Torrealba J350F Exam 2 Study Guide PDF
Document Details
Uploaded by ProminentMendelevium5976
The University of Texas at Austin
Diego Torrealba
Tags
Summary
This document appears to be a study guide for a media law exam. It contains summaries of court cases related to media law, including specific case names and citations. This guide is prepared for a course named J350F: Media Law and is scheduled for November 21, 2024.
Full Transcript
Diego Torrealba Dr. Sanders J350F: Media Law 21 November 2024 Exam 2 Study Guide **Weeks Covered**: 1. 2. 3. 4. 5. 6. Dr. Sanders' Study Guide ======================== - Fair-game Cases --------------- ### [[U.S. v. The Progressive Inc. 476 F. Supp 990 (W.D. Wis.) (1979)]](http...
Diego Torrealba Dr. Sanders J350F: Media Law 21 November 2024 Exam 2 Study Guide **Weeks Covered**: 1. 2. 3. 4. 5. 6. Dr. Sanders' Study Guide ======================== - Fair-game Cases --------------- ### [[U.S. v. The Progressive Inc. 476 F. Supp 990 (W.D. Wis.) (1979)]](https://firstamendment.mtsu.edu/article/united-states-v-progressive-inc-w-d-wis/) (Post Pentagon Papers, *what can be restrained* - - - - - - - - - - - - - - - - - - - - - - 2. ### [[New York Times Company v. United States, 403 US 713]](https://www.oyez.org/cases/1970/1873) (1971) (The "Pentagon Papers" case) a. i. ii. iii. 1. b. iv. v. c. vi. 2. 3. 4. d. vii. 3. ### [[New York Times Company v. Sullivan]](https://www.oyez.org/cases/1963/39), 376 US 254 (1964) e. viii. ix. f. x. 5. xi. xii. xiii. xiv. g. h. xv. 6. 7. xvi. 8. xvii. i. j. k. xviii. xix. xx. xxi. 4. ### [[Curtis Publishing Company v. Butts]](https://www.oyez.org/cases/1966/37), 388 US 130 (1967) (Sullivan Progeny: Public Figures) l. m. xxii. 9. a. i. ii. b. iii. c. 10. d. iv. v. e. vi. f. n. o. xxiii. 11. xxiv. xxv. 12. xxvi. xxvii. 13. 5. ### [[Gertz v. Robert Welch Inc.]](https://www.oyez.org/cases/1973/72-617), 418 US 323 (1974) p. q. xxviii. xxix. xxx. xxxi. r. s. xxxii. 14. g. vii. viii. 1. ix. 2. 15. 16. h. xxxiii. xxxiv. 17. 18. i. 6. ### [[Philadelphia Newspapers, Inc. v. Hepps]](https://www.oyez.org/cases/1985/84-1491), 475 US 767 (1986) t. u. xxxv. xxxvi. v. w. xxxvii. x. xxxviii. xxxix. 7. ### [[Branzburg v. Hayes]](https://www.oyez.org/cases/1971/70-85), 408 US 665 (1972) y. xl. 19. xli. 20. xlii. z. a. xliii. 21. xliv. 8. ### [[Cohen v. Cowles Media Company]](https://www.oyez.org/cases/1990/90-634), 501 US 663 (1991) b. xlv. 22. 23. xlvi. xlvii. xlviii. 24. c. d. xlix. 25. 26. l. e. li. lii. 27. 9. ### [[Eldred v. Ashcroft]](https://www.oyez.org/cases/2002/01-618), 537 US 186 (2003) f. liii. liv. lv. 28. lvi. g. h. lvii. 29. 30. lviii. 10. ### [[Harper & Row, Publishers, Inc. v. Nation Enterprises]](https://www.oyez.org/cases/1984/83-1632), 471 US 539 (1985) i. lix. 31. lx. 32. lxi. lxii. lxiii. j. k. lxiv. 33. j. 34. lxv. l. lxvi. 35. 36. 37. k. l. m. n. o. p. q. r. s. t. 38. u. v. w. x. y. lxvii. 39. z. a. b. 40. c. d. e. lxviii. 41. 42. f. g. h. 43. i. j. lxix. 44. 45. 46. k. l. m. n. o. 47. p. q. r. s. t. u. v. - Legal Terms/Concepts -------------------- 1. ### Prior restraints, including current examples of them a. i. b. ii. c. d. e. iii. iv. v. f. vi. vii. viii. ix. 2. ### The Espionage Act of 1917 g. x. h. i. xi. xii. xiii. xiv. xv. xvi. xvii. j. xviii. xix. k. l. 3. ### The Patriot Act (USA PATRIOT Act), Oct. 26, 2001 m. xx. 1. a. b. 2. n. xxi. xxii. o. 4. ### The Foreign Intelligence Surveillance Act of 1978 (FISA) p. q. xxiii. xxiv. r. s. xxv. xxvi. t. xxvii. xxviii. u. xxix. v. 5. ### Edward Snowden and mass surveillance post 9/11 w. xxx. xxxi. xxxii. x. xxxiii. xxxiv. xxxv. xxxvi. xxxvii. xxxviii. xxxix. y. xl. 6. ### The implications of global surveillance on journalists: Prism, Pegasus, etc. z. a. xli. xlii. b. xliii. xliv. 7. ### The definition of defamation, libel v. slander, per quod v. per se c. xlv. xlvi. d. xlvii. 3. c. 4. d. 5. e. e. xlviii. xlix. l. 6. 7. 8. 9. 10. 11. 8. ### Plaintiff's case for defamation in the US: At common law v. today f. li. 12. f. 13. 14. g. h. i. lii. 15. 16. 17. 18. g. liii. liv. lv. h. lvi. 19. j. k. l. lvii. 20. 21. 22. 23. m. 24. lviii. 25. 26. lix. 27. lx. 28. n. o. 29. i. lxi. +-----------------------+-----------------------+-----------------------+ | **Type of Plaintiff | **Level of Fault to | **Required to Prove | | (π = "plaintiff)** | Win their Case** | Falsity?** | +=======================+=======================+=======================+ | Public Official | Actual Malice (NYT v. | Yes (Philadelphia | | | Sullivan) | Newspaper v. Hepps) | +-----------------------+-----------------------+-----------------------+ | Public Figure | Actual Malice (Curtis | Yes (Philadelphia | | | Publishing v. Butts) | Newspaper v. Hepps) | +-----------------------+-----------------------+-----------------------+ | Private Person | To win (general): | Topics of public | | | *Negligence* in most | concern: Yes, must be | | | states (Gertz v. | proved as false. | | | Welch) | | | | | Matters of private | | | ***Negligence***: The | concern: ??? | | | defendant did not do | | | | what a reasonable | Question: Does the | | | person would have | First Amendment | | | done. | require private | | | | plaintiffs suring | | | | about matters of | | | | private concern to | | | | prove falsity? Some | | | | states say yes; | | | | others say no. | +-----------------------+-----------------------+-----------------------+ lxii. j. lxiii. lxiv. 30. p. 31. 32. q. lxv. 33. r. 34. 9. ### Defenses to defamation k. lxvi. lxvii. 35. l. lxviii. 36. s. lxix. 37. 38. m. lxx. lxxi. 39. t. u. v. lxxii. 40. 41. w. x. lxxiii. 42. y. 43. 44. z. 45. lxxiv. 46. a. 47. b. lxxv. 48. 49. c. lxxvi. 50. 51. 52. 53. 10. ### Opinion v. Fact in defamation cases n. lxxvii. 54. 55. d. lxxviii. lxxix. lxxx. 56. 57. o. lxxxi. 58. lxxxii. 59. 60. lxxxiii. 61. 62. 63. p. 11. ### Key takeaways from The Great Hack, Citizenfour and other videos q. lxxxiv. lxxxv. lxxxvi. 64. lxxxvii. 65. r. lxxxviii. lxxxix. xc. 66. e. 67. f. 68. g. h. 69. i. j. k. 70. l. m. 71. n. 72. o. p. 73. q. 74. r. 75. s. t. i. 76. u. 77. v. w. 78. x. y. z. 79. a. b. 80. c. d. 81. e. f. 82. g. h. 83. i. 84. j. k. l. 85. m. n. 86. o. p. 87. q. r. 88. s. 89. t. u. v. w. x. 90. y. z. 91. a. 92. b. 93. c. 94. d. e. f. 95. g. h. i. j. 96. k. l. ii. 97. m. 98. n. 99. o. iii. p. 100. q. r. iv. 101. s. 102. t. 103. u. v. 12. ### Status of data protection laws globally; U.S. approach v. EU approach s. xci. 104. t. xcii. xciii. xciv. xcv. u. xcvi. 105. w. x. y. z. xcvii. 106. a. b. c. d. xcviii. 107. 108. 109. v. xcix. c. w. ci. x. cii. 13. ### State protections for data privacy y. ciii. 110. 111. civ. cv. z. 14. ### Where does the right of privacy come from? When does it apply? a. cvi. cvii. b. cviii. cix. cx. cxi. c. cxii. d. e. cxiii. cxiv. f. 15. ### What sources of law protect privacy? g. cxv. cxvi. cxvii. cxviii. h. cxix. cxx. i. cxxi. j. cxxii. 16. ### What are the privacy torts, their elements and defenses? k. cxxiii. 112. e. cxxiv. 113. 114. 115. 116. cxxv. 117. l. cxxvi. 118. 119. 120. cxxvii. 121. f. 122. g. h. 123. i. 124. cxxviii. 125. j. 126. k. l. 127. m. cxxix. cxxx. cxxxi. 128. m. n. 129. o. v. p. 130. cxxxii. 131. 132. q. r. s. t. n. cxxxiii. 133. 134. 135. 136. cxxxiv. 137. u. v. cxxxv. 138. w. 139. 17. ### What is IP law? What are the types of IP? o. cxxxvi. cxxxvii. 140. 141. x. y. z. 142. 143. a. 144. cxxxviii. cxxxix. 18. ### What constitutional source of law provides for its protection? Other sources p. q. cxl. cxli. r. cxlii. cxliii. 145. b. c. d. 146. e. f. vi. g. vii. viii. 147. h. i. j. s. 19. ### What can be copyrighted? t. u. cxliv. v. cxlv. cxlvi. cxlvii. cxlviii. cxlix. cl. cli. clii. w. cliii. cliv. x. clv. y. 20. ### What is a term of protection? What rights do you get? z. clvi. clvii. a. b. c. clviii. 148. clix. 149. 150. 151. clx. 152. clxi. 153. 154. k. l. 155. clxii. 156. m. clxiii. 157. 21. ### What considerations are there for freelancers? What is a work-for-hire? d. clxiv. clxv. 158. 159. n. o. p. q. r. s. t. u. v. e. clxvi. clxvii. f. clxviii. clxix. 22. ### What are the types of infringement? g. clxx. h. clxxi. 160. clxxii. 161. 162. 163. clxxiii. 164. 165. i. clxxiv. clxxv. clxxvi. j. clxxvii. 166. 167. clxxviii. 168. 169. 170. clxxix. 171. 172. w. x. y. 23. ### What are the benefits of registering for copyright protection? k. clxxx. l. clxxxi. clxxxii. m. n. 24. ### What is fair use? When does it apply? o. clxxxiii. 173. 174. p. clxxxiv. 175. 176. 177. z. a. b. c. d. e. f. g. h. i. 178. j. k. l. m. n. clxxxv. 179. o. p. q. 180. r. s. t. clxxxvi. 181. 182. u. v. w. 183. x. y. clxxxvii. 184. 185. 186. z. a. b. c. d. 187. e. f. g. h. i. j. k. clxxxviii. 25. ### Which cases outlined fair use? q. r. s. t. u. v. w. 26. ### Other than fair use, how can you legally access content? x. clxxxix. y. cxc. cxci. z. cxcii. a. cxciii. 188. cxciv. cxcv. 189. 27. ### Why do reporters want/need to protect their sources and work products? How should they? b. cxcvi. cxcvii. c. cxcviii. cxcix. cc. d. cci. 190. ccii. 191. cciii. 192. cciv. e. ccv. 193. l. 194. ccvi. 195. 196. 197. 198. ccvii. 199. 200. ccviii. 201. 28. ### What is a testimonial (or testamentary) privilege? Give examples. f. ccix. g. ccx. ccxi. ccxii. ccxiii. 29. ### What is a shield law? Reporter's privilege? When/where do they protect journalists? h. ccxiv. ccxv. i. ccxvi. j. ccxvii. ccxviii. 30. ### How should you handle sources who want confidentiality? k. ccxix. ccxx. ccxxi. l. ccxxii. ccxxiii. m. ccxxiv. 202. 203. ccxxv. 204. 205. ccxxvi. 206. 207. ccxxvii. 208. 209. ccxxviii. ccxxix. 210. 211. 31. ### What is promissory estoppel? n. o. ccxxx. ccxxxi. 32. ### What are laws of general applicability? p. q. r. 33. ### What is the legality of newsroom searches? s. t. ccxxxii. u. ccxxxiii. 212. ccxxxiv. 213. 214. v. ccxxxv. Weekly Infographics/Visuals =========================== - Cybersecurity & Surveillance ("5 Things to Know, Surveillance & National Security") ----------------------------------------------------------------------------------- 1. a. b. 2. c. d. e. 3. f. g. h. 4. i. j. 5. k. - - 1. 2. 3. 4. 5. 6. 7. - Elements of Defamation ("Five Elements of Defamation in the U.S. Today") ------------------------------------------------------------------------ 1. a. i. ii. b. c. 2. d. e. f. g. h. 3. i. j. iii. k. iv. 4. l. m. 5. n. o. p. q. - - Key Moments in Information Privacy & Data Security -------------------------------------------------- - - - - - - - - - - - - - - - - - - - - - - - Four Reputation Privacy Torts ("The Four Common Law Privacy Torts") ------------------------------------------------------------------- 1. a. i. ii. iii. iv. b. v. 1. 2. c. vi. vii. viii. ix. d. x. 3. e. xi. xii. xiii. f. xiv. xv. 4. g. xvi. xvii. xviii. xix. h. - Fair Use ("The Four Fair Use Factors to decide whether a use violates copyright") --------------------------------------------------------------------------------- 1. a. b. 2. c. d. 3. e. f. 4. g. h. - - The 6 Rights of Copyright in the U.S. ------------------------------------- 1. a. 2. b. 3. c. 4. d. 5. e. 6. f. - Understanding the many opinions in Branzburg v. Hayes ----------------------------------------------------- - - 1. 2. - - - - - - - - - -