Open Access. Powered by Scholars. Published by Universities.®

Communications Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 37

Full-Text Articles in Communications Law

Can Dna Be Speech?, Jorge R. Roig Dec 2015

Can Dna Be Speech?, Jorge R. Roig

Jorge R Roig

DNA is generally regarded as the basic building block of life itself. In the most fundamental sense, DNA is nothing more than a chemical compound, albeit a very complex and peculiar one. DNA is an information-carrying molecule. The specific sequence of base pairs contained in a DNA molecule carries with it genetic information, and encodes for the creation of particular proteins. When taken as a whole, the DNA contained in a single human cell is a complete blueprint and instruction manual for the creation of that human being.
In this article we discuss myriad current and developing ways in which …


Users' Patronage: The Return Of The Gift In The "Crowd Society", Giancarlo F. Frosio Sep 2015

Users' Patronage: The Return Of The Gift In The "Crowd Society", Giancarlo F. Frosio

Giancarlo Francesco Frosio

In this work, I discuss the tension between gift and market economy throughout the history of creativity. For millennia, the production of creative artifacts has lain at the intersection between gift and market economy. From the time of Pindar and Simonides – and until the Romanticism will commence a process leading to the complete commodification of creative artifacts – market exchange models run parallel to gift exchange. From Roman amicitia to the medieval and Renaissance belief that “scientia donum dei est, unde vendi non potest,” creativity has been repeatedly construed as a gift. Again, at the time of the British …


Toward A New Language Of Legal Drafting, Matthew Roach Jul 2015

Toward A New Language Of Legal Drafting, Matthew Roach

Matthew Roach

Lawyers should write in document markup language just like web developers, digital publishers, scientists, and almost everyone else.


Overestimating Wireless Demand: Policy And Investment Implications Of Upward Bias In Mobile Data Forecasts, J. Armand Musey Cfa, Aalok Mehta May 2015

Overestimating Wireless Demand: Policy And Investment Implications Of Upward Bias In Mobile Data Forecasts, J. Armand Musey Cfa, Aalok Mehta

J. Armand Musey, CFA

In this paper, we present evidence of persistent errors in projections of wireless demand and examine the implications for wireless policy and investment. Mobile demand projections are relied upon in academic and government research and used for critically important telecommunications policy decisions, both domestically and internationally. The Federal Communications Commission, for example, used such projections to estimate a 275 MHz spectrum shortage by 2014 and featured such estimates in the U.S. National Broadband Plan as evidence for allocating additional spectrum for cellular services. The International Telecommunications Union Radiocommunication Sector endorsed in 2006 an estimate of a 1,280- to 1,720-MHz spectrum …


Right-Sizing Spectrum Auction Licenses: The Case For Smaller Geographic License Areas In The Tv Broadcast Incentive Auction, William H. Lehr Phd, J. Armand Musey Cfa Apr 2015

Right-Sizing Spectrum Auction Licenses: The Case For Smaller Geographic License Areas In The Tv Broadcast Incentive Auction, William H. Lehr Phd, J. Armand Musey Cfa

J. Armand Musey, CFA

The wireless sector is a key contributor to economic activity and growth. Over the next several years, wireless service providers are expected to invest $25 to $53 billion upgrading and expanding their networks to deploy 4G mobile broadband across the nation. All told, wireless broadband investment and the services and innovation supported by such investment are expected to add between $259 and $355 billion to US GDP each year through 2017. The Federal Communications Commission ("Commission" or "FCC") is currently designing the largest ever auction of terrestrial wireless spectrum, currently planned for late 2014 (the "Incentive Auction"). The purpose is …


The Self, The Stasi, The Nsa: Privacy, Knowledge, And Complicity In The Surveillance State, Richard Warner, Robert H. Sloan Mar 2015

The Self, The Stasi, The Nsa: Privacy, Knowledge, And Complicity In The Surveillance State, Richard Warner, Robert H. Sloan

Richard Warner

We focus on privacy in public. The notion dates back over a century, at least to the work of the German sociologist, Georg Simmel. Simmel observed that people voluntarily limit their knowledge of each other as they interact in a wide variety of social and commercial roles, thereby making certain information private relative to the interaction even if it is otherwise publicly available. Current governmental surveillance in the US (and elsewhere) reduces privacy in public. But to what extent?

The question matters because adequate self-realization requires adequate privacy in public. That in turn depends on informational norms, social norms that …


The Evolution Of Internet Service Providers From Partners To Adversaries: Tracking Shifts In Interconnection Goals And Strategies In The Internet’S Fifth Generation, Rob Frieden Jan 2015

The Evolution Of Internet Service Providers From Partners To Adversaries: Tracking Shifts In Interconnection Goals And Strategies In The Internet’S Fifth Generation, Rob Frieden

Rob Frieden

This paper will examine new models for the carriage of Internet traffic with an eye toward providing insights on how the interconnection process has changed and what positive and negative consequences have resulted. Internet Service Provider (“ISP”) interconnection used to constitute a cooperative undertaking, but now it increasingly requires difficult and protracted negotiations between ventures that consider themselves adversaries in a winner take all transaction. The paper concludes that new commercial arrangements, such as paid peering, can achieve mutually beneficial outcomes. However, the paper also identifies instances where migration from traditional interconnection arrangements can harm consumers by reducing some of …


The Unexamined Life In The Era Of Big Data: Toward A Udaap For Data, Sean Brian Dec 2014

The Unexamined Life In The Era Of Big Data: Toward A Udaap For Data, Sean Brian

Sean Brian

No abstract provided.


Ex Ante Versus Ex Post Approaches To Network Neutrality: A Cost Benefit Analysis, Rob Frieden Sep 2014

Ex Ante Versus Ex Post Approaches To Network Neutrality: A Cost Benefit Analysis, Rob Frieden

Rob Frieden

Many advocates for less intrusive government oversight of telecommunications support the migration from regulation by an expert agency to the use of adjudication remedies largely guided by antitrust/competition policy principles. They believe that competition authorities, or reviewing courts can resolve disputes after they have occurred in lieu of having expert regulatory agencies available to anticipate and resolve problems before they become acute. Such ex post remedies typically determine whether anticompetitive conduct has occurred and what marketplace harm has resulted. Advocates for retaining so-called ex ante regulation believe that an expert agency remains essential particularly in light of fast changing market …


What’S New In The Network Neutrality Debate, Rob Frieden Sep 2014

What’S New In The Network Neutrality Debate, Rob Frieden

Rob Frieden

For over ten years, academics, practitioners, policy makers, consumers and other stakeholders have debated whether and how governments should regulate the Internet with an eye toward promoting accessibility, affordability and neutrality. This issue has triggered grave concerns about the Internet’s ability to continue generating substantial and widespread benefits. Advocates for various outcomes have vastly different assessments about many baseline subjects including the viability of sustainable competition and self-regulation. Consumers become agitated and confused by different framing of the issues, particularly when participants in the Internet ecosystem cannot reach closure on interconnection and compensation issues. Increasingly these disputes trigger temporary degradation …


Internet Protocol Television And The Challenge Of “Mission Critical” Bits., Rob Frieden Aug 2014

Internet Protocol Television And The Challenge Of “Mission Critical” Bits., Rob Frieden

Rob Frieden

The Internet increasingly provides an alternative distribution medium for video and other types of high value, bandwidth intensive content. Many consumers have become “technology agnostic” about what kind of wireline or wireless medium provides service. However, they expect carriers to offer access anytime, anywhere, via any device and in any format. These early adopters of new technologies and alternatives to “legacy” media have no patience with the concept of “appointment television” that limits access to a specific time, on a single channel and in only one presentation format. This paper assesses whether and how Internet Service Providers (“ISPs”) can offer …


Protecting The Sender: Liability Protection For The Senders Of Electronic Communication, Meredith W. Doherty Jul 2014

Protecting The Sender: Liability Protection For The Senders Of Electronic Communication, Meredith W. Doherty

Meredith W. Doherty

As the technology of smartphones has progressed, electronic communication has become an integral and portable part of our daily lives. A recent New Jersey case highlighted the issue of holding the sender of a text message liable for injuries resulting from a motor vehicle accident in which the driver at fault was reading a text message from the sender at the time of the accident. This note focuses on the implications of such liability being imposed on senders of text messages as well as the slippery slope that could result, taking all forms of electronic communication, social media and mobile …


Balancing The Scales: Adhuc Sub Judice Li Est Or Trial By Media, Casey J. Cooper Jul 2014

Balancing The Scales: Adhuc Sub Judice Li Est Or Trial By Media, Casey J. Cooper

Casey J Cooper

The right to freedom of expression and free press is recognized under almost all major human rights instruments and domestic legal systems—common and civil—in the world. However, what do you do when a fundamental right conflicts with another equally fundamental right, like the right to a fair trial? In the United States, the freedom of speech, encompassing the freedom of the press, goes nearly unfettered: the case is not the same for other common law countries. In light of cultural and historic facts, institutional factors, modern realities, and case-law, this Article contends that current American jurisprudence does not take into …


Drones, Henry H. Perritt Jr., Eliot O. Sprague Apr 2014

Drones, Henry H. Perritt Jr., Eliot O. Sprague

Henry H. Perritt, Jr.

Abstract
Drone technology is evolving rapidly. Microdrones—what the FAA calls “sUAS”—already on the market at the $1,000 level, have the capability to supplement manned helicopters in support of public safety operations, news reporting, and powerline and pipeline patrol, when manned helicopter support is infeasible, untimely, or unsafe.
Larger drones–"machodrones”–are not yet available outside battlefield and counterterrorism spaces. Approximating the size of manned helicopters, but without pilots, or with human pilots being optional, their design is still in its infancy as designers await greater clarity in the regulatory requirements that will drive airworthiness certification.
This article evaluates drone technology and design …


The Eye Of The Beholder: Participation And Impact In Telecommunications (De)Regulation, Dorit Reiss Jan 2014

The Eye Of The Beholder: Participation And Impact In Telecommunications (De)Regulation, Dorit Reiss

Dorit R. Reiss

The California Public Utilities Commission addressed both pricing deregulation and universal service in telecommunications during the last decade. Both decisions had a similar cast of characters, and similarly elaborate processes. In relation to price deregulation, the utilities positions were accepted on every issue addressed; in relation to universal service, consumer organizations’ positions were accepted in about 60% of the issues. This article tells the story of how those decisions were made, and examines the reasons for the difference in impact. The article examines and reject an explanation of capture; accepts in part a focus on the influence of the commissioner …


New Models And Conflicts In The Interconnection And Delivery, Rob Frieden Jan 2014

New Models And Conflicts In The Interconnection And Delivery, Rob Frieden

Rob Frieden

As the Internet has evolved and diversified, interconnection terms and conditions have changed between Internet Service Providers (“ISPs”). These carriers experiment with alternatives to conventional models that classify interconnection as either peering or transiting. The former typically involves interconnection between high capacity carriers whose transoceanic traffic volumes generally match thereby eliminating the need for a transfer of funds. Historically smaller carriers have paid transit fees to larger Tier-1 ISPs for the opportunity to secure upstream links throughout the Internet cloud. With the growing availability of bandwidth intensive, video content carried via the Internet, traffic volume disparities have increased between ISPs. …


Net Bias And The Treatment Of “Mission-Critical” Bits, Rob Frieden Jan 2014

Net Bias And The Treatment Of “Mission-Critical” Bits, Rob Frieden

Rob Frieden

The Internet increasingly provides an alternative distribution medium for video and other types of high value, bandwidth intensive content. Many consumers have become “technology agnostic” about what kind of wireline or wireless medium provides service. However, they expect carriers to offer access anytime, anywhere, via any device and in any distribution format. These early adopters of new technologies and alternatives to “legacy” media have no patience with the concept of “appointment television” that limits access to a specific time, on a particular channel and in a single presentation format. This paper assesses whether and how Internet Service Providers (“ISPs”) can …


Privacy Issues In The Age Of Social Media M&A, Amy A. Hinkler Oct 2013

Privacy Issues In The Age Of Social Media M&A, Amy A. Hinkler

Amy A. Hinkler

No abstract provided.


Flawed Transparency: Shared Data Collection And Disclosure Challenges For Google Glass And Similar Technologies, Jonathan I. Ezor Oct 2013

Flawed Transparency: Shared Data Collection And Disclosure Challenges For Google Glass And Similar Technologies, Jonathan I. Ezor

Jonathan I. Ezor

Current privacy law and best practices assume that the party collecting the data is able to describe and disclose its practices to those from and about whom the data are collected. With emerging technologies such as Google Glass, the information being collected by the wearer may be automatically shared to one or more third parties whose use may be substantially different from that of the wearer. Often, the wearer may not even know what information is being uploaded, and how it may be used. This paper will analyze the current state of U.S. law and compliance regarding personal information collection …


A Comprehensive Approach To Bridging The Gap Between Cyberbullying Rules And Regulations And The Protections Offered By The First Amendment For Off-Campus Student Speech, Vahagn Amirian Aug 2013

A Comprehensive Approach To Bridging The Gap Between Cyberbullying Rules And Regulations And The Protections Offered By The First Amendment For Off-Campus Student Speech, Vahagn Amirian

Vahagn Amirian

No abstract provided.


Internet Control Or Internet Censorship? Comparing The Control Models Of China, Singapore, And The United States To Guide Taiwan’S Choice, Jeffrey Li May 2013

Internet Control Or Internet Censorship? Comparing The Control Models Of China, Singapore, And The United States To Guide Taiwan’S Choice, Jeffrey Li

Jeffrey Li

Internet censorship generally refers to unjustified online speech scrutiny and control by the government or government-approved measures for Internet control. The danger of Internet censorship is the chilling effect and the substantial harm on free speech, a cornerstone of democracy, in cyberspace. This paper compares China’s blocking and filtering system, the class license system of Singapore, and the government-private partnership model of the United States to identify the features, and pros and cons of each model on the international human rights. By finding lessons from each of the model, this paper suggests Taiwan should remain its current meager internet control …


Emerging Technologies And Dwindling Speech, Jorge R. Roig Dec 2012

Emerging Technologies And Dwindling Speech, Jorge R. Roig

Jorge R Roig

Inspired in part by the recent holding in Bland v. Roberts that the use of the “Like” feature in Facebook is not covered by the Free Speech Clause, this article makes a brief foray into the approach that courts have taken in the recent past towards questions of First Amendment coverage in the context of emerging technologies. Specifically, this article will take a closer look at how courts have dealt with the issue of functionality in the context of First Amendment coverage of computer source code. The analysis of this and other recent experiences, when put in a larger context, …


Broadcasting Licenses: Ownership Rights And The Spectrum Rationalization Challenge, J. Armand Musey Cfa Sep 2012

Broadcasting Licenses: Ownership Rights And The Spectrum Rationalization Challenge, J. Armand Musey Cfa

J. Armand Musey, CFA

This Article examines the showdown between television broadcast- ers and the government in light of the FCC’s plan to reallocate cur- rently licensed broadcast spectrum to signifcantly higher value mobile broadband use. The government seeks to do so in an economically, socially and legally effcient manner, and has indicated that it seeks a reallocation process that is voluntary for broadcasters. Nonetheless, any spectrum reallocation proceeding raises the question of whether, and to what extent, television broadcasters ultimately possess rights to licensed spectrum, and what type of compensation, if any, they would be owed if the FCC takes their spectrum licenses …


Threats Escalate: Corporate Information Technology Governance Under Fire, Lawrence J. Trautman Jan 2012

Threats Escalate: Corporate Information Technology Governance Under Fire, Lawrence J. Trautman

Lawrence J. Trautman Sr.

In a previous publication The Board’s Responsibility for Information Technology Governance, (with Kara Altenbaumer-Price) we examined: The IT Governance Institute’s Executive Summary and Framework for Control Objectives for Information and Related Technology 4.1 (COBIT®); reviewed the Weill and Ross Corporate and Key Asset Governance Framework; and observed “that in a survey of audit executives and board members, 58 percent believed that their corporate employees had little to no understanding of how to assess risk.” We further described the new SEC rules on risk management; Congressional action on cyber security; legal basis for director’s duties and responsibilities relative to IT governance; …


Data Protection: Idealisms And Realisms, Rebecca Wong Dr Jan 2012

Data Protection: Idealisms And Realisms, Rebecca Wong Dr

Dr Rebecca Wong

Following proposals to consider revising the Data Protection Directive 95/46/EC (DPD) in 2011, have the changes addressed the main areas of concern that have been the focus of much discussion? The areas of concern include the application of the Directive in the online age, particularly to social networking sites and cloud computing; the minimum/maximum standard approach by the EU Member States to data protection; the relevance and application of the data protection principles. These are some of the issues that were considered in the recent Art. 29 Working Party’s Opinion on the Future of Privacy. The article will use this …


Decoding First Amendment Coverage Of Computer Source Code In The Age Of Youtube, Facebook And The Arab Spring, Jorge R. Roig Dec 2011

Decoding First Amendment Coverage Of Computer Source Code In The Age Of Youtube, Facebook And The Arab Spring, Jorge R. Roig

Jorge R Roig

Computer source code is the lifeblood of the Internet. It is also the brick and mortar of cyberspace. As such, it has been argued that the degree of control that a government can wield over code can be a powerful tool for controlling new technologies. With the advent and proliferation in the Internet of social networking media and platforms for the publication and sharing of user-generated content, the ability of individuals across the world to communicate with each other has reached truly revolutionary dimensions.
The influence of Facebook in the popular revolutions of the Arab Spring has been well documented. …


The Future Of Privacy, Rebecca Wong Dr Feb 2011

The Future Of Privacy, Rebecca Wong Dr

Dr Rebecca Wong

The Art. 29 Working Party (hereinafter “Art. 29 WP”) is an influential body comprised of representatives from the Member State Data Protection Authorities2 established under the Data Protection Directive 95/46/EC, has recently issued an opinion with the Working Party on Police and Justice. This is quite significant, since the opinion sets out some of the issues that will need to be addressed in the lead up to the revision of the Data Protection Directive 95/46/EC.3 This comes at a time, when there have been discussions on the current application of the European Data Protection Directive to the internet,4 (such as …


Licensing As Digital Rights Management, From The Advent Of The Web To The Ipad, Reuven Ashtar Jan 2011

Licensing As Digital Rights Management, From The Advent Of The Web To The Ipad, Reuven Ashtar

Reuven Ashtar

This Article deals with the Digital Millennium Copyright Act’s anti-circumvention provision, Section 1201, and its relationship to licensing. It argues that not all digital locks and contractual notices qualify for legal protection under Section 1201, and attributes the courts’ indiscriminate protection of all Digital Rights Management (DRM) measures to the law’s incoherent formulation. The Article proposes a pair of filters that would enable courts to distinguish between those DRM measures that qualify for protection under Section 1201, and those that do not. The filters are shown to align with legislative intent and copyright precedent, as well as the approaches recently …


Rationales For And Against Fcc Involvement In Resolving Internet Service Provider Interconnection Disputes, Rob M. Frieden Jan 2011

Rationales For And Against Fcc Involvement In Resolving Internet Service Provider Interconnection Disputes, Rob M. Frieden

Rob Frieden

Internet Service Providers (“ISPs”) provide end users with access to and from the Internet cloud. In addition to providing the first and last mile carriage of traffic, ISPs secure upstream access to sources of content via other ISPs typically on a paid (transit), or barter (peering) basis. Because a single ISP operates in two separate segments of traffic routing, both the terms and conditions of network interconnection and the degree of marketplace competition can vary greatly. In this double-sided market, ISPs typically have many transit and peering opportunities upstream to content providers, but downstream end users may have a limited …


From Bad To Worst: Assessing The Long Term Consequences Of Four Very Bad Fcc Decisions, Rob M. Frieden Jan 2011

From Bad To Worst: Assessing The Long Term Consequences Of Four Very Bad Fcc Decisions, Rob M. Frieden

Rob Frieden

Far too many major decisions of the Federal Communications Commission (“FCC”) rely on flawed assumptions about the current and future telecommunications marketplace. If the FCC incorrectly overstates the current state of competition, it risks exacerbating its mistake going forward if actual competition proves unsustainable, or lackluster. In many key decisions the FCC cited robust competition in current and future markets as the basis for decisions that relax restrictions on incumbents, abandon strategies for promoting competition, or apply statutory definitions of services that trigger limited government oversight. The Commission ignores the secondary and tertiary consequences of decisions that deprive it of …