Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 30 of 37
Full-Text Articles in Law
Behavioral Advertising: The Cryptic Hunter And Gatherer Of The Internet, Joanna Penn
Behavioral Advertising: The Cryptic Hunter And Gatherer Of The Internet, Joanna Penn
Federal Communications Law Journal
In an era where three out of every four Americans have Internet access, the term "surfing" has transformed from riding waves into running the risk of having private information gathered, stored, and disseminated-all without the user's knowledge or permission. This new found online practice, known as "behavioral advertising," is a veritable goldmine for those companies that know the game. But will the FTC or Congress soon make new rules concerning how to play? This Note begins by explaining the differences between behavioral targeting and retargeting and the techniques that the two methods use to collect data. This Note then explores …
Wiretapping The Internet: The Expansion Of The Communications Assistance To Law Enforcement Act To Extend Government Surveillance, Christa M. Hibbard
Wiretapping The Internet: The Expansion Of The Communications Assistance To Law Enforcement Act To Extend Government Surveillance, Christa M. Hibbard
Federal Communications Law Journal
Criminal use of the Internet to circumvent traditional government phone wiretaps has inspired the Obama Administration to create a proposal to expand the Communications Assistance to Law Enforcement Act ("CALEA"). CALEA was passed in 1994 to regulate telephone and broadband companies to ensure compliance with standards to enable government wiretapping. The proposed amendment of CALEA would allow the government to require all communications service providers to meet technical standards necessary to comply with a wiretap order. The expansion of CALEA would likely widen its scope to social networking sites, instant messaging, gaming consoles that allow conversation among multiple players, and …
From Betamax To Youtube: How Sony Corporation Of America V. Universal City Studios, Inc. Could Still Be A Standard For New Technology, Veronica Corsaro
From Betamax To Youtube: How Sony Corporation Of America V. Universal City Studios, Inc. Could Still Be A Standard For New Technology, Veronica Corsaro
Federal Communications Law Journal
Internet technological innovations, particularly the development of Peer-to-Peer ("P2P") networks and the proliferation of user-generated content sites, have introduced considerable challenges for the application of copyright law and infringement liability. The response from the courts and Congress has been mixed, with severe legal curtails being applied to P2P technology while usergenerated content sites have been afforded a level of protection against infringement claims as part of the Digital Millennium Copyright Act's section 512 "safe harbor" provisions. However, these provisions have raised concerns about the issue of secondary copyright liability, a matter that has still been left undefined. This Note will …
It’S A Mad, Mad Internet: Globalization And The Challenges Presented By Internet Censorship, Jessica E. Bauml
It’S A Mad, Mad Internet: Globalization And The Challenges Presented By Internet Censorship, Jessica E. Bauml
Federal Communications Law Journal
The advent of the Internet has brought tremendous technological advancements and growth to the world. However, it has also become a source of conflict, particularly when different countries attempt to regulate this very ubiquitous and amorphous medium. The most notable controversy has arisen in China home to the world's most advanced system of Internet censorship, which levies harsh penalties on those who violate the country's strict censorship laws. China's "Great Firewall" has raised many eyebrows and is garnishing substantial criticism in response to the human rights abuses that result from the jailing and reported torture of Chinese dissidents. Yet the …
Internet Governance And Democratic Legitimacy, Oliver Sylvain
Internet Governance And Democratic Legitimacy, Oliver Sylvain
Federal Communications Law Journal
Even as the Internet goes pop, federal policymakers continue to surrender their statutory obligation to regulate communications in the first instance to extralegal nongovernmental organizations comprised of technical experts. The FCC's adjudication of a dispute concerning a major broadband service provider's network management practices is a case in point. There, in the absence of any enforceable legislative or regulatory rule, the FCC turned principally to the transmission principles of the Internet Engineering Taskforce, the preeminent nongovernmental Internet engineering standard-setting organization. This impulse to defer as a matter of course to such an organization without any legal mechanism requiring as much …
Creating Effective Broadband Network Regulation, Daniel L. Brenner
Creating Effective Broadband Network Regulation, Daniel L. Brenner
Federal Communications Law Journal
The Internet is central to the business and pastimes of Americans. Calls for increased regulation are ongoing, inevitable, and often justified. But calls for "network neutrality" or "nondiscrimination" assume with little hesitation federal agency competence to give predictable and accurate meaning to these terms and create regulations to implement them. This Article's chief contribution to Internet policy debate is to focus attention on the likelihood of successful FCC Internet regulation-a key assumption of some advocates.
The Article analyzes three characteristics that hobble the FCC, which is the likeliest federal agency to provide prescriptive rules. First, the record for the agency …
Virtually Enabled: How Title Iii Of The Americans With Disabilities Act Might Be Applied To Online Virtual Worlds, Joshua Newton
Virtually Enabled: How Title Iii Of The Americans With Disabilities Act Might Be Applied To Online Virtual Worlds, Joshua Newton
Federal Communications Law Journal
The rise and popularity of online virtual worlds, such as World of Warcraft and Second Life, holds significant promise for people with disabilities. For people who are unable to easily leave home or travel, virtual worlds provide a public venue, wherein people may interact freely without the social stigma that accompanies disability. However, access to these virtual worlds may be inhibited by physical, visual, or aural impairments, and virtual-world developers can be hostile to modifying their products to mitigate these difficulties. Thus, some disability advocates have turned to Title III of the Americans with Disabilities Act, arguing that places of …
Whose Burden Is It Anyway? Addressing The Needs Of Content Owners In Dmca Safe Harbors, Greg Janson
Whose Burden Is It Anyway? Addressing The Needs Of Content Owners In Dmca Safe Harbors, Greg Janson
Federal Communications Law Journal
Much of today's network neutrality debate addresses concerns that cable providers will limit access to competing Web-based services delivering multimedia content. While proposals to mandate nondiscrimination for all Internet traffic surely will help create a competitive environment where online entertainment providers can prosper, ISP interference is not the only threat. Online entertainment sites that relay user-generated content are threatened by crippling litigation brought by copyright holders for actions taken by third parties using their services. Reliance on the safe harbors provided in the Digital Millennium Copyright Act has, in most cases, proved unsuccessful. This Note addresses the concerns of both …
The Never-Ending Limits Of § 230: Extending Isp Immunity To The Sexual Exploitation Of Children, Katy Noeth
The Never-Ending Limits Of § 230: Extending Isp Immunity To The Sexual Exploitation Of Children, Katy Noeth
Federal Communications Law Journal
In 2006, the U.S. District Court for the Eastern District of Texas extended civil liability to Yahoo! under § 230 of the Communications Decency Act so that it could not be sued for knowingly profiting from a Web site where members exchanged sexually explicit pictures of minors. The court found that the reasoning of the seminal § 230 case, Zeran v. AOL, was analogous and that policy considerations mandated its holding.
This Note argues that a multifaceted approach is needed to prevent future courts from following that decision, including an amendment to § 230 that would impose civil liability upon …
Rethinking The Communications Decency Act: Eliminating Statutory Protections Of Discriminatory Housing Advertisements On The Internet, James D. Shanahan
Rethinking The Communications Decency Act: Eliminating Statutory Protections Of Discriminatory Housing Advertisements On The Internet, James D. Shanahan
Federal Communications Law Journal
The recent decision in Craigslist signals a drastic reduction in the effectiveness of the prohibition on discriminatory housing advertisements under the Fair Housing Act ("FHA"). Section 230 of the Communications Decency Act gives blanket immunity to Internet Content Providers from publisher liability for content originating from third parties. One of the effects of this immunity is the creation of a monopoly for discriminatory advertisements otherwise proscribed by the FHA. This Note argues that the simplest solution for Congress is to adjust the language of § 230 by adding the FHA to the list of exceptions to statutory immunity.
Who Controls The Internet? A Review, Deborah J. Salons
Who Controls The Internet? A Review, Deborah J. Salons
Federal Communications Law Journal
Book Review: Who Controls the Internet? Illusions of a Borderless World, Jack Goldsmith and Tim Wu, Oxford University Press 2006.
Ms. Salons reviews Who Controls the Internet? Illusions of a Borderless World, Oxford University Press, 2006. Authored by Jack Goldsmith and Tim Wu, the book provides a history of the Internet and analyzes the nexus between globalization and government coercion. The book focuses on how these agents have shaped and developed the Internet as we are familiar with it today.
Interconnection Policy And Technological Progress, Gerald W. Brock
Interconnection Policy And Technological Progress, Gerald W. Brock
Federal Communications Law Journal
No abstract provided.
Digital Crossroads, Kathleen Wallman
Digital Crossroads, Kathleen Wallman
Federal Communications Law Journal
Book Review: Digital Crossroads: American Telecommunications Policy in the Internet Age, Jonathan E. Nuechterlein & Philip J. Weiser, Cambridge, Mass., MIT Press, 2005, 670 pages.
A review of Digital Crossroads: American Telecommunications Policy in the Internet Age, by Jonathan E. Nuechterlein and Philip J. Weiser, MIT Press, 2005. Most practitioners of communications law are familiar with the necessity of teaching themselves enough economics, engineering, and politics to practice competently and comfortably in an area that is inherently interdisciplinary. Likewise, many professors who teach telecommunications from a variety of disciplinary perspectives are familiar with the frustration of locating a text that …
Staying Afloat In The Internet Stream: How To Keep Web Radio From Drowning In Digital Copyright Royalties, Emily D. Harwood
Staying Afloat In The Internet Stream: How To Keep Web Radio From Drowning In Digital Copyright Royalties, Emily D. Harwood
Federal Communications Law Journal
In the 1990's, the development of "streaming" technology allowed webcasters to begin broadcasting music on the Internet. The public took advantage of a plethora of free media players, and the number of web-based radio stations soared. However, a crippling dispute over broadcast rates left the viability of this technology in doubt. This Note criticizes current policies that curtail radio streaming by providing harsh financial restrictions on webcasters. In looking to the future, this Note argues that Congress should extend licensing exemptions to cover those Internet stations most like their AM/FM counterparts who do not have to pay additional fees.
Promoting Innovation To Prevent The Internet From Becoming A Wasteland, Zoe Baird
Promoting Innovation To Prevent The Internet From Becoming A Wasteland, Zoe Baird
Federal Communications Law Journal
No abstract provided.
What’S In A Name?, Jonathan Zittrain
What’S In A Name?, Jonathan Zittrain
Federal Communications Law Journal
Book Review: Ruling the Root, Milton L. Mueller, Cambridge, Mass.: MIT Press, 2002, 301 pages.
A review of Milton L. Mueller's Ruling the Root, The MIT Press, 2002. In the spring of 1998, the U.S. government told the Internet: Govern yourself. This unfocused order-a blandishment, really, expressed as an awkward "statement of policy" by the Department of Commerce, carrying no direct force of law-came about because the management of obscure but critical centralized Internet functions was at a political crossroads. In Ruling the Root, Mueller thoroughly documents the colorful history both before and after this moment of inflection, and gives …
Injunctive Relief In The Internet Age: The Battle Between Free Speech And Trade Secrets, Adam W. Johnson
Injunctive Relief In The Internet Age: The Battle Between Free Speech And Trade Secrets, Adam W. Johnson
Federal Communications Law Journal
The information revolution has led to technological innovations in the movement, storage, and dissemination of information. The Internet allows a person, with good or bad intent, to distribute information to millions of people. This ability raises serious implications when trade secret information is the subject of Internet postings. Once a trade secret becomes publicly available, it loses its legal secrecy, and special legal protection. Additionally, competitors and everyone else on the Internet can gain access to the information. For those who rely on trade secret protection to guard their inventions, this presents a growing concern.
This Note will illustrate the …
Carnivore, The Fbi’S E-Mail Surveillance System: Devouring Criminals, Not Privacy, Griffin S. Dunham
Carnivore, The Fbi’S E-Mail Surveillance System: Devouring Criminals, Not Privacy, Griffin S. Dunham
Federal Communications Law Journal
On July 11, 2000, the FBI intorduced Carnivore, an Internet monitoring system. It was designed, and is used exclusively, to carry out court-ordered surveillance of electronic communications. It is a tangible, portable device, tantamount to a phone tap, that allows the FBI to intercept and collect criminal suspects' e-mail without their knowledge or consent. This Note addresses competing and parallel interests between the government and society to determine the legitimacy and necessity of Carnivore. The purpose of this Note is twofold: first, to demonstrate the need for Carnivore to enable law enforcement to keep up with criminals who utilize cyberspace …
Indecent Exposures In An Electronic Regime, Natalie L. Regoli
Indecent Exposures In An Electronic Regime, Natalie L. Regoli
Federal Communications Law Journal
As the topic of data privacy is vast and the subject of much scrutiny, this Comment focuses narrowly on commercial cyber-activities relating to the nonconsensual Internet acquisition of personally identifiable user data. Beginning with a brief examination of the technology that has exacerbated privacy law's inadequacies, it briefly discusses failed attempts to safeguard privacy rights through the market and federal agency management. It then addresses current U.S. privacy legislation and the 1995 European Privacy Directive. Finally, this Comment proposes the creation of a new legislative system to effectively combat the surreptitious collection, storage, use, and sale of personal data.
The Defamation Of Choice-Of-Law In Cyberspace: Countering The View That The Restatement (Second) Of Conflict Of Laws Is Inadequate To Navigate The Borderless Reaches Of The Intangible Frontier, Philip Adam Davis
Federal Communications Law Journal
This Note examines the adequacy of the traditional choice-of-law rules, including the Restatement (Second), in interstate cyber-defamation disputes, and argues that there is nothing different or unique about cyberspace which warrants the modification or abandonment of traditional choice-of-law regimes for cyber-defamation disputes.
Taking Account Of The World As It Will Be: The Shifting Course Of U.S. Encryption Policy, Tricia E. Black
Taking Account Of The World As It Will Be: The Shifting Course Of U.S. Encryption Policy, Tricia E. Black
Federal Communications Law Journal
Encryption, understood on a basic level as the process of scrambling information to disguise its content, has been a topic of intense debate over the past decade because of Internet growth and well-founded concerns about online security. The encryption debate centers on striking an appropriate balance between national security concerns and the potential prosperity of the high-tech industry. The Clinton Administration played an important role in relaxing U.S. encryption policy. This Note argues that the dramatic shift in encryption policy resulted from a recognition of how the world will be in the digital age, and that strong, unregulated encryption technology …
Don’T Talk To Strangers: An Analysis Of Government And Industry Efforts To Protect A Child’S Privacy Online, Dorothy A. Hertzel
Don’T Talk To Strangers: An Analysis Of Government And Industry Efforts To Protect A Child’S Privacy Online, Dorothy A. Hertzel
Federal Communications Law Journal
Studies indicate that nearly two-thirds of children use the Internet. Children online users have created unique concerns for Internet providers and lawmakers. The collection, storage, and sale of a child online user's personal information without the child or parent's knowledge or consent has elicited much concern. Such a practice is commonplace in the world of the Internet. Congress, through the Child Online Privacy Protection Act, and the Internet industry have addressed how to curb this practice. In addition to these efforts, technological tools are currently available that block the transfer of personally identifiable information from the user to the computer. …
Strike Two: An Analysis Of The Child Online Protection Act’S Constitutional Failures, Heather L. Miller
Strike Two: An Analysis Of The Child Online Protection Act’S Constitutional Failures, Heather L. Miller
Federal Communications Law Journal
Congress's first attempt to regulate minors' access to sexually explicit material via the Internet failed. Congress responded with the Child Online Protection Act, which, despite its narrower scope, cannot withstand constitutional scrutiny. This Notes delves into the constitutionality of Congress's second attempt by addressing the difficulty of applying the vague "harmful to minors" definition to the Internet medium and the economic and technological unavailability of the Act's affirmative defenses. This Note concludes with an explanation as to why legislation is an ineffective mechanism to address the problem of minors' access to online pornography.
False Alarm?, Henry H. Perritt, Jr., Margaret G. Stewart
False Alarm?, Henry H. Perritt, Jr., Margaret G. Stewart
Federal Communications Law Journal
No abstract provided.
The Copyright Dilemma Involving Online Service Providers: Problem Solved . . . For Now, Christian C.M. Beams
The Copyright Dilemma Involving Online Service Providers: Problem Solved . . . For Now, Christian C.M. Beams
Federal Communications Law Journal
The Internet environment has presented copyright law with a development unlike any other this century. The illegal trading of copyrighted works has become easier than ever. Until recently, it was possible to hold online service providers strictly liable for the infringing actions of their users, regardless of whether the provider had knowledge of any infringing activity. While promoting the policy of copyright law, upholding such a standard had the potential to limit Internet speech and retard its growth. Seeing this, Congress began to debate on legislation that would protect innocent service providers from this liability. This Note argues that with …
Playing The Name Game: A Glimpse At The Future Of The Internet Domain Name System, Rebecca W. Gole
Playing The Name Game: A Glimpse At The Future Of The Internet Domain Name System, Rebecca W. Gole
Federal Communications Law Journal
As the Internet continues to expand into the top global medium for commerce, education, and communication, individuals and businesses are racing to claim their own unique Internet address or domain name. Unlike the three-dimensional world, where many entities may share the same name, on the Internet each domain name must be unique. As a result of this uniqueness requirement, a variety of disputes and trademark issues have arisen as individuals and entities compete for lucrative domain names on the Internet market. These disputes have led to the submission of two proposals for the overhaul of the current domain name system. …
The Information Superhighway: Trolls At The Tollgate, Charles M. Oliver
The Information Superhighway: Trolls At The Tollgate, Charles M. Oliver
Federal Communications Law Journal
Prior to the passage of the 1996 Telecommunications Act, policymakers sought funding and regulatory mechanisms capable of fulfilling the vision of an Information Superhighway. Vice President Gore, the Clinton Administration's point person on the issue, initially proposed assessing fees on other sectors of the telecommunications industry to fund construction. Meanwhile, conservatives asserted that deregulation of the industry would achieve the desired result. A compromise ultimately was reached: the 1996 Act requires local exchange carriers to unbundle their networks and provide access at a reasonable cost to competitors. The use of regulatory formulas in lieu of taxes to subsidize a national …
International Jurisdiction In Cyberspace: Which States May Regulate The Internet?, Stephan Wilske, Teresa Schiller
International Jurisdiction In Cyberspace: Which States May Regulate The Internet?, Stephan Wilske, Teresa Schiller
Federal Communications Law Journal
The Internet now reaches 60 million users in 160 countries, with the number increasing each year. Although cyberspace has been viewed as a self-regulating entity controlled by no government, this myth is being destroyed as the global Internet community expands. With this expansion comes a question: Who has the authority to regulate cyberspace? Given that decisions about the Internet reach far beyond national borders, the answer to this question is unknown, but certainly has broad implications. Traditional laws of international jurisdiction, including jurisdiction to prescribe, jurisdiction to adjudicate, and jurisdiction to enforce, offer some clear answers. However, further development of …
Linking Copyright To Homepages, Matt Jackson
Linking Copyright To Homepages, Matt Jackson
Federal Communications Law Journal
The explosive growth of the Internet as a widespread medium of communication raises many novel copyright issues. One issue that has escaped much examination is the copyright implications of "links"--references to other Internet Web sites that allow immediate access to those sites. This Comment analyzes such questions as whether linking gives rise to direct or contributory liability to the copyright owner of a linked site, and whether the links themselves are copyrightable. It concludes that, although contributory liability is possible, linking cannot constitute a direct infringement any more than dialing a phone number to reach an answering machine with a …
The Communications Decency Act, Jim Exon
The Communications Decency Act, Jim Exon
Federal Communications Law Journal
No abstract provided.