Law 2010 Midterm Exam Prep

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/104

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

105 Terms

1
New cards

Kennison V. Daire (1986)

Australian Supreme Court
Dispute: Larceny vs. Fraud in the case of a banking transaction via machine. Male did not have active account, just an outdated accounted. Went and retrieved 250$ from ATM.
Ruling: Larceny was charged because machine cannot consent like a human, therefore it is THEFT

2
New cards

State V. Decker (2018)

Decker (34M) sent indecent photo of MJ (14F) via FB messenger. Decker convicted of criminal sexual conduct and indecent exposure to a minor. Online together=simultaneous internal perspective

3
New cards

Barlow-Declaration of Independence

Basically says that the internet should not be governed in the same way actual space is, and does not lie inside of borders. Wanted to create own social contract. Believed that ethics, enlightened self-interest and commonweal will create a government.

4
New cards

Kerr-Internal/External Perspective

Addresses the problem of perspective in internet law. External=hardwires and actual servers
Internal= user experience
The court needs to decide if it will treat the virtual world as real. Says the internet is a physical network, and can create a virtual world for its users that appear sufficiently realistic to make plausible claim for equal footing in court with real world. (Amazon example)

5
New cards

Johnson and Post: Law and Borders

Tries to define the geographic borders of cyberspace.
Power: control over physical space, defining statehood
Effects: correspondence between physical boundaries and "law space" reflect deep rooted relationship with physical proximity
Legitimacy: Acceptance of the notion that person within a border are the ultimate source of law making within that border
Notice: physical boundaries are appropriate for law space in physical world because they can give notice that the rules change when boundaries are crossed.
Cyberspace has no territory borders, and is regarded as a mere transmission medium.
Treating cyberspace as a separate space which distinct laws apply should come naturally. Not a homogenous place, has unique characteristics.

6
New cards

Franks- Unwilling Avatars

Cyberspace allows people to control who they want to be and where they want to go.
appeals to individuals who feel like their life experiences are restricted by physical identity.
Catfishing, people using photos and identity of others to dox (addresses, emails, phone numbers) or become someone new to lewd interest.
First Amendment rights are argued here, but new levels of targeting are victimizing women's identity who is used.
If individuals abuse their liberty by exercising power in self interested ways, community will go into war.
1. Anonymity: increased opportunity for harassers to attack target, making it hard for legal help
2. Amplification: capacity for harassers to quickly find a wide audience for harassment
3. Permanence: very difficult to erase from the web
4. Virtual Captivity/Publicity: options to avoid or exit situations in which harassment occurs are extremely limited.

7
New cards

Yahoo Nazi Case

Wu and Goldsmith
French antiracism organization sued Yahoo for hosting Nazi auction that were accessible in France and violated French laws against the trafficking of Nazi goods.
Internet is increasingly separated by walls of law, language, filters. yahoo says they can't tell where their users are, wrong because of IP addresses and tracing packets. Best option is cross-referencing and analyzation will result in 99% accuracy in location. 2000

8
New cards

federal and state court systems

Federal is created and instated by the constitution, state is created by state government.

9
New cards

South Dakota v. Wayfair (2018)

states may charge sales tax on online purchases made from out-of-state sellers even if the seller does not have a physical presence in the state

10
New cards

Packinham V North Carolina (Free Speech vs. Protecting Against Potential Predators)

2017, NC makes sex offenders not able to use social media.
Social media=
1. operated by someone who gets money from membership fees, ads
2. facilitates social interaction between 2+ people
3. allows users to create personal page, nickname, and photos and mechanisms to communicate
Includes 2 express exemptions: 1. does not extend to webs that only provide photo sharing, electronic mail. IM, or chat room.
2. primary purpose is to facilitate commercial transactions.

11
New cards

Campbell v. Reisch (Free Speech Rights on Twitter)

Woman running for office blocked man for disagreeing with her opinions and commenting. Blocking on twitter meant no ability to make conversation or respond directly.

12
New cards

Texas V Johnson (What Counts as speech)

1989, deciding if Flag burning was protected under free speech/expression. HIs actions were full of communication, implicating the First Amendment

13
New cards

BLAND V. ROBERTS (liking on FB as speech)

2012, Hampton sheriff office stated for reelection of Roberts, while defendant liked the page and therefore his icon showed up on liked pages. controversial figure, so the user is associated with them and potentially harming reputation.

14
New cards

Olmstead (1928)

Olmstead's appeal made it to the Supreme Court on the grounds that wiretapping act was a violation of his fourth amendment rights to be free from unreasonable search and seizure. Supreme Court decided wiretapping warrantless was permissible

15
New cards

Katz (1967)

Copyright case in which Katz does not want pic of him with his tongue out to be seen in Photo copy. Chevaldina copied pic into several defaming blog posts. Three factors in fair use:
1. purpose and character of work
2. nature of work
3. effect on use.
tilted towards fair use.

16
New cards

Kyllo (2001)

Suspicious that marijuana was being grown in petitioner Kyllo's home in a triplex, agents used a thermal-imaging device to scan the triplex to determine if the amount of heat emanating from it was consistent with the high-intensity lamps typically used for indoor marijuana growth. Opinion of the CourtBy a 5-4 margin, the court held that a search warrant must be obtained before the government, including the police and federal agents, may use a thermal imaging device to monitor the heat and radiation of one's home.

17
New cards

Jones (2012)

In this case, the Government installed a Global Positioning System (GPS) tracking device on respondent Antoine Jones' Jeep without a valid warrant and without Jones' consent, then used that device to monitor the Jeep's movements over the course of four weeks. Court decided unanimously that this was a search under the 4 amendment

18
New cards

Riley V California

Court unanimously held that the warrantless search and seizure of digital contents of a cell phone during an arrest is unconstitutional.

19
New cards

Carpenter v. United States

Cell-site location may not be used in court without a warrant.

20
New cards

Rights of Anonymity

Supreme Court repeatedly affirmed that rights of anonymity lies in the First Amendment right. Right to remain anonymous or to be able to act/communciate anonymously

21
New cards

Rights of Privacy under the Second Restatements of Torts

Restatement of the Law, Second, Torts, § 652. One who intentionally intrudes, physically or otherwise, upon the solitude or seclusion of another or his private affairs or concerns, is subject to liability to the other for invasion of his privacy, if the intrusion would be highly offensive to a reasonable person.

22
New cards

Meyerkord v Zipatoni

Missouri Court of Appeals vacated and remanded the trial court's dismissal of a plaintiff's claim alleging that the defendant company, Zipatoni, had cast the plaintiff in a false light by failing to remove the plaintiff as the registrant of a certain website.

23
New cards

IP Address (Internet Protocol Address)

A unique number identifying every computer on the Internet (like 197.123.22.240)

24
New cards

Trap and Trace Device

Surveillance device that displays the caller's phone number.

25
New cards

Internal/External Perspective

External: hardware
Internal: software

26
New cards

US Const Art III: Jurisdiction

establishes the legal ability to hear a case. vested in the Supreme Court

27
New cards

US Const. Supremacy Clause

Article VI, Paragraph 2 of the U.S. Constitution is commonly referred to as the Supremacy Clause. It establishes that the federal constitution, and federal law generally, take precedence over state laws, and even state constitutions.

28
New cards

Personal Jurisdiction

the power of a court to force a person to appear before it

29
New cards

Subject Matter Jurisdiction

the power of a court to hear a particular type of case

30
New cards

General Jurisdiction

Authority of a court to hear a wide range of cases

31
New cards

Transient Jurisdiction

Jurisdiction over a nonresident defendant based on service of process on the defendant while present in the forum State. jurisdiction over persons temporarily present in the forum

32
New cards

Attachment Jurisdiction

jurisdiction over a defendant's property to obtain payment of a claim not related to the property

33
New cards

Jurisdiction by Consent

A party's consent to the jurisdiction of a court allows the court jurisdiction over that party. This consent can happen through contract or agreement.

34
New cards

Specific Jurisdiction

When a court has jurisdiction over a company or individual with respect to a specific incident or matter.

35
New cards

Minimum Contracts

A constitutional fairness requirement that a defendant have at least a certain minimum level of contact with a state before the state courts can have jurisdiction over the defendant.

36
New cards

Extradition

A legal process whereby an alleged criminal offender is surrendered by the officials of one state to officials of the state in which the crime is alleged to have been committed.

37
New cards

Protected Computer under the CFAA

gov computers, financial institution computers, any computer used in interstate or foreign commerce or communications

38
New cards

Artificial Intelligence

a subdiscipline of computer science that attempts to simulate human thinking

39
New cards

Case Holding

the final decision the court reached, majority opinion

40
New cards

US Const: Commerce clause (Interstate commerce)

Congress has the power to regulate commerce with foreign nations and among the several states

41
New cards

US Const: 4th Amendment Requirements

The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things

42
New cards

"search" under the 4th amendment

A governmental exploration or examination, where a person has a reasonable expectation of privacy, for items that may be used as evidence in a criminal proceeding.

43
New cards

US Const: 1st Amendment: Speech

Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press; or the right of the people peaceably to assemble, and to petition the Government for a redress of grievances.

44
New cards

Strict Scrutiny

A Supreme Court test to see if a law denies equal protection because it does not serve a compelling state interest and is not narrowly tailored to achieve that goal

45
New cards

compelling government interest

A test of constitutionality that requires the government to have compelling reasons for passing any law that restricts fundamental rights, such as free speech, or distinguishes between people based on a suspect trait.

46
New cards

Intermediate Scrutiny

a test used by the Supreme Court in gender discrimination cases that places the burden of proof partially on the government and partially on the challengers to show that the law in question is unconstitutional

47
New cards

cyberspace

a metaphor for describing the non-physical terrain created by computer systems

48
New cards

privacy

the right of people not to reveal information about themselves, free from intrusion into or publicity concerning matters of a personal nature

49
New cards

statute

a law enacted by legislature

50
New cards

bill

a proposed law presented to a legislative body for consideration

51
New cards

Speech (what is it?)

Expression, posts, writing, etc whatever you want

52
New cards

US Const: 4th Amendment: Search incident to arrest

The Fourth Amendment prohibits the United States government from conducting "unreasonable searches and seizures." In general, this means police cannot search a person or their property without a warrant or probable cause. It also applies to arrests and the collection of evidence.

53
New cards

14th Amendment incorporation

- Freedom of speech/press/religion (1st amendment)
- Criminal rights (4th, 5th, 6th)
Right to privacy (4th & 9th)
all are applicable through the Due Process clause. Substantively and procedurally

54
New cards

1983 Action against government official

Federal agents can be sued if they act with state or local officers to violate federal rights

55
New cards

Civil vs Criminal Action

In a civil case, three-fourths or more jurors may return a verdict, whereas in a criminal case the verdict must be unanimous. You may be called to serve on either a civil or a criminal case. In a civil case, the party filing a lawsuit is called a plaintiff.

56
New cards

appellate

having the power to hear appeals and to reverse lower court decisions

57
New cards

Originalism

A view that the Constitution should be interpreted according to the original intentions or original meaning of the Framers. Many conservatives support this view.

58
New cards

Textualism

An approach to interpreting the Constitution that relies on a literal, "plain words" reading of the document

59
New cards

narrowly tailored

law only fits speech its trying to deal with; not overbroad

60
New cards

Content-Neutral restriction

Content neutral refers to laws that apply to all expression without regard to the substance or message of the expression. Such laws generally regulate only the time, place, and manner of speech in contrast to content-based laws, which regulate speech based on content.

61
New cards

commercial speech

Communication in the form of advertising. It can be restricted more than many other types of speech but has been receiving increased protection from the Supreme Court.

62
New cards

Incidental speech restrictions

constitutional if it is not "greater than necessary to further a substantial governmental interest

63
New cards

anonymity

the condition of being unknown

64
New cards

Natural Rights

the idea that all humans are born with rights, which include the right to life, liberty, and property

65
New cards

Presence (where are you online?)

If you are in correspondent with someone at the same time as they are on the platform, you are present with them. You are in the air of cyberspace

66
New cards

remand

to send a case back to a lower court to be tried again

67
New cards

Choice of Law

a common provision in a contract that specified what law must be used to resolve a dispute that arises between the parties to a contract

68
New cards

Extradition

A legal process whereby an alleged criminal offender is surrendered by the officials of one state to officials of the state in which the crime is alleged to have been committed.

69
New cards

Malware

software that is intended to damage or disable computers and computer systems.

70
New cards

Computer Fraud and Abuse Act (CFAA)

a federal statute that prohibits unlawful access to computers used in national defense, by financial institutions, or by governments

71
New cards

tax

a required payment to a local, state, or national government

72
New cards

reasonable expectation of privacy

the objective standard developed by courts for determining whether a government intrusion into an individual's person or property constitutes a search because it interferes with the individual's interests that are normally protected from government examination

73
New cards

search warrant

A court order allowing law enforcement officers to search a suspect's home or business and take specific items as evidence

74
New cards

probable cause

reasonable cause for issuing a search warrant or making an arrest; more than mere suspicion

75
New cards

consent

Explicit Consent Requirements: Under the CPRA, explicit consent is required for the collection and processing of sensitive personal information. This means that users must actively agree to the processing of their data for specific purposes, such as the sale of personal information or the use of geolocation data.

76
New cards

Plain View Rule

Evidence can be collected without a warrant if illegal activity (someone smoking pot) or evidence (like drug paraphernalia) is clearly seen out in the open.

77
New cards

clear and convincing evidence

The standard of proof required in some civil cases and, in federal courts, the standard of proof necessary for a defendant to make a successful claim of insanity.

78
New cards

beyond a reasonable doubt

The level of proof required to convict a person of a crime

79
New cards

preponderance of the evidence

The standard of proof in a civil case in which a judge or jury must believe the plaintiff's story and evidence is stronger than the defendant's version.

80
New cards

jury trial

A trial where a group of people listens to the evidence and decides the case

81
New cards

Testimonial

(n.) a statement that speaks to a person's character or to the benefits of a product; expressing the value and worth of someone or something

82
New cards

privacy invasion

intrusion into the personal life of another individual without just cause

83
New cards

Seclusion Intrusion

Intrusion into a person's physical private space: watching, listening, recording another private person's private activity

84
New cards

Appropriation

using someone’s name or likeness without permission for personal gain

85
New cards

Publicity and Private Life

publicizing of details of a person's private life, if not of legitimate public concern

86
New cards

False Light

invading a person's privacy by implying something untrue about him or her

87
New cards

Defamation

Act of harming or ruining another's reputation

88
New cards

Negligence

careless neglect, often resulting in injury

89
New cards

Reckless Disregard

acting with a conscious disregard or indifference to the rights or safety of others

90
New cards

Actual Malice

Either knowledge of a defamatory statement's falsity or a reckless disregard for the truth.

91
New cards

Intellectual Property

A product of the intellect, such as an expressed idea or concept, that has commercial value.

92
New cards

Social Media Censorship

Social media platforms are private companies and are not bound by the First Amendment. In fact, they have their own First Amendment rights. This means they can moderate the content people post on their websites without violating those users' First Amendment rights.

93
New cards

Communications Decency Act (including Section 230)

Prohibits the use of telecommunications device by a person not disclosing his or her identity in order to abuse, annoy, threaten, or harass another person. Provides limited federal immunity to providers and users of interactive computer services.

94
New cards

Privacy from Government

You will be free from intrusion into private life or affairs, except when it results in undue or illegal gathering

95
New cards

Digital Surveillance

Being watched online for information, trends, likes, etc.

96
New cards

Electronic Communications Privacy Act

A law passed by Congress in 1986 establishing the due process requirements that law enforcement officers must meet in order to legally intercept wire communications.

97
New cards

Stored Communications Act

An act allowing law enforcement access to electronic messages greater than 180 days old without a warrant (but with a court order or subpoena, such access may be obtained for messages less than 180 days old)

98
New cards

Wiretap Act

A federal law to protect the privacy of phone calls and other oral communications that makes it illegal to intercept, record, disseminate or use a private communication without a participant's permission. The law allows the government to bring criminal charges and those whose privacy was violated to sue for civil damages.

99
New cards

Internet Service Providers

a company that provides access to the internet

100
New cards

Content Moderation

monitoring and filtering user-generated content