Section 230 is finally getting the clear-eyed attention that it deserves. No longer is it naive to suggest that we revisit the law that immunizes online platforms from liability for illegality that they enable. Today, the harm wrought by the current approach is undeniable. Time and practice have made clear that tech companies don't have enough incentive to remove harmful content, especially if it generates likes, clicks, and shares. They earn a fortune in advertising fees from illegality like nonconsensual pornography with little risk to their reputations. Victims can't sue the entities that have enabled and profited from their suffering. The question is how to fix Section 230. The legal shield enjoyed by online platforms needs preconditions. This essay proposes a reasonable steps approach borne out of more than 12 years working with tech companies on content moderation policies and victims of intimate privacy violations. In this essay, I lay out concrete suggestions for a reasonable steps approach, one that has synergies with international efforts.
This Essay expounds on the outsized role of private law in governing ownership of new technologies and data. As scholars lament gaps between law and...
Large language models (LLMs) now perform extremely well on many natural language processing tasks. Their ability to convert legal texts to data may...
Privacy is a key issue in AI regulation, especially in a sensitive area such as healthcare. The United States (US) has taken a sectoral approach to...
The 2024 edition of Selected Intellectual Property, Internet, and Information Law, Statutes, Regulations, and Treaties, edited by Professors Sharon K...
Fifty years ago, federal and state lawmakers called for the regulation of a criminal justice “databank” connecting federal, state, and local agencies...
The use of autonomy to initiate force, which states may begin to view as necessary to protect against hypersonic attacks and other forms of ‘hyperwar...
On Thursday afternoon, in an important lawsuit seeking to clarify which religious objectors will be taken seriously when they seek legal exemptions, a...
This chapter provides an overview of computational text analysis techniques used to study judicial behavior and decision-making. As legal texts become...
A crucial first step in addressing intimate-image abuse is its proper conceptualization. Intimate-image abuse amounts to a violation of intimate...
Liberalism is back on its heels, pushed there by political movements in the United States and Europe and by the critiques of legal scholars and...
We live in a golden age of student surveillance. Some surveillance is old school: video cameras, school resource officers, and tip lines. Old-school...
A resilience agenda is an essential part of protecting national security in a digital age. Digital technologies impact nearly all aspects of everyday...
Cyber stalking involves repeated, often relentless targeting of someone with abuse. Death and rape threats may be part of a perpetrator’s playbook...
In the last few years, the Supreme Court has upended its doctrine of religious freedom under the First Amendment. The Court has explicitly rejected...
Generative AI is already beginning to alter legal practice. If optimistic forecasts prove warranted, how might this technology transform judicial...
Working hand-in-hand with the private sector, largely in a regulatory vacuum, policing agencies at the federal, state, and local level are acquiring...
In New York Times v. Sullivan (1964), the Supreme Court began adopting First Amendment restrictions on liability for defamation and other speech torts...
This article argues that the fact that an action will compound a prior injustice counts as a reason against doing the action. I call this reason The...