Open Access. Powered by Scholars. Published by Universities.®

Communications Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 9 of 9

Full-Text Articles in Communications Law

Exploring The First Amendment Rights Of Teens In Relationship To Sexting And Censorship, Julia Halloran Mclaughlin Feb 2012

Exploring The First Amendment Rights Of Teens In Relationship To Sexting And Censorship, Julia Halloran Mclaughlin

University of Michigan Journal of Law Reform

This Article explores child pornography law in relation to teen sexting conduct. Recently, some teens who engaged in teen sexting have been convicted under child pornography laws and have been required to register as sexual predators. The criminalization of teens for developmentally typical behavior, mimicking the conduct of adults, can result in grave harm to most teens. Furthermore, the application of child pornography laws to teen sexting conduct demonstrates the constitutional overbreadth of the current definition of child pornography. Photographs have an emblematic role in society-capturing and celebrating youth. Moreover, the creation of teen sexting images accompanies a teen's developmental …


Ill Telecommunications: How Internet Infrastructure Providers Lose First Amendment Protection, Nicholas Bramble Jan 2010

Ill Telecommunications: How Internet Infrastructure Providers Lose First Amendment Protection, Nicholas Bramble

Michigan Telecommunications & Technology Law Review

The Federal Communications Commission (FCC) recently proposed an Internet nondiscrimination rule: "Subject to reasonable network management, a provider of broadband Internet access service must treat lawful content, applications, and services in a nondiscriminatory manner." Among other requests, the FCC sought comment on whether the proposed nondiscrimination rule would "promote free speech, civic participation, and democratic engagement," and whether it would "impose any burdens on access providers' speech that would be cognizable for purposes of the First Amendment." The purpose of this Article is to suggest that a wide range of responses to these First Amendment questions, offered by telecommunications providers …


Rationing The Infinite, Leonard M. Niehoff Apr 2009

Rationing The Infinite, Leonard M. Niehoff

Michigan Law Review

This Review raises a number of objections to Baker's arguments and proposals. Furthermore, this Review raises the fundamental question of whether Baker's central operating assumption-that media is a scarce resource that should be fairly distributed-remains timely in light of the far-reaching and fast-paced changes wrought by the internet. Nevertheless, this Review also recognizes that, as with Baker's prior works, Media Concentration and Democracy makes a serious contribution to the discussion of the political, social, and economic dynamics that challenge the existence of a strong and independent media. Media Concentration and Democracy does a better job of raising questions than of …


Regulating Speech Across Borders: Technology Vs. Values, Matthew Fagin Apr 2003

Regulating Speech Across Borders: Technology Vs. Values, Matthew Fagin

Michigan Telecommunications & Technology Law Review

The disfavored status within international law of unilateral state-based regulations that target extraterritorial actors arises from the inherent challenges such actions represent to state sovereignty. In the context of the Internet, the complexity of choice-of-law analysis is heightened: regulations imposed by one state have the potential to effectively block communications to citizens of all states and undermine the conflicting regulatory aims of neighboring states. Early legal commentators built upon this cascading chilling effect of state-based regulation to proclaim both the futility and illegitimacy of state-based action in the online environment. Subsequent scholars have demonstrated the commensurability of state-based online regulation …


Corporate Cybersmear: Employers File John Doe Defamation Lawsuits Seeking The Identity Of Anonymous Employee Internet Posters, Margo E. K. Reder, Christine Neylon O'Brien Jun 2002

Corporate Cybersmear: Employers File John Doe Defamation Lawsuits Seeking The Identity Of Anonymous Employee Internet Posters, Margo E. K. Reder, Christine Neylon O'Brien

Michigan Telecommunications & Technology Law Review

Communications systems are now wide open and fully accessible, with no limits in range, scope or geography. Targeted audiences are accessible with pinpoint accuracy. Messages reach millions of readers with one click. There is a chat room for everyone. Most importantly, there is no limit on content. Therefore, employees can register their dissatisfaction by posting a message in a chat room. Moreover, the identity of the posting employee is not easily discoverable due to anonymous and pseudonymous communications capabilities. The nature of these online messages is qualitatively different from real-world communications. By way of example, newspapers have a responsibility regarding …


Criminalization Of True Anonymity In Cyberspace, The, George F. Du Pont Jun 2001

Criminalization Of True Anonymity In Cyberspace, The, George F. Du Pont

Michigan Telecommunications & Technology Law Review

The question of whether a state or the federal government can create a narrowly tailored restriction on cyberspace anonymity without violating the First Amendment remains unresolved[...]The Supreme Court has not directly addressed the issue, but it may soon consider the constitutionality of criminalizing certain kinds of cyber-anonymity in light of the unique nature of cyberspace. This comment explores the various forms of anonymity, examines the First Amendment status of anonymity in and outside of cyberspace, analyzes relevant scholarly commentary, and concludes that a narrowly tailored legislative restriction on "true" anonymity in cyberspace would not violate the First Amendment.


Incitement To Violence On The World Wide Web: Can Web Publishers Seek First Amendment Refuge?, Lonn Weissblum Jun 2000

Incitement To Violence On The World Wide Web: Can Web Publishers Seek First Amendment Refuge?, Lonn Weissblum

Michigan Telecommunications & Technology Law Review

The purpose of this comment is to analyze the potential First Amendment implications of the appearance of bomb-making instructions on the Web in the United States. Moreover, this comment will ultimately consider the notion that "because Brandenburg allows consideration of all the unique characteristics of the Web, there is no reason to formulate new jurisprudence merely because of new technology." Part II examines the seminal cases in the area of speech action, including Schenck v. United States, Hess v. Indiana, and Brandenburg v. Ohio, and the adulations and criticisms that resulted from these cases. Part III discusses the civil cases …


"Chilling" The Internet? Lessons From Fcc Regulation Of Radio Broadcasting , Thomas W. Hazlett, David W. Sosa Jun 1998

"Chilling" The Internet? Lessons From Fcc Regulation Of Radio Broadcasting , Thomas W. Hazlett, David W. Sosa

Michigan Telecommunications & Technology Law Review

Congress included the Communications Decency Act (CDA) in the Telecommunications Act signed into law on February 8, 1996. The bill seeks to outlaw the use of computers and phone lines to transmit "indecent" material with provisions of jail terms and heavy fines for violators. Proponents of the bill argue it is necessary to protect minors from undesirable speech on the Internet. The CDA was immediately challenged in court by the American Civil Liberties Union, and the special 3-judge federal panel established to hear the case recently declared the Act unconstitutional. Yet, its ultimate adjudication remains in doubt. Ominously, the federal …


Regulatory Web: Free Speech And The Global Information Infrastructure, A, Victor Mayer-Schönberger, Teree E. Foster Jun 1997

Regulatory Web: Free Speech And The Global Information Infrastructure, A, Victor Mayer-Schönberger, Teree E. Foster

Michigan Telecommunications & Technology Law Review

National restrictions of freedom of speech on the nascent global information infrastructure are commonplace not only in the United States, but also around the globe. Individual nations, each intent upon preserving what they perceive to be within the perimeters of their national interests, seek to regulate certain forms of speech because of content that is considered reprehensible or offensive to national well-being or civic virtue. The fact that this offending speech is technologically dispersed instantaneously to millions of potential recipients strengthens the impetus to regulate.... Activists at both ends of the spectrum disregard an integral aspect of the global composition …