ISP/Craiglist - Assignment Example

Comments (0) Cite this document
The plaintiff Immunomedics Inc, has a right to sue the ISP in order for the court to order for an investigation to the conduct of the ISP employees. Under the law the employer is liable for the negligence of the not supervising employees. A good example is Dickinson v…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER93.5% of users find it useful
Read TextPreview

Extract of sample "ISP/Craiglist"

Cyber law Question #3 on page 329 The plaintiff Immunomedics Inc, has a right to sue the ISP in order for the court to order for an investigation to the conduct of the ISP employees. Under the law the employer is liable for the negligence of the not supervising employees. A good example is Dickinson v. Edwards, the court ruled that the employer was liable for the accident caused by the employee due to intoxication after a company banquet (Constance E. Bagley, 2010).
Fiduciary duties is the relationship between the employer as principals and the employee, and have a duty to disclose all information to enable the employee perform his task, and employers are bounded by the actions of the employees (Gerald R. Ferrera, 2012). Thus the employees of ISP were operating within the parameters of the company and as the responded in the case they are obliged to defend themselves on limited tort liability.
Under the law if an employee is involved in a criminal act, the plaintiff (Immunomedics) can sue responded (ISP) for neglect hiring and retention as but the plaintiff must prove that the ISP knew the conduct of the employee who allowed poster on the chat room (Nolo, 2014), further under the law during hiring an tech employee completing Form I-9 to determine the employee eligibility and Form SS-8 to show the behavior of the worker to be employed. Thus the liability lies on ISP to provide the details of the pseudonym name and IP address but it must be authorized by the courts.
Question #5 on page 362
Craiglist is not liable for the contents distributed on its website.
Under Digital Millennium Copyright Act (DCMA) section 512(C ) provides for a safe-harbor content posted on Craiglist blog or website by a user, due to the fact that employees of Craiglist did not have actual knowledge of the contents posted. If they were informed of the damaging, discriminatory content on there blog they could have immediately remove failure to which they are liable. The lawyer instituting the case did not inform Craiglist about the contents and they fail to remove (Digital Media Law project, 2012).
Under Communications Decency ActCDA) section 230 treats internet publishers different from traditional publishers in that the it gives the interactive online providers immunity from tort liability as long as the content was posted and published by a third party thus the content on Craiglist was published by the user (Kenneth W. Clarkson, 2015).
All these acts read together with the The Fair Housing Act (FHA), proves that Craiglist did not publish the discriminatory contents on their blog, it was done by the third party, user.
Constance E. Bagley, D. W. (2010). Managers and the Legal Enviroment. Mason: Cengage Learnin.
Digital Media Law project. (2012). Protecting Yourself Against Copyright Claims Based on User Content. Retrieved November 13, 2014, from Digital Media Law project:
Gerald R. Ferrera, M. E. (2012). CyberLaw: Text and Cases. Cengage Learning.
Kenneth W. Clarkson, R. L. (2015). Business Law Text and Cases (13 ed.). Stamford,: Cengage Learning.
Nolo. (2014). Employer Liability for an Employees Bad Acts. Retrieved November 14, 2014, from Nolo: Read More
Cite this document
  • APA
  • MLA
(“ISP/Craiglist Assignment Example | Topics and Well Written Essays - 250 words”, n.d.)
Retrieved from
(ISP/Craiglist Assignment Example | Topics and Well Written Essays - 250 Words)
“ISP/Craiglist Assignment Example | Topics and Well Written Essays - 250 Words”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document


Studying Human Mobility through Photograph Geo-Tagging

...can examine the Craiglist website. (Friedland & Sommer, 2010) One form of uploading images in Craiglist is through HTML link. Images uploaded by this would still have their geo information present in them. Since Craiglist being one of the biggest sites of human resource information, there is every possibility that everyone’s geo tagged information would be publicly available for taking. (Friedland & Sommer, 2010) Securing the privacy of Location To secure, it is important for application developers to put users in the driver’s seat. They should ultimately decide whether the image should contain location information or not. From the developer’s perspective, if the user is ignorant about...
8 Pages(2000 words)Research Paper

Recent Development in Fight against Peer to Peer File Sharing: Legal Issues and Alternative Solutions the right-holders in their fight against the p2p file sharing, with a comprehensive focus on the defendants of p2p infringement such as: web providers, individuals and ISP. This paper also attempts at showing the ineffectiveness of legal litigation against these defendants and at providing alternative solutions to prevent the P2P file sharing infringements. Software Provider From Sony Safe Harbor To Open End Secondary Liability: Secondary liability is a common law principal, imposed on the parties who have some level of involvement in copy right infringements but who are not considered as the primary infringers3. The standard for secondary liability of technology providers was started by the sony v. universal in...
29 Pages(7250 words)Assignment

Intellectual property / copyright legal research effectively search (eg by using Boolean, truncation, etc) full text and bibliographic databases and the Internet Appropriately cite sources in written and oral work complying with legal citation, footnoting and bibliography conventions WEEK 1: LEGAL RESEARCH METHODOLOGY and TOPIC ANALYSIS EXERCISE 1.1: Read and analyse the research problem and identify the broad areas of law and the issues. Identify keywords for research and use Statsky's "cartwheel" to help think of alternative keywords. IDENTIFY THE GENERAL AREAS OF LAW Aspects of the ISP have advanced dramatically over the past few years to the agenda-setting and negotiations stages of regime formation, and international adoption of widely used...
6 Pages(1500 words)Essay

Strategic Planning for Advertising

...Strategic Advertising Plan for the ISP Wanadoo Re-branded to Orange Analytical report Table of Contents Introduction 1 Strategy inAdvertising Plan 2. Section I - Situation Analysis/Business Review. 2.1 Industry Review 2.1.1 Means of Internet onnection in the UK 2.1.2 Wholesale broadband connection market shares 2.1.3 General trends in Internet using in the UK 2.2 Company Review 2.2.1 Freeserve 2.2.2 Wanadoo 2.2.3 Orange 2.2.4 France Telecom Group as Corporate Parent 2.3 Customer Review 2.4 PESTEL Framework 2.5 Key factors of success within the competitive market 2.6 SWOT Analysis 3. Section II - Strategic Direction in Business Environment 4. Section III - Media and Creative Objectives 5. Section IV - An Example of...
20 Pages(5000 words)Essay

Net Neutrality

...there has been overblown rhetoric over the issue of net neutrality and the threat to it. The regulations that are currently in place are a sufficient deterrent to allow this to happen. (3) Examination of some of the cries of discrimination by ISPs shows that there is no credence to these accusations. This can be seen from the issue between web service Craiglist and the ISP Cox Cable Internet. There are accusations that the ISP Cox Cable Internet is choking user access to Craiglist. However it appears that this has more to do with one of the Cox security softwares, which users can uninstall. Thus claims for discrimination by ISP’s...
2 Pages(500 words)Essay


..., dial up, integrated services digital network (ISDN) and several other methods. For large organizations, Ethernet, gigabit Ethernet, asynchronous transfer mode (ATM) is used. The services that ISP provides are, provision of a world wide web, electronic mail service, internet relay chat for customers to chat with third party, servers that allow customers and interested parties to share on a forum or a certain topic online and a file transfer protocol that enables customers to store their data and other documents and for third parties to retrieve them Internet security has in recent times deteriorated because security measures have not been appropriately taken keen off especially by the individuals and small business...
5 Pages(1250 words)Essay

You are an Investment Analyst

...and partnerships in eBay continue influencing the company’s trajectory for better and worse. The major holdings in eBay include GSI Commerce, PayPal, Kijiji, Gumtree, ProStores, Redlaser,, brands4friends, Craiglist, EachNet, UnionMobile Pay, MercadoLibre and amongst others. The pioneer communities in eBay were built on e-commerce, inspired by opportunity and sustained by trust. This makes eBay to attract millions of client daily on international, national and local levels through an array of websites which focus on payments, communications and commerce (Penfold, 2011). The eBay Marketplace The marketplace in eBay provides a powerful platform for sale of goods and services through passionate individuals...
9 Pages(2250 words)Essay

White Paper Project: Telecommunication Solution for Communication Problem

...Network Solutions After examining this scenario, it was clear that man elements were needed to ensure that this solution was secured, flexible, and provided many addresses .If this access is given to unauthorized users, this can possible be a huge vulnerability. In order to protect this risk, two-tier level of security should be enforced. The two-level security prompts the user to enter two aspects of passphrases in case an intruder has one component, but lacks another component. This paper will discuss the solution of ISP, VPN connection, and utilization of IPv6. Creating a VPN connection for this organization seemed to me the most feasible solution. It was evident that IPsecs play a huge role in ensuring encryption...
5 Pages(1250 words)Case Study


..., the company should use the Craig list, for advertising for jo0b vacancies, and Skype for purposes of conducting a job interview. The Craigslist is an online company that specializes in providing advertisement services to companies. The url of the Craig List is, (Craiglist, n.d). To advertise in this website, it would cost the company approximately 25 dollars. Skype can be used for purposes of conducting interviews, and it is one of the cheapest methods an organization can use. This is because it is free to access the services of Skype. The use of Skype would enable the company to save on administrative costs that could be used for purposes of carrying out a face to face interview. The url of Skype is,...
2 Pages(500 words)Assignment

Linkedin Understanding a Statement of Rights and Responsibilities apply for “Stop Now” orders against traders in breach of consumer protection regulations. The central issue facing internet service providers (ISPs) on the Internet is liability for defamation which takes place in another jurisdiction19. In practice, the breadth of services provided by ISPs is wide, ranging from hosting, facilitating online news dissemination to email account administration. Other services include online magazines, blogs and mailing lists20. This has created difficulties in regulating abusive conduct and defamation online and determining liability. For example, under UK defamation law, ISPs constitute secondary publishers and as such will be liable for defamation...
6 Pages(1500 words)Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Assignment on topic ISP/Craiglist for FREE!

Contact Us