10: The Power of Property: Strict Liability for Viewing NCII

Restricted access
Rights and permissions Cite this chapter

This chapter explains why viewers’ liability could and should be strict, rather than merely fault-based. Building on the discussion in Chapters 4 and 5 it further explains how a property-based understanding of privacy helps justifying both strict liability and its proper limits; thus avoiding excessive liability. Hence, this chapter makes three contributions: doctrinal, normative and conceptual. Doctrinally, it explains that (1) the misuse of private information tort (Privacy) is already understood as a stricter form of liability; (2) that liability under Privacy might be stricter than under breach of confidentiality (from which Privacy sprung) and the justifications for this difference; and (3) Privacy can therefore accommodate viewers’ strict liability for viewing NCII (Part 2). Normatively, it then explains how the concepts of possession, passive behaviour and reliance make viewers’ strict liability to be justified and not excessive (Part 3). Theoretically, it inquires how conceptualizing information as property justifies strict, rather than fault-based, liability for viewing, despite the fact that the act of viewing both misappropriates and destroys value (Part 4); it thus complements the analysis offered in Chapters 4 and 5.

  • Abraham, Kenneth and White, Edward. (2019). The Puzzle of the Dignitary Torts. Cornell Law Review, 104(2): 31780.

  • Adler, Matthew. (2012). Well-Being and Fair Distribution: Beyond Cost-Benefit Analysis, Oxford: Oxford University Press.

  • Adler Matthew and Posner, Eric. (1999). Rethinking Cost-Benefit Analysis. Yale Law Journal, 109(2): 165248.

  • Ahlert, Christian, Marsden, Chris and Yung, Chester. (2004). How Liberty Disappeared from Cyberspace: The Mystery Shopper Tests Internet Content Self-Regulation. Academia, [Online] 1 January. Available from: https://www.academia.edu/686683/How_Liberty_Disappeared_from_Cyberspace_The_Mystery_Shopper_Tests_Internet_Content_Self-Regulation [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Allen, Anita. (2010). Privacy Torts: Unreliable Remedies for LGBT Plaintiffs. California Law Review, 98(6): 171164.

  • Allen, Anita. (2011). Unpopular Privacy: What Must We Hide? Oxford: Oxford University Press.

  • Alter, Charlotte. (2014). Clicking on Jennifer Lawrence’s Nude Photos Is Sleazy, but Is It Really Sexual Assault? Time, [Online] 2 September. Available from: https://time.com/3258898/jennifer-lawrence-kate-upton-naked-photos-icloud-hacking/ [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Angelopopulos, Christina. (2015). Delfi v Estonia: ISPs and the Freedom to Impart Information. The IPKAT, [Blog] 24 June. Available from: http://ipkitten.blogspot.nl/2015/06/delfi-v-estonia-isps-and-freedom-to.html [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Angelopoulos, Christina. (2020). Primary and Accessory Liability in EU Copyright Law, in Rosati, Elenora (ed) The Routledge Handbook of European Copyright Law, Abingdon: Routledge, 193214.

    • Search Google Scholar
    • Export Citation
  • Angelopoulos, Christina and Smet, Stijn. (2016). Notice-and-Fair-Balance: How to Reach a Compromise Between Fundamental Rights in European Intermediary Liability. Journal of Media Law, 8(2): 266301.

    • Search Google Scholar
    • Export Citation
  • AP News. (2019). Sandy Hook Lawsuit against Gun-Maker Set for Trial in 2021. AP News, [Online] 11 December. Available from: https://apnews.com/7105329aaf8f039abab83c2836c288af [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Arnold, Carrie. (2016). Life after Rape: The Sexual Assault Issue No One’s Talking About. Women’s Health, [Online] 13 September. Available from: https://www.womenshealthmag.com/life/a19899018/ptsd-after-rape/ [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Atiyah, Patrick. (1967). Vicarious Liability in the Law of Torts, London: Butterworths.

  • Baker, Berenice. (2013). The Internet Wouldn’t Exist without Porn. New Statesman, [Online] 17 June. Available from: https://www.newstatesman.com/politics/2013/06/internet-wouldn-t-exist-without-porn [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Bambauer, Derek. (2014). Exposed .Minnesota Law Review, 98(6): 2025102.

  • Banta, Natalie. (2016). Death and Privacy in the Digital Age. North Carolina Law Review, 94: 92790.

  • Bar-Gill, Oren and Porat, Ariel. (2014). Harm-Benefit Interactions. American Law and Economics Review, 16(1): 86116.

  • Barendt, Eric. (2015). An Overlap of Defamation and Privacy? Journal of Media Law, 7(1): 8591.

  • Bari, Shahidha. (2016). Female Nudity Is Powerful – But Not Necessarily Empowering. Aeon, [Online] 12 September. Available from: www.aeon.co/ideas/female-nudity-is-powerful-but-not-necessarily-empowering [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Barnett, Katy. (2018). Gain-Based Relief for Breach of Privacy, in Varuhas, Jason and Moreham, Nicole (eds) Remedies for Breach of Privacy, Oxford: Hart, 183204.

    • Search Google Scholar
    • Export Citation
  • Barrett, Paul. (2020). Who Moderates the Social Media Giants? A Call to End Outsourcing. NYU Stern Center for Business and Human Rights. [Online] Available from: https://www.stern.nyu.edu/experience-stern/faculty-research/who-moderates-social-media-giants-call-end-outsourcing [Accessed 30 September 2022].

    • Search Google Scholar
    • Export Citation
  • Bartow, Ann. (2009). Internet Defamation as Profit Center: The Monetization of Online Harassment. Harvard Journal of Law & Gender, 32(2): 10247.

    • Search Google Scholar
    • Export Citation
  • Bates, Samantha. (2017). Revenge Porn and Mental Health: A Qualitative Analysis of the Mental Health Effects of Revenge Porn on Female Survivors. Feminist Criminology, 12(1): 2242.

    • Search Google Scholar
    • Export Citation
  • BBC. (2014). Man Charged in Netherlands in Amanda Todd Suicide Case. BBC News, [Online] 18 April. Available from: https://www.bbc.co.uk/news/world-europe-27076991 [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • BBC. (2016). Tiziana Cantone: Suicide Following Years of Humiliation Online Stuns Italy. BBC News, [Online] 16 September. Available from: https://www.bbc.co.uk/news/world-europe-37380704 [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Beever, Allan. (2015). What Does Tort Law Protect? Singapore Academy of Law Journal, Special Issue: 626–42.

  • Beever, Allan. (2016). A Theory of Tort Liability .London: Hart.

  • Ben-Shahar, Omri. (1998). Should Products Liability Be Based on Hindsight? Journal of Law, Economics, and Organization, 14(2): 32557.

    • Search Google Scholar
    • Export Citation
  • Benn, I. Stanley. (1971). Privacy, Freedom, and Respect for Persons, in Pennock, J. Ronald and Chapman, John W. (eds) Nomos XIII: Privacy, New York: Atherton Press, 126.

    • Search Google Scholar
    • Export Citation
  • Bennett, Theodore. (2016). Not so Straight-Talking: How Defamation Law Should Treat Imputations of Homosexuality. University of Queensland Law Journal, 35(2): 31330.

    • Search Google Scholar
    • Export Citation
  • Bennett, Thomas. (2018). Why Sir Cliff Richard’s Case Was Rightly Decided: Part 2: The Public Interest Balance. INFORRM, [Online] 2 August. Available from: https://inforrm.org/2018/08/02/why-sir-cliff-richards-case-was-rightly-decided-part-2-the-public-interest-balance-thomas-bennett/ [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Bennett, Thomas and Wragg, Paul. (2018). Was Richard v BBC Correctly Decided? Communications Law, 23(3): 15165.

  • Benzanson, Randall. (1986). The Libel Suit in Retrospect: What Plaintiffs Want and What Plaintiffs Get, the Symposium: New Perspectives in the Law of Defamation. California Law Review, 74(3): 789808.

    • Search Google Scholar
    • Export Citation
  • Berry, Andrew. (1984). Beshada v Johns-Manville Products Corp: Revolution-Or-Aberration-In Products Liability Law. Fordham Law Review, 52(5): 786803.

    • Search Google Scholar
    • Export Citation
  • Berryman, Jeff. (2018). Remedies for Breach of Privacy in Canada, in Varuhas, Jason and Moreham, Nicole (eds) Remedies for Breach of Privacy, Oxford: Hart, 323–48.

    • Search Google Scholar
    • Export Citation
  • Bickert, Monika and Fishman, Brian. (2018). Hard Questions: What Are We Doing to Stay Ahead of Terrorists? Facebook Newsroom, [Online] 8 November. Available from: https://about.fb.com/news/2018/11/staying-ahead-of-terrorists/ [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Birnhack, Michael. (2020). Personalized Privacy. Tel Aviv University Law Review, 42(2): 381404.

  • Bitton, Yifat. (2010). Liability of Bias: A Comparative Study of Gender-Related Interests in Negligence Law. Annual Survey of International & Comparative Law, 16(1): 63128.

    • Search Google Scholar
    • Export Citation
  • Bjorkegren, Alex. (2020). DCMS. Email correspondence to Tsachi Keren-Paz, 12 Feb.

  • Blackman, Josh. (2009). Omniveillance, Google, Privacy in Public, and the Right to Your Digital Identity: A Tort for Recording and Disseminating an Individual’s Image Over the Internet. Santa Clara Law Review, 49(2): 31392.

    • Search Google Scholar
    • Export Citation
  • Bloom, Sarah. (2014). No Vengeance for Revenge Porn Victims: Unravelling Why This Latest Female-Centric, Intimate-Partner Offense Is Still Legal, and Why We Should Criminalize It. Fordham Urban Law Journal, 42(1): 23489.

    • Search Google Scholar
    • Export Citation
  • Boerding, Andreas, Culik, Nicolai, Doepke, Christian and Hoeren, Thomas. (2018). Data Ownership: A Property Rights Approach from a European Perspective. Journal of Civil Law Studies, 11(2): 32370.

    • Search Google Scholar
    • Export Citation
  • Boyle, Karen. (2014). Feminism and Pornography, in Evans, Mary, Hemmings, Clare, Henry, Marsha, Johnstone, Hazel, Madhok, Sumi, Plomien, Ania and Wearing, Sadie (eds) The SAGE Handbook of Feminist Theory, London: SAGE, 21529.

    • Search Google Scholar
    • Export Citation
  • Brannon, Valerie. (2019). Liability for Content Hosts: An Overview of the Communications Decency Act’s Section 230. Congressional Research Service.

    • Search Google Scholar
    • Export Citation
  • Brown, Jonathan. (2018). ‘Revenge Porn’ and the Actio Iniuriarum: Using ‘Old Law’ to Solve ‘New Problems’. Legal Studies, 38(3): 396410.

    • Search Google Scholar
    • Export Citation
  • Brownmiller, Susan. (1975). Against Our Will: Men, Women, and Rape, New York: Simon & Schuster.

  • Brunner, Lisl. (2016). The Liability of an Online Intermediary for Third Party Content: The Watchdog Becomes the Monitor: Intermediary Liability after Delfi v Estonia. Human Rights Law Review, 16: 16374.

    • Search Google Scholar
    • Export Citation
  • Buchanan, James and Yoon, Yong. (2000). Symmetric Tragedies: Commons and Anti-Commons. Journal of Law and Economics, 43(1): 114.

  • Bushard, Brian. (2022). Pornhub CEO And COO Resign amid Blowback over Nonconsensual Videos of Minors. Forbes, [Online] 21 June. Available from: https://www.forbes.com/sites/brianbushard/2022/06/21/pornhub-ceo-and-coo-resign-amid-blowback-over-nonconsensual-videos-of-minors/ [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Calabresi, Guido and Hirschoff, Jon. (1972). Toward a Test of Strict Liability in Tort. Yale Law Journal, 81(6): 105585.

  • Calabresi, Guido. and Klevorick, Alvin. (1985). Four Tests for Liability in Torts. Journal of Legal Studies, 14(3): 585627.

  • Campbell, John. (2011). An Anomaly: Special Damages for Libel. Journal of Media Law, 3(2): 1938.

  • Cane, Peter. (1991). Tort Law and Economic Interests, Oxford: Oxford University Press.

  • Cane, Peter. (1997). The Anatomy of Tort Law, London: Hart.

  • Cardi, Julia. (2020). Denver Judge Awards Damages in Civil Revenge Porn Lawsuit. Law Week Colorado, [Online] 26 August. Available from: https://lawweekcolorado.com/2020/08/denver-judge-awards-damages-in-civil-revenge-porn-lawsuit/ [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Carotte, Elise, Davis, Angela and Lim, Megan. (2020). Sexual Behaviours and Violence in Pornography: Systematic Review and Narrative Synthesis of Video Content Analyses. Journal of Medical Internet Research, 22(5): e16702.

    • Search Google Scholar
    • Export Citation
  • Carroll, Robyn and Witzleb, Normann. (2011). ‘It’s Not Just about the Money’ Enhancing the Vindicatory Effect of Private Law Remedies. Monash University Law Review, 37(1): 21640.

    • Search Google Scholar
    • Export Citation
  • Cheer, Ursula. (2016). Divining the Dignity Torts: A Possible Future for Defamation and Privacy, in Kenyon, Andrew. (ed) Comparative Defamation and Privacy Law, Cambridge: Cambridge University Press, 30930.

    • Search Google Scholar
    • Export Citation
  • Chesney, Robert and Citron, Danielle. (2019). Deep Fakes: A Looming Challenge for Privacy, Democracy, and National Security. California Law Review, 107: 1753820.

    • Search Google Scholar
    • Export Citation
  • Chisala-Tempelhoff, Sarai and Twesiime Kirya, Monica. (2016). Gender, Law and Revenge Porn in Sub-Saharan Africa: A Review of Malawi and Uganda. Palgrave Communications 2: 16069.

    • Search Google Scholar
    • Export Citation
  • Chouliaraki, Lillie. (2006). The Spectatorship of Suffering, London: SAGE.

  • Citron, Danielle. (2009). Cyber Civil Rights. Boston University Law Review, 89(1): 61125.

  • Citron, Danielle. (2016). Hate Crimes in Cyberspace, Cambridge: Harvard University Press.

  • Citron, Danielle. (2019). Sexual Privacy. Yale Law Journal, 128(7): 1870961.

  • Citron, Danielle and Franks, Mary Ann. (2014). Criminalizing Revenge Porn. Wake Forest Law Review, 49(2): 34592.

  • Citron, Danielle and Wittes, Benjamin. (2017). The Internet Will Not Break: Denying Bad Samaritans Section 230. Immunity Fordham Law Review, 86(2): 40123.

    • Search Google Scholar
    • Export Citation
  • Cloud, Morgan. (2018). Property Is Privacy: Locke and Brandeis in the Twenty-First Century. American Criminal Law Review, 55(1): 3775.

    • Search Google Scholar
    • Export Citation
  • Cohen, Felix. (1935). Transcendental Nonsense and the Functional Approach. Columbia Law Review, 35(6): 80949.

  • Cohen, Lloyd. (1991). Holdouts and Free Riders. Journal of Legal Studies, 20(2): 35162.

  • Cox, Joseph. (2015). How the FBI Located Suspected Admins of the Dark Web’s Largest Child Porn Site. Vice, [Online] 2 March. Available from: https://www.vice.com/en/article/jpgm7d/how-the-fbi-identified-suspects-behind-the-dark-webs-largest-child-porn-site-playpen [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Cox, Joseph. (2018). Inside the Private Forums Where Men Illegally Trade Upskirt Photos. Vice, [Online] 8 May. Available from: https://www.vice.com/en/article/gykxvm/upskirt-creepshot-site-the-candid-forum?utm_source=mbtwitter [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Croucher, Stephen. (2011). Social Networking and Cultural Adaptation: A Theoretical Model. Journal of International & Intercultural Communication, 4(4): 25964.

    • Search Google Scholar
    • Export Citation
  • Crown Prosecution Service. (2020). Indecent and Prohibited Images of Children. CPS, [Online]. Available from: https://www.cps.gov.uk/legal-guidance/indecent-and-prohibited-images-children [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Crown Prosecution Service (2022). Hate Crime. CPS, [Online]. Available from: https://www.cps.gov.uk/hate-crime [Accessed 22 July 2022].

  • Cyber Civil Rights Initiative. (2014). End Revenge Porn. Cyber Civil Rights, [Online]. Available from: https://www.cybercivilrights.org/wp-content/uploads/2014/12/RPStatistics.pdf [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Dagan, Hanoch. (1999). Takings and Distributive Justice. Virginia Law Review, 85(5): 741804.

  • Dagan, Hanoch. (2002). Market Overt as Insurance, in Lerner, Shalom and Lewinsohn-Zamir, Daphna. (eds) Essays in Honour of Joshua Weisman, Jerusalem: Harry and Michael Sacher Institute for Legislative Research and Comparative Law, 1542.

    • Search Google Scholar
    • Export Citation
  • Dagan, Hanoch. (2007). The Realist Conception of Law. University of Toronto Law Journal, 57(3): 60760.

  • Dagan, Hanoch and Heller, Michael. (2001). The Liberal Commons. Yale Law Journal, 110(4): 549624.

  • Data & Society Research Institute. (2016). Nonconsensual Image Sharing: One in 25 Americans Has Been a Victim of “Revenge Porn”. Data Society, [Online] 13 December. Available from: https://datasociety.net/pubs/oh/Nonconsensual_Image_Sharing_2016.pdf [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Davey, Tina. (2020). Until Death Do Us Part: Post-Mortem Privacy Rights for the Ante-Mortem Person. University of East Anglia: Doctoral Thesis.

    • Search Google Scholar
    • Export Citation
  • Davidson, Julia, Livingstone, Sonia, Jenkins, Sam, Gekoski, Anna, Choak, Clare, Ike, Tarela et al (2019). Adult Online Hate, Harassment and Abuse. UK Council for Internet Safety, [Online] June. Available from: https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/811450/Adult_Online_Harms_Report_2019.pdf [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Davies, Caroline. (2015a). Revenge Porn Cases Increase Considerably, Police Figures Reveal. The Guardian, [Online] 15 July. Available from: www.theguardian.com/technology/2015/jul/15/revenge-porn-cases-increase-police-figures-reveal [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Davies, Paul. (2011). Accessory Liability for Assisting Torts Cambridge Law Journal, 70(2): 35380.

  • Davies, Paul. (2015). Accessory Liability. Oxford: Hart.

  • Davies, Paul. (2016). Accessory Liability in Tort. Law Quarterly Review, 132: 1519.

  • Davis, Antigone. (2019). Detecting Non-Consensual Intimate Images and Supporting Victims. Facebook, [Online] 15 March. Available from: https://about.fb.com/news/2019/03/detecting-non-consensual-intimate-images/ [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Deakin, Simon. (2012). Markesinis & Deakin on Tort Law, 7th edn. Oxford: Oxford University Press.

  • Department for Digital, Culture, Media & Sport. (2019). Online Harms White Paper (CP 57). Available from: https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/973939/Online_Harms_White_Paper_V2.pdf [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Descheemaeker, Eric. (2015). The Harms of Privacy. Journal of Media Law, 7(2): 278306.

  • Descheemaeker, Eric. (2018). Claimant-Focused Damages in the Law of Privacy, in Varuhas, Jason and Moreham, Nicole (eds) Remedies for Breach of Privacy, Oxford: Hart, 14363.

    • Search Google Scholar
    • Export Citation
  • Determann, Lothar. (2018). No One Owns Data. Hastings Law Journal, 70(1): 144.

  • Dillof, Anthony. (2017). Possession, Child Pornography, and Proportionality: Criminal Liability for Aggregate Harm Offenses. Florida State University Law Review, 44(4): 133154.

    • Search Google Scholar
    • Export Citation
  • Dodd, Vikram. (2019). Targeting of Supt Robyn Williams ‘Example of Met Institutional Racism’. The Guardian, [Online] 26 November. Available from: https://www.theguardian.com/uk-news/2019/nov/26/police-officer-robyn-williams-sentenced-unpaid-work-possessing-child-abuse-video [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Dodge, Alexa. (2018). Cyber Harm, ‘Real’ Harm, Emotional Harm: Legal Conceptions of the Harm Caused by Non-Consensual Intimate Image Sharing. American Law and Society Association, 9 June, Toronto.

    • Search Google Scholar
    • Export Citation
  • Dori, Roni. (2018). I’m Going to Be a Revenge Porn Victim for the Rest of My Life. Haaretz, [Online] 4 January. Available from: https://www.haaretz.com/world-news/europe/2018-01-17/ty-article-magazine/.premium/im-going-to-be-a-revenge-porn-victim-for-the-rest-of-my-life/0000017f-e540-d7b2-a77f-e7474d740000 [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Douglas, Simon and Goold, Imogen. (2016). Property in Human Biomaterials: A New Methodology. Cambridge Law Journal, 75(3): 478504.

  • Duch-Brown, Nestor, Martens, Bertin and Mueller-Langer, Frank. (2017). The Economies of Ownership, Access and Trade in Digital Data .Seville: European Commission.

    • Search Google Scholar
    • Export Citation
  • Dworkin, Andrea. (1981). Pornography: Men Possessing Women .London: The Women’s Press.

  • Dworkin, Ronald. (1977). Taking Rights Seriously. Cambridge: Harvard University Press.

  • Dworkin, Ronald. (1986). Law’s Empire .London: Fontana Press.

  • Eaton, Asia, Jacobs, Holly and Ruvalcaba, Yanet. (2017). Nationwide Online Study of Nonconsensual Porn Victimization and Perpetration: A Summary Report. CCRI, [Online] June. Available from: https://www.cybercivilrights.org/wp-content/uploads/2017/06/CCRI-2017-Research-Report.pdf [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Edwards, Lillian. (2009). The Rise and Fall of Intermediary Liability Online, in Edwards, L. and Waelde, C. (eds) Law and the Internet, 3rd edn. London: Hart, 4788.

    • Search Google Scholar
    • Export Citation
  • Edwards, Lillian. (2018). With Great Power Comes Great Responsibility? The Rise of Platform Liability, in Edwards, L. (ed) Law, Policy and Internet, London: Bloomsbury. 25390.

    • Search Google Scholar
    • Export Citation
  • Edwards, Lilian and Harbinja, Edina. (2013). Protecting Post-Mortem Privacy: Reconsidering the Privacy Interests of the Deceased in a Digital World. Cardozo Arts & Entertainment Law, 32(1): 83130.

    • Search Google Scholar
    • Export Citation
  • Edwards, Valerie. (2018b). Student Whose Girlfriend Killed Herself after He Threatened Her with Revenge Porn Could Face Trial. NZ Herald, [Online] 11 June. Available from: https://www.nzherald.co.nz/world/news/article.cfm?c_id=2&objectid=12068489 [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Electoral Commission. (2018). Analysis of Cases of Alleged Electoral Fraud in the UK in 2017: Summary of Data Recorded by Police Forces 2018. Available from: https://www.electoralcommission.org.uk/__data/assets/pdf_file/0006/239973/Fraud-allegations-data-report-2017.pdf [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Electronic Frontier Foundation. (2015). Manila Principles on Intermediary Liability. Manila Principles, [Online]. Available from: https://www.manilaprinciples.org [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Electronic Frontier Foundation. (2018). The Santa Clara Principles on Transparency and Accountability in Content Moderation. Santa Clara Principles, [Online]. Available from: https://santaclaraprinciples.org [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Elyachar, Jacob. (2018). Young Social Media Users Ignore Facebook, Embrace WhatsApp as Primary News Source. Tech Times, [Online] 14 June. Available from: www.techtimes.com/articles/230255/20180614/young-social-media-users-ignore-facebook-embrace-whatsapp-as-primary-news-source.htm [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Englehardt, Steven. (2019). No Boundaries: Exfiltration of Personal Data by Session-Replay Scripts. Freedom to Tinker, [Online] 15 November. Available from: https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-personal-data-by-session-replay-scripts/ [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • European Commission. (2017). Tackling Illegal Content Online: Towards an Enhanced Responsibility of Online Platforms, Brussels: European Commission.

    • Search Google Scholar
    • Export Citation
  • European Commission. (2018a). Overview of the Legal Framework of Notice-and-Action Procedures in Member States SMART 2016/0039 – Final Report, Brussels: Directorate-General for Communication Network, Content and Technology.

    • Search Google Scholar
    • Export Citation
  • European Commission. (2018b). Proposal for a Regulation of the European Parliament and of the Council on Preventing the Dissemination of Terrorist Content Online, Brussels: Directorate-General for Migration and Home Affairs.

    • Search Google Scholar
    • Export Citation
  • Facebook. (2018–current). Transparency Reports. Facebook, [Online]. Available from: https://transparency.facebook.com [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Facebook. (2019). 2019 Community Standards Report. Facebook, [Online]. Available from: https://transparency.facebook.com/community-standards-enforcement [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Facebook. (2020). Facebook Reports First Quarter 2020 Results. Facebook, [Online] 29 April. Available from: https://investor.fb.com/investor-news/press-release-details/2020/Facebook-Reports-First-Quarter-2020-Results/default.aspx [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Farber, Daniel and McDonnell, Brett. (2003). Why (and How): Fairness Matters at the IP/Antitrust Interface. Minnesota Law Review, 87: 181770.

    • Search Google Scholar
    • Export Citation
  • Fight the New Drug. (2020a). Can the Line between Consent and Coercion Get Blurred during Porn Production? Fight the New Drug, [Online] 15 July. Available from: https://fightthenewdrug.org/consent-and-coercion-blurred-in-porn-production/ [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Fight the New Drug. (2020b). Pornhub Reportedly Refused to Remove Videos of This Minor’s Sexual Assault – until She Posed as Her Own Lawyer. Fight the New Drug, [Online] 14 July. Available from: https://fightthenewdrug.org/pornhub-refused-to-remove-videos-of-this-minors-sexual-assault/ (link no longer accessible) [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Fight the New Drug. (2020c). Are Porn Sites Protecting Victims of Nonconsensual Content? We Investigated, Here’s What We Found. Fight the New Drug, [Online] 14 July. Available from: https://fightthenewdrug.org/what-porn-sites-could-be-doing-to-protect-victims/ [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Fight the New Drug. (2020d). Their Private Videos Were Nonconsensually Uploaded to Pornhub, and Now These Women Are Fighting Back. Fight the New Drug, [Online] 10 April. Available from: https://fightthenewdrug.org/their-private-photos-were-shared-non-consensually-to-pornhub-and-now-these-women-are-fighting-back/ [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Fight the New Drug. (2021). 7 Cases of Nonconsensual Porn and Rape Tapes Pornhub Doesn’t Want Consumers to Know About. Fight the New Drug, [Online] 3 February. Available from: https://fightthenewdrug.org/pornhub-reportedly-profits-from-nonconsensual-videos/ [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Fletcher, George. (1972). Fairness and Utility in Tort Theory. Harvard Law Review, 85(3): 53773.

  • Fortin, Francis. (2011). Usenet Newsgroups, Child Pornography and the Role of Participants. The International Centre for Comp. Criminology, Panel Presentation at the Third Annual Illicit Networks Workshop (3 October).

    • Search Google Scholar
    • Export Citation
  • Franks, Mary Ann. (2013a). Why We Need a Federal Criminal Law Response to Revenge Porn. Concurring Opinions, [Online] 15 February. Available from: http://www.concurringopinions.com/archives/2013/02/why-we-need-a-federal-criminal-law-response-to-revenge-porn.html (link no longer accessible) [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Franks, Mary Ann. (2013b). Adventures in Victim Blaming: Revenge Porn Edition. Concurring Opinions, [Online] 1 February. Available from: www.concurringopinions.com/archives/2013/02/adventures-in-victim-blaming-revenge-porn-edition.html (link no longer accessible) [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Franks, Marie Ann. (2017). Revenge Porn Reform: A View from the Front Lines. Florida Law Review, 69(5): 1251338.

  • Friedman, Jonathan and Buono, Francis. (2000). Limiting Tort Liability for Online Third-Party Content under Section 230 of the Communications Act. Federal Communications Law Journal, 52(3): 64766.

    • Search Google Scholar
    • Export Citation
  • Friedmann, Daniel. (1989). The Efficient Breach Fallacy. Journal of Legal Studies, 18(1): 124.

  • Frosio, Giancarlo. (2017a). Internet Intermediary Liability: WILMap, Theory and Trends. International Journal of Learning Technology, 13(1): 1638.

    • Search Google Scholar
    • Export Citation
  • Frosio, Giancarlo. (2017b). Death of ‘No Monitoring Obligations’: A Story of Untameable Monsters. Journal of Intellectual Property, Information Technology and Electronic Commerce, 8(3): 199215.

    • Search Google Scholar
    • Export Citation
  • Frosio, Giancarlo. (2017c). From Horizontal to Vertical: An Intermediary Liability Earthquake in Europe. Journal of Intellectual Property Law & Practice 12(7): 56575.

    • Search Google Scholar
    • Export Citation
  • Frosio, Giancarlo. (2017d). Reforming Intermediary Liability in the Platform Economy: A European Digital Single Market Strategy. Northwestern Law Review, 112: 1946.

    • Search Google Scholar
    • Export Citation
  • Frosio, Giancarlo. (2020). Email correspondence to Tsachi Keren-Paz, 8 February.

  • Frosio, Giancarlo and Mendis, S. (2020). Monitoring and Filtering: European Reform or Global Trend? in Frosio, Giancarlo. (ed) The Oxford Handbook of Online Intermediary Liability, Oxford: Oxford University Press, 54465.

    • Search Google Scholar
    • Export Citation
  • Fuller, Lon and Perdue, William. (1936). The Reliance Interest in Contract Damages. Yale Law Journal, 46(3): 373420.

  • Garrahan, Matthew and Croft, Jane. (2018). Philip Green Case Brings NDAs Back into the Spotlight. Financial Times, [Online] 26 October. Available from: https://www.ft.com/content/fa225f02-d873-11e8-ab8e-6be0dcf18713 [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Gauntlett, David. (1997). Ten Things Wrong with the Effects Model, in Dickinson, Roger, Harindranath, Ramaswami and Linné, Olga (eds) Approaches to Audiences: A Reader, London: Arnold, 12030.

    • Search Google Scholar
    • Export Citation
  • Gavin, Jeff and Scott, Adrian. (2019). Attributions of Victim Responsibility in Revenge Pornography. Journal of Aggression, Conflict and Peace Research, 11(4): 26372.

    • Search Google Scholar
    • Export Citation
  • Gavison, Ruth. (1980). Privacy and the Limits of Law. Yale Law Journal, 89(3): 42171.

  • Gebhart, Gennie. (2019). Who Has Your Back? Censorship Edition 2019. Electronic Frontiers Foundation, [Online] 12 June. Available from: https://www.eff.org/wp/who-has-your-back-2019#provides-meaningful-notice [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Gee, Steven. (2010). Commercial Injunctions, 6th edn. London: Sweet & Maxwell.

  • Georgaki, Konstania. Rollo, Alessandro and Giakoumakis, Emmanuel. (2016). Escaping the Slippery Slope: Freedom of Expression and Cyberspace Regulation after the Delfi Case. CUSPE Communications, [Online]. Available from: https://doi.org/10.17863/CAM.25630 [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Gewirtz-Meydan, Ateret, Walsh, Wendy, Wolak, Janis and Finkelhor, David. (2018). The Complex Experience of Child Pornography Survivors. Child Abuse and Neglect, 80: 23848.

    • Search Google Scholar
    • Export Citation
  • Gilles, Stephen. (2002). The Emergence of Cost-Benefit Balancing in English Negligence Law. University of Chicago-Kent Law Review, 77(2): 489586.

    • Search Google Scholar
    • Export Citation
  • Gilmore, Lauren. (2016). Porn Pioneers: How Adult Entertainment Boosts Technology. The Next Web, [Online] 30 August. Available from: https://thenextweb.com/news/porn-pioneers-adult-entertainment-boosts-technology [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Glassman, Jordan. (2020). Too Dangerous to Exist: Holding Compromised Internet Platforms Strictly Liable under the Doctrine of Abnormally Dangerous Activities. North Carolina Journal of Law and Technology, 22(2): 293333.

    • Search Google Scholar
    • Export Citation
  • Goldman, Eric. (2008). The Sex Tape Problem … and a Possible Legislative Solution? Technology & Marketing Law, [Blog] 11 July. Available from: https://blog.ericgoldman.org/archives/2008/07/the_sex_tape_pr.htm [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Goldman, Eric. (2010). Ripoff Report Isn’t Bound by Injunction against User Post–Blockowicz v Williams. Technology & Marketing Law, [Blog] 28 December. Available from: www.blog.ericgoldman.org/archives/2010/12/ripoff_report_d.htm [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Goldman, Eric. (2012). Online User Account Termination and 47 USC § 230(c)(2). UC Irvine Law Review, 2(2): 659674.

  • Goldman, Eric. (2013). What Should We Do about Revenge Porn Sites Like Texxxan? Forbes, [Online] 28 January. Available from: www.forbes.com/sites/ericgoldman/2013/01/28/what-should-we-do-about-revenge-porn-sites-like-texxxan/#5cf7fe2c7eff [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Goldman, Eric. (2014). Revenge Porn Is Bad, But It’s Not GoDaddy’s Fault. Forbes, [Online] 10 April. Available from: https://www.forbes.com/sites/ericgoldman/2014/04/10/revenge-porn-is-bad-but-its-not-godaddys-fault/#61ca3d243f6e [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Goldman, Eric. (2016). Facebook Isn’t Liable for Fake User Account Containing Non-Consensual Pornography. Forbes, [Online] 8 March. Available from: www.forbes.com/sites/ericgoldman/2016/03/08/facebook-isnt-liable-for-fake-user-account-containing-non-consensual-pornography/#33a30d7a79b2 [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Goldman, Eric. (2017). Ten Worst Section 230 Rulings of 2016 (Plus the Five Best). Technology & Marketing Law Blog, [Blog] 4 January. Available from: https://blog.ericgoldman.org/archives/2017/01/ten-worst-section-230-rulings-of-2016-plus-the-five-best.htm [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Goldman, Eric and Jin, Angie. (2018). Judicial Resolution of Nonconsensual Pornography Dissemination Cases. I/S: A Journal of Law and Policy for the Information Society, 14(2): 283352.

    • Search Google Scholar
    • Export Citation
  • Government Equalities Office. (2015). Hundreds of Victims of Revenge Porn Seek Support from Helpline. Government Equalities Office, [Online] 23 August. Available from: https://www.gov.uk/government/news/hundreds-of-victims-of-revenge-porn-seek-support-from-helpline [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Gray, Anthony. (2018). Vicarious Liability: Critique and Reform, Oxford: Hart.

  • Green, Sarah and Randall, John. (2009). The Tort of Conversion, Oxford: Hart.

  • Greenberg, Andy. (2014). Hacked Celeb Pics Made Reddit Enough Cash to Run Its Servers for a Month. Wired, [Online] 10 September. Available from: https://www.wired.com/2014/09/celeb-pics-reddit-gold/ [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Guo, Richard. (2008). Stranger Danger and the Online Social Network. Berkley Tech Law Journal, 23(1): 61744.

  • Haber, Eldar. (2016). Privatization of the Judiciary. Seattle University Law Review, 40(1): 11572.

  • Halley, Janet. (2006). Split Decisions: How and Why to Take a Break from Feminism, New Jersey: Princeton University Press.

  • Halliday, Josh. (2015). Revenge Porn: 175 Cases Reported to Police in Six Months. The Guardian, [Online] 11 October. Available from: https://www.theguardian.com/uk-news/2015/oct/11/revenge-porn-175-cases-reported-to-police-in-six-months [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Hamilton, Fiona. (2021). Police Officer Robyn Williams Sacked over Child Abuse Video Wins Her Job Back. The Times, [Online] 17 June. Available from: https://www.thetimes.co.uk/article/police-officer-sacked-over-child-abuse-video-wins-her-job-back-after-appeal-g7g0dhrfp [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Hamilton, Melissa. (2012). The Child Pornography Crusade and Its Net-Widening Effect. Cardozo Law Review, 33(4): 16791729.

  • Harari, Yuval Noah. (2016). Homo Deus: A Brief History of Tomorrow, London: Penguin.

  • Harn Lee, Yin. (2019). Delivering (Up). A Copyright-Based Remedy for Revenge Porn. Journal of International Property Law & Practice, 14(2): 99111.

    • Search Google Scholar
    • Export Citation
  • Hartshorne, John. (2012). An Appropriate Remedy for the Publication of False Private Information. Journal of Media Law, 4(1): 93116.

  • Hedley, Steve. (2009). Looking Outward or Looking Inward? Obligations Scholarship in the Early 21st Century, in Robertson, Andrew and Tang, Hang Wu. (eds) The Goals of Private Law, London: Hart, 193214.

    • Search Google Scholar
    • Export Citation
  • Helman, Lital and Parchomovsky, Gideon. (2011). The Best Available Technology Standard. Columbia Law Review, 111(6): 1194242.

  • Henry, Nicola and Powell, Anastasia. (2018). Technology-Facilitated Sexual Violence: A Literature Review of Empirical Research. Trauma, Violence & Abuse, 19(2): 195208.

    • Search Google Scholar
    • Export Citation
  • Henry, Nicola, Powell, Anastasia and Flynn, Asher. (2017). Not Just ‘Revenge Pornography’: Australians Experiences of Image-Based Abuse: A Summary Report. RMIT University, [Online] May. Available from: https://researchmgt.monash.edu/ws/portalfiles/portal/214045352/revenge_porn_report_2017.pdf [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Henry, Nicola, Flynn, Asher and Powell, Anastasia. (2019). Responding to Revenge Pornography: Prevalence, Nature and Impacts, Melbourne: Criminology Research Advisory Council.

    • Search Google Scholar
    • Export Citation
  • Hepburn, Carol L. (2021). Savage Lawyers, Seattle. Email correspondence to Tsachi Keren-Paz, 8 September.

  • Hern, Alex. (2019). Revealed: Catastrophic Effects of Working as a Facebook Moderator. The Guardian, [Online] 17 September. Available from: https://www.theguardian.com/technology/2019/sep/17/revealed-catastrophic-effects-working-facebook-moderator [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Hessick, Carissa B. (ed) (2016). Refining Child Pornography Law, Ann Arbor: University of Michigan Press.

  • Hill, Rachel. (2015). Cyber-Misogyny: Should Revenge Porn Be Regulated in Scotland and if So How? SCRIPT-ed, 12(2): 11740.

  • Hoboken, Joris and Keller, Daphne. (2019). Design Principles for Intermediary Liability Laws. Transatlantic Working Group, [Online] 8 October. Available from: https://www.ivir.nl/publicaties/download/Intermediary_liability_Oct_2019.pdf [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Holland, David. (2014). Remedies after Coventry v Lawrence: Shelfer Shelved? Landmark Chambers, [Online]. Available from: https://www.landmarkchambers.co.uk/wp-content/uploads/2018/07/DMH-CovLawrence.pdf. [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Holten, Emma. (2020). Consent. Frikson, [Online] 14 June. Available from: https://friktionmagasin.dk/consent-86fe7b14282f [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Horwitz, Morton. (1977). The Transformation of American Law 1780–1860, Cambridge: Harvard University Press.

  • Howden, Spence. (2019). Text Messages Are Property: Why You Don’t Own Your Text Messages, but It’d Be a Lot Cooler if You Did. Washington and Lee Law Review, 76(2): 1074126.

    • Search Google Scholar
    • Export Citation
  • Hunt, Chris. (2011). Conceptualizing Privacy and Elucidating Its Importance: Foundational Considerations for the Development of Canada’s Fledgling Privacy Tort. Queen’s Law Journal, 37(1): 16799.

    • Search Google Scholar
    • Export Citation
  • Husovec, Marti and Peguera, Miquel. (2015). Much Ado about Little: Privately Litigated Internet Disconnection Injunctions. International Review of Intellectual Property and Competition Law, 46(1): 1037.

    • Search Google Scholar
    • Export Citation
  • Ibbetson, David. (2001). A Historical Introduction to the Law of Obligations, Oxford: Oxford University Press.

  • ICF Consulting Services Limited. (2019). Research into Online Platforms Operating Models and Management of Online Harms, London: Department for Digital, Culture, Media & Sport.

    • Search Google Scholar
    • Export Citation
  • Irish News. (2018). Facebook in Legal Settlement over Naked Picture of Northern Ireland Girl (14). Irish News, [Online] 9 January. Available from: www.irishnews.com/news/northernirelandnews/2018/01/09/news/facebook-in-legal-settlement-over-naked-picture-of-northern-ireland-girl-14--1228484/ [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Isaac, Mike. (2019). Facebook’s Profits and Revenue Climb as It Gains More Users. New York Times, [Online] 30 January. Available from: https://www.nytimes.com/2019/01/30/technology/facebook-earnings-revenue-profit.html [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Isaacs, Kate. (2019). Pornhub: The Ongoing Revenge Porn Investigation. Open Access Government, [Online] 29 October. Available from: https://www.openaccessgovernment.org/revenge-porn-investigation/76810/ [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Isaacs, Kate. (2020). Pornhub Needs to Change – or Shut Down. The Guardian, [Online] 9 March. Available from: https://www.theguardian.com/global-development/2020/mar/09/pornhub-needs-to-change-or-shut-down [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Ivanova, Yordanka. (2020). Data Controller, Processor, or Joint Controller: Towards Reaching GDPR Compliance in a Data- and Technology Driven World, in Tzanou, Maria. (ed) Personal Data Protection and Legal Developments in the European Union, Hershey: IGI Global, 6184.

    • Search Google Scholar
    • Export Citation
  • Jacob, Assaf. (2012). Daaka’s Ache and the Evolution of ‘Harm to Plaintiff’s Autonomy’. Hebrew University Law Review, 42: 585.

    • Search Google Scholar
    • Export Citation
  • Jenkins, Phillip. (2001). Beyond Tolerance: Child Pornography on the Internet, New York: New York University Press.

  • Jinana, Haider. (2020). The English Torts of Defamation and (False) Privacy: Analysing the Impact of the Overlap on Defences, Interim Injunctions and Damages. Keele: PhD Dissertation.

    • Search Google Scholar
    • Export Citation
  • Kamal, Mudasir and Newman, William. (2016). Revenge Pornography: Mental Health Implications and Related Legislation. Journal of the American Academy of Psychiatry and the Law, 44(3): 35967.

    • Search Google Scholar
    • Export Citation
  • Kanecek, Vaclav. (2018). Ownership of Personal Data in the Internet of Things. Computer Law & Security Review, 34(5): 103952.

  • Kaplow, Louis and Shavell, Steven. (1996). Accuracy in the Assessment of Damages. Journal of Law and Economics, 39(1): 191210.

  • Karanian, Lara. (2019). Stripped of Dignity? Humiliation, Privacy and the Punishment of Revenge Porn. LSA Annual Conference, 31 May, Toronto.

    • Search Google Scholar
    • Export Citation
  • Keating, Gregory. (2000). Distributive and Corrective Justice in the Tort Law of Accidents. Southern California Law Review, 74(1): 193224.

    • Search Google Scholar
    • Export Citation
  • Keating, Gregory. (2001). The Theory of Enterprise Liability and Common Law Strict Liability. Vanderbilt Law Review, 54(3): 1285336.

  • Keating, Gregory. (2003a). Irreparable Injury and Extraordinary Precaution: The Safety and Feasibility Norms in American Accident Law. Theoretical Inquiries in Law, 4(1): 188.

    • Search Google Scholar
    • Export Citation
  • Keating, Gregory. (2003b). Pressing Precaution beyond the Point of Cost-Justification. Vanderbilt Law Review, 56(3): 653750.

  • Keating, Gregory. (2012). The Priority of Respect over Repair. Legal Theory, 18(3): 293338.

  • Keating, Gregory. (2018). Principles of Risk Imposition and the Priority of Avoiding Harm. Revus, 36: 130.

  • Keating, Gregory. (2019). Justice for Guinea Pigs. Law Innovation and Technology, 11(1): 7592.

  • Keller, Daphne. (2017a). SESTA and the Teachings of Intermediary Liability. SSRN, [Online] 2 November. Available from: www.ssrn.com/abstract=3121296 [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Keller, Daphne. (2017b). Problems with Filters in the European Commission’s Platforms Proposal. CIS Blog, [Blog] 5 October. Available from: http://cyberlaw.stanford.edu/blog/2017/10/problems-filters-european-commissions-platforms-proposal [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Keller, Daphne and Leersen, Paddy. (2020). Facts and Where to Find Them: Empirical Research on Internet Platforms and Content Moderation, in Persily, Nathaniel and Tucker, Joshua. (eds) Social Media and Democracy: The State of the Field and Prospects for Reform, Cambridge: Cambridge University Press, 22051.

    • Search Google Scholar
    • Export Citation
  • Kennedy, Duncan. (1982). Distributive and Paternalist Motives in Contract and Tort Law, with Special Reference to Compulsory Terms and Unequal Bargaining Power. Maryland Law Review, 41(4): 563635.

    • Search Google Scholar
    • Export Citation
  • Keren-Paz, Tsachi. (2003). Egalitarianism as Justification: Why and How Should Egalitarian Considerations Reshape the Standard of Care in Negligence Law. Theoretical Inquiries in Law, 4(1): 160.

    • Search Google Scholar
    • Export Citation
  • Keren-Paz, Tsachi. (2007a). Torts, Egalitarianism and Distributive Justice, Farnham: Ashgate.

  • Keren-Paz, Tsachi. (2007b). Compensating Injury to Autonomy: Normative Evaluation, Recent Developments and Future Tendencies. Colman Law Review 22: 187266.

    • Search Google Scholar
    • Export Citation
  • Keren-Paz, Tsachi. (2010). Poetic Justice: Why Sex-Slaves Should Be Allowed to Sue Ignorant Clients in Conversion. Law & Philosophy, 29: 30736.

    • Search Google Scholar
    • Export Citation
  • Keren-Paz, Tsachi. (2013). Sex Trafficking: A Private Law Response, Abingdon: Routledge.

  • Keren-Paz, Tsachi. (2014). Injuries from Unforeseeable Risks which Advance Medical Knowledge: Restitution-Based Justification for Strict Liability. Journal of European Tort Law, 5(3): 275309.

    • Search Google Scholar
    • Export Citation
  • Keren-Paz, Tsachi. (2016). Liability for Consequences, Duty of Care and the Limited Relevance of Specific Reliance: New Insights on Bhamra v Dubb .Journal of Professional Negligence, 32(1): 4865.

    • Search Google Scholar
    • Export Citation
  • Keren-Paz, Tsachi. (2017). Compensating Injury to Autonomy: A Conceptual and Normative Analysis, in Barker, Kit, Fairweather, Karen and Grantham, Ross. (eds) Private Law in the Twenty-First Century, Oxford: Hart, 41137.

    • Search Google Scholar
    • Export Citation
  • Keren-Paz, Tsachi. (2018). Compensating Injury to Autonomy in English Negligence Law: Inconsistent Recognition. Medical Law Review, 26(4): 585609.

    • Search Google Scholar
    • Export Citation
  • Keren-Paz, Tsachi. (2019a). No-fault (strict): Liability for Injuries from Innovative Treatments: Fairness or also Efficiency? Law, Innovation and Technology, 11(4): 5574.

    • Search Google Scholar
    • Export Citation
  • Keren-Paz, Tsachi. (2019b). Gender Injustice in Compensating Injury to Autonomy in English and Singaporean Negligence Law. Feminist Legal Studies, 27(1): 3356.

    • Search Google Scholar
    • Export Citation
  • Keren-Paz, Tsachi. (2020). The Uncreditworthy’s Tale: Personalized Default Rules and the Problem of Tracking. Tel Aviv University Law Review, 42(2): 42146.

    • Search Google Scholar
    • Export Citation
  • Keren-Paz, Tsachi and Cockburn, Tina. (eds) (2019). Regulating Innovative Treatments: Information, Risk Allocation and Redress. Law, Innovation and Technology, Special Issue, 11(1): 1174.

    • Search Google Scholar
    • Export Citation
  • Keren-Paz, Tsachi and Wright, Richard. (2019). Liability for Mass Sexual Abuse. American Criminal Law Review, 56(1): 185234.

  • Kleeman, Jenny. (2018). YouTube Star Wins Damages in Landmark UK ‘Revenge Porn’ Case. The Guardian, [Online] 17 January. Available from: www.theguardian.com/technology/2018/jan/17/youtube-star-chrissy-chambers-wins-damages-in-landmark-uk-revenge-porn-case [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Knight, Lewis. (2021). Sharon Stone Says She Was Not Warned about Explicit Shot in Basic Instinct Scene. The Mirror, [Online] 18 March. Available from: https://www.mirror.co.uk/3am/celebrity-news/sharon-stone-says-not-warned-23756519 [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Kosseff, Jeff. (2010). Defending Section 230: The Value of Intermediary Immunity. Journal of Technology Law and Policy, 15(2): 12358.

    • Search Google Scholar
    • Export Citation
  • Kowalski, Robin, Limber, Susan and Agatson, Patricia. (2008). Cyberbullying: Bullying in the Digital Age, Oxford: Oxford University Press.

    • Search Google Scholar
    • Export Citation
  • Kristof, Nicholas. (2020). The Children of Pornhub. New York Times, [Online] 4 December. Available from: https://www.nytimes.com/2020/12/04/opinion/sunday/pornhub-rape-trafficking.html [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Kronman, Anthony. (1978). Mistake, Disclosure, Information, and the Law of Contracts. Journal of Legal Studies, 7(1): 134.

  • Kuwert, Phillipp, Glaesmer, Heide, Eichhorn, Svenja, Grundke, Elena, Pietrzak, Robert H. and Freyberger, Harald J. et al (2014). Long-Term Effects of Conflict-Related Sexual Violence Compared with Non-Sexual War Trauma in Female World War II Survivors: A Matched Pairs Study. Archives of Sexual Behaviour 43(6): 105964.

    • Search Google Scholar
    • Export Citation
  • La, Lynn. (2018). YouPorn’s Cringey Revenge Porn Video Is a Step in the Right Direction. CNET, [Online] 27 March. Available from: https://www.cnet.com/news/revenge-porn-youporn-reporting-tool/#.

    • Search Google Scholar
    • Export Citation
  • Laidlaw, Emily and Young, Hilary. (2017). Internet Intermediary Liability in Defamation: Proposals for Statutory Reform, Ontario: Law Commission of Ontario.

    • Search Google Scholar
    • Export Citation
  • Laidlaw, Emily and Young, Hilary. (2019). Internet Intermediary Liability in Defamation. Osgoode Hall Law Journal, 56(1): 153202.

  • Laidlaw, Emily and Young, Hilary. (2020). Creating a Revenge Porn Tort for Canada. Supreme Court Law Review, 96(2): 14787.

  • Lanier, Jaron. (2018). Ten Arguments for Deleting your Social Media Accounts Right Now, New York: Random House.

  • Larusdottir, Jónína Sigrún. (2010). Liability of Intermediaries for Copyright Infringement in the Case of Hosting on the Internet. Stockholm Institute for Scandinavian Law, 472–88.

    • Search Google Scholar
    • Export Citation
  • Law Commission. (2021). Intimate Image Abuse: Consultation Paper (CP 253), London: Stationary Office.

  • Law Commission. (2022). Intimate Image Abuse: A Final Report (Law Com No 407), London: Stationary Office.

  • Lessig, Larry. (2002). Privacy as Property. Social Research, 69(1): 24769.

  • Lippman, Julia and Campbell, Scott. (2014). Damned if You Do, Damned if You Don’t … if You’re a Girl: Relational and Normative Contexts of Adolescent Sexting in the United States. Journal of Children and Media, 8(4): 37186.

    • Search Google Scholar
    • Export Citation
  • Lipton, Jacqueline. (2011). Combating Cyber-Victimization. Berkeley Tech Law Review, 26(2): 110454.

  • Llewellyn, Karl. (1931). Some Realism about Realism: Responding to Dean Pound. Harvard Law Review, 44(8): 122264.

  • Lollar, E Cortney. (2013). Child Pornography and the Restitution Revolution. The Journal of Criminal Law and Criminology, 103(2): 34383.

    • Search Google Scholar
    • Export Citation
  • Lopez, Tess, Allenbaugh, Mark and Ellis, Alan. (2012). Trends and Practice Tips for Representing Child Pornography Offenders at Sentencing. Criminal Justice, 27(3): 312.

    • Search Google Scholar
    • Export Citation
  • LoPiano, James. (2018). Public For a Purpose: Analyzing Viewpoint Discrimination on the President’s Twitter Account. Fordham Intellectual Property, Media & Entertainment Law Journal, 28(3): 51170.

    • Search Google Scholar
    • Export Citation
  • Lunney, Mark, Nolan, Donal and Oliphant, Ken. (2017). Tort Law, 6th edn. Oxford: Oxford University Press.

  • Lytton, Timothy. (ed) (2005). Suing the Gun Industry, Ann Arbor: University of Michigan Press.

  • Mabie, Margaret E. (2021). Email correspondence to Tsachi Keren-Paz, 8 September.

  • Mackie, Jeannie. (2014). Jennifer Lawrence’s Nude Photo Leak Was a Scandal, but Legally Speaking It Was Not a Sex Crime. The Independent, [Online] 10 October. Available from: https://www.independent.co.uk/voices/comment/jennifer-lawrence-s-nude-photo-leak-was-scandal-legally-speaking-it-was-not-sex-crime-9786886.html [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Mackinnon, Catharine. (2011). Trafficking, Prostitution, and Inequality. Harvard Civil Rights Civil Liberties Law Review, 46(2): 271310.

    • Search Google Scholar
    • Export Citation
  • Mangan, David. (2017). The Relationship between Defamation, Breach of Privacy and Other Legal Claims Involving Offensive Internet Content, Toronto: Law Commission of Ontario.

    • Search Google Scholar
    • Export Citation
  • Marshall, Jojo. (2014). Why We All Need to Worry about Revenge Porn. Elle, [Online] 24 September. Available from: https://www.elle.com/life-love/sex-relationships/news/a15497/what-is-revenge-porn/ [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Marshall, Tom. (2016). YouTube Star in £22,000 Crowdfunding Bid to Finance Revenge Porn Legal Battle. The Evening Standard, [Online] 28 February. Available from: https://www.standard.co.uk/news/crime/youtube-star-in-ps22-000-crowdfunding-bid-to-finance-revenge-porn-claim-a3190901.html [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Marwick, Alice. (2017). Scandal or Sex Crime? Gendered Privacy and the Celebrity Nude Photo Leaks. Ethics and Information Technology, 19: 17791.

    • Search Google Scholar
    • Export Citation
  • Mautner, Menachem. (1991). The Eternal Triangles of the Law: Toward a Theory of Priorities in Conflicts Involving Remote Parties. Michigan Law Review, 90(1): 95154.

    • Search Google Scholar
    • Export Citation
  • McAteer, Oliver. (2017). Anthony Weiner Jailed for Sexting Underage Girl Photos of his Penis. Metro, [Online] 25 September. Available from: www.metro.co.uk/2017/09/25/anthony-weiner-jailed-for-sexting-underage-girl-photos-of-his-penis-6954415/ [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • McBride, Nicolas. (2019). The Humanity of Private Law: Explanation, London: Hart.

  • McGlynn, Clare and Rackley, Erica. (2017). Image-Based Sexual Abuse. OJLS, 37(3): 53461.

  • McGlynn, Clare, Rackley, Erica and Houghton, Ruth. (2017). Beyond ‘Revenge Porn’: The Continuum of Image-Based Sexual Abuse. Feminist Legal Studies, 25: 2546.

    • Search Google Scholar
    • Export Citation
  • McGlynn, Clare, Johnson, Kelly, Rackley, Erika, Henry, Nicola,Gavey, Nicola and Flynn, Asher et al (2021). It’s Torture for the Soul’: The Harms of Image-Based Sexual Abuse. Social & Legal Studies, 30(4): 54162.

    • Search Google Scholar
    • Export Citation
  • McIntyre, T.J. (2018). Internet Censorship in the United Kingdom: National Schemes and European Norms, in Edwards, Lillian (ed) Law, Policy and the Internet, 3rd edn. London: Hart, 291331.

    • Search Google Scholar
    • Export Citation
  • McPhail, Beverly. (2015). Feminist Framework Plus: Knitting Feminist Theories of Rape Etiology into a Comprehensive Model. Trauma, Violence, & Abuse, 17(3): 31429.

    • Search Google Scholar
    • Export Citation
  • Merrill, Thomas. (1986). The Economics of Public Use. Cornell Law Review 72(1): 61116.

  • Merrill, Thomas. (1998). Property and the Right to Exclude. Nebraska Law Review, 77(4): 73055.

  • Meta. (2021). Facebook Community Standards; Part III Objectionable Content; Adult Nudity and Sexual Activity. Meta, [Online]. Available from https://www.facebook.com/communitystandards/adult_nudity_sexual_activity [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Michels, Johan and Millard, Christopher. (2019). Mind the Gap: The Status of Digital Files under Property Law. Queen Mary School of Law Legal Studies Research Paper No 317/2019, [Online]. Available from: https://ssrn.com/abstract=3387400 [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Mohan, Megha. (2020). I was Raped at 14, and the Video Ended Up on a Porn Site. BBC, [Online] 10 February. Available from: https://www.bbc.co.uk/news/stories-51391981 [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Mooney, Annabelle (2014). Restoring Trust: Plachimada, the Human Trust and Anticipatory Negligence as Restorative Justice. International Journal for the Semiotics of Law, 27(2): 24361.

    • Search Google Scholar
    • Export Citation
  • Moore, Caitlin. (2014). Jennifer Lawrence on Hacked Photos: Anybody Who Looked at Those Pictures, You’re Perpetuating a Sexual Offence. Washington Post, [Online] 7 October. Available from: https://www.washingtonpost.com/news/arts-and-entertainment/wp/2014/10/07/jennifer-lawrence-on-hacked-photos-anybody-who-looked-at-those-pictures-youre-perpetuating-a-sexual-offense/ [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Moosavian, Rebecca. (2018). ‘Stealing Souls’? Article 8 and Photographic Intrusion. Northern Ireland Law Quarterly, 69(4): 53158.

    • Search Google Scholar
    • Export Citation
  • Moosavian, Rebecca. (2022). Pavesich v New England Insurance Co (1905), in Wragg, P. and Coe, P. (eds) Landmark Cases in Privacy, Oxford: Hart, chapter 3.

    • Search Google Scholar
    • Export Citation
  • Moreham, Nicole. (2005). Privacy in the Common Law: A Doctrinal and Theoretical Analysis. Law Quarterly Review, 121: 62836.

  • Moreham, Nicole. (2018a). Compensating for Loss of Dignity and Autonomy, in Varuhas, Jason and Moreham, Nicole (eds) Remedies for Breach of Privacy, Oxford: Hart, 12542.

    • Search Google Scholar
    • Export Citation
  • Moreham, Nicole. (2018b). Unpacking the Reasonable Expectation of Privacy Test. Law Quarterly Review, 134: 65174.

  • Moreham, Nicole (2019). Privacy, Reputation and Alleged Wrongdoing: Why Police Investigations Should Not Be Regarded as Private. Journal of Media Law, 11(2): 14262.

    • Search Google Scholar
    • Export Citation
  • Morgan, Bronwen. (2007). The Intersection of Rights and Regulation .Farnham: Ashgate.

  • Mullis, Alistair, Parkes, Richard and Busuttil, Godwin. (eds) (2013). Gately on Libel and Slander, 12th edn. London: Sweet & Maxwell.

  • Murphy, John. (2007). Rethinking Injunctions in Tort Law. Oxford Journal of Legal Studies, 27(3): 50936.

  • Murphy, John. (2022). The Province and Politics of the Economic Torts, Oxford: Hart.

  • Nehushtan, Yossi. (2007). The Limits of Tolerance: A Substantive-Liberal Perspective. Ratio Juris, 20(2): 23057.

  • Netanel, Neil W. (2000). Market Hierarchy and Copyright in Our System of Free Expression. Vanderbilt Law Review, 53(6): 1879932.

  • Newton, Casey. (2019). The Trauma Floor. The Verge, [Online] 25 February. Available from: https://www.theverge.com/2019/2/25/18229714/cognizant-facebook-content-moderator-interviews-trauma-working-conditions-arizona. [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Nicklin, Matthew and Strong, Chloe. (2016). Remedies and Sanctions, in Moreham, Nicole and Warby, Mark (eds) Tugendhat and Christie: The Law of Privacy and The Media, 3rd edn. Oxford: Oxford University Press, 555–619.

    • Search Google Scholar
    • Export Citation
  • North, Anna. (2018). The Disturbing Story Behind the Rape Scene in Bernardo Bertolucci’s Last Tango in Paris, explained. Vox, [Online] 26 November. Available from: https://www.vox.com/2018/11/26/18112531/bernardo-bertolucci-maria-schneider-last-tango-in-paris [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • O’Brien, Ashley Sara. (2018). Woman Awarded $6.45 Million in Revenge Porn Case. CNN [Online] 9 April. Available from: https://money.cnn.com/2018/04/09/technology/revenge-porn-judgment/index.html [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • O’Connell, Aislin and Bakina, Ksenia. (2020). Using IP Rights to Protect Human Rights: Copyright for Revenge Porn Removal. Legal Studies, 40(3): 44257.

    • Search Google Scholar
    • Export Citation
  • Oliver, Kelly. (2016). Rape as Spectator Sport and Creepshot Entertainment: Social Media and the Valorization of Lack of Consent. American Studies Journal, [Online]. Available from: http://www.asjournal.org/61-2016/rape-spectator-sport-creepshot-entertainment-social-media-valorization-lack-consent/ [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Oltermann, Phillip. (2014). Revenge Porn Victims Receive Boost from German Court Ruling. The Guardian, [Online] 22 May. Available from: www.theguardian.com/technology/2014/may/22/revenge-porn-victims-boost-german-court-ruling [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • OneLogin. (2022). What Is Multi-Factor Authentication (MFA)? OneLogin, [Online]. Available from: https://www.onelogin.com/learn/what-is-mfa [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Oster, Jan. (2015). Communication, Defamation and Liability of Intermediaries. Legal Studies, 35(2): 34868.

  • Ottenweller, Cara. (2007). Cyberbullying: The Interactive Playground Cries for a Clarification of the Communications Decency Act. Valparaiso University Law Review, 41(3): 1285334.

    • Search Google Scholar
    • Export Citation
  • Palmer, Craig. (1988). Twelve Reasons Why Rape Is Not Sexually Motivated: A Skeptical Examination. The Journal of Sex Research, 25(4): 51230.

    • Search Google Scholar
    • Export Citation
  • Parkes, Richard. (2016). Privacy, Defamation and False Facts, in Moreham, Nicole and Warby, Mark. (eds) Tugendhat and Christie: The Law of Privacy and The Media, 3rd edn. Oxford: Oxford University Press, 34985.

    • Search Google Scholar
    • Export Citation
  • Pasquale, Frank. (2016). Platform Neutrality: Enhancing Freedom of Expression in Spheres of Private Power. Theoretical Inquiries in Law, 17(2): 487514.

    • Search Google Scholar
    • Export Citation
  • Pattella-Ray, P.J. (2018). Beyond Privacy: Bodily Integrity as an Alternative Framework for Understanding Non-Consensual Pornography. Information, Communication and Society, 21(5): 78691.

    • Search Google Scholar
    • Export Citation
  • Paul, Kari. (2020). Pornhub Removes Millions of Videos after Investigation Finds Child Abuse Content. The Guardian, [Online] 14 December. Available from: https://www.theguardian.com/technology/2020/dec/14/pornhub-purge-removes-unverified-videos-investigation-child-abuse [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Peersman, Claudia, Schulze, Christian, Rashid, Awais, Brennan, Margaret and Fischer, Carl. (2016). iCOP: Live Forensics to Reveal Previously Unknown Criminal Media on P2P networks. Digital Investigation, 18: 5064.

    • Search Google Scholar
    • Export Citation
  • Peters, Jonathan. (2017). The Sovereigns of Cyberspace and State Action: The First Amendment’s Application – or Lack Thereof – to Third-Party Platforms. Berkeley Technology Law Journal, 32(2): 9891026.

    • Search Google Scholar
    • Export Citation