Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Communications Law

PDF

Internet

Institution
Publication Year
Publication
Publication Type

Articles 31 - 60 of 181

Full-Text Articles in Law

Don’T Tread On Me…Online: The Fec Should Stay Out Of Free Internet-Based Political Speech, Timothy J. D’Elia Dec 2015

Don’T Tread On Me…Online: The Fec Should Stay Out Of Free Internet-Based Political Speech, Timothy J. D’Elia

Catholic University Journal of Law and Technology

No abstract provided.


Newsroom: Fcc's Sohn On Consumer Protection, Roger Williams University School Of Law Sep 2015

Newsroom: Fcc's Sohn On Consumer Protection, Roger Williams University School Of Law

Life of the Law School (1993- )

No abstract provided.


Users' Patronage: The Return Of The Gift In The "Crowd Society", Giancarlo F. Frosio Sep 2015

Users' Patronage: The Return Of The Gift In The "Crowd Society", Giancarlo F. Frosio

Giancarlo Francesco Frosio

In this work, I discuss the tension between gift and market economy throughout the history of creativity. For millennia, the production of creative artifacts has lain at the intersection between gift and market economy. From the time of Pindar and Simonides – and until the Romanticism will commence a process leading to the complete commodification of creative artifacts – market exchange models run parallel to gift exchange. From Roman amicitia to the medieval and Renaissance belief that “scientia donum dei est, unde vendi non potest,” creativity has been repeatedly construed as a gift. Again, at the time of the British …


Towards An Internet Bill Of Rights, Giovanna De Minico Jul 2015

Towards An Internet Bill Of Rights, Giovanna De Minico

Loyola of Los Angeles International and Comparative Law Review

No abstract provided.


Loopholes For Circumventing The Constitution: Unrestrained Bulk Surveillance On Americans By Collecting Network Traffic Abroad, Axel Arnbak, Sharon Goldberg Jun 2015

Loopholes For Circumventing The Constitution: Unrestrained Bulk Surveillance On Americans By Collecting Network Traffic Abroad, Axel Arnbak, Sharon Goldberg

Michigan Telecommunications & Technology Law Review

This Article reveals interdependent legal and technical loopholes that the US intelligence community could use to circumvent constitutional and statutory safeguards for Americans. These loopholes involve the collection of Internet traffic on foreign territory, and leave Americans as unprotected as foreigners by current United States (US) surveillance laws. This Article will also describe how modern Internet protocols can be manipulated to deliberately divert American’s traffic abroad, where traffic can then be collected under a more permissive legal regime (Executive Order 12333) that is overseen solely by the executive branch of the US government. Although the media has reported on some …


Social Media And The Internet: A Story Of Privatization, Victoria D. Baranetsky May 2015

Social Media And The Internet: A Story Of Privatization, Victoria D. Baranetsky

Pace Law Review

This article will question what role private and public actors assume in the current structure of data collection and what potential rights are violated. To tease out the relationship between the private and government sectors, this article, for sake of argument, accepts as fact that surveillance is a core government function and that data is a public resource collected by private organizations. While those assumptions may be challenged by different definitions of what constitutes a public function, public resource, or mode of collection, this article does not take on those challenges. It also does not ask the normative question of …


Cookie Monster: Balancing Internet Privacy With Commerce, Technology And Terrorism, Nichoel Forrett Dec 2014

Cookie Monster: Balancing Internet Privacy With Commerce, Technology And Terrorism, Nichoel Forrett

Touro Law Review

No abstract provided.


Voice Over Internet Protocol: An International Approach To Regulation, Jimar Sanders Sep 2014

Voice Over Internet Protocol: An International Approach To Regulation, Jimar Sanders

Georgia Journal of International & Comparative Law

No abstract provided.


Fcc Commenting Workshop, Laura Quilter Jul 2014

Fcc Commenting Workshop, Laura Quilter

Laura Quilter

No abstract provided.


U.S. Vs. European Broadband Deployment: What Do The Data Say?, Christopher S. Yoo Jun 2014

U.S. Vs. European Broadband Deployment: What Do The Data Say?, Christopher S. Yoo

All Faculty Scholarship

As the Internet becomes more important to the everyday lives of people around the world, commentators have tried to identify the best policies increasing the deployment and adoption of high-speed broadband technologies. Some claim that the European model of service-based competition, induced by telephone-style regulation, has outperformed the facilities-based competition underlying the US approach to promoting broadband deployment. The mapping studies conducted by the US and the EU for 2011 and 2012 reveal that the US led the EU in many broadband metrics.

• High-Speed Access: A far greater percentage of US households had access to Next Generation Access (NGA) …


The Communication Decency Act Gone Wild: A Case For Renewing The Presumption Against Preemption, Ryan J.P. Dyer Mar 2014

The Communication Decency Act Gone Wild: A Case For Renewing The Presumption Against Preemption, Ryan J.P. Dyer

Seattle University Law Review

Since its inception, the Internet has disseminated the most vital commodity known to man—information. But not all information is societally desirable. In fact, much of what the Internet serves to disseminate is demonstrably criminal. Nevertheless, in the effort to unbind the “vibrant and competitive free market” of ideas on the Internet, Congress enacted section 230 of the Communications Decency Act, which essentially grants immunity to interactive computer service providers from liability for information provided by a third party. This Comment suggests that, in certain contexts, courts applying section 230 immunity should reexamine the preemptive effect Congress intended section 230 to …


Pinterest And Copyright's Safe Harbors For Internet Providers, Michael W. Carroll Jan 2014

Pinterest And Copyright's Safe Harbors For Internet Providers, Michael W. Carroll

Articles in Law Reviews & Other Academic Journals

Has the time come to substantially revise the Copyright Act to better adapt the law to the ever-evolving digital environment? A number of influential sources appear to think so. If their initiatives gain momentum, it will be important to consider lessons learned from the first such effort fifteen years ago when Congress made far-reaching changes to copyright law by extending the term of copyright for twenty years and by enacting a package of reform proposals known as the Digital Millennium Copyright Act (“DMCA”). This Article intertwines the story of one important provision of the DMCA - safe harbors for Internet …


Wireless Localism: Beyond The Shroud Of Objectivity In Federal Spectrum Administration, Olivier Sylvain Dec 2013

Wireless Localism: Beyond The Shroud Of Objectivity In Federal Spectrum Administration, Olivier Sylvain

Michigan Telecommunications & Technology Law Review

Recent innovations in mobile wireless technology have instigated a debate between two camps of legal scholars about federal administration of the electromagnetic spectrum. The first camp argues that the Federal Communications Commission (“FCC”) should define spectrum use rights more clearly and give spectrum licensees broad property rights in frequencies. The second camp argues that, rather than award exclusive licenses to the highest bidder, the FCC ought to open much, if not most, of the spectrum to unlicensed use by smartphones and tablets equipped with the newest spectrum administration technology. First, this Article shows that both of these camps comprise a …


Fifteen Minutes Of Infamy: Privileged Reporting And The Problem Of Perpetual Reputational Harm, Richard J. Peltz-Steele Jun 2013

Fifteen Minutes Of Infamy: Privileged Reporting And The Problem Of Perpetual Reputational Harm, Richard J. Peltz-Steele

Richard J. Peltz-Steele

This Article provides an overview of the labyrinth of media tort defenses, specifically the four privileges – fair comment, fair report, neutral reportage, and wire service – that come into play when the media republish defamatory content about criminal suspects and defendants without specific intent to injure. The Article then discusses these privileges in light of a hypothetical case involving a highly publicized crime and an indicted suspect, against whom charges are later dropped, but who suffers perpetual reputational harm from the out-of-context republication online of news related to his indictment. The Article demonstrates how the four privileges would operate …


A Victimless Sex Crime: The Case For Decriminalizing Consensual Teen Sexting, Joanna R. Lampe Jan 2013

A Victimless Sex Crime: The Case For Decriminalizing Consensual Teen Sexting, Joanna R. Lampe

University of Michigan Journal of Law Reform

As teenagers' access to cellular phones and the internet has increased over the past two decades, so has their ability to harm themselves and others through misuse of new technology. One risky behavior that has become common among teenagers is "sexting"--the digital sharing of sexually suggestive images. To combat the dangers of teen sexting, many states have criminalized the act. Criminalization does not resolve the issue of teen sexting, however, and in many cases it may cause additional harm. This Note reviews existing state laws related to teen sexting, and critiques these laws on constitutional and policy grounds. It then …


Emerging Technologies And Dwindling Speech, Jorge R. Roig Dec 2012

Emerging Technologies And Dwindling Speech, Jorge R. Roig

Jorge R Roig

Inspired in part by the recent holding in Bland v. Roberts that the use of the “Like” feature in Facebook is not covered by the Free Speech Clause, this article makes a brief foray into the approach that courts have taken in the recent past towards questions of First Amendment coverage in the context of emerging technologies. Specifically, this article will take a closer look at how courts have dealt with the issue of functionality in the context of First Amendment coverage of computer source code. The analysis of this and other recent experiences, when put in a larger context, …


After Privacy: The Rise Of Facebook, The Fall Of Wikileaks, And Singapore’S Personal Data Protection Act 2012, Simon Chesterman Dec 2012

After Privacy: The Rise Of Facebook, The Fall Of Wikileaks, And Singapore’S Personal Data Protection Act 2012, Simon Chesterman

Simon Chesterman

This article discusses the changing ways in which information is produced, stored, and shared — exemplified by the rise of social-networking sites like Facebook and controversies over the activities of WikiLeaks — and the implications for privacy and data protection. Legal protections of privacy have always been reactive, but the coherence of any legal regime has also been undermined by the lack of a strong theory of what privacy is. There is more promise in the narrower field of data protection. Singapore, which does not recognise a right to privacy, has positioned itself as an e-commerce hub but had no …


Internet-Based Fans: Why The Entertainment Industries Cannot Depend On Traditional Copyright Protections , Thomas C. Inkel Oct 2012

Internet-Based Fans: Why The Entertainment Industries Cannot Depend On Traditional Copyright Protections , Thomas C. Inkel

Pepperdine Law Review

No abstract provided.


Limits Of The Federal Wiretap Act's Ability To Protect Against Wi-Fi Sniffing, Mani Potnuru Oct 2012

Limits Of The Federal Wiretap Act's Ability To Protect Against Wi-Fi Sniffing, Mani Potnuru

Michigan Law Review

Adoption of Wi-Fi wireless technology continues to see explosive growth. However many users still operate their home Wi-Fi networks in unsecured mode or use publicly available unsecured Wi-Fi networks, thus exposing their communications to the dangers of "packet sniffing," a technique used for eavesdropping on a network. Some have argued that communications over unsecured Wi-Fi networks are "readily accessible to the general public" and that such communications are therefore excluded from the broad protections of the Federal Wiretap Act against intentional interception of electronic communications. This Note examines the Federal Wiretap Act and argues that the current Act's treatment of …


Behavioral Advertising: The Cryptic Hunter And Gatherer Of The Internet, Joanna Penn May 2012

Behavioral Advertising: The Cryptic Hunter And Gatherer Of The Internet, Joanna Penn

Federal Communications Law Journal

In an era where three out of every four Americans have Internet access, the term "surfing" has transformed from riding waves into running the risk of having private information gathered, stored, and disseminated-all without the user's knowledge or permission. This new found online practice, known as "behavioral advertising," is a veritable goldmine for those companies that know the game. But will the FTC or Congress soon make new rules concerning how to play? This Note begins by explaining the differences between behavioral targeting and retargeting and the techniques that the two methods use to collect data. This Note then explores …


Wiretapping The Internet: The Expansion Of The Communications Assistance To Law Enforcement Act To Extend Government Surveillance, Christa M. Hibbard Mar 2012

Wiretapping The Internet: The Expansion Of The Communications Assistance To Law Enforcement Act To Extend Government Surveillance, Christa M. Hibbard

Federal Communications Law Journal

Criminal use of the Internet to circumvent traditional government phone wiretaps has inspired the Obama Administration to create a proposal to expand the Communications Assistance to Law Enforcement Act ("CALEA"). CALEA was passed in 1994 to regulate telephone and broadband companies to ensure compliance with standards to enable government wiretapping. The proposed amendment of CALEA would allow the government to require all communications service providers to meet technical standards necessary to comply with a wiretap order. The expansion of CALEA would likely widen its scope to social networking sites, instant messaging, gaming consoles that allow conversation among multiple players, and …


From Betamax To Youtube: How Sony Corporation Of America V. Universal City Studios, Inc. Could Still Be A Standard For New Technology, Veronica Corsaro Mar 2012

From Betamax To Youtube: How Sony Corporation Of America V. Universal City Studios, Inc. Could Still Be A Standard For New Technology, Veronica Corsaro

Federal Communications Law Journal

Internet technological innovations, particularly the development of Peer-to-Peer ("P2P") networks and the proliferation of user-generated content sites, have introduced considerable challenges for the application of copyright law and infringement liability. The response from the courts and Congress has been mixed, with severe legal curtails being applied to P2P technology while usergenerated content sites have been afforded a level of protection against infringement claims as part of the Digital Millennium Copyright Act's section 512 "safe harbor" provisions. However, these provisions have raised concerns about the issue of secondary copyright liability, a matter that has still been left undefined. This Note will …


Exploring The First Amendment Rights Of Teens In Relationship To Sexting And Censorship, Julia Halloran Mclaughlin Feb 2012

Exploring The First Amendment Rights Of Teens In Relationship To Sexting And Censorship, Julia Halloran Mclaughlin

University of Michigan Journal of Law Reform

This Article explores child pornography law in relation to teen sexting conduct. Recently, some teens who engaged in teen sexting have been convicted under child pornography laws and have been required to register as sexual predators. The criminalization of teens for developmentally typical behavior, mimicking the conduct of adults, can result in grave harm to most teens. Furthermore, the application of child pornography laws to teen sexting conduct demonstrates the constitutional overbreadth of the current definition of child pornography. Photographs have an emblematic role in society-capturing and celebrating youth. Moreover, the creation of teen sexting images accompanies a teen's developmental …


Network Neutrality: Verizon V. Fcc, Anna S. Han Jan 2012

Network Neutrality: Verizon V. Fcc, Anna S. Han

University of Michigan Journal of Law Reform Caveat

The Federal Communications Commission (“FCC”) is once again locking horns with the broadband behemoth, Verizon, over the issue of network neutrality. Although this conflict between the government and corporate giants is far from new, recent events have forced courts to give it close scrutiny. Given the explosive pace at which technology has expanded and permeated citizens’ daily lives, the judgments rendered have greater significance now than ever before.


Technology Convergence And Federalism: The Case Of Voip Regulation, Daniel A. Lyons Jan 2012

Technology Convergence And Federalism: The Case Of Voip Regulation, Daniel A. Lyons

University of Michigan Journal of Law Reform Caveat

The Vermont Supreme Court may soon consider whether federal law permits the Public Service Board to regulate certain voice-over-internet-protocol (VoIP) services. Across the Hudson, Governor Andrew Cuomo recently sought to bar the New York Public Service Commission from adopting similar regulations. And these states are not alone: from Maine to Florida, several states are considering whether their jurisdiction over traditional telephone service encompasses this new technology, through which nearly one-third of American landline households receive telephone service. If so, nationwide VoIP providers could face up to fifty new legal regimes with which they must comply before offering service. If not, …


Viewer Discretion Is Advised: Disconnects Between The Marketplace Of Ideas And Social Media Used To Communicate Information During Emergencies And Public Health Crises, Peter Maggiore Jan 2012

Viewer Discretion Is Advised: Disconnects Between The Marketplace Of Ideas And Social Media Used To Communicate Information During Emergencies And Public Health Crises, Peter Maggiore

Michigan Telecommunications & Technology Law Review

In a sense, social media has become the ideal manifestation of the "Marketplace of Ideas" (hereinafter "Marketplace") that Chief Justice Oliver Wendell Holmes articulated. The Marketplace concept will be discussed in greater detail below, but in brief, it is the theory that truth will surface over falsehoods when all opinions and ideas are freely expressed, because the value or worth of that opinion or idea will be determined on the market of public opinion. Part I of this Note will examine the Marketplace concept through the works of various legal and philosophical theorists. Chief among them is Frederick Schauer's work …


Privacy Policies, Terms Of Service, And Ftc Enforcement: Broadening Unfairness Regulation For A New Era, G. S. Hans Jan 2012

Privacy Policies, Terms Of Service, And Ftc Enforcement: Broadening Unfairness Regulation For A New Era, G. S. Hans

Michigan Telecommunications & Technology Law Review

This Note examines website privacy policies in the context of FTC regulation. The relevant portion of Section 5 of the Federal Trade Commission Act, 15 U.S.C. § 45(a), uses the following language to define the scope of the agency's regulatory authority: "Unfair methods of competition in or affecting commerce, and unfair or deceptive acts or practices in or affecting commerce, are hereby declared unlawful." Specifically, this Note analyzes the FTC's power to regulate unfair practices (referred to as the FTC's "unfairness power") granted by Section 5, and also discusses the deception prong of Section 5, which allows the agency to …


Decoding First Amendment Coverage Of Computer Source Code In The Age Of Youtube, Facebook And The Arab Spring, Jorge R. Roig Dec 2011

Decoding First Amendment Coverage Of Computer Source Code In The Age Of Youtube, Facebook And The Arab Spring, Jorge R. Roig

Jorge R Roig

Computer source code is the lifeblood of the Internet. It is also the brick and mortar of cyberspace. As such, it has been argued that the degree of control that a government can wield over code can be a powerful tool for controlling new technologies. With the advent and proliferation in the Internet of social networking media and platforms for the publication and sharing of user-generated content, the ability of individuals across the world to communicate with each other has reached truly revolutionary dimensions.
The influence of Facebook in the popular revolutions of the Arab Spring has been well documented. …


It’S A Mad, Mad Internet: Globalization And The Challenges Presented By Internet Censorship, Jessica E. Bauml May 2011

It’S A Mad, Mad Internet: Globalization And The Challenges Presented By Internet Censorship, Jessica E. Bauml

Federal Communications Law Journal

The advent of the Internet has brought tremendous technological advancements and growth to the world. However, it has also become a source of conflict, particularly when different countries attempt to regulate this very ubiquitous and amorphous medium. The most notable controversy has arisen in China home to the world's most advanced system of Internet censorship, which levies harsh penalties on those who violate the country's strict censorship laws. China's "Great Firewall" has raised many eyebrows and is garnishing substantial criticism in response to the human rights abuses that result from the jailing and reported torture of Chinese dissidents. Yet the …


Licensing As Digital Rights Management, From The Advent Of The Web To The Ipad, Reuven Ashtar Jan 2011

Licensing As Digital Rights Management, From The Advent Of The Web To The Ipad, Reuven Ashtar

Reuven Ashtar

This Article deals with the Digital Millennium Copyright Act’s anti-circumvention provision, Section 1201, and its relationship to licensing. It argues that not all digital locks and contractual notices qualify for legal protection under Section 1201, and attributes the courts’ indiscriminate protection of all Digital Rights Management (DRM) measures to the law’s incoherent formulation. The Article proposes a pair of filters that would enable courts to distinguish between those DRM measures that qualify for protection under Section 1201, and those that do not. The filters are shown to align with legislative intent and copyright precedent, as well as the approaches recently …