Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 37

Full-Text Articles in Law

Behavioral Advertising: The Cryptic Hunter And Gatherer Of The Internet, Joanna Penn May 2012

Behavioral Advertising: The Cryptic Hunter And Gatherer Of The Internet, Joanna Penn

Federal Communications Law Journal

In an era where three out of every four Americans have Internet access, the term "surfing" has transformed from riding waves into running the risk of having private information gathered, stored, and disseminated-all without the user's knowledge or permission. This new found online practice, known as "behavioral advertising," is a veritable goldmine for those companies that know the game. But will the FTC or Congress soon make new rules concerning how to play? This Note begins by explaining the differences between behavioral targeting and retargeting and the techniques that the two methods use to collect data. This Note then explores …


Wiretapping The Internet: The Expansion Of The Communications Assistance To Law Enforcement Act To Extend Government Surveillance, Christa M. Hibbard Mar 2012

Wiretapping The Internet: The Expansion Of The Communications Assistance To Law Enforcement Act To Extend Government Surveillance, Christa M. Hibbard

Federal Communications Law Journal

Criminal use of the Internet to circumvent traditional government phone wiretaps has inspired the Obama Administration to create a proposal to expand the Communications Assistance to Law Enforcement Act ("CALEA"). CALEA was passed in 1994 to regulate telephone and broadband companies to ensure compliance with standards to enable government wiretapping. The proposed amendment of CALEA would allow the government to require all communications service providers to meet technical standards necessary to comply with a wiretap order. The expansion of CALEA would likely widen its scope to social networking sites, instant messaging, gaming consoles that allow conversation among multiple players, and …


From Betamax To Youtube: How Sony Corporation Of America V. Universal City Studios, Inc. Could Still Be A Standard For New Technology, Veronica Corsaro Mar 2012

From Betamax To Youtube: How Sony Corporation Of America V. Universal City Studios, Inc. Could Still Be A Standard For New Technology, Veronica Corsaro

Federal Communications Law Journal

Internet technological innovations, particularly the development of Peer-to-Peer ("P2P") networks and the proliferation of user-generated content sites, have introduced considerable challenges for the application of copyright law and infringement liability. The response from the courts and Congress has been mixed, with severe legal curtails being applied to P2P technology while usergenerated content sites have been afforded a level of protection against infringement claims as part of the Digital Millennium Copyright Act's section 512 "safe harbor" provisions. However, these provisions have raised concerns about the issue of secondary copyright liability, a matter that has still been left undefined. This Note will …


It’S A Mad, Mad Internet: Globalization And The Challenges Presented By Internet Censorship, Jessica E. Bauml May 2011

It’S A Mad, Mad Internet: Globalization And The Challenges Presented By Internet Censorship, Jessica E. Bauml

Federal Communications Law Journal

The advent of the Internet has brought tremendous technological advancements and growth to the world. However, it has also become a source of conflict, particularly when different countries attempt to regulate this very ubiquitous and amorphous medium. The most notable controversy has arisen in China home to the world's most advanced system of Internet censorship, which levies harsh penalties on those who violate the country's strict censorship laws. China's "Great Firewall" has raised many eyebrows and is garnishing substantial criticism in response to the human rights abuses that result from the jailing and reported torture of Chinese dissidents. Yet the …


Internet Governance And Democratic Legitimacy, Oliver Sylvain Apr 2010

Internet Governance And Democratic Legitimacy, Oliver Sylvain

Federal Communications Law Journal

Even as the Internet goes pop, federal policymakers continue to surrender their statutory obligation to regulate communications in the first instance to extralegal nongovernmental organizations comprised of technical experts. The FCC's adjudication of a dispute concerning a major broadband service provider's network management practices is a case in point. There, in the absence of any enforceable legislative or regulatory rule, the FCC turned principally to the transmission principles of the Internet Engineering Taskforce, the preeminent nongovernmental Internet engineering standard-setting organization. This impulse to defer as a matter of course to such an organization without any legal mechanism requiring as much …


Creating Effective Broadband Network Regulation, Daniel L. Brenner Jan 2010

Creating Effective Broadband Network Regulation, Daniel L. Brenner

Federal Communications Law Journal

The Internet is central to the business and pastimes of Americans. Calls for increased regulation are ongoing, inevitable, and often justified. But calls for "network neutrality" or "nondiscrimination" assume with little hesitation federal agency competence to give predictable and accurate meaning to these terms and create regulations to implement them. This Article's chief contribution to Internet policy debate is to focus attention on the likelihood of successful FCC Internet regulation-a key assumption of some advocates.

The Article analyzes three characteristics that hobble the FCC, which is the likeliest federal agency to provide prescriptive rules. First, the record for the agency …


Virtually Enabled: How Title Iii Of The Americans With Disabilities Act Might Be Applied To Online Virtual Worlds, Joshua Newton Jan 2010

Virtually Enabled: How Title Iii Of The Americans With Disabilities Act Might Be Applied To Online Virtual Worlds, Joshua Newton

Federal Communications Law Journal

The rise and popularity of online virtual worlds, such as World of Warcraft and Second Life, holds significant promise for people with disabilities. For people who are unable to easily leave home or travel, virtual worlds provide a public venue, wherein people may interact freely without the social stigma that accompanies disability. However, access to these virtual worlds may be inhibited by physical, visual, or aural impairments, and virtual-world developers can be hostile to modifying their products to mitigate these difficulties. Thus, some disability advocates have turned to Title III of the Americans with Disabilities Act, arguing that places of …


Whose Burden Is It Anyway? Addressing The Needs Of Content Owners In Dmca Safe Harbors, Greg Janson Jan 2010

Whose Burden Is It Anyway? Addressing The Needs Of Content Owners In Dmca Safe Harbors, Greg Janson

Federal Communications Law Journal

Much of today's network neutrality debate addresses concerns that cable providers will limit access to competing Web-based services delivering multimedia content. While proposals to mandate nondiscrimination for all Internet traffic surely will help create a competitive environment where online entertainment providers can prosper, ISP interference is not the only threat. Online entertainment sites that relay user-generated content are threatened by crippling litigation brought by copyright holders for actions taken by third parties using their services. Reliance on the safe harbors provided in the Digital Millennium Copyright Act has, in most cases, proved unsuccessful. This Note addresses the concerns of both …


The Never-Ending Limits Of § 230: Extending Isp Immunity To The Sexual Exploitation Of Children, Katy Noeth Jun 2009

The Never-Ending Limits Of § 230: Extending Isp Immunity To The Sexual Exploitation Of Children, Katy Noeth

Federal Communications Law Journal

In 2006, the U.S. District Court for the Eastern District of Texas extended civil liability to Yahoo! under § 230 of the Communications Decency Act so that it could not be sued for knowingly profiting from a Web site where members exchanged sexually explicit pictures of minors. The court found that the reasoning of the seminal § 230 case, Zeran v. AOL, was analogous and that policy considerations mandated its holding.

This Note argues that a multifaceted approach is needed to prevent future courts from following that decision, including an amendment to § 230 that would impose civil liability upon …


Rethinking The Communications Decency Act: Eliminating Statutory Protections Of Discriminatory Housing Advertisements On The Internet, James D. Shanahan Dec 2007

Rethinking The Communications Decency Act: Eliminating Statutory Protections Of Discriminatory Housing Advertisements On The Internet, James D. Shanahan

Federal Communications Law Journal

The recent decision in Craigslist signals a drastic reduction in the effectiveness of the prohibition on discriminatory housing advertisements under the Fair Housing Act ("FHA"). Section 230 of the Communications Decency Act gives blanket immunity to Internet Content Providers from publisher liability for content originating from third parties. One of the effects of this immunity is the creation of a monopoly for discriminatory advertisements otherwise proscribed by the FHA. This Note argues that the simplest solution for Congress is to adjust the language of § 230 by adding the FHA to the list of exceptions to statutory immunity.


Who Controls The Internet? A Review, Deborah J. Salons Jun 2007

Who Controls The Internet? A Review, Deborah J. Salons

Federal Communications Law Journal

Book Review: Who Controls the Internet? Illusions of a Borderless World, Jack Goldsmith and Tim Wu, Oxford University Press 2006.

Ms. Salons reviews Who Controls the Internet? Illusions of a Borderless World, Oxford University Press, 2006. Authored by Jack Goldsmith and Tim Wu, the book provides a history of the Internet and analyzes the nexus between globalization and government coercion. The book focuses on how these agents have shaped and developed the Internet as we are familiar with it today.


Interconnection Policy And Technological Progress, Gerald W. Brock Jun 2006

Interconnection Policy And Technological Progress, Gerald W. Brock

Federal Communications Law Journal

No abstract provided.


Digital Crossroads, Kathleen Wallman May 2005

Digital Crossroads, Kathleen Wallman

Federal Communications Law Journal

Book Review: Digital Crossroads: American Telecommunications Policy in the Internet Age, Jonathan E. Nuechterlein & Philip J. Weiser, Cambridge, Mass., MIT Press, 2005, 670 pages.

A review of Digital Crossroads: American Telecommunications Policy in the Internet Age, by Jonathan E. Nuechterlein and Philip J. Weiser, MIT Press, 2005. Most practitioners of communications law are familiar with the necessity of teaching themselves enough economics, engineering, and politics to practice competently and comfortably in an area that is inherently interdisciplinary. Likewise, many professors who teach telecommunications from a variety of disciplinary perspectives are familiar with the frustration of locating a text that …


Staying Afloat In The Internet Stream: How To Keep Web Radio From Drowning In Digital Copyright Royalties, Emily D. Harwood May 2004

Staying Afloat In The Internet Stream: How To Keep Web Radio From Drowning In Digital Copyright Royalties, Emily D. Harwood

Federal Communications Law Journal

In the 1990's, the development of "streaming" technology allowed webcasters to begin broadcasting music on the Internet. The public took advantage of a plethora of free media players, and the number of web-based radio stations soared. However, a crippling dispute over broadcast rates left the viability of this technology in doubt. This Note criticizes current policies that curtail radio streaming by providing harsh financial restrictions on webcasters. In looking to the future, this Note argues that Congress should extend licensing exemptions to cover those Internet stations most like their AM/FM counterparts who do not have to pay additional fees.


Promoting Innovation To Prevent The Internet From Becoming A Wasteland, Zoe Baird May 2003

Promoting Innovation To Prevent The Internet From Becoming A Wasteland, Zoe Baird

Federal Communications Law Journal

No abstract provided.


What’S In A Name?, Jonathan Zittrain Dec 2002

What’S In A Name?, Jonathan Zittrain

Federal Communications Law Journal

Book Review: Ruling the Root, Milton L. Mueller, Cambridge, Mass.: MIT Press, 2002, 301 pages.

A review of Milton L. Mueller's Ruling the Root, The MIT Press, 2002. In the spring of 1998, the U.S. government told the Internet: Govern yourself. This unfocused order-a blandishment, really, expressed as an awkward "statement of policy" by the Department of Commerce, carrying no direct force of law-came about because the management of obscure but critical centralized Internet functions was at a political crossroads. In Ruling the Root, Mueller thoroughly documents the colorful history both before and after this moment of inflection, and gives …


Injunctive Relief In The Internet Age: The Battle Between Free Speech And Trade Secrets, Adam W. Johnson May 2002

Injunctive Relief In The Internet Age: The Battle Between Free Speech And Trade Secrets, Adam W. Johnson

Federal Communications Law Journal

The information revolution has led to technological innovations in the movement, storage, and dissemination of information. The Internet allows a person, with good or bad intent, to distribute information to millions of people. This ability raises serious implications when trade secret information is the subject of Internet postings. Once a trade secret becomes publicly available, it loses its legal secrecy, and special legal protection. Additionally, competitors and everyone else on the Internet can gain access to the information. For those who rely on trade secret protection to guard their inventions, this presents a growing concern.

This Note will illustrate the …


Carnivore, The Fbi’S E-Mail Surveillance System: Devouring Criminals, Not Privacy, Griffin S. Dunham May 2002

Carnivore, The Fbi’S E-Mail Surveillance System: Devouring Criminals, Not Privacy, Griffin S. Dunham

Federal Communications Law Journal

On July 11, 2000, the FBI intorduced Carnivore, an Internet monitoring system. It was designed, and is used exclusively, to carry out court-ordered surveillance of electronic communications. It is a tangible, portable device, tantamount to a phone tap, that allows the FBI to intercept and collect criminal suspects' e-mail without their knowledge or consent. This Note addresses competing and parallel interests between the government and society to determine the legitimacy and necessity of Carnivore. The purpose of this Note is twofold: first, to demonstrate the need for Carnivore to enable law enforcement to keep up with criminals who utilize cyberspace …


Indecent Exposures In An Electronic Regime, Natalie L. Regoli Mar 2002

Indecent Exposures In An Electronic Regime, Natalie L. Regoli

Federal Communications Law Journal

As the topic of data privacy is vast and the subject of much scrutiny, this Comment focuses narrowly on commercial cyber-activities relating to the nonconsensual Internet acquisition of personally identifiable user data. Beginning with a brief examination of the technology that has exacerbated privacy law's inadequacies, it briefly discusses failed attempts to safeguard privacy rights through the market and federal agency management. It then addresses current U.S. privacy legislation and the 1995 European Privacy Directive. Finally, this Comment proposes the creation of a new legislative system to effectively combat the surreptitious collection, storage, use, and sale of personal data.


The Defamation Of Choice-Of-Law In Cyberspace: Countering The View That The Restatement (Second) Of Conflict Of Laws Is Inadequate To Navigate The Borderless Reaches Of The Intangible Frontier, Philip Adam Davis Mar 2002

The Defamation Of Choice-Of-Law In Cyberspace: Countering The View That The Restatement (Second) Of Conflict Of Laws Is Inadequate To Navigate The Borderless Reaches Of The Intangible Frontier, Philip Adam Davis

Federal Communications Law Journal

This Note examines the adequacy of the traditional choice-of-law rules, including the Restatement (Second), in interstate cyber-defamation disputes, and argues that there is nothing different or unique about cyberspace which warrants the modification or abandonment of traditional choice-of-law regimes for cyber-defamation disputes.


Taking Account Of The World As It Will Be: The Shifting Course Of U.S. Encryption Policy, Tricia E. Black Mar 2001

Taking Account Of The World As It Will Be: The Shifting Course Of U.S. Encryption Policy, Tricia E. Black

Federal Communications Law Journal

Encryption, understood on a basic level as the process of scrambling information to disguise its content, has been a topic of intense debate over the past decade because of Internet growth and well-founded concerns about online security. The encryption debate centers on striking an appropriate balance between national security concerns and the potential prosperity of the high-tech industry. The Clinton Administration played an important role in relaxing U.S. encryption policy. This Note argues that the dramatic shift in encryption policy resulted from a recognition of how the world will be in the digital age, and that strong, unregulated encryption technology …


Don’T Talk To Strangers: An Analysis Of Government And Industry Efforts To Protect A Child’S Privacy Online, Dorothy A. Hertzel Mar 2000

Don’T Talk To Strangers: An Analysis Of Government And Industry Efforts To Protect A Child’S Privacy Online, Dorothy A. Hertzel

Federal Communications Law Journal

Studies indicate that nearly two-thirds of children use the Internet. Children online users have created unique concerns for Internet providers and lawmakers. The collection, storage, and sale of a child online user's personal information without the child or parent's knowledge or consent has elicited much concern. Such a practice is commonplace in the world of the Internet. Congress, through the Child Online Privacy Protection Act, and the Internet industry have addressed how to curb this practice. In addition to these efforts, technological tools are currently available that block the transfer of personally identifiable information from the user to the computer. …


Strike Two: An Analysis Of The Child Online Protection Act’S Constitutional Failures, Heather L. Miller Dec 1999

Strike Two: An Analysis Of The Child Online Protection Act’S Constitutional Failures, Heather L. Miller

Federal Communications Law Journal

Congress's first attempt to regulate minors' access to sexually explicit material via the Internet failed. Congress responded with the Child Online Protection Act, which, despite its narrower scope, cannot withstand constitutional scrutiny. This Notes delves into the constitutionality of Congress's second attempt by addressing the difficulty of applying the vague "harmful to minors" definition to the Internet medium and the economic and technological unavailability of the Act's affirmative defenses. This Note concludes with an explanation as to why legislation is an ineffective mechanism to address the problem of minors' access to online pornography.


False Alarm?, Henry H. Perritt, Jr., Margaret G. Stewart May 1999

False Alarm?, Henry H. Perritt, Jr., Margaret G. Stewart

Federal Communications Law Journal

No abstract provided.


The Copyright Dilemma Involving Online Service Providers: Problem Solved . . . For Now, Christian C.M. Beams May 1999

The Copyright Dilemma Involving Online Service Providers: Problem Solved . . . For Now, Christian C.M. Beams

Federal Communications Law Journal

The Internet environment has presented copyright law with a development unlike any other this century. The illegal trading of copyrighted works has become easier than ever. Until recently, it was possible to hold online service providers strictly liable for the infringing actions of their users, regardless of whether the provider had knowledge of any infringing activity. While promoting the policy of copyright law, upholding such a standard had the potential to limit Internet speech and retard its growth. Seeing this, Congress began to debate on legislation that would protect innocent service providers from this liability. This Note argues that with …


Playing The Name Game: A Glimpse At The Future Of The Internet Domain Name System, Rebecca W. Gole Mar 1999

Playing The Name Game: A Glimpse At The Future Of The Internet Domain Name System, Rebecca W. Gole

Federal Communications Law Journal

As the Internet continues to expand into the top global medium for commerce, education, and communication, individuals and businesses are racing to claim their own unique Internet address or domain name. Unlike the three-dimensional world, where many entities may share the same name, on the Internet each domain name must be unique. As a result of this uniqueness requirement, a variety of disputes and trademark issues have arisen as individuals and entities compete for lucrative domain names on the Internet market. These disputes have led to the submission of two proposals for the overhaul of the current domain name system. …


The Information Superhighway: Trolls At The Tollgate, Charles M. Oliver Dec 1997

The Information Superhighway: Trolls At The Tollgate, Charles M. Oliver

Federal Communications Law Journal

Prior to the passage of the 1996 Telecommunications Act, policymakers sought funding and regulatory mechanisms capable of fulfilling the vision of an Information Superhighway. Vice President Gore, the Clinton Administration's point person on the issue, initially proposed assessing fees on other sectors of the telecommunications industry to fund construction. Meanwhile, conservatives asserted that deregulation of the industry would achieve the desired result. A compromise ultimately was reached: the 1996 Act requires local exchange carriers to unbundle their networks and provide access at a reasonable cost to competitors. The use of regulatory formulas in lieu of taxes to subsidize a national …


International Jurisdiction In Cyberspace: Which States May Regulate The Internet?, Stephan Wilske, Teresa Schiller Dec 1997

International Jurisdiction In Cyberspace: Which States May Regulate The Internet?, Stephan Wilske, Teresa Schiller

Federal Communications Law Journal

The Internet now reaches 60 million users in 160 countries, with the number increasing each year. Although cyberspace has been viewed as a self-regulating entity controlled by no government, this myth is being destroyed as the global Internet community expands. With this expansion comes a question: Who has the authority to regulate cyberspace? Given that decisions about the Internet reach far beyond national borders, the answer to this question is unknown, but certainly has broad implications. Traditional laws of international jurisdiction, including jurisdiction to prescribe, jurisdiction to adjudicate, and jurisdiction to enforce, offer some clear answers. However, further development of …


Linking Copyright To Homepages, Matt Jackson Apr 1997

Linking Copyright To Homepages, Matt Jackson

Federal Communications Law Journal

The explosive growth of the Internet as a widespread medium of communication raises many novel copyright issues. One issue that has escaped much examination is the copyright implications of "links"--references to other Internet Web sites that allow immediate access to those sites. This Comment analyzes such questions as whether linking gives rise to direct or contributory liability to the copyright owner of a linked site, and whether the links themselves are copyrightable. It concludes that, although contributory liability is possible, linking cannot constitute a direct infringement any more than dialing a phone number to reach an answering machine with a …


The Communications Decency Act, Jim Exon Nov 1996

The Communications Decency Act, Jim Exon

Federal Communications Law Journal

No abstract provided.