Content moderation is typically viewed as an affront to free expression. When companies remove online abuse, they face accusations of censorship. Lost in the discussion is the fact that victims of intimate privacy violations and cyberstalking typically-and regrettably-withdraw from on-and offline activities. Online assaults chase targeted individuals offline; they silence victims. Content moderation can secure opportunities for people to speak. Legal and corporate prohibitions against intimate privacy violations and cyberstalking can help provide the reassurance that victims need to stay online. They can endow individuals with a sense of trust so they continue to use networked technologies to express themselves. Those prohibitions are consonant with First Amendment doctrine and free speech values. Combating online abuse isn't a zero-sum game with free speech as the loser. Rather, it can free us to speak by changing the culture that rewards abuse and encourages self-censorship.
Where do future disabilities fit within the law? Disability civil rights laws expressly extend rights to individuals with present or past...
The chapter provides an introduction to issues involving single people and the law. Accordingly, it explores legal approaches to singlehood and non...
For the over half-million people currently homeless in the United States, the U.S. Constitution has historically provided little help: it is strongly...
The Supreme Court’s evisceration of the federal constitutional right to abortion has raised the specter of criminal and civil liability for abortion...
Musk’s attempts to gain access to agency databases is an egregious violation of the act, which protects personal information from abuse.
Under the...
Between November and December 2024, news articles reported widespread incidents of small- and medium-sized drones flying across northeastern U.S...
National security decisions pose a paradox: they are among the most consequential a government can make, but are generally the least transparent to...
In the last five years, 27 states have passed bans prohibiting transgender minors from receiving gender-affirming care. These treatments include...
Children should be seen and not heard, or so the old saying goes. A new version of this adage is now playing out across the United States, as more...
A resilience agenda is an essential part of protecting national security in a digital age. Digital technologies impact nearly all aspects of everyday...
In the last few years, the Supreme Court has upended its doctrine of religious freedom under the First Amendment. The Court has explicitly rejected...
During times of crisis, governments often consider policies that may promote safety, but that would require overstepping constitutionally protected...
Today, intimate privacy—which seeks to protect access to and information about our body, health, sexuality, gender, intimate thoughts, desires...
This essay considers the future of public-private collaboration in the wake of the Murthy v. Missouri litigation, which cast doubt on the...
Congress and state legislatures are showing renewed interest in youth privacy, proposing myriad new laws to address data extraction, addiction...
Large Language Models (LLMs) have the potential to transform public international lawyering. ChatGPT and similar LLMs can do so in at least five ways...
Suddenly, the term “civil war” is everywhere, from state and federal immigration battles to abortion access to environmental regulation to election...
Content moderation is typically viewed as an affront to free expression. When companies remove online abuse, they face accusations of censorship. Lost...