Internet Points of Control
Preprint
- 1 January 2003
- preprint
- Published by Elsevier in SSRN Electronic Journal
Abstract
The online availability of pornography and unauthorized intellectual property has driven Internet growth while giving rise to efforts to make the Net more regulable. Early efforts to control the Internet have targeted the endpoints of the network - the sources and recipients of objectionable material - and to some extent the intermediaries who host others' content. Recently attention has shifted to intermediaries near would-be recipients of content. The U.S. Commonwealth of Pennsylvania permits its attorney general to obtain a court order requiring Internet service providers to block Pennsylvanians' access to Internet locations designated as containing illegal pornography. If successful, this approach could be employed for other regulatory purposes, such as controlling the online distribution of copyright-infringing materials. While the Pennsylvania law suffers from a number of technical limitations and Constitutional vulnerabilities, with some adjustments to Internet architecture and data carriage practices this approach could become a comprehensive scheme for widespread content control that overcomes a number of enforcement barriers and jurisdiction-related objections.Keywords
This publication has 7 references indexed in Scilit:
- Ashcroft v. American Civil Liberties Union (2002)Published by Taylor & Francis ,2015
- USA: Open Source Copyright Infringement – XimpleWare Corp. v. Versata Software, Inc., Ameriprise Financial, Inc. et al.Computer Law Review International, 2015
- Treatment Modalities for Psychodermatological DiseasesTURKDERM, 2010
- Sheep ID: double tagging derogation endsVeterinary Record, 2007
- United States v. John Larkin Thompson, 234 F.3d 74 (1st Cir. 2000)Federal Sentencing Reporter, 2001
- United States v. Deneen Sweeting, 213 F.3d 95 (3d Cir. 2000)Federal Sentencing Reporter, 2001
- Development of transonic area-rule methodologyJournal of Aircraft, 1995