Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 22 of 22
Full-Text Articles in Law
Loopholes For Circumventing The Constitution: Unrestrained Bulk Surveillance On Americans By Collecting Network Traffic Abroad, Axel Arnbak, Sharon Goldberg
Loopholes For Circumventing The Constitution: Unrestrained Bulk Surveillance On Americans By Collecting Network Traffic Abroad, Axel Arnbak, Sharon Goldberg
Michigan Telecommunications & Technology Law Review
This Article reveals interdependent legal and technical loopholes that the US intelligence community could use to circumvent constitutional and statutory safeguards for Americans. These loopholes involve the collection of Internet traffic on foreign territory, and leave Americans as unprotected as foreigners by current United States (US) surveillance laws. This Article will also describe how modern Internet protocols can be manipulated to deliberately divert American’s traffic abroad, where traffic can then be collected under a more permissive legal regime (Executive Order 12333) that is overseen solely by the executive branch of the US government. Although the media has reported on some …
Wireless Localism: Beyond The Shroud Of Objectivity In Federal Spectrum Administration, Olivier Sylvain
Wireless Localism: Beyond The Shroud Of Objectivity In Federal Spectrum Administration, Olivier Sylvain
Michigan Telecommunications & Technology Law Review
Recent innovations in mobile wireless technology have instigated a debate between two camps of legal scholars about federal administration of the electromagnetic spectrum. The first camp argues that the Federal Communications Commission (“FCC”) should define spectrum use rights more clearly and give spectrum licensees broad property rights in frequencies. The second camp argues that, rather than award exclusive licenses to the highest bidder, the FCC ought to open much, if not most, of the spectrum to unlicensed use by smartphones and tablets equipped with the newest spectrum administration technology. First, this Article shows that both of these camps comprise a …
Viewer Discretion Is Advised: Disconnects Between The Marketplace Of Ideas And Social Media Used To Communicate Information During Emergencies And Public Health Crises, Peter Maggiore
Michigan Telecommunications & Technology Law Review
In a sense, social media has become the ideal manifestation of the "Marketplace of Ideas" (hereinafter "Marketplace") that Chief Justice Oliver Wendell Holmes articulated. The Marketplace concept will be discussed in greater detail below, but in brief, it is the theory that truth will surface over falsehoods when all opinions and ideas are freely expressed, because the value or worth of that opinion or idea will be determined on the market of public opinion. Part I of this Note will examine the Marketplace concept through the works of various legal and philosophical theorists. Chief among them is Frederick Schauer's work …
Privacy Policies, Terms Of Service, And Ftc Enforcement: Broadening Unfairness Regulation For A New Era, G. S. Hans
Privacy Policies, Terms Of Service, And Ftc Enforcement: Broadening Unfairness Regulation For A New Era, G. S. Hans
Michigan Telecommunications & Technology Law Review
This Note examines website privacy policies in the context of FTC regulation. The relevant portion of Section 5 of the Federal Trade Commission Act, 15 U.S.C. § 45(a), uses the following language to define the scope of the agency's regulatory authority: "Unfair methods of competition in or affecting commerce, and unfair or deceptive acts or practices in or affecting commerce, are hereby declared unlawful." Specifically, this Note analyzes the FTC's power to regulate unfair practices (referred to as the FTC's "unfairness power") granted by Section 5, and also discusses the deception prong of Section 5, which allows the agency to …
Ill Telecommunications: How Internet Infrastructure Providers Lose First Amendment Protection, Nicholas Bramble
Ill Telecommunications: How Internet Infrastructure Providers Lose First Amendment Protection, Nicholas Bramble
Michigan Telecommunications & Technology Law Review
The Federal Communications Commission (FCC) recently proposed an Internet nondiscrimination rule: "Subject to reasonable network management, a provider of broadband Internet access service must treat lawful content, applications, and services in a nondiscriminatory manner." Among other requests, the FCC sought comment on whether the proposed nondiscrimination rule would "promote free speech, civic participation, and democratic engagement," and whether it would "impose any burdens on access providers' speech that would be cognizable for purposes of the First Amendment." The purpose of this Article is to suggest that a wide range of responses to these First Amendment questions, offered by telecommunications providers …
Wireless Net Neutrality Regulation And The Problem With Pricing: An Empirical, Cautionary Tale, Babette E.L. Boliek
Wireless Net Neutrality Regulation And The Problem With Pricing: An Empirical, Cautionary Tale, Babette E.L. Boliek
Michigan Telecommunications & Technology Law Review
I present here a unique empirical analysis of the consumer welfare benefits of prior regulation in the mobile telecommunications industry. In particular, I analyze the relative consumer benefits of state rate regulation and federal entry regulation. The institution of filing requirements and FTC review and approval of various consumer pricing regimes is highly analogous to the consumer price controls imposed by various state level public utility commissions in the past. Furthermore, the imposition of a zero-price rule is analogous to past rate regulation; in particular it is similar to past wholesale regulation with its underlying principles of open access and …
Fcc Jurisdiction Over Isps In Protocol-Specific Bandwidth Throttling, Andrew Gioia
Fcc Jurisdiction Over Isps In Protocol-Specific Bandwidth Throttling, Andrew Gioia
Michigan Telecommunications & Technology Law Review
Over the past decade, the Internet has matured from its dial-up infancy into the nation's dominant communications infrastructure. Such rapid growth and accessibility--while fostering free speech and innovation like nothing before--has nonetheless created complex regulatory and policy questions for both the Federal Communications Commission (FCC) and the cable companies providing the nation's broadband Internet access. For instance, Comcast, one such Internet provider, has recently brought to the fore the question of how, and to what extent, the FCC can ensure an open and accessible Internet through the company's recent actions in selectively targeting and interfering with the connections of certain …
When Mobile Phones Are Rfid-Equipped - Finding E.U.-U.S. Solutions To Protect Consumer Privacy And Facilitate Mobile Commerce, Nancy J. King
When Mobile Phones Are Rfid-Equipped - Finding E.U.-U.S. Solutions To Protect Consumer Privacy And Facilitate Mobile Commerce, Nancy J. King
Michigan Telecommunications & Technology Law Review
New mobile phones have been designed to include delivery of mobile advertising and other useful location-based services, but have they also been designed to protect consumers' privacy? One of the key enabling technologies for these new types of phones and new mobile services is Radio Frequency Identification (RFID), a wireless communication technology that enables the unique identification of tagged objects. In the case of RFID-enabled mobile phones, the personal nature of the devices makes it very likely that, by locating a phone, businesses will also be able to locate its owner. Consumers are currently testing new RFID-enabled phones around the …
A New Frontier Or Merely A New Medium - An Analysis Of The Ethics Of Blawgs, Justin Krypel
A New Frontier Or Merely A New Medium - An Analysis Of The Ethics Of Blawgs, Justin Krypel
Michigan Telecommunications & Technology Law Review
The purpose of this Note is to investigate those rules of ethics which interact with attorney blogs, placing a special emphasis on advertising rules. The central finding is that, under the Supreme Court's current First Amendment jurisprudence, attorney blogs (or, more cleverly, "blawgs") are not subject to regulation by the ethics codes of the ABA or the various state bars. Furthermore, if the Supreme Court were to, for some reason, construe blawgs as falling outside of First Amendment protection, evidence suggests that regulating this new medium would be neither desirable nor effective. Part II outlines the historical framework which underlies …
Justice, And Only Justice, You Shall Pursue: Network Neutrality, The First Amendment And John Rawls's Theory Of Justice, Amit M. Schejter, Moran Yemini
Justice, And Only Justice, You Shall Pursue: Network Neutrality, The First Amendment And John Rawls's Theory Of Justice, Amit M. Schejter, Moran Yemini
Michigan Telecommunications & Technology Law Review
As broadband becomes the public's technology of choice to access the Internet, it is also emerging as the battlefield upon which the struggle for control of the Internet is being fought. Operators who provide physical access to the service claim the right to discriminate among the content providers who use the infrastructure in which the operators have invested. In contrast, content providers warn that exercising such a policy would "undermine the principles that have made the Internet such a success."[...] For academic observers, analysis of this issue has thus far been confined to the areas of property law, innovation, and …
A Shadow Government: Private Regulation, Free Speech, And Lessons From The Sinclair Blogstorm, Marvin Ammori
A Shadow Government: Private Regulation, Free Speech, And Lessons From The Sinclair Blogstorm, Marvin Ammori
Michigan Telecommunications & Technology Law Review
Because of the economics of online information, thousands who do not know each other can band together in hours, without previous organizational coordination or any persistent central coordination, to affect others and conform society to their idea of the social good. This changes the dynamic of political action and the ability of unaffiliated, lone individuals to respond to social acts where government and the market have not. Through ad hoc volunteerism, the Sinclair participants produced regulatory action against a private party with whom they were not transacting--because they believed government failed to do so. Although ad hoc volunteerism has received …
From The Cluetrain To The Panopticon: Isp Activity Characterization And Control Of Internet Communications, Eric Evans
From The Cluetrain To The Panopticon: Isp Activity Characterization And Control Of Internet Communications, Eric Evans
Michigan Telecommunications & Technology Law Review
If ISPs are exposed to liability for forwarding others' messages--messages originating with other ISPs or with the ISP's own users--the norm of universal mutual message forwarding that underlies the present operation of the Internet will be threatened. This Note will argue that society presently confronts a choice between a common carrier Internet characterized by universal mutual message forwarding and a monitored and controlled Internet. Part I will describe the underlying rules that govern ISPs' liability for their users' actions. Part II will argue that the present statutory regime governing ISPs' liability for users' copyright infringement includes elements that provide ISPs …
Application Of The Public-Trust Doctrine And Principles Of Natural Resource Management To Electromagnetic Spectrum, Patrick S. Ryan
Application Of The Public-Trust Doctrine And Principles Of Natural Resource Management To Electromagnetic Spectrum, Patrick S. Ryan
Michigan Telecommunications & Technology Law Review
The Electromagnetic spectrum is among our most valuable natural resources. Yet while the past few decades have seen a rich body of environmental law develop for other natural resources, this movement has largely passed over the electromagnetic spectrum. This Article argues that to remedy that situation, the public-trust doctrine, which is now a cornerstone of modern environmental law, should be extended to the electromagnetic spectrum. This extension would not be a leap: the public-trust doctrine has already been used to guarantee the public access to various bodies of water (not just navigable water), and to protect recreational lakes and beaches, …
The Need For Revisions To The Law Of Wiretapping And Interception Of Email, Robert A. Pikowsky
The Need For Revisions To The Law Of Wiretapping And Interception Of Email, Robert A. Pikowsky
Michigan Telecommunications & Technology Law Review
I argue that a person's privacy interest in his email is the same as his privacy interest in a telephone conversation. Moreover, the privacy interest in email remains unchanged regardless of whether it is intercepted in transmission or covertly accessed from the recipient's mailbox. If one accepts this assumption, it follows that the level of protection against surveillance by law enforcement officers should be the same[...] As technology continues to blur the distinction between wire and electronic communication, it becomes apparent that a new methodology must be developed in order to provide logical and consistent protection to private communications. The …
Regulating Speech Across Borders: Technology Vs. Values, Matthew Fagin
Regulating Speech Across Borders: Technology Vs. Values, Matthew Fagin
Michigan Telecommunications & Technology Law Review
The disfavored status within international law of unilateral state-based regulations that target extraterritorial actors arises from the inherent challenges such actions represent to state sovereignty. In the context of the Internet, the complexity of choice-of-law analysis is heightened: regulations imposed by one state have the potential to effectively block communications to citizens of all states and undermine the conflicting regulatory aims of neighboring states. Early legal commentators built upon this cascading chilling effect of state-based regulation to proclaim both the futility and illegitimacy of state-based action in the online environment. Subsequent scholars have demonstrated the commensurability of state-based online regulation …
Corporate Cybersmear: Employers File John Doe Defamation Lawsuits Seeking The Identity Of Anonymous Employee Internet Posters, Margo E. K. Reder, Christine Neylon O'Brien
Corporate Cybersmear: Employers File John Doe Defamation Lawsuits Seeking The Identity Of Anonymous Employee Internet Posters, Margo E. K. Reder, Christine Neylon O'Brien
Michigan Telecommunications & Technology Law Review
Communications systems are now wide open and fully accessible, with no limits in range, scope or geography. Targeted audiences are accessible with pinpoint accuracy. Messages reach millions of readers with one click. There is a chat room for everyone. Most importantly, there is no limit on content. Therefore, employees can register their dissatisfaction by posting a message in a chat room. Moreover, the identity of the posting employee is not easily discoverable due to anonymous and pseudonymous communications capabilities. The nature of these online messages is qualitatively different from real-world communications. By way of example, newspapers have a responsibility regarding …
Criminalization Of True Anonymity In Cyberspace, The, George F. Du Pont
Criminalization Of True Anonymity In Cyberspace, The, George F. Du Pont
Michigan Telecommunications & Technology Law Review
The question of whether a state or the federal government can create a narrowly tailored restriction on cyberspace anonymity without violating the First Amendment remains unresolved[...]The Supreme Court has not directly addressed the issue, but it may soon consider the constitutionality of criminalizing certain kinds of cyber-anonymity in light of the unique nature of cyberspace. This comment explores the various forms of anonymity, examines the First Amendment status of anonymity in and outside of cyberspace, analyzes relevant scholarly commentary, and concludes that a narrowly tailored legislative restriction on "true" anonymity in cyberspace would not violate the First Amendment.
Incitement To Violence On The World Wide Web: Can Web Publishers Seek First Amendment Refuge?, Lonn Weissblum
Incitement To Violence On The World Wide Web: Can Web Publishers Seek First Amendment Refuge?, Lonn Weissblum
Michigan Telecommunications & Technology Law Review
The purpose of this comment is to analyze the potential First Amendment implications of the appearance of bomb-making instructions on the Web in the United States. Moreover, this comment will ultimately consider the notion that "because Brandenburg allows consideration of all the unique characteristics of the Web, there is no reason to formulate new jurisprudence merely because of new technology." Part II examines the seminal cases in the area of speech action, including Schenck v. United States, Hess v. Indiana, and Brandenburg v. Ohio, and the adulations and criticisms that resulted from these cases. Part III discusses the civil cases …
Telemedicine: Rx For The Future Of Health Care, Susan E. Volkert
Telemedicine: Rx For The Future Of Health Care, Susan E. Volkert
Michigan Telecommunications & Technology Law Review
Quite simply, telemedicine symbolizes and catalyzes the clash between the reality of our legal and political approach to health care and the American dream of bringing health care to all patients. Telemedicine, like our health care delivery systems, is regulated by many layers of government. Unlike other issues, telemedicine cuts through and challenges the traditional controls of access and cost. As such, telemedicine is a microcosm of our health care delivery system and a lens through which one may analyze the obstacles to access in the current system. This article examines these issues, proposes that telemedicine's goal should be to …
"Chilling" The Internet? Lessons From Fcc Regulation Of Radio Broadcasting , Thomas W. Hazlett, David W. Sosa
"Chilling" The Internet? Lessons From Fcc Regulation Of Radio Broadcasting , Thomas W. Hazlett, David W. Sosa
Michigan Telecommunications & Technology Law Review
Congress included the Communications Decency Act (CDA) in the Telecommunications Act signed into law on February 8, 1996. The bill seeks to outlaw the use of computers and phone lines to transmit "indecent" material with provisions of jail terms and heavy fines for violators. Proponents of the bill argue it is necessary to protect minors from undesirable speech on the Internet. The CDA was immediately challenged in court by the American Civil Liberties Union, and the special 3-judge federal panel established to hear the case recently declared the Act unconstitutional. Yet, its ultimate adjudication remains in doubt. Ominously, the federal …
Regulatory Web: Free Speech And The Global Information Infrastructure, A, Victor Mayer-Schönberger, Teree E. Foster
Regulatory Web: Free Speech And The Global Information Infrastructure, A, Victor Mayer-Schönberger, Teree E. Foster
Michigan Telecommunications & Technology Law Review
National restrictions of freedom of speech on the nascent global information infrastructure are commonplace not only in the United States, but also around the globe. Individual nations, each intent upon preserving what they perceive to be within the perimeters of their national interests, seek to regulate certain forms of speech because of content that is considered reprehensible or offensive to national well-being or civic virtue. The fact that this offending speech is technologically dispersed instantaneously to millions of potential recipients strengthens the impetus to regulate.... Activists at both ends of the spectrum disregard an integral aspect of the global composition …
Telecommunications In Transition: Unbundling, Reintegration, And Competition, David J. Teece
Telecommunications In Transition: Unbundling, Reintegration, And Competition, David J. Teece
Michigan Telecommunications & Technology Law Review
The world economy is experiencing a technological revolution, fueled by rapid advances in microelectronics, optics, and computer science, that in the 1990s and beyond will dramatically change the way people everywhere communicate, learn, and access information and entertainment. This technological revolution has been underway for about a decade. The emergence of a fully-interactive communications network, sometimes referred to as the "Information Superhighway," is now upon us. This highway, made possible by fiber optics and the convergence of several different technologies, is capable of delivering a plethora of new interactive entertainment, informational, and instructional services that are powerful and user-friendly. The …