to give kids access, that decision cannot, for the range of speech being discussed here, be overridden by the state.
  • 66
    • 84923761962 scopus 로고    scopus 로고
    • note
    • Manufacturers of browsers and operating systems would presumably make it difficult to modify the kids-mode configuration without a password. In practice, this would require both that the kids-mode browser configuration not be easily changed, and that the operating system prevent installation of a fresh browser where the child could choose whether to set it in kids-mode. Eventually, we might expect that the kids-mode setting would migrate entirely into the operating system, with all browsers' behavior determined by the operating system setting.
  • 67
    • 0347148910 scopus 로고    scopus 로고
    • visited Oct. 6
    • "Cookies are a general mechanism which server side [sic] connections (such as CGI scripts) can use to both store and retrieve information on the client side of the connection. The addition of a simple, persistent, client-side state significantly extends the capabilities of Web-based client/server applications." Persistent Client State HTTP Cookie, Introduction (visited Oct. 6, 1999) 〈http://home.netscape.com/newsref/std/cookie_spec.html〉. See generally Cookie Central (visited Oct. 6, 1999) 〈http://www.cookiecentral.com〉.
    • (1999) Persistent Client State HTTP Cookie, Introduction
  • 68
    • 0346518537 scopus 로고    scopus 로고
    • visited Oct. 6
    • "Cookies are a general mechanism which server side [sic] connections (such as CGI scripts) can use to both store and retrieve information on the client side of the connection. The addition of a simple, persistent, client-side state significantly extends the capabilities of Web-based client/server applications." Persistent Client State HTTP Cookie, Introduction (visited Oct. 6, 1999) 〈http://home.netscape.com/newsref/std/cookie_spec.html〉. See generally Cookie Central (visited Oct. 6, 1999) 〈http://www.cookiecentral.com〉.
    • (1999) Cookie Central
  • 69
    • 84923761961 scopus 로고    scopus 로고
    • note
    • Ginsberg implies that suppliers can be burdened to separate "harmful to minor" speech from other speech. Ginsberg v. New York, 390 U.S. 629, 643-45 (1968).
  • 70
    • 84923761959 scopus 로고    scopus 로고
    • note
    • This analysis follows the test created by the Supreme Court regarding the constitutionality of speech-restrictive regulations involving the protection of children. See infra note 80 and accompanying text.
  • 71
    • 0346573375 scopus 로고    scopus 로고
    • U.S.C.A. § 231(a)(1) Supp.
    • Child Online Protection Act, 47 U.S.C.A. § 231(a)(1) (Supp. 1999).
    • (1999) Child Online Protection Act , vol.47
  • 72
    • 84923761957 scopus 로고    scopus 로고
    • 47 U.S.C.A. § 231(c)(1)
    • 47 U.S.C.A. § 231(c)(1).
  • 73
    • 84923761948 scopus 로고    scopus 로고
    • See 47 U.S.C.A § 231(c)(2)
    • See 47 U.S.C.A § 231(c)(2).
  • 74
    • 84923761947 scopus 로고    scopus 로고
    • See supra Section I.A
    • See supra Section I.A.
  • 75
    • 84923761946 scopus 로고    scopus 로고
    • 47 U.S.C.A § 231(c)(1)
    • 47 U.S.C.A § 231(c)(1).
  • 76
    • 84923761945 scopus 로고    scopus 로고
    • 47 U.S.C.A § 223(e)(5)(A)
    • 47 U.S.C.A § 223(e)(5)(A).
  • 77
    • 84923761944 scopus 로고    scopus 로고
    • See Reno v. ACLU, 521 U.S. 844, 881-82 (1997)
    • See Reno v. ACLU, 521 U.S. 844, 881-82 (1997).
  • 78
    • 84923761943 scopus 로고    scopus 로고
    • See 144 CONG. REC. 139, H9902-11 (1998)
    • See 144 CONG. REC. 139, H9902-11 (1998).
  • 79
    • 84923761942 scopus 로고    scopus 로고
    • See Reno v. ACLU, 521 U.S. at 887-88 (O'Connor, J., concurring in the judgment in part and dissenting in part)
    • See Reno v. ACLU, 521 U.S. at 887-88 (O'Connor, J., concurring in the judgment in part and dissenting in part).
  • 80
    • 84923761941 scopus 로고    scopus 로고
    • See, e.g., ACLU v. Reno, 31 F. Supp. 2d 473 (E.D. Pa. 1999) (preliminarily enjoining COPA)
    • See, e.g., ACLU v. Reno, 31 F. Supp. 2d 473 (E.D. Pa. 1999) (preliminarily enjoining COPA).
  • 81
    • 84923761939 scopus 로고    scopus 로고
    • The "burdensome" test is structurally similar to the test in abortion cases. See Planned Parenthood v. Casey, 505 U.S. 833 (1992)
    • The "burdensome" test is structurally similar to the test in abortion cases. See Planned Parenthood v. Casey, 505 U.S. 833 (1992).
  • 82
    • 84923761937 scopus 로고    scopus 로고
    • See Casey, 505 U.S. at 833
    • See Casey, 505 U.S. at 833.
  • 83
    • 84923761928 scopus 로고    scopus 로고
    • See Pike v. Bruce Church, Inc., 397 U.S. 137 (1970)
    • See Pike v. Bruce Church, Inc., 397 U.S. 137 (1970).
  • 84
    • 84923761927 scopus 로고    scopus 로고
    • See Sable Communications, Inc. v. FCC, 492 U.S. 115 (1989) (plurality permitting regulation of "dial-a-porn" to protect kids); Ginsberg v. New York, 390 U.S. 629 (1968) (upholding New York statute that required keeping of material harmful to minors from minors)
    • See Sable Communications, Inc. v. FCC, 492 U.S. 115 (1989) (plurality permitting regulation of "dial-a-porn" to protect kids); Ginsberg v. New York, 390 U.S. 629 (1968) (upholding New York statute that required keeping of material harmful to minors from minors).
  • 85
    • 0347833610 scopus 로고    scopus 로고
    • U.S.C.A. § 231(c)(1)(C) Supp.
    • Child Online Protection Act, 47 U.S.C.A. § 231(c)(1)(C) (Supp. 1999).
    • (1999) Child Online Protection Act , vol.47
  • 86
    • 84923761926 scopus 로고    scopus 로고
    • See supra note 81 and accompanying text
    • See supra note 81 and accompanying text.
  • 87
    • 84923761925 scopus 로고    scopus 로고
    • See ACLU v. Reno, 31 F. Supp. 2d 473, 492 (E.D. Pa. 1999)
    • See ACLU v. Reno, 31 F. Supp. 2d 473, 492 (E.D. Pa. 1999).
  • 88
    • 84923761924 scopus 로고    scopus 로고
    • note
    • Reno v. ACLU indicates quite clearly, we believe, that the state's interest is limited to facilitating the choice by parents. See supra note 62. The government in Reno had argued that the state had an interest, beyond the interest of parents, to protect kids from speech "harmful to minors" even if the parents did not so wish. See Transcript of Oral Argument, Reno v. ACLU, 521 U.S. 844 (1997), available in 1997 WL 136253, at *19-24 (Mar. 19, 1997). But the Court did not embrace this broader restriction. See Reno v. ACLU, 521 U.S. at 865 & n.31.
  • 90
    • 84923718432 scopus 로고    scopus 로고
    • Pub. L. No. 105-277, Stat. to be codified at 15 U.S.C. §§ 6501-6506
    • Children's Online Privacy Protection Act of 1998, Pub. L. No. 105-277, 112 Stat. 2681-728 (to be codified at 15 U.S.C. §§ 6501-6506).
    • Children's Online Privacy Protection Act of 1998 , vol.112 , pp. 2681-2728
  • 91
    • 84923761923 scopus 로고    scopus 로고
    • Reno v. ACLU, 521 U.S. 844, 874 (1997)
    • Reno v. ACLU, 521 U.S. 844, 874 (1997).
  • 92
    • 84923761922 scopus 로고    scopus 로고
    • note
    • One possible way to evade the limitation would be for a kid to download another browser and set it up to be free of the kids-ID restriction. But this possibility could be addressed. Again, the browser manufacturers could easily segregate download locations, based on whether the browser making the request were kids-ID enabled. If it were kids-ID enabled, then the company would download a kids-ID set browser only. Alternatively, the kids-ID could be enabled in the operating system ("OS"), making substitution of an adult OS for a kids OS significantly more difficult.
  • 93
    • 84923761921 scopus 로고    scopus 로고
    • See infra Part III
    • See infra Part III.
  • 94
    • 0042980672 scopus 로고
    • § 402(2) & cmt. e.
    • See RESTATEMENT (THIRD) OF FOREIGN RELATIONS § 402(2) & cmt. e.(1987) For example, the Child Sexual Abuse Prevention Act, 18 U.S.C. § 2423(b) (Supp. I 1995), criminalizes traveling abroad to engage in illegal sexual acts with children. For an interesting discussion of this provision, see Margaret A. Healy, Prosecuting Child Sex Tourists at Home: Do Laws in Sweden, Australia, and the United States Safeguard the Rights of Children as Mandated by International Law?, 18 FORDHAM INT'L L.J. 1852, 1902-12 (1995).
    • (1987) Restatement (Third) of Foreign Relations
  • 95
    • 0345942213 scopus 로고
    • U.S.C. § 2423(b) Supp. I
    • See RESTATEMENT (THIRD) OF FOREIGN RELATIONS § 402(2) & cmt. e.(1987) For example, the Child Sexual Abuse Prevention Act, 18 U.S.C. § 2423(b) (Supp. I 1995), criminalizes traveling abroad to engage in illegal sexual acts with children. For an interesting discussion of this provision, see Margaret A. Healy, Prosecuting Child Sex Tourists at Home: Do Laws in Sweden, Australia, and the United States Safeguard the Rights of Children as Mandated by International Law?, 18 FORDHAM INT'L L.J. 1852, 1902-12 (1995).
    • (1995) Child Sexual Abuse Prevention Act , vol.18
  • 97
    • 84923761919 scopus 로고    scopus 로고
    • note
    • Obviously, the most significant concern here would be jurisdictions outside of the United States or outside of places where a strong free speech right exists. The norms that the United States sets for the Net, however, would certainly spill over into those places and our view is that this spillover ought to be reckoned in any regulatory regime.
  • 98
    • 84923761917 scopus 로고    scopus 로고
    • note
    • In fact, voluntary access controls were the main motivation for the creation of PICS.
  • 99
    • 0347779031 scopus 로고    scopus 로고
    • HASTINGS Comm. & Ent. L.J.
    • For a demonstration of Alta Vista's "Family Filter," using ratings from SurfWatch, click on the Family Filter link at 〈http://www.altavista.com/〉 (visited Sept. 17, 1999). For a discussion of the implications, see Jonathan Weinberg, Rating the Net, 19 HASTINGS Comm. & Ent. L.J. 453 (1997).
    • (1997) Rating the Net , vol.19 , pp. 453
    • Weinberg, J.1
  • 100
    • 0347779030 scopus 로고    scopus 로고
    • Safety Online: Will It Impede Free Speech?
    • Dec. 5
    • See Rikki McGinty, Safety Online: Will It Impede Free Speech?, MEDIA DAILY, Dec. 5, 1997.
    • (1997) Media Daily
    • McGinty, R.1
  • 101
    • 84923759429 scopus 로고    scopus 로고
    • Cf. Weinberg, supra note 93, at n.108
    • Cf. Weinberg, supra note 93, at n.108.
  • 105
    • 0011917733 scopus 로고    scopus 로고
    • Filtering Information on the Internet
    • March
    • See Paul Resnick, Filtering Information on the Internet, SCI. AM., March 1997, at 62; PICS, Censorship, & Intellectual Freedom FAQ (Paul Resnick, ed.) (last modified Aug. 4, 1999) 〈http://www.w3.org/PICS/PICS-FAQ-980126.html〉.
    • (1997) Sci. Am. , pp. 62
    • Resnick, P.1
  • 106
    • 0347832783 scopus 로고    scopus 로고
    • last modified Aug. 4
    • See Paul Resnick, Filtering Information on the Internet, SCI. AM., March 1997, at 62; PICS, Censorship, & Intellectual Freedom FAQ (Paul Resnick, ed.) (last modified Aug. 4, 1999) 〈http://www.w3.org/PICS/PICS-FAQ-980126.html〉.
    • (1999) PICS, Censorship, & Intellectual Freedom FAQ
    • Resnick, P.1
  • 109
    • 84923759428 scopus 로고    scopus 로고
    • note
    • In email transmission protocols such as SMTP, there is no preliminary end-to-end session set up that would enable the recipient to send a certificate indicating its jurisdiction or type. Email transmission is effectively a one-way communication.
  • 111
    • 84923758131 scopus 로고    scopus 로고
    • S. 771, 105th Cong.
    • Without sender tagging, automated filtering is still possible, but will never be completely accurate at separating spam from non-spam messages. This is the essence of Senator Frank Murkowski's Unsolicited Commercial Electronic Mail Choice Act of 1997, S. 771, 105th Cong.
    • Unsolicited Commercial Electronic Mail Choice Act of 1997
    • Murkowski, F.1
  • 112
    • 84923759427 scopus 로고    scopus 로고
    • See SCHWARTZ & GARFINKEL, supra note 101, at 85-93
    • See SCHWARTZ & GARFINKEL, supra note 101, at 85-93.
  • 113
    • 0027005999 scopus 로고
    • Achieving Electronic Privacy
    • Aug.
    • Ecash is simply a digital object that could be attached, as a file is, to an email message. For a discussion of ecash, see David Chaum, Achieving Electronic Privacy, SCI. AM., Aug. 1992, at 96, 96-97.
    • (1992) Sci. Am. , pp. 96
    • Chaum, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.