Congressional Research Service
While P2P file sharing technology could be used for legitimate purposes, P2P users most often copy and distribute digital files that contain copyrighted sound recordings, television shows, and motion pictures, without the permission of (or payment to) the copyright holders
Vanderbilt Law Review
In the absence of cyberbullying laws, victims can resort only to tort law and certain criminal laws aimed at related offenses. Legislators, however, should be wary of hastily and improvidently creating overly broad statutes that impinge upon the First Amendment.
Wake Forest Law Review
Even where States have passed legislation dealing with cyberbullying, little direction is available on the type of cyberbullying policy schools should adopt. The author develops a model policy on cyberbullying that does not violate the students’ First Amendment rights to free speech.
Missouri Law School
The first panel speaks broadly about cyberbullying. The second speaker, whose presentation begins at 43:00, discusses controlling cyberbullying without violating the First Amendment, while the third speaker discusses New York’s 2013 cyberbullying statute.
C-SPAN
Law professors and journals debated First Amendment freedom of the press rights versus national security interests in the age of WikiLeaks. They also responded to questions from the audience.
C-SPAN
Michael Hayden gave the luncheon address at a First Amendment Center day-long discussion entitled, “Criminal Law, National Security and the First Amendment.” He focused on the relationship between intelligence and the media.
C-SPAN
Panelists talked about investigating and prosecuting cases in which national security violations are alleged, concerns over privacy and free speech issues, the needs of law enforcement and intelligence authorities, and pending cases in federal court. They also responded to questions from the audience.