13.07.2015 Views

Vol 7 No 1 - Roger Williams University School of Law

Vol 7 No 1 - Roger Williams University School of Law

Vol 7 No 1 - Roger Williams University School of Law

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

ISP explains that they are not a state actor and the courtagrees.390 Should private action <strong>of</strong> such a public nature, wherethe ISP’s mailboxes and networks are vital to the widespreaddissemination <strong>of</strong> information, trump the marketing firm’s freespeech interest? Should the private property be open for thispurpose? In general, owners <strong>of</strong> private property are not requiredto allow their property to be used for speech purposes thoughthere are exceptions. Is there a principle <strong>of</strong> free speech in thisprivate space where property law and notions such as trespass391and nuisance predominate? Had the ISP sought to enforce itsrights through a trespass action, the issue <strong>of</strong> free speech and stateaction may gain more support.392 However, through selfexecutingcode, an ISP is able to enforce its private norms, forcingthe marketing firm to bring the action to court. In doing so,marketing firms must scramble to find an unconscionability ordiversity principle/ethic in their favour since such a principle hasyet to be fully developed for the digital environment. The lack <strong>of</strong> asophisticated notion <strong>of</strong> digital constitutionalism hinders themaking <strong>of</strong> an already difficult argument.Secondly, imagine a private corporation that encrypts anddistributes information it on its own terms. UCITA contains thepower to be activated remotely or through self-help;393 thus it isself-enforcing with no need for the court system. Code rules. Inthis case, the values or principles <strong>of</strong> the transaction are insertedand implemented by the private corporation. The public values <strong>of</strong>fair use and free access, and in a broader sense respect for thepublic domain, are not necessarily implemented in this regime.For example, I buy a book that may not be printed or copied andmay be read or viewed only once. The code enforces this processand therefore a court will not be brought into the question unlessthere is a valid cause <strong>of</strong> action, i.e., unconsionability.Contrast contract outside the realm <strong>of</strong> code. While I might390. Id. at 445391. See e.g., eBay, Inc. v. Bidder’s Edge, Inc., 100 F. Supp. 2d. 1058 (N.D. Cal.2000) (involving a case where an Internet auction site sued an auction aggregating sitefor trespass).392. Cf. Compuserve, Inc. v. Cyber Promotions, Inc., 962 F. Supp. 1015 (S.D. Ohio1997) (holding that a company’s intentional use <strong>of</strong> the service’s proprietary computerequipment was actionable trespass to chattels for which First Amendment provided nodefense).393. See UCITA § 816 (1999); Julie E. Cohen, Copyright and the Jurisprudence <strong>of</strong>Self-Help, 13 Berkeley Tech. L.J. 1089 (1998).

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!