Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

University of Michigan Law School

Communications Law

Keyword
Publication Year
Publication
Publication Type

Articles 1 - 30 of 299

Full-Text Articles in Law

Regulatory Paralysis: The Answer To The Unanswerable Question Of Fcc Minority Ownership Policy, Christopher Terry Apr 2023

Regulatory Paralysis: The Answer To The Unanswerable Question Of Fcc Minority Ownership Policy, Christopher Terry

Michigan Technology Law Review

For five decades, the Federal Communications Commission (FCC) has struggled to implement policies that promote minority ownership of broadcast stations. Four “Prometheus” decisions from the Third Circuit span a seventeen-year legal impasse that highlighted the agency’s shortcomings on effective minority ownership policies. Now, after the Supreme Court’s 2021 decision in FCC v. Prometheus Radio Project, the FCC is required to relaunch its media ownership policy in 2022. This paper explores how the FCC has interpreted diversity in media ownership policymaking by examining a range of diversity policies and assessment methodologies particularly regarding minority ownership. The paper then presents data from …


Answering The Call For Telephone Consumer Protection Act Reform: Effectuating Congressional Intent Within 47 U.S.C. § 227(B)(1)(A), Justice M. Hubbard Apr 2023

Answering The Call For Telephone Consumer Protection Act Reform: Effectuating Congressional Intent Within 47 U.S.C. § 227(B)(1)(A), Justice M. Hubbard

University of Michigan Journal of Law Reform

This Note analyzes the current state of the civil law surrounding the Telephone Consumer Protection Act (TCPA) and highlights a glaring flaw within the current practice of assigning liability to telephonic solicitors utilizing an automatic telephone dialing system (autodialer): solicitors can be subjected to liability even though their actions are not what Congress intended to prevent. Congress enacted the TCPA in response to unique consumer privacy and public safety concerns. For example, the use of an autodialer created a substantial likelihood that autodialers would call emergency services and could “seize” their telephone lines and prevent those lines from being utilized …


Unprecedented Precedent And Original Originalism: How The Supreme Court’S Decision In Dobbs Threatens Privacy And Free Speech Rights, Leonard Niehoff Jan 2023

Unprecedented Precedent And Original Originalism: How The Supreme Court’S Decision In Dobbs Threatens Privacy And Free Speech Rights, Leonard Niehoff

Articles

The U.S. Supreme Court’s decision in Dobbs v. Jackson Women’s Health Organization has drawn considerable attention because of its reversal of Roe v. Wade and its rejection of a woman’s constitutional right to terminate her pregnancy. The Dobbs majority, and some of the concurring opinions, emphasized that the ruling was a narrow one. Nevertheless, there are reasons to think the influence of Dobbs may extend far beyond the specific constitutional issue the case addresses.

This article explains why Dobbs could have significant and unanticipated implications for the law of privacy and the law of free expression. I argue that two …


Beyond True And False: Fake News And The Digital Epistemic Divide, Gilad Abiri, Johannes Buchheim Sep 2022

Beyond True And False: Fake News And The Digital Epistemic Divide, Gilad Abiri, Johannes Buchheim

Michigan Technology Law Review

The massive fact-checking, flagging, and content removal campaigns run by major digital platforms during the 2020 elections and the Covid-19 pandemic did some good. However, they failed to prevent substantial portions of the population from believing that the election was stolen or that vaccinations are dangerous.

In this Article, we argue that the reason for the ineffectiveness of truth-based solutions—such as fact-checking— is that they do not reach the heart of the problem. Both scholars and policymakers share the implicit or explicit belief that the rise of digital fake news is harmful mainly because it spreads false information, which lays …


Private Censorship, Disinformation And The First Amendment: Rethinking Online Platforms Regulation In The Era Of A Global Pandemic, Tzu- Chiang Huang Sep 2022

Private Censorship, Disinformation And The First Amendment: Rethinking Online Platforms Regulation In The Era Of A Global Pandemic, Tzu- Chiang Huang

Michigan Technology Law Review

The proliferation of online disinformation and the rise of private censorship are paradigmatic examples of the challenges to traditional First Amendment jurisprudence in an algorithmic society. The limitations of traditional First Amendment jurisprudence are amplified by the impact of the COVID-19 pandemic in two ways. On the one hand, in the wake of the pandemic, we have entered an “infodemic” era where the volume of disinformation, as well as the harm it causes have reached unprecedented levels. For example, health disinformation has contributed to vaccine hesitancy. On the other hand, even though the proliferation of online disinformation seems to suggest …


Institutional Considerations For The Regulation Of Internet Service Providers, Daniel Deacon Feb 2022

Institutional Considerations For The Regulation Of Internet Service Providers, Daniel Deacon

Articles

Written to commemorate the twenty-fifth anniversary of the Telecommunications Act of 1996, this Essay looks forward at possible settlements regarding the nagging question of whether and how best to regulate Internet service providers. Rather than start from the standpoint that this or that policy, such as net neutrality, is good or bad, I ask more broadly who should regulate ISPs and under what general framework. I assess and critique various frameworks, including reliance on markets and antitrust; state-level regulation under a federal Title I regime; various frameworks set forward in Republican sponsored bills; and the Save the Internet Act. I …


The Everyday First Amendment, Leonard M. Niehoff, Thomas Sullivan Jan 2022

The Everyday First Amendment, Leonard M. Niehoff, Thomas Sullivan

Articles

On June 26 and June 27, 2019, some twenty contenders for the Democratic nomination for President of the United States participated in two evenings of political debate. The outsized group included Rep. Tulsi Gabbard of Hawaii, who was struggling to gain traction with voters. Shortly after the debate, while many viewers were conducting online searches to learn more about the candidates, Google temporarily suspended her campaign’s advertising account.

Google claimed that the interruption occurred because an automated system flagged unusual activity on the account. But Gabbard did not accept this explanation; she believed that Google deliberately had tried to undermine …


The Contribution Of Eu Law To The Regulation Of Online Speech, Luc Von Danwitz Jan 2021

The Contribution Of Eu Law To The Regulation Of Online Speech, Luc Von Danwitz

Michigan Technology Law Review

Internet regulation in the European Union (EU) is receiving significant attention and criticism in the United States. The European Court of Justice’s (ECJ) judgment in the case Glawischnig-Piesczek v. Facebook Ireland, in which the ECJ found a take-down order against Facebook for defamatory content with global effect permissible under EU law, was closely scrutinized in the United States. These transsystemic debates are valuable but need to be conducted with a thorough understanding of the relevant legal framework and its internal logic. This note aims to provide the context to properly assess the role the ECJ and EU law play …


Publish, Share, Re-Tweet, And Repeat, Michal Lavi Jan 2021

Publish, Share, Re-Tweet, And Repeat, Michal Lavi

University of Michigan Journal of Law Reform

New technologies allow users to communicate ideas to a broad audience easily and quickly, affecting the way ideas are interpreted and their credibility. Each and every social network user can simply click “share” or “retweet” and automatically republish an existing post and expose a new message to a wide audience. The dissemination of ideas can raise public awareness about important issues and bring about social, political, and economic change.

Yet, digital sharing also provides vast opportunities to spread false rumors, defamation, and Fake News stories at the thoughtless click of a button. The spreading of falsehoods can severely harm the …


Symmetry And (Network) Neutrality, Tejas N. Narechania Dec 2020

Symmetry And (Network) Neutrality, Tejas N. Narechania

Michigan Law Review Online

In this short Essay, I take the opportunity to highlight one further potential asymmetry that may yet emerge from the Supreme Court’s application of Chevron’s many doctrines. Drawing on then-Judge Kavanaugh’s disdissental from the D.C. Circuit’s decision affirming network neutrality rules, I suggest that there is at least one vote on the Supreme Court—and perhaps more—for an asymmetric approach to the major questions doctrine. Moreover, I demonstrate how asymmetry in this context is deeply irrational. As applied to network neutrality, the asymmetry has at least one of two effects. One, it might simply favor one large industry over another, …


Unplanned Obsolescence: Interpreting The Automatic Telephone Dialing System After The Smartphone Epoch, Walter Allison Oct 2020

Unplanned Obsolescence: Interpreting The Automatic Telephone Dialing System After The Smartphone Epoch, Walter Allison

Michigan Law Review

Technology regulations succeed or fail based upon their ability to regulate an idea. Constant innovation forces legislators to draft statutes aimed at prohibiting the idea of a device, rather than a specific device itself, because new devices with new capacities emerge every day. The Telephone Consumer Protection Act (TCPA) is a federal statute that imposes liability based on the idea of an automatic telephone dialing system (ATDS). But the statute’s definition of the device is ambiguous. The FCC struggles to coherently apply the definition to new technologies, and courts interpret the definition inconsistently. Federal circuit courts have split over these …


How Reporters Can Evaluate Automated Driving Announcements, Bryant Walker Smith Jan 2020

How Reporters Can Evaluate Automated Driving Announcements, Bryant Walker Smith

Journal of Law and Mobility

This article identifies a series of specific questions that reporters can ask about claims made by developers of automated motor vehicles (“AVs”). Its immediate intent is to facilitate more critical, credible, and ultimately constructive reporting on progress toward automated driving. In turn, reporting of this kind advances three additional goals. First, it encourages AV developers to qualify and support their public claims. Second, it appropriately manages public expectations about these vehicles. Third, it fosters more technical accuracy and technological circumspection in legal and policy scholarship.


Net Neutrality: An Explainer, Kincaid C. Brown Jan 2020

Net Neutrality: An Explainer, Kincaid C. Brown

Law Librarian Scholarship

Net neutrality is the idea that internet services or broadband providers should treat all content streaming through their systems the same, and providers who use their discretion to create “fast lanes,” block particular content, or throttle (slow down) internet speeds are not in keeping with how the internet ought to work.


Does A Non-Extreme Answer To Extremism Exist?, Jeffrey Levicki Jun 2019

Does A Non-Extreme Answer To Extremism Exist?, Jeffrey Levicki

University of Michigan Journal of Law Reform

Foreword for the Journal of Law Reform symposium entitled Alt-Association: The Role of Law in Combatting Extremism.


Policing Hate Speech And Extremism: A Taxonomy Of Arguments In Opposition, Leonard M. Niehoff Jun 2019

Policing Hate Speech And Extremism: A Taxonomy Of Arguments In Opposition, Leonard M. Niehoff

University of Michigan Journal of Law Reform

Hate speech and extremist association do real and substantial harm to individuals, groups, and our society as a whole. Our common sense, experience, and empathy for the targets of extremism tell us that our laws should do more to address this issue. Current reform efforts have therefore sought to revise our laws to do a better job at policing, prohibiting, and punishing hate speech and extremist association.

Efforts to do so, however, encounter numerous and substantial challenges. We can divide them into three general categories: definitional problems, operational problems, and conscientious problems. An informed understanding of these three categories of …


The Airwaves Meet The Highways, David Redl Apr 2019

The Airwaves Meet The Highways, David Redl

Journal of Law and Mobility

I applaud and congratulate the University of Michigan for launching the Journal of Law and Mobility. The timing is perfect. The information superhighway is no longer just a clever metaphor. We are living in an era where internet connectivity is a critical part of making transportation safer and more convenient. Internet connectivity has powered the U.S. and global economies for years now. In the early stages, dial-up connections enabled users to access a vast store of digital information. As the internet and its usage grew, so did the demand for faster broadband speeds. Finally, wireless networks untethered the power of …


The Innocent Villain: Involuntary Manslaughter By Text, Charles Adside Iii Apr 2019

The Innocent Villain: Involuntary Manslaughter By Text, Charles Adside Iii

University of Michigan Journal of Law Reform

Michelle Carter’s texts instructing her mentally ill online boyfriend to commit suicide offended the social moral code. But the law does not categorize all morally reprehensible behavior as criminal. Commonwealth v. Carter is unprecedented in manslaughter law because Carter was convicted on the theory that she was virtually present as opposed to physically present—at the crime scene. The court’s reasoning is expansive, as the framework it employs is excessively vague and does not provide fair notice to the public of which actions constitute involuntary manslaughter. Disturbingly, the Massachusetts Supreme Judicial Court affirmed the trial court’s logic. This Article concludes that …


Virtual Hatred: How Russia Tried To Start A Race War In The United States, William J. Aceves Jan 2019

Virtual Hatred: How Russia Tried To Start A Race War In The United States, William J. Aceves

Michigan Journal of Race and Law

During the 2016 U.S. presidential election, the Russian government engaged in a sophisticated strategy to influence the U.S. political system and manipulate American democracy. While most news reports have focused on the cyber-attacks aimed at Democratic Party leaders and possible contacts between Russian officials and the Trump presidential campaign, a more pernicious intervention took place. Throughout the campaign, Russian operatives created hundreds of fake personas on social media platforms and then posted thousands of advertisements and messages that sought to promote racial divisions in the United States. This was a coordinated propaganda effort. Some Facebook and Twitter posts denounced the …


Catch And Kill: Does The First Amendment Protect Buying Speech To Bury It?, Leonard M. Niehoff Jan 2019

Catch And Kill: Does The First Amendment Protect Buying Speech To Bury It?, Leonard M. Niehoff

Articles

The news media usually chase stories in order to publish them—but sometimes not so much. In some instances, media entities vigorously pursue a story—and purchase the source’s right to tell it—for the specific purpose of ensuring that it does not see the light of day. This practice, commonly called “catch and kill,” has recently come under close scrutiny and raises a host of questions.

These include pragmatic questions: Does the practice work? Can the media entity (or a third-party beneficiary) really enforce the underlying contract? Doesn’t the source’s willingness to abide by the contract come down to a simple economic …


You Can’T Say That!: Public Forum Doctrine And Viewpoint Discrimination In The Social Media Era, Micah Telegen Oct 2018

You Can’T Say That!: Public Forum Doctrine And Viewpoint Discrimination In The Social Media Era, Micah Telegen

University of Michigan Journal of Law Reform

The growing prevalence of privately-owned social media platforms is changing the way Americans and their governments communicate. This shift offers new opportunities, but also requires a reinterpretation of the First Amendment’s proscription of government limitations of speech. The public forum doctrine and its proscription of viewpoint discrimination seem particularly stretched by the digital revolution and the development of social media. In ongoing cases, litigants and courts have invoked the doctrine to limit the government’s ability to ‘block’ those who comment critically on government pages—much to the chagrin of those who note the private status of the companies hosting the pages …


How Elonis Failed To Clarify The Analysis Of "True Threats" In Social Media Cases And The Subsequent Need For Congressional Response, Jessica L. Opila Nov 2017

How Elonis Failed To Clarify The Analysis Of "True Threats" In Social Media Cases And The Subsequent Need For Congressional Response, Jessica L. Opila

Michigan Telecommunications & Technology Law Review

Social media and other internet communications have altered the way people communicate with one another, including the way people threaten one another. In 2015, the United States Supreme Court decided Elonis v. United States, which imposed a heightened mental state requirement for federal prosecutions of threats issued in interstate commerce. Although the statute, 18 U.S.C. § 875(c), has no mental state requirement, the Supreme Court held that, consistent with the principles of criminal law, only those with guilty minds should be convicted and thus some showing of subjective intent is required. The opinion did not name the requisite mental …


In Re Akhbar Beirut & Al Amin, Monica Hakimi Jul 2017

In Re Akhbar Beirut & Al Amin, Monica Hakimi

Articles

On August 29, 2016, the Special Tribunal for Lebanon (Tribunal) sentenced a corporate media enterprise and one of its employees for contemptuously interfering with the Tribunal's proceedings in Ayyash, a prosecution concerning the February 2005 terrorist attack that killed former Lebanese Prime Minister Rafiq Hariri. The contempt decision is significant for two reasons: (1) it adopts an expansive definition of the crime of contempt to restrict a journalist's freedom of expression; and (2) it is the first international judicial decision to hold a corporate entity criminally responsible.


Bankrupt Marketplace: First Amendment Theory And The 2016 Presidential Election, Leonard M. Niehoff Jan 2017

Bankrupt Marketplace: First Amendment Theory And The 2016 Presidential Election, Leonard M. Niehoff

Articles

In this article I advance two arguments. The first is that 2016 was a particularly important year for freedom of speech and the press, although not for conventional reasons. The second is that hte events of 2016 revealed that one of the essential components of our democracy - the central role that free expression plays in the democratic process - is in a state of serious dysfunction, if not crisis.


Are Trump's Attacks On The Media Adversely Affecting Public Opinion?, Leonard M. Niehoff Jan 2017

Are Trump's Attacks On The Media Adversely Affecting Public Opinion?, Leonard M. Niehoff

Articles

Both during the election cycle and as president of the United States, Donald Trump has enthusiastically and aggressively attacked the media. On Twitter, in speeches, and at rallies he has repeatedly deployed his favorite “f words” against mainstream broadcast, print, and online news sources: “fake,” “fraudulent,” “failing,” and (phonetically) “phony.” Some attacks have been personal to individual journalists, some have been more institutionally focused, and some have been made in contexts that appeared to create physical risk to reporters who were present. But whatever the variation in lavors, the frequency of the attacks has remained constant. Indeed, Trump has devoted …


Valuing Spectrum Allocations, Thomas W. Hazlett, Michael Honig Jan 2016

Valuing Spectrum Allocations, Thomas W. Hazlett, Michael Honig

Michigan Telecommunications & Technology Law Review

Observing trends in which Wi-Fi and Bluetooth have become widely popular, some argue that unlicensed allocations hosting such wireless technologies are increasingly valuable and that administrative spectrum allocations should shift accordingly. We challenge that policy conclusion. A core issue is that the social value of a given spectrum allocation is widely assumed to equal the gains of the applications it is likely to host. This thinking is faulty, as vividly seen in what we deem the Broadcast TV Spectrum Valuation Fallacy – the idea that because wireless video, or broadcast network programs are popular, TV channels are efficiently defined. This …


Blacklining Editorial Privilege, Justin Hurwitz Jan 2016

Blacklining Editorial Privilege, Justin Hurwitz

Michigan Telecommunications & Technology Law Review

Over the past year, FCC Commissioner Mike O’Rielly has drawn valuable attention to various Commission procedures in need of reform. Of these procedures perhaps the most perplexing is that of “editorial privileges” – a process whereby Commission staff is granted permission to continue editing Commission Orders subsequent to their adoption, such that the text of the Order voted on by the Commission is not necessarily the same as that ultimately published in the Federal Register or otherwise released to the public. This procedure is longstanding – predating institutional memory; yet it is also entirely unprecedented in the canon of administrative …


Astroturf Campaigns: Transparency In Telecom Merger Review, Victoria Peng Jan 2016

Astroturf Campaigns: Transparency In Telecom Merger Review, Victoria Peng

University of Michigan Journal of Law Reform

Large telecommunications companies looking to merge spend millions of dollars in their lobbying efforts to clear regulatory hurdles and obtain approval for their proposed mergers. Corporations such as AT&T, Comcast, and Time Warner use public participation processes as vehicles to influence regulatory decision-making. In the Federal Communications Commission (FCC) merger review context, the notice- and-comment process and public hearings have become fertile breeding grounds for hidden corporate influence. Corporations spend millions on corporate social responsibility programs and call upon nonprofit organizations that receive their largesse to represent their corporate interests as grassroots interests when the FCC seeks public comment. This …


What Common Law And Common Sense Teach Us About Corporate Cybersecurity, Stephanie Balitzer Jan 2016

What Common Law And Common Sense Teach Us About Corporate Cybersecurity, Stephanie Balitzer

University of Michigan Journal of Law Reform

This Note examines the challenges of corporate cyberdefense and suggests an approach to mitigate them. Part I outlines the background of the corporate cyberdefense quandary and various cyberdefense strategies. Part II explores the current landscape of cybersecurity law in the United States and the regulatory infrastructure that governs cybercrimes. Part II also surveys case law that illustrates the legal loopholes and ambiguities corporations face when implementing cybersecurity measures. Finally, Part III argues that the proposed active defense model fails to comport with practical concerns and established legal principles. This Note’s comparative analysis of common law ‘defense of property’ principles and …


Network Neutrality And The First Amendment, Andrew Patrick, Eric Scharphorn Oct 2015

Network Neutrality And The First Amendment, Andrew Patrick, Eric Scharphorn

Michigan Telecommunications & Technology Law Review

The First Amendment reflects the conviction that the widest possible dissemination of information from diverse and antagonistic sources is essential to public welfare. Like the printing press, the Internet has dramatically transformed the marketplace of ideas by providing unprecedented opportunities for individuals to communicate. Though its growth continues to be phenomenal, broadband service providers— acting as Internet gatekeepers—have developed the ability to discriminate against specific content and applications. First, these gatekeepers intercept and inspect data transferred over public networks, then selectively block or slow it. This practice has the potential to stifle the Internet’s value as a speech platform by …


Loopholes For Circumventing The Constitution: Unrestrained Bulk Surveillance On Americans By Collecting Network Traffic Abroad, Axel Arnbak, Sharon Goldberg Jun 2015

Loopholes For Circumventing The Constitution: Unrestrained Bulk Surveillance On Americans By Collecting Network Traffic Abroad, Axel Arnbak, Sharon Goldberg

Michigan Telecommunications & Technology Law Review

This Article reveals interdependent legal and technical loopholes that the US intelligence community could use to circumvent constitutional and statutory safeguards for Americans. These loopholes involve the collection of Internet traffic on foreign territory, and leave Americans as unprotected as foreigners by current United States (US) surveillance laws. This Article will also describe how modern Internet protocols can be manipulated to deliberately divert American’s traffic abroad, where traffic can then be collected under a more permissive legal regime (Executive Order 12333) that is overseen solely by the executive branch of the US government. Although the media has reported on some …