Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Communications Law

PDF

Federal Communications Law Journal

Internet

Articles 1 - 30 of 47

Full-Text Articles in Law

Behavioral Advertising: The Cryptic Hunter And Gatherer Of The Internet, Joanna Penn May 2012

Behavioral Advertising: The Cryptic Hunter And Gatherer Of The Internet, Joanna Penn

Federal Communications Law Journal

In an era where three out of every four Americans have Internet access, the term "surfing" has transformed from riding waves into running the risk of having private information gathered, stored, and disseminated-all without the user's knowledge or permission. This new found online practice, known as "behavioral advertising," is a veritable goldmine for those companies that know the game. But will the FTC or Congress soon make new rules concerning how to play? This Note begins by explaining the differences between behavioral targeting and retargeting and the techniques that the two methods use to collect data. This Note then explores …


Wiretapping The Internet: The Expansion Of The Communications Assistance To Law Enforcement Act To Extend Government Surveillance, Christa M. Hibbard Mar 2012

Wiretapping The Internet: The Expansion Of The Communications Assistance To Law Enforcement Act To Extend Government Surveillance, Christa M. Hibbard

Federal Communications Law Journal

Criminal use of the Internet to circumvent traditional government phone wiretaps has inspired the Obama Administration to create a proposal to expand the Communications Assistance to Law Enforcement Act ("CALEA"). CALEA was passed in 1994 to regulate telephone and broadband companies to ensure compliance with standards to enable government wiretapping. The proposed amendment of CALEA would allow the government to require all communications service providers to meet technical standards necessary to comply with a wiretap order. The expansion of CALEA would likely widen its scope to social networking sites, instant messaging, gaming consoles that allow conversation among multiple players, and …


From Betamax To Youtube: How Sony Corporation Of America V. Universal City Studios, Inc. Could Still Be A Standard For New Technology, Veronica Corsaro Mar 2012

From Betamax To Youtube: How Sony Corporation Of America V. Universal City Studios, Inc. Could Still Be A Standard For New Technology, Veronica Corsaro

Federal Communications Law Journal

Internet technological innovations, particularly the development of Peer-to-Peer ("P2P") networks and the proliferation of user-generated content sites, have introduced considerable challenges for the application of copyright law and infringement liability. The response from the courts and Congress has been mixed, with severe legal curtails being applied to P2P technology while usergenerated content sites have been afforded a level of protection against infringement claims as part of the Digital Millennium Copyright Act's section 512 "safe harbor" provisions. However, these provisions have raised concerns about the issue of secondary copyright liability, a matter that has still been left undefined. This Note will …


It’S A Mad, Mad Internet: Globalization And The Challenges Presented By Internet Censorship, Jessica E. Bauml May 2011

It’S A Mad, Mad Internet: Globalization And The Challenges Presented By Internet Censorship, Jessica E. Bauml

Federal Communications Law Journal

The advent of the Internet has brought tremendous technological advancements and growth to the world. However, it has also become a source of conflict, particularly when different countries attempt to regulate this very ubiquitous and amorphous medium. The most notable controversy has arisen in China home to the world's most advanced system of Internet censorship, which levies harsh penalties on those who violate the country's strict censorship laws. China's "Great Firewall" has raised many eyebrows and is garnishing substantial criticism in response to the human rights abuses that result from the jailing and reported torture of Chinese dissidents. Yet the …


Internet Governance And Democratic Legitimacy, Oliver Sylvain Apr 2010

Internet Governance And Democratic Legitimacy, Oliver Sylvain

Federal Communications Law Journal

Even as the Internet goes pop, federal policymakers continue to surrender their statutory obligation to regulate communications in the first instance to extralegal nongovernmental organizations comprised of technical experts. The FCC's adjudication of a dispute concerning a major broadband service provider's network management practices is a case in point. There, in the absence of any enforceable legislative or regulatory rule, the FCC turned principally to the transmission principles of the Internet Engineering Taskforce, the preeminent nongovernmental Internet engineering standard-setting organization. This impulse to defer as a matter of course to such an organization without any legal mechanism requiring as much …


Creating Effective Broadband Network Regulation, Daniel L. Brenner Jan 2010

Creating Effective Broadband Network Regulation, Daniel L. Brenner

Federal Communications Law Journal

The Internet is central to the business and pastimes of Americans. Calls for increased regulation are ongoing, inevitable, and often justified. But calls for "network neutrality" or "nondiscrimination" assume with little hesitation federal agency competence to give predictable and accurate meaning to these terms and create regulations to implement them. This Article's chief contribution to Internet policy debate is to focus attention on the likelihood of successful FCC Internet regulation-a key assumption of some advocates.

The Article analyzes three characteristics that hobble the FCC, which is the likeliest federal agency to provide prescriptive rules. First, the record for the agency …


Virtually Enabled: How Title Iii Of The Americans With Disabilities Act Might Be Applied To Online Virtual Worlds, Joshua Newton Jan 2010

Virtually Enabled: How Title Iii Of The Americans With Disabilities Act Might Be Applied To Online Virtual Worlds, Joshua Newton

Federal Communications Law Journal

The rise and popularity of online virtual worlds, such as World of Warcraft and Second Life, holds significant promise for people with disabilities. For people who are unable to easily leave home or travel, virtual worlds provide a public venue, wherein people may interact freely without the social stigma that accompanies disability. However, access to these virtual worlds may be inhibited by physical, visual, or aural impairments, and virtual-world developers can be hostile to modifying their products to mitigate these difficulties. Thus, some disability advocates have turned to Title III of the Americans with Disabilities Act, arguing that places of …


Whose Burden Is It Anyway? Addressing The Needs Of Content Owners In Dmca Safe Harbors, Greg Janson Jan 2010

Whose Burden Is It Anyway? Addressing The Needs Of Content Owners In Dmca Safe Harbors, Greg Janson

Federal Communications Law Journal

Much of today's network neutrality debate addresses concerns that cable providers will limit access to competing Web-based services delivering multimedia content. While proposals to mandate nondiscrimination for all Internet traffic surely will help create a competitive environment where online entertainment providers can prosper, ISP interference is not the only threat. Online entertainment sites that relay user-generated content are threatened by crippling litigation brought by copyright holders for actions taken by third parties using their services. Reliance on the safe harbors provided in the Digital Millennium Copyright Act has, in most cases, proved unsuccessful. This Note addresses the concerns of both …


The Never-Ending Limits Of § 230: Extending Isp Immunity To The Sexual Exploitation Of Children, Katy Noeth Jun 2009

The Never-Ending Limits Of § 230: Extending Isp Immunity To The Sexual Exploitation Of Children, Katy Noeth

Federal Communications Law Journal

In 2006, the U.S. District Court for the Eastern District of Texas extended civil liability to Yahoo! under § 230 of the Communications Decency Act so that it could not be sued for knowingly profiting from a Web site where members exchanged sexually explicit pictures of minors. The court found that the reasoning of the seminal § 230 case, Zeran v. AOL, was analogous and that policy considerations mandated its holding.

This Note argues that a multifaceted approach is needed to prevent future courts from following that decision, including an amendment to § 230 that would impose civil liability upon …


Rethinking The Communications Decency Act: Eliminating Statutory Protections Of Discriminatory Housing Advertisements On The Internet, James D. Shanahan Dec 2007

Rethinking The Communications Decency Act: Eliminating Statutory Protections Of Discriminatory Housing Advertisements On The Internet, James D. Shanahan

Federal Communications Law Journal

The recent decision in Craigslist signals a drastic reduction in the effectiveness of the prohibition on discriminatory housing advertisements under the Fair Housing Act ("FHA"). Section 230 of the Communications Decency Act gives blanket immunity to Internet Content Providers from publisher liability for content originating from third parties. One of the effects of this immunity is the creation of a monopoly for discriminatory advertisements otherwise proscribed by the FHA. This Note argues that the simplest solution for Congress is to adjust the language of § 230 by adding the FHA to the list of exceptions to statutory immunity.


Who Controls The Internet? A Review, Deborah J. Salons Jun 2007

Who Controls The Internet? A Review, Deborah J. Salons

Federal Communications Law Journal

Book Review: Who Controls the Internet? Illusions of a Borderless World, Jack Goldsmith and Tim Wu, Oxford University Press 2006.

Ms. Salons reviews Who Controls the Internet? Illusions of a Borderless World, Oxford University Press, 2006. Authored by Jack Goldsmith and Tim Wu, the book provides a history of the Internet and analyzes the nexus between globalization and government coercion. The book focuses on how these agents have shaped and developed the Internet as we are familiar with it today.


The Law Of Unintended Consequences, Susan Ness Jun 2006

The Law Of Unintended Consequences, Susan Ness

Federal Communications Law Journal

No abstract provided.


Interconnection Policy And Technological Progress, Gerald W. Brock Jun 2006

Interconnection Policy And Technological Progress, Gerald W. Brock

Federal Communications Law Journal

No abstract provided.


The Failure Of Competition Under The 1996 Telecommunications Act, Gene Kimmelman, Mark Cooper, Magda Herra Jun 2006

The Failure Of Competition Under The 1996 Telecommunications Act, Gene Kimmelman, Mark Cooper, Magda Herra

Federal Communications Law Journal

No abstract provided.


The 1996 Telecommunications Act, Jim Robbins Jun 2006

The 1996 Telecommunications Act, Jim Robbins

Federal Communications Law Journal

No abstract provided.


Digital Crossroads, Kathleen Wallman May 2005

Digital Crossroads, Kathleen Wallman

Federal Communications Law Journal

Book Review: Digital Crossroads: American Telecommunications Policy in the Internet Age, Jonathan E. Nuechterlein & Philip J. Weiser, Cambridge, Mass., MIT Press, 2005, 670 pages.

A review of Digital Crossroads: American Telecommunications Policy in the Internet Age, by Jonathan E. Nuechterlein and Philip J. Weiser, MIT Press, 2005. Most practitioners of communications law are familiar with the necessity of teaching themselves enough economics, engineering, and politics to practice competently and comfortably in an area that is inherently interdisciplinary. Likewise, many professors who teach telecommunications from a variety of disciplinary perspectives are familiar with the frustration of locating a text that …


A Horizontal Leap Forward: Formulating A New Communications Public Policy Framework Based On The Network Layers Model, Richard S. Whitt May 2004

A Horizontal Leap Forward: Formulating A New Communications Public Policy Framework Based On The Network Layers Model, Richard S. Whitt

Federal Communications Law Journal

Over the course of the last several decades, legal and structural fictions have evolved and have been integrated into the reality of communications theory and regulation. In this Article, the Author argues that the development of a "layers approach" to communications regulation of IP networks would lead to greater efficiencies while addressing public policy issues. By reconceptualizing communications regulation along horizontal layers, Mr. Whitt posits that the logical walls surrounding the key components of IP networks should be removed to promote increased functionality of communications oversight and management. In this way, the outmoded vertical separation associated with the legal legacy …


Staying Afloat In The Internet Stream: How To Keep Web Radio From Drowning In Digital Copyright Royalties, Emily D. Harwood May 2004

Staying Afloat In The Internet Stream: How To Keep Web Radio From Drowning In Digital Copyright Royalties, Emily D. Harwood

Federal Communications Law Journal

In the 1990's, the development of "streaming" technology allowed webcasters to begin broadcasting music on the Internet. The public took advantage of a plethora of free media players, and the number of web-based radio stations soared. However, a crippling dispute over broadcast rates left the viability of this technology in doubt. This Note criticizes current policies that curtail radio streaming by providing harsh financial restrictions on webcasters. In looking to the future, this Note argues that Congress should extend licensing exemptions to cover those Internet stations most like their AM/FM counterparts who do not have to pay additional fees.


Promoting Innovation To Prevent The Internet From Becoming A Wasteland, Zoe Baird May 2003

Promoting Innovation To Prevent The Internet From Becoming A Wasteland, Zoe Baird

Federal Communications Law Journal

No abstract provided.


From Vast Wasteland To Electronic Garden: Responsibilities In The New Video Environment, Charles M. Firestone May 2003

From Vast Wasteland To Electronic Garden: Responsibilities In The New Video Environment, Charles M. Firestone

Federal Communications Law Journal

No abstract provided.


What’S In A Name?, Jonathan Zittrain Dec 2002

What’S In A Name?, Jonathan Zittrain

Federal Communications Law Journal

Book Review: Ruling the Root, Milton L. Mueller, Cambridge, Mass.: MIT Press, 2002, 301 pages.

A review of Milton L. Mueller's Ruling the Root, The MIT Press, 2002. In the spring of 1998, the U.S. government told the Internet: Govern yourself. This unfocused order-a blandishment, really, expressed as an awkward "statement of policy" by the Department of Commerce, carrying no direct force of law-came about because the management of obscure but critical centralized Internet functions was at a political crossroads. In Ruling the Root, Mueller thoroughly documents the colorful history both before and after this moment of inflection, and gives …


Injunctive Relief In The Internet Age: The Battle Between Free Speech And Trade Secrets, Adam W. Johnson May 2002

Injunctive Relief In The Internet Age: The Battle Between Free Speech And Trade Secrets, Adam W. Johnson

Federal Communications Law Journal

The information revolution has led to technological innovations in the movement, storage, and dissemination of information. The Internet allows a person, with good or bad intent, to distribute information to millions of people. This ability raises serious implications when trade secret information is the subject of Internet postings. Once a trade secret becomes publicly available, it loses its legal secrecy, and special legal protection. Additionally, competitors and everyone else on the Internet can gain access to the information. For those who rely on trade secret protection to guard their inventions, this presents a growing concern.

This Note will illustrate the …


Carnivore, The Fbi’S E-Mail Surveillance System: Devouring Criminals, Not Privacy, Griffin S. Dunham May 2002

Carnivore, The Fbi’S E-Mail Surveillance System: Devouring Criminals, Not Privacy, Griffin S. Dunham

Federal Communications Law Journal

On July 11, 2000, the FBI intorduced Carnivore, an Internet monitoring system. It was designed, and is used exclusively, to carry out court-ordered surveillance of electronic communications. It is a tangible, portable device, tantamount to a phone tap, that allows the FBI to intercept and collect criminal suspects' e-mail without their knowledge or consent. This Note addresses competing and parallel interests between the government and society to determine the legitimacy and necessity of Carnivore. The purpose of this Note is twofold: first, to demonstrate the need for Carnivore to enable law enforcement to keep up with criminals who utilize cyberspace …


The Defamation Of Choice-Of-Law In Cyberspace: Countering The View That The Restatement (Second) Of Conflict Of Laws Is Inadequate To Navigate The Borderless Reaches Of The Intangible Frontier, Philip Adam Davis Mar 2002

The Defamation Of Choice-Of-Law In Cyberspace: Countering The View That The Restatement (Second) Of Conflict Of Laws Is Inadequate To Navigate The Borderless Reaches Of The Intangible Frontier, Philip Adam Davis

Federal Communications Law Journal

This Note examines the adequacy of the traditional choice-of-law rules, including the Restatement (Second), in interstate cyber-defamation disputes, and argues that there is nothing different or unique about cyberspace which warrants the modification or abandonment of traditional choice-of-law regimes for cyber-defamation disputes.


Protecting Privacy And Enabling Pharmaceutical Sales On The Internet: A Comparative Analysis Of The United States And Canada, Nicole A. Rothstein Mar 2001

Protecting Privacy And Enabling Pharmaceutical Sales On The Internet: A Comparative Analysis Of The United States And Canada, Nicole A. Rothstein

Federal Communications Law Journal

The Internet raises enhanced and unique concerns regarding informational health privacy and Internet pharmacy sales. As technology advances and the Internet changes the way people obtain medical services and products, protecting consumers and their informational health data in online pharmaceutical transactions is paramount. This Comment charts and compares the existing legal frameworks in the United States and Canada relative to informational health privacy. Following this discussion, each legal framework comes into sharp focus with regard to Internet pharmacy sales. Ultimately, this Comment concludes that based on the highly sensitive nature of personal medical information, a baseline privacy standard should be …


Taking Account Of The World As It Will Be: The Shifting Course Of U.S. Encryption Policy, Tricia E. Black Mar 2001

Taking Account Of The World As It Will Be: The Shifting Course Of U.S. Encryption Policy, Tricia E. Black

Federal Communications Law Journal

Encryption, understood on a basic level as the process of scrambling information to disguise its content, has been a topic of intense debate over the past decade because of Internet growth and well-founded concerns about online security. The encryption debate centers on striking an appropriate balance between national security concerns and the potential prosperity of the high-tech industry. The Clinton Administration played an important role in relaxing U.S. encryption policy. This Note argues that the dramatic shift in encryption policy resulted from a recognition of how the world will be in the digital age, and that strong, unregulated encryption technology …


The Availability Of The Fair Use Defense In Music Piracy And Internet Technology, Sonia Das May 2000

The Availability Of The Fair Use Defense In Music Piracy And Internet Technology, Sonia Das

Federal Communications Law Journal

This Note examines the development of the fair-use defense to other new technologies, such as the VCR and photocopier, and concludes that courts generally make the fair-use defense available in cases involving copying using new technology. Such uses of the technology have contributed, rather than deterred, to both the bettering of the technology itself and increasing the use of a copyright work. Ultimately, the increased uses reward the copyright holder. Next, this Note applies fair-use cases to new technology in the music industry, namely the increase availability of music on the Internet and a device known as the Rio, which …


Don’T Talk To Strangers: An Analysis Of Government And Industry Efforts To Protect A Child’S Privacy Online, Dorothy A. Hertzel Mar 2000

Don’T Talk To Strangers: An Analysis Of Government And Industry Efforts To Protect A Child’S Privacy Online, Dorothy A. Hertzel

Federal Communications Law Journal

Studies indicate that nearly two-thirds of children use the Internet. Children online users have created unique concerns for Internet providers and lawmakers. The collection, storage, and sale of a child online user's personal information without the child or parent's knowledge or consent has elicited much concern. Such a practice is commonplace in the world of the Internet. Congress, through the Child Online Privacy Protection Act, and the Internet industry have addressed how to curb this practice. In addition to these efforts, technological tools are currently available that block the transfer of personally identifiable information from the user to the computer. …


Strike Two: An Analysis Of The Child Online Protection Act’S Constitutional Failures, Heather L. Miller Dec 1999

Strike Two: An Analysis Of The Child Online Protection Act’S Constitutional Failures, Heather L. Miller

Federal Communications Law Journal

Congress's first attempt to regulate minors' access to sexually explicit material via the Internet failed. Congress responded with the Child Online Protection Act, which, despite its narrower scope, cannot withstand constitutional scrutiny. This Notes delves into the constitutionality of Congress's second attempt by addressing the difficulty of applying the vague "harmful to minors" definition to the Internet medium and the economic and technological unavailability of the Act's affirmative defenses. This Note concludes with an explanation as to why legislation is an ineffective mechanism to address the problem of minors' access to online pornography.


The Digital Dilemma: Ten Challenges Facing Minority-Owned New Media Ventures, Marcelino Ford-Livene May 1999

The Digital Dilemma: Ten Challenges Facing Minority-Owned New Media Ventures, Marcelino Ford-Livene

Federal Communications Law Journal

Minority-owned companies competing in print publishing, radio, broadcast television, cable, and telecommunications industries have had no shortage of challenges, setbacks, and failures. Minority-owned companies are struggling to stake a claim in the new media frontier. Some challenges they face are unique to the underlying technology, uncertainty, and international reach of the Web. There should be a sense of urgency with respect to minority participation on the Web. If the promise of broadband leads to new media outlets that are profitable and more dynamic than traditional media, then minorities cannot afford to be left out.

Forum: New Approaches to Minority Media …