-
2
-
-
84923762038
-
-
See Ginsberg v. New York, 390 U.S. 629 (1968)
-
See Ginsberg v. New York, 390 U.S. 629 (1968).
-
-
-
-
3
-
-
84923762037
-
-
note
-
We reserve the term "censorship" for blanket restrictions on the distribution of speech that apply regardless of the recipient or the context. Access control is a broader concept that includes not only censorship but also restrictions on speech that may depend on the recipient or context.
-
-
-
-
4
-
-
0345942237
-
-
See Communications Decency Act of 1996, § 502, 110 Stat. 133, invalidated by Reno v. ACLU, 521 U.S. 844 (1997); § 1403, U.S.C.A. § Supp.
-
See Communications Decency Act of 1996, § 502, 110 Stat. 133, invalidated by Reno v. ACLU, 521 U.S. 844 (1997); Child Online Protection Act, § 1403, 47 U.S.C.A. § 231 (Supp. 1999).
-
(1999)
Child Online Protection Act
, vol.47
, pp. 231
-
-
-
5
-
-
84923762036
-
-
"Spam" signifies unsolicited commercial email. See infra Part IV
-
"Spam" signifies unsolicited commercial email. See infra Part IV.
-
-
-
-
6
-
-
84923762035
-
-
See Kim L. Rappaport, In the Wake of Reno v. ACLU: The Continued Struggle in Western Constitutional Democracies with Internet Censorship and Freedom of Speech Online, 13 AM. U. INT'L L. REV. 765, 766-67, 788-90 (1998)
-
See Kim L. Rappaport, In the Wake of Reno v. ACLU: The Continued Struggle in Western Constitutional Democracies with Internet Censorship and Freedom of Speech Online, 13 AM. U. INT'L L. REV. 765, 766-67, 788-90 (1998).
-
-
-
-
7
-
-
0003336455
-
-
WIRED, June
-
See Geremie R. Barmé & Sang Ye, The Great Firewall of China, WIRED, June 1997, at 138, 147; Philip Shenon, 2-Edged Sword: Asian Regimes on the Internet, N.Y. TIMES, May 29, 1995, at 1.
-
(1997)
The Great Firewall of China
, pp. 138
-
-
Barmé, G.R.1
Ye, S.2
-
8
-
-
0039422968
-
2-Edged Sword: Asian Regimes on the Internet
-
May 29
-
See Geremie R. Barmé & Sang Ye, The Great Firewall of China, WIRED, June 1997, at 138, 147; Philip Shenon, 2-Edged Sword: Asian Regimes on the Internet, N.Y. TIMES, May 29, 1995, at 1.
-
(1995)
N.Y. Times
, pp. 1
-
-
Shenon, P.1
-
9
-
-
0345942237
-
-
U.S.C.A. § Supp.
-
Child Online Protection Act, 47 U.S.C.A. § 231 (Supp. 1999).
-
(1999)
Child Online Protection Act
, vol.47
, pp. 231
-
-
-
10
-
-
0345942238
-
-
§ 502, Stat. Reno v. ACLU, 521 U.S. 844
-
Communications Decency Act of 1996, § 502, 110 Stat. 133, invalidated by Reno v. ACLU, 521 U.S. 844 (1997).
-
(1997)
Communications Decency Act of 1996
, vol.110
, pp. 133
-
-
-
11
-
-
84923762034
-
-
See Reno v. ACLU, 521 U.S. 844 (1997)
-
See Reno v. ACLU, 521 U.S. 844 (1997).
-
-
-
-
12
-
-
84923762033
-
-
See ACLU v. Reno, 31 F. Supp. 2d 473 (E.D. Pa. 1999)
-
See ACLU v. Reno, 31 F. Supp. 2d 473 (E.D. Pa. 1999).
-
-
-
-
13
-
-
84923762032
-
-
note
-
A cynic might believe that this repetition is no accident. After all, Congress gets rewarded for what it passes, not what sticks. Protecting kids is great politics. Why do it only once, the cynic might ask, when one can do it every two years?
-
-
-
-
14
-
-
84923762031
-
-
See the cases cited in Lessig, supra note 1, at 638 nn.26 & 27
-
See the cases cited in Lessig, supra note 1, at 638 nn.26 & 27.
-
-
-
-
15
-
-
84923762030
-
-
note
-
We describe this model below in Section II.D. Congress was aware of this alternative. See 144 CONG. REC. S12795 (daily ed. Oct. 21, 1998) (comments of Sen. Leahy).
-
-
-
-
16
-
-
84923762029
-
-
note
-
There is an important ambiguity in the concept of "jurisdiction" that we ignore here. Some rules depend upon where the person acts, rather than where the person is a citizen. If the drinking age in one state is 21, it does not matter that in the jurisdiction where X comes from, the drinking age is 18. But some rules may depend upon where someone comes from. We do not distinguish those cases in this version of the argument.
-
-
-
-
17
-
-
84923762028
-
-
An example would be Cyber Patrol's CyberNOT list. See Cyber Patrol Main Page (visited Sept. 9, 1999)
-
An example would be Cyber Patrol's CyberNOT list. See Cyber Patrol Main Page (visited Sept. 9, 1999) 〈http://www.cyberpatrol.com/〉.
-
-
-
-
18
-
-
84923762027
-
-
See Paris Adult Theatre I v. Slaton, 413 U.S. 49, 55 (1972), which held that an injunction could be used so long as adequate procedures to determine obscenity had been used. This would probably not be permitted absent a judicial finding. See Rowan v. United States Post Office Dep't, 397 U.S. 728, 738-39 (1970)
-
See Paris Adult Theatre I v. Slaton, 413 U.S. 49, 55 (1972), which held that an injunction could be used so long as adequate procedures to determine obscenity had been used. This would probably not be permitted absent a judicial finding. See Rowan v. United States Post Office Dep't, 397 U.S. 728, 738-39 (1970).
-
-
-
-
19
-
-
84923762026
-
-
note
-
Again, the sender does not know the recipient; the recipient does not know the content of the item; the intermediary does not know either. See supra Section I.A. This does not mean that there would not be extreme, and therefore easy, cases. The speaker would certainly know, therefore, whether some kinds of speech were highly likely to be permitted. Banalities about the weather constitute fairly safe speech acts anywhere; sadistic child porn is fairly unsafe in most jurisdictions.
-
-
-
-
20
-
-
37849186539
-
-
HARV. L. REV.
-
For an excellent analysis of a property regime for dealing with access control, see Developments in the Law - The Law of Cyberspace, 112 HARV. L. REV. 1574, 1634-57 (1999).
-
(1999)
Developments in the Law - The Law of Cyberspace
, vol.112
, pp. 1574
-
-
-
21
-
-
84923762025
-
-
See infra Part II
-
See infra Part II.
-
-
-
-
22
-
-
84923762024
-
-
note
-
By "uncertainty" we mean simply not having a given type of information - for example, information about the jurisdiction from which a receiver comes.
-
-
-
-
23
-
-
0009305817
-
-
B.U. L. REV.
-
We do not claim at this point that either default would, for all types of speech, be constitutional under the U.S. Constitution. Nor do we speak about the burdens of proof under a particular statute. We assume throughout that the state bears the burden for all elements of the charge. Cf. Smith v. California, 361 U.S. 147 (1959) (finding it unconstitutional to hold a bookseller criminally liable regardless of the bookseller's knowledge of the obscene contents of books sold). Rather than claim what is constitutionally possible, our defaults help clarify the relationship between the proscription and uncertainty. Like Schauer's article, our objective is to further explore this relationship, and the constitutional implications of uncertainty. See Frederick Schauer, Fear, Risk and the First Amendment: Unraveling the "Chilling Effect," 58 B.U. L. REV. 685, 725-29 (1978).
-
(1978)
Fear, Risk and the First Amendment: Unraveling the "Chilling Effect,"
, vol.58
, pp. 685
-
-
Schauer, F.1
-
24
-
-
84923762023
-
-
note
-
It is distinct because there exists no requirement to not send, but rather simply a punishment for sending without indication that the sending is legal. We concede this is a fine line, but with our defaults we aim, as we have explained above, not so much to limn the contours of American constitutionalism, but to understand the relationship between these rules and uncertainty.
-
-
-
-
25
-
-
84923762022
-
-
note
-
The Model Penal Code equates specific intent with "acting knowingly." The relevant section reads: A person acts knowingly with respect to a material element of an offense when: (i) if the element involves the nature of his conduct or the attendant circumstances, he is aware that his conduct is of that nature or that such circumstances exist; and (ii) if the element involves a result of his conduct, he is aware that it is practically certain that his conduct will cause such a result. MODEL PENAL CODE § 2.02(2)(b) (1962).
-
-
-
-
26
-
-
84923762021
-
-
See infra Section II.A
-
See infra Section II.A.
-
-
-
-
27
-
-
84923762019
-
-
note
-
The RESTATEMENT (SECOND) OF TORTS §282 (1965) defines negligence as "conduct which falls below the standard established by law for the protection of others against unreasonable risk of harm."
-
-
-
-
28
-
-
84923762017
-
-
note
-
Our conclusion, however, will be that the social costs of enabling blocking by intermediaries are in fact quite high. See infra text accompanying notes 58-60.
-
-
-
-
29
-
-
84923762008
-
-
See, e.g., Reno v. ACLU, 521 U.S. 844, 887 & n.2 (1997) (O'Connor, J., concurring in the judgment in part and dissenting in part)
-
See, e.g., Reno v. ACLU, 521 U.S. 844, 887 & n.2 (1997) (O'Connor, J., concurring in the judgment in part and dissenting in part).
-
-
-
-
30
-
-
84923762007
-
-
note
-
A web server, for example, knows the IP address of the client computer that requests a web page, but usually knows little else about the recipient. An IP address does not readily identify a geographic location, because the administrative practices surrounding IP address allocation have not been based solely on geography. By analogy with the telephone numbering system, IP addresses have been allocated more like 800-numbers than like the numbers in regular area codes. Moreover, there is currently no single up-to-date database indicating the location of the computer using each IP address. (In practice, to facilitate routing, address allocations do roughly follow geography, which means that such a database might not be too unwieldy if it were assembled.) An IP address does not even uniquely identify a recipient computer, since dial-up connections through an Internet service provider typically are assigned a different address each time they dial.
-
-
-
-
31
-
-
84923762006
-
-
note
-
Though the use of the word has become quite general, we attempt in this essay to follow Schauer's definition of "chill," which refers "only to those examples of deterrence which result from the indirect governmental restriction of protected expression." Schauer, supra note 22, at 693.
-
-
-
-
32
-
-
84923762005
-
-
See Hamling v. United States, 418 U.S. 87, 104-06 (1974)
-
See Hamling v. United States, 418 U.S. 87, 104-06 (1974).
-
-
-
-
33
-
-
84923762004
-
-
Reno v. ACLU, 521 U.S. at 876
-
Reno v. ACLU, 521 U.S. at 876.
-
-
-
-
34
-
-
84923762003
-
-
See e.g., Upper Midwest Booksellers Ass'n v. City of Minneapolis, 780 F.2d 1389, 1394 (8th Cir. 1986); see also M.S. News Co. v. Casado, 721 F.2d 1281, 1287-91, 1295 (10th Cir. 1983) (upholding a requirement that obscene-as-to-minors magazines be placed in "blinder racks"). Under Ginsberg, "minors may constitutionally be denied access to material that is obscene as to minors," but adults may not. Reno v. ACLU, 521 U.S. at 895 (O'Connor, J., concurring in the judgment in part and dissenting in part) (citing Ginsberg v. New York, 390 U.S. 629, 633 (1968)). Material is obscene as to minors if it is patently offensive, appeals to minors' prurient interest, and completely lacks socially redeeming value for minors. See id.
-
See e.g., Upper Midwest Booksellers Ass'n v. City of Minneapolis, 780 F.2d 1389, 1394 (8th Cir. 1986); see also M.S. News Co. v. Casado, 721 F.2d 1281, 1287-91, 1295 (10th Cir. 1983) (upholding a requirement that obscene-as-to-minors magazines be placed in "blinder racks"). Under Ginsberg, "minors may constitutionally be denied access to material that is obscene as to minors," but adults may not. Reno v. ACLU, 521 U.S. at 895 (O'Connor, J., concurring in the judgment in part and dissenting in part) (citing Ginsberg v. New York, 390 U.S. 629, 633 (1968)). Material is obscene as to minors if it is patently offensive, appeals to minors' prurient interest, and completely lacks socially redeeming value for minors. See id.
-
-
-
-
36
-
-
84923762002
-
-
See id. at 58-62
-
See id. at 58-62.
-
-
-
-
37
-
-
0347148927
-
-
visited Sept. 16
-
See VeriSign Digital ID Center (visited Sept. 16, 1999) 〈http://www.verisign.com/ client/index.html〉.
-
(1999)
VeriSign Digital ID Center
-
-
-
39
-
-
84923762001
-
-
note
-
Note that even though the technology for this solution is already in place, we refer to it as a possible architectural change because a widespread change in social practices would be necessary for the technology to be used in this way.
-
-
-
-
40
-
-
84923761999
-
-
note
-
One version of this regime would have recipients provide child-IDs, which we discuss below when considering COPA. See infra Section II.D.
-
-
-
-
41
-
-
84923761997
-
-
note
-
Another possibility would be for the server to send a request of the form "if you are in jurisdiction X or Y and you are under 18, please provide a child ID," which would further reduce the burden of the system.
-
-
-
-
42
-
-
0347148909
-
-
app. 5 visited Sept. 16
-
Currently, the InterNIC maintains a database of the assignations of IP addresses to organizations. This database is public, and a copy of it may be queried from any computer on the Internet. Unfortunately, some entries in the database are incomplete or out of date, and they do not necessarily identify the location of computers using the IP addresses. It has been suggested, however, that such a database be used as a starting point for developing an IP to jurisdiction mapping. See Philip McCrea et al., Blocking Content on the Internet: A Technical Perspective, app. 5 (visited Sept. 16, 1999) 〈http://www.noie.gov.au/〉.
-
(1999)
Blocking Content on the Internet: A Technical Perspective
-
-
McCrea, P.1
-
43
-
-
84923761988
-
-
See, e.g., Paris Adult Theater I v. Slaton, 413 U.S. 49, 55 (1972)
-
See, e.g., Paris Adult Theater I v. Slaton, 413 U.S. 49, 55 (1972).
-
-
-
-
44
-
-
84923761987
-
-
note
-
See Schauer, supra note 22, at 725-29. The closest case is perhaps Bantam Books v. Sullivan, 372 U.S. 58 (1963), where the Court invalidated a "blacklist" Commission. The preclearance idea is not quite a blacklist - the result of the submission would be a promise not to prosecute, not a determination that the material was "obscene." Again, however, we concede that the line is a difficult one to sustain.
-
-
-
-
45
-
-
84923761986
-
-
See supra Section I.B
-
See supra Section I.B.
-
-
-
-
46
-
-
84923761985
-
-
note
-
It would be different, of course, if the sender were considered as a bookstore, without knowledge, or any simple way to get knowledge, about the content of its books. See Cubby, Inc. v. Compuserve, Inc., 776 F. Supp. 135, 139-40 (S.D.N.Y. 1991). We would consider such a "sender" to be an intermediary in our analysis.
-
-
-
-
47
-
-
84923761984
-
-
note
-
This depends upon the level of knowledge required for someone to be guilty under such a provision. If the statute were criminal, the knowledge requirement would be quite strong, so inadvertent liability would not be possible. But for a lesser prohibition, the knowledge requirement may be less.
-
-
-
-
48
-
-
84923761983
-
-
See supra Section II.A.1
-
See supra Section II.A.1.
-
-
-
-
49
-
-
84923761982
-
-
See id.
-
See id.
-
-
-
-
50
-
-
0346573368
-
-
last modified Aug. 4
-
The labels could be expressed in PICS format, see generally Platform for Internet Content Selection (last modified Aug. 4, 1999) 〈http://www.w3.org/PICS/〉, or the new RDF format, see generally Resource Description Framework (last modified Aug. 9, 1999) 〈http://www.w3.org/RDF〉, and distributed along with the items.
-
(1999)
Platform for Internet Content Selection
-
-
-
51
-
-
0012923277
-
-
last modified Aug. 9, distributed along with the items
-
The labels could be expressed in PICS format, see generally Platform for Internet Content Selection (last modified Aug. 4, 1999) 〈http://www.w3.org/PICS/〉, or the new RDF format, see generally Resource Description Framework (last modified Aug. 9, 1999) 〈http://www.w3.org/RDF〉, and distributed along with the items.
-
(1999)
Resource Description Framework
-
-
-
52
-
-
84923761981
-
-
note
-
If many people voluntarily adopted a "prohibited unless permitted" filter, then the market demand for labels might sufficiently encourage sender self-labeling, even if the state mandated only the less strict "permitted unless prohibited" regime. For example, consumers might turn on the facilities in Microsoft's Internet Explorer (version 3 and higher) or Netscape Navigator (version 4.5) to voluntarily block access based on senders' PICS-formatted self-labels.
-
-
-
-
53
-
-
0003638780
-
-
2d ed. and the cases cited therein
-
The "compelled speech" doctrine forbids the government from forcing individuals to assert the views of the government. See LAURENCE H. TRIBE, AMERICAN CONSTITUTIONAL LAW 804-06 (2d ed. 1988) and the cases cited therein.
-
(1988)
American Constitutional Law
, pp. 804-806
-
-
Tribe, L.H.1
-
55
-
-
84923761979
-
-
note
-
The government's own ratings are not always determinative of whether speech was delivered or not, absent a judicial finding. See Rowan v. United States Post Office Dep't 397 U.S. 728, 738-39 (1970). To force individuals to label their content would, we believe, often require them to make judgments about the character of the material they were labeling. But the labels in this context are not objective, nor independent of a viewpoint about the nature of the material. To have to assert the character of the material, then, can be to require individuals to make what is in essence a political statement. If a newspaper cannot be forced to publish a story it does not otherwise want to print, see Miami Herald Publishing Co. v. Tornillo, 418 U.S. 241 (1974), then neither should a web site be forced to publish a story about itself (i.e., that it carries materials of type X) that it does not otherwise want to print.
-
-
-
-
56
-
-
84923761977
-
-
note
-
A URL identifies both a computer to connect to and a path or file name to request. Thus, URL blocking enables some files from a Web server to be blocked, while others are not blocked.
-
-
-
-
57
-
-
84923761968
-
-
note
-
For a more complete description of application layer and network layer blocking, see McCrea et al., supra note 41, at 25-31.
-
-
-
-
58
-
-
84923761967
-
-
note
-
It would be possible, though expensive, to make an international phone call to access an IAP in another jurisdiction.
-
-
-
-
59
-
-
84923761966
-
-
note
-
McCrea et al. detail these and other ways that senders and recipients might bypass intermediaries' blocks. See McCrea et al., supra note 41, at 35, 37.
-
-
-
-
61
-
-
0347148917
-
-
visited Sept. 9
-
ICQ ("I Seek You") maintains a worldwide registry of users and their status (online, busy, away, etc.), allowing users an easy way to keep track of friends and acquaintances. The ICQ client software interacts with the registry updating a user's information and receiving information about others on that user's "contact list." The ICQ client also acts as a platform for chat and other message exchange between any two registered ICQ users. See How to Use ICQ (visited Sept. 9, 1999) 〈http://www.icq.com/icqtour/〉; What Is ICQ? (visited Sept. 9, 1999) 〈http://www.icq.com/products/whatisicq.html〉.
-
(1999)
How to use ICQ
-
-
-
62
-
-
0345887721
-
-
visited Sept. 9
-
ICQ ("I Seek You") maintains a worldwide registry of users and their status (online, busy, away, etc.), allowing users an easy way to keep track of friends and acquaintances. The ICQ client software interacts with the registry updating a user's information and receiving information about others on that user's "contact list." The ICQ client also acts as a platform for chat and other message exchange between any two registered ICQ users. See How to Use ICQ (visited Sept. 9, 1999) 〈http://www.icq.com/icqtour/〉; What Is ICQ? (visited Sept. 9, 1999) 〈http://www.icq.com/products/whatisicq.html〉.
-
(1999)
What Is ICQ?
-
-
-
63
-
-
84923761965
-
-
See McCrea et al., supra note 41, at 31
-
See McCrea et al., supra note 41, at 31.
-
-
-
-
64
-
-
84923761964
-
-
note
-
They are a special case as well in that, relative to other mandated access control, the content here is easier to identify. The model becomes far more complex if content such as "defamatory" or "seditious" speech were considered. Likewise, the problem becomes far more difficult if the recipient always has an incentive to evade the regulation. Regulating "kids" is a special case because, at least sometimes, the parent has an interest in enforcing the regulation.
-
-
-
-
65
-
-
84923761963
-
-
note
-
The Court in Reno v. ACLU made it clear that the relevant question is whether parents are enabled in protecting kids, not whether the state is. 521 U.S. 844, 865 & n.31 (1997). If a parent decides to give kids access, that decision cannot, for the range of speech being discussed here, be overridden by the state.
-
-
-
-
66
-
-
84923761962
-
-
note
-
Manufacturers of browsers and operating systems would presumably make it difficult to modify the kids-mode configuration without a password. In practice, this would require both that the kids-mode browser configuration not be easily changed, and that the operating system prevent installation of a fresh browser where the child could choose whether to set it in kids-mode. Eventually, we might expect that the kids-mode setting would migrate entirely into the operating system, with all browsers' behavior determined by the operating system setting.
-
-
-
-
67
-
-
0347148910
-
-
visited Oct. 6
-
"Cookies are a general mechanism which server side [sic] connections (such as CGI scripts) can use to both store and retrieve information on the client side of the connection. The addition of a simple, persistent, client-side state significantly extends the capabilities of Web-based client/server applications." Persistent Client State HTTP Cookie, Introduction (visited Oct. 6, 1999) 〈http://home.netscape.com/newsref/std/cookie_spec.html〉. See generally Cookie Central (visited Oct. 6, 1999) 〈http://www.cookiecentral.com〉.
-
(1999)
Persistent Client State HTTP Cookie, Introduction
-
-
-
68
-
-
0346518537
-
-
visited Oct. 6
-
"Cookies are a general mechanism which server side [sic] connections (such as CGI scripts) can use to both store and retrieve information on the client side of the connection. The addition of a simple, persistent, client-side state significantly extends the capabilities of Web-based client/server applications." Persistent Client State HTTP Cookie, Introduction (visited Oct. 6, 1999) 〈http://home.netscape.com/newsref/std/cookie_spec.html〉. See generally Cookie Central (visited Oct. 6, 1999) 〈http://www.cookiecentral.com〉.
-
(1999)
Cookie Central
-
-
-
69
-
-
84923761961
-
-
note
-
Ginsberg implies that suppliers can be burdened to separate "harmful to minor" speech from other speech. Ginsberg v. New York, 390 U.S. 629, 643-45 (1968).
-
-
-
-
70
-
-
84923761959
-
-
note
-
This analysis follows the test created by the Supreme Court regarding the constitutionality of speech-restrictive regulations involving the protection of children. See infra note 80 and accompanying text.
-
-
-
-
71
-
-
0346573375
-
-
U.S.C.A. § 231(a)(1) Supp.
-
Child Online Protection Act, 47 U.S.C.A. § 231(a)(1) (Supp. 1999).
-
(1999)
Child Online Protection Act
, vol.47
-
-
-
72
-
-
84923761957
-
-
47 U.S.C.A. § 231(c)(1)
-
47 U.S.C.A. § 231(c)(1).
-
-
-
-
73
-
-
84923761948
-
-
See 47 U.S.C.A § 231(c)(2)
-
See 47 U.S.C.A § 231(c)(2).
-
-
-
-
74
-
-
84923761947
-
-
See supra Section I.A
-
See supra Section I.A.
-
-
-
-
75
-
-
84923761946
-
-
47 U.S.C.A § 231(c)(1)
-
47 U.S.C.A § 231(c)(1).
-
-
-
-
76
-
-
84923761945
-
-
47 U.S.C.A § 223(e)(5)(A)
-
47 U.S.C.A § 223(e)(5)(A).
-
-
-
-
77
-
-
84923761944
-
-
See Reno v. ACLU, 521 U.S. 844, 881-82 (1997)
-
See Reno v. ACLU, 521 U.S. 844, 881-82 (1997).
-
-
-
-
78
-
-
84923761943
-
-
See 144 CONG. REC. 139, H9902-11 (1998)
-
See 144 CONG. REC. 139, H9902-11 (1998).
-
-
-
-
79
-
-
84923761942
-
-
See Reno v. ACLU, 521 U.S. at 887-88 (O'Connor, J., concurring in the judgment in part and dissenting in part)
-
See Reno v. ACLU, 521 U.S. at 887-88 (O'Connor, J., concurring in the judgment in part and dissenting in part).
-
-
-
-
80
-
-
84923761941
-
-
See, e.g., ACLU v. Reno, 31 F. Supp. 2d 473 (E.D. Pa. 1999) (preliminarily enjoining COPA)
-
See, e.g., ACLU v. Reno, 31 F. Supp. 2d 473 (E.D. Pa. 1999) (preliminarily enjoining COPA).
-
-
-
-
81
-
-
84923761939
-
-
The "burdensome" test is structurally similar to the test in abortion cases. See Planned Parenthood v. Casey, 505 U.S. 833 (1992)
-
The "burdensome" test is structurally similar to the test in abortion cases. See Planned Parenthood v. Casey, 505 U.S. 833 (1992).
-
-
-
-
82
-
-
84923761937
-
-
See Casey, 505 U.S. at 833
-
See Casey, 505 U.S. at 833.
-
-
-
-
83
-
-
84923761928
-
-
See Pike v. Bruce Church, Inc., 397 U.S. 137 (1970)
-
See Pike v. Bruce Church, Inc., 397 U.S. 137 (1970).
-
-
-
-
84
-
-
84923761927
-
-
See Sable Communications, Inc. v. FCC, 492 U.S. 115 (1989) (plurality permitting regulation of "dial-a-porn" to protect kids); Ginsberg v. New York, 390 U.S. 629 (1968) (upholding New York statute that required keeping of material harmful to minors from minors)
-
See Sable Communications, Inc. v. FCC, 492 U.S. 115 (1989) (plurality permitting regulation of "dial-a-porn" to protect kids); Ginsberg v. New York, 390 U.S. 629 (1968) (upholding New York statute that required keeping of material harmful to minors from minors).
-
-
-
-
85
-
-
0347833610
-
-
U.S.C.A. § 231(c)(1)(C) Supp.
-
Child Online Protection Act, 47 U.S.C.A. § 231(c)(1)(C) (Supp. 1999).
-
(1999)
Child Online Protection Act
, vol.47
-
-
-
86
-
-
84923761926
-
-
See supra note 81 and accompanying text
-
See supra note 81 and accompanying text.
-
-
-
-
87
-
-
84923761925
-
-
See ACLU v. Reno, 31 F. Supp. 2d 473, 492 (E.D. Pa. 1999)
-
See ACLU v. Reno, 31 F. Supp. 2d 473, 492 (E.D. Pa. 1999).
-
-
-
-
88
-
-
84923761924
-
-
note
-
Reno v. ACLU indicates quite clearly, we believe, that the state's interest is limited to facilitating the choice by parents. See supra note 62. The government in Reno had argued that the state had an interest, beyond the interest of parents, to protect kids from speech "harmful to minors" even if the parents did not so wish. See Transcript of Oral Argument, Reno v. ACLU, 521 U.S. 844 (1997), available in 1997 WL 136253, at *19-24 (Mar. 19, 1997). But the Court did not embrace this broader restriction. See Reno v. ACLU, 521 U.S. at 865 & n.31.
-
-
-
-
90
-
-
84923718432
-
-
Pub. L. No. 105-277, Stat. to be codified at 15 U.S.C. §§ 6501-6506
-
Children's Online Privacy Protection Act of 1998, Pub. L. No. 105-277, 112 Stat. 2681-728 (to be codified at 15 U.S.C. §§ 6501-6506).
-
Children's Online Privacy Protection Act of 1998
, vol.112
, pp. 2681-2728
-
-
-
91
-
-
84923761923
-
-
Reno v. ACLU, 521 U.S. 844, 874 (1997)
-
Reno v. ACLU, 521 U.S. 844, 874 (1997).
-
-
-
-
92
-
-
84923761922
-
-
note
-
One possible way to evade the limitation would be for a kid to download another browser and set it up to be free of the kids-ID restriction. But this possibility could be addressed. Again, the browser manufacturers could easily segregate download locations, based on whether the browser making the request were kids-ID enabled. If it were kids-ID enabled, then the company would download a kids-ID set browser only. Alternatively, the kids-ID could be enabled in the operating system ("OS"), making substitution of an adult OS for a kids OS significantly more difficult.
-
-
-
-
93
-
-
84923761921
-
-
See infra Part III
-
See infra Part III.
-
-
-
-
94
-
-
0042980672
-
-
§ 402(2) & cmt. e.
-
See RESTATEMENT (THIRD) OF FOREIGN RELATIONS § 402(2) & cmt. e.(1987) For example, the Child Sexual Abuse Prevention Act, 18 U.S.C. § 2423(b) (Supp. I 1995), criminalizes traveling abroad to engage in illegal sexual acts with children. For an interesting discussion of this provision, see Margaret A. Healy, Prosecuting Child Sex Tourists at Home: Do Laws in Sweden, Australia, and the United States Safeguard the Rights of Children as Mandated by International Law?, 18 FORDHAM INT'L L.J. 1852, 1902-12 (1995).
-
(1987)
Restatement (Third) of Foreign Relations
-
-
-
95
-
-
0345942213
-
-
U.S.C. § 2423(b) Supp. I
-
See RESTATEMENT (THIRD) OF FOREIGN RELATIONS § 402(2) & cmt. e.(1987) For example, the Child Sexual Abuse Prevention Act, 18 U.S.C. § 2423(b) (Supp. I 1995), criminalizes traveling abroad to engage in illegal sexual acts with children. For an interesting discussion of this provision, see Margaret A. Healy, Prosecuting Child Sex Tourists at Home: Do Laws in Sweden, Australia, and the United States Safeguard the Rights of Children as Mandated by International Law?, 18 FORDHAM INT'L L.J. 1852, 1902-12 (1995).
-
(1995)
Child Sexual Abuse Prevention Act
, vol.18
-
-
-
96
-
-
0346518544
-
-
FORDHAM INT'L L.J.
-
See RESTATEMENT (THIRD) OF FOREIGN RELATIONS § 402(2) & cmt. e.(1987) For example, the Child Sexual Abuse Prevention Act, 18 U.S.C. § 2423(b) (Supp. I 1995), criminalizes traveling abroad to engage in illegal sexual acts with children. For an interesting discussion of this provision, see Margaret A. Healy, Prosecuting Child Sex Tourists at Home: Do Laws in Sweden, Australia, and the United States Safeguard the Rights of Children as Mandated by International Law?, 18 FORDHAM INT'L L.J. 1852, 1902-12 (1995).
-
(1995)
Prosecuting Child Sex Tourists at Home: Do Laws in Sweden, Australia, and the United States Safeguard the Rights of Children as Mandated by International Law?
, vol.18
, pp. 1852
-
-
Healy, M.A.1
-
97
-
-
84923761919
-
-
note
-
Obviously, the most significant concern here would be jurisdictions outside of the United States or outside of places where a strong free speech right exists. The norms that the United States sets for the Net, however, would certainly spill over into those places and our view is that this spillover ought to be reckoned in any regulatory regime.
-
-
-
-
98
-
-
84923761917
-
-
note
-
In fact, voluntary access controls were the main motivation for the creation of PICS.
-
-
-
-
99
-
-
0347779031
-
-
HASTINGS Comm. & Ent. L.J.
-
For a demonstration of Alta Vista's "Family Filter," using ratings from SurfWatch, click on the Family Filter link at 〈http://www.altavista.com/〉 (visited Sept. 17, 1999). For a discussion of the implications, see Jonathan Weinberg, Rating the Net, 19 HASTINGS Comm. & Ent. L.J. 453 (1997).
-
(1997)
Rating the Net
, vol.19
, pp. 453
-
-
Weinberg, J.1
-
100
-
-
0347779030
-
Safety Online: Will It Impede Free Speech?
-
Dec. 5
-
See Rikki McGinty, Safety Online: Will It Impede Free Speech?, MEDIA DAILY, Dec. 5, 1997.
-
(1997)
Media Daily
-
-
McGinty, R.1
-
101
-
-
84923759429
-
-
Cf. Weinberg, supra note 93, at n.108
-
Cf. Weinberg, supra note 93, at n.108.
-
-
-
-
105
-
-
0011917733
-
Filtering Information on the Internet
-
March
-
See Paul Resnick, Filtering Information on the Internet, SCI. AM., March 1997, at 62; PICS, Censorship, & Intellectual Freedom FAQ (Paul Resnick, ed.) (last modified Aug. 4, 1999) 〈http://www.w3.org/PICS/PICS-FAQ-980126.html〉.
-
(1997)
Sci. Am.
, pp. 62
-
-
Resnick, P.1
-
106
-
-
0347832783
-
-
last modified Aug. 4
-
See Paul Resnick, Filtering Information on the Internet, SCI. AM., March 1997, at 62; PICS, Censorship, & Intellectual Freedom FAQ (Paul Resnick, ed.) (last modified Aug. 4, 1999) 〈http://www.w3.org/PICS/PICS-FAQ-980126.html〉.
-
(1999)
PICS, Censorship, & Intellectual Freedom FAQ
-
-
Resnick, P.1
-
109
-
-
84923759428
-
-
note
-
In email transmission protocols such as SMTP, there is no preliminary end-to-end session set up that would enable the recipient to send a certificate indicating its jurisdiction or type. Email transmission is effectively a one-way communication.
-
-
-
-
111
-
-
84923758131
-
-
S. 771, 105th Cong.
-
Without sender tagging, automated filtering is still possible, but will never be completely accurate at separating spam from non-spam messages. This is the essence of Senator Frank Murkowski's Unsolicited Commercial Electronic Mail Choice Act of 1997, S. 771, 105th Cong.
-
Unsolicited Commercial Electronic Mail Choice Act of 1997
-
-
Murkowski, F.1
-
112
-
-
84923759427
-
-
See SCHWARTZ & GARFINKEL, supra note 101, at 85-93
-
See SCHWARTZ & GARFINKEL, supra note 101, at 85-93.
-
-
-
-
113
-
-
0027005999
-
Achieving Electronic Privacy
-
Aug.
-
Ecash is simply a digital object that could be attached, as a file is, to an email message. For a discussion of ecash, see David Chaum, Achieving Electronic Privacy, SCI. AM., Aug. 1992, at 96, 96-97.
-
(1992)
Sci. Am.
, pp. 96
-
-
Chaum, D.1
|