Open Access. Powered by Scholars. Published by Universities.®

Communications Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 8 of 8

Full-Text Articles in Communications Law

Blocking Nature's Vulnerable Calls For Help: The Tenth Circuit Dials Into The Telecommunications Act's Federal Environmental Preemption Clause In Santa Fe Alliance V. City Of Santa Fe, Samantha Speiss Oct 2022

Blocking Nature's Vulnerable Calls For Help: The Tenth Circuit Dials Into The Telecommunications Act's Federal Environmental Preemption Clause In Santa Fe Alliance V. City Of Santa Fe, Samantha Speiss

Villanova Environmental Law Journal

No abstract provided.


Wiretapping The Internet: Analyzing The Application Of The Federal Wiretap Act’S Party Exception Online, Hayden Driscoll Oct 2022

Wiretapping The Internet: Analyzing The Application Of The Federal Wiretap Act’S Party Exception Online, Hayden Driscoll

Washington and Lee Journal of Civil Rights and Social Justice

The federal Wiretap Act—originally enacted to curtail the government’s unbridled use of wiretaps to monitor telephonic communications—was amended in 1986 to provide a private right of action, extending the Act’s Fourth Amendment-like protections to private intrusions. Since the advent of the internet, plaintiffs have attempted to predicate claims of unauthorized online privacy intrusions on the Wiretap Act. In response, defendants claim they are parties to the communications at issue and should be absolved of liability under the Act’s party exception. The federal circuit courts of appeal disagree on how the party exception applies in the internet context. This Note evaluates …


Paving A New (Hua)Wei: A Comparative Analysis Of International Approaches To Securing Information And Communication Technology Supply Chains, Jordan Villegas Jun 2022

Paving A New (Hua)Wei: A Comparative Analysis Of International Approaches To Securing Information And Communication Technology Supply Chains, Jordan Villegas

Catholic University Law Review

Recent amendments to Chinese Intelligence Laws codify affirmative obligations upon domestic companies and citizens alike, namely, that they must assist and support the Chinese Communist Party (CCP) in its intelligence gathering efforts. Coupling these laws with the international prevalence of Huawei, a Chinese telecommunications company comprising two-thirds of 5G equipment outside China, CCP compromised 5G equipment is an unassailable reality. This article explores five intelligence allied nations and how each has respectively addressed the risk posed by Huawei. It argues each nation’s policies are deducible to three primary approaches, categorically including: (1) promulgation of law explicitly excluding Huawei 5G equipment; …


The Political Dynamics Of Legislative Reform: Potential Drivers Of The Next Communications Statute, Christopher S. Yoo, Tiffany Keung Mar 2022

The Political Dynamics Of Legislative Reform: Potential Drivers Of The Next Communications Statute, Christopher S. Yoo, Tiffany Keung

All Faculty Scholarship

Although most studies of major communications reform legislation focus on the merits of their substantive provisions, analyzing the political dynamics that led to the enactment of such legislation can yield important insights. An examination of the tradeoffs that led the major industry segments to support the Telecommunications Act of 1996 provides a useful illustration of the political bargain that it embodies. Application of a similar analysis to the current context identifies seven components that could form the basis for the next communications statute: universal service, pole attachments, privacy, intermediary immunity, net neutrality, spectrum policy, and antitrust reform. Determining how these …


A 180 On Section 230: State Efforts To Erode Social Media Immunity, Leslie Y. Garfield Tenzer, Hayley Margulis Jan 2022

A 180 On Section 230: State Efforts To Erode Social Media Immunity, Leslie Y. Garfield Tenzer, Hayley Margulis

Elisabeth Haub School of Law Faculty Publications

The turmoil of the 2020 presidential election renewed controversy surrounding 47 U.S.C § 230. The law, adopted as part of the 1996 Communications Decency Act (CDA), shields Interactive Computer Services (ICS) from civil liability for third-party material posted on their Platforms--no matter how heinous and regardless of whether the material enjoys constitutional protection. Consequently, any ICS, which is broadly defined to include Internet service providers (ISPs) and social media platforms (Platforms), can police its own postings but remains free from government intervention or retribution.

In 2022, members of the Texas and Florida legislatures passed laws aiming to limit the scope …


The Rise Of 5g Technology: How Internet Privacy And Protection Of Personal Data Is A Must In An Evolving Digital Landscape, Justin Rabine Jan 2022

The Rise Of 5g Technology: How Internet Privacy And Protection Of Personal Data Is A Must In An Evolving Digital Landscape, Justin Rabine

Catholic University Journal of Law and Technology

No abstract provided.


The Application Of The Right To Be Forgotten In The Machine Learning Context: From The Perspective Of European Laws, Zeyu Zhao Jan 2022

The Application Of The Right To Be Forgotten In The Machine Learning Context: From The Perspective Of European Laws, Zeyu Zhao

Catholic University Journal of Law and Technology

The right to be forgotten has been evolving for decades along with the progress of different statutes and cases and, finally, independently enacted by the General Data Protection Regulation, making it widely applied across Europe. However, the related provisions in the regulation fail to enable machine learning systems to realistically forget the personal information which is stored and processed therein.

This failure is not only because existing European rules do not stipulate standard codes of conduct and corresponding responsibilities for the parties involved, but they also cannot accommodate themselves to the new environment of machine learning, where specific information can …


Deepfakes, Shallowfakes, And The Need For A Private Right Of Action, Eric Kocsis Jan 2022

Deepfakes, Shallowfakes, And The Need For A Private Right Of Action, Eric Kocsis

Dickinson Law Review (2017-Present)

For nearly as long as there have been photographs and videos, people have been editing and manipulating them to make them appear to be something they are not. Usually edited or manipulated photographs are relatively easy to detect, but those days are numbered. Technology has no morality; as it advances, so do the ways it can be misused. The lack of morality is no clearer than with deepfake technology.

People create deepfakes by inputting data sets, most often pictures or videos into a computer. A series of neural networks attempt to mimic the original data set until they are nearly …