Open Access. Powered by Scholars. Published by Universities.®

Communications Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Journal

2022

Discipline
Institution
Keyword
Publication

Articles 1 - 30 of 37

Full-Text Articles in Communications Law

Forms Of Expression Of Will In Constitutional Texts Regulating Rights And Freedoms And Its Impact On Their Guarantee: A Comparative Study), Fatima Zohra Ramdani Dr. Nov 2022

Forms Of Expression Of Will In Constitutional Texts Regulating Rights And Freedoms And Its Impact On Their Guarantee: A Comparative Study), Fatima Zohra Ramdani Dr.

مجلة جامعة الإمارات للبحوث القانونية UAEU LAW JOURNAL

The study presents the problem of multiple method of expression in drafting constitutional legal rules related to the rights and freedoms of individuals, because the good constitutional rule simplifies the difficulties related to understanding and applying them, and spreading legitimate confidence in the legal system of the state, which results in protecting the legal framework in which individuals and state authorities interact alike the objective of the state of law.

The recherche revealed that the multiplicity of methods, and how to provide for rights and freedoms has two butt: the first hand is demonstrates the interest of the constitutional founder …


Blocking Nature's Vulnerable Calls For Help: The Tenth Circuit Dials Into The Telecommunications Act's Federal Environmental Preemption Clause In Santa Fe Alliance V. City Of Santa Fe, Samantha Speiss Oct 2022

Blocking Nature's Vulnerable Calls For Help: The Tenth Circuit Dials Into The Telecommunications Act's Federal Environmental Preemption Clause In Santa Fe Alliance V. City Of Santa Fe, Samantha Speiss

Villanova Environmental Law Journal

No abstract provided.


Wiretapping The Internet: Analyzing The Application Of The Federal Wiretap Act’S Party Exception Online, Hayden Driscoll Oct 2022

Wiretapping The Internet: Analyzing The Application Of The Federal Wiretap Act’S Party Exception Online, Hayden Driscoll

Washington and Lee Journal of Civil Rights and Social Justice

The federal Wiretap Act—originally enacted to curtail the government’s unbridled use of wiretaps to monitor telephonic communications—was amended in 1986 to provide a private right of action, extending the Act’s Fourth Amendment-like protections to private intrusions. Since the advent of the internet, plaintiffs have attempted to predicate claims of unauthorized online privacy intrusions on the Wiretap Act. In response, defendants claim they are parties to the communications at issue and should be absolved of liability under the Act’s party exception. The federal circuit courts of appeal disagree on how the party exception applies in the internet context. This Note evaluates …


Countering Personalized Speech, Leon G. Ho Oct 2022

Countering Personalized Speech, Leon G. Ho

Northwestern Journal of Technology and Intellectual Property

Social media platforms use personalization algorithms to make content curation decisions for each end user. These personalized recommendation decisions are essentially speech conveying a platform's predictions on content relevance for each end user. Yet, they are causing some of the worst problems on the internet. First, they facilitate the precipitous spread of mis- and disinformation by exploiting the very same biases and insecurities that drive end user engagement with such content. Second, they exacerbate social media addiction and related mental health harms by leveraging users' affective needs to drive engagement to greater and greater heights. Lastly, they erode end user …


Representation Without Elections: Civil Society Participation As A Remedy For The Democratic Deficits Of Online Speech Governance, Brenda Dvoskin Sep 2022

Representation Without Elections: Civil Society Participation As A Remedy For The Democratic Deficits Of Online Speech Governance, Brenda Dvoskin

Villanova Law Review

No abstract provided.


Beyond True And False: Fake News And The Digital Epistemic Divide, Gilad Abiri, Johannes Buchheim Sep 2022

Beyond True And False: Fake News And The Digital Epistemic Divide, Gilad Abiri, Johannes Buchheim

Michigan Technology Law Review

The massive fact-checking, flagging, and content removal campaigns run by major digital platforms during the 2020 elections and the Covid-19 pandemic did some good. However, they failed to prevent substantial portions of the population from believing that the election was stolen or that vaccinations are dangerous.

In this Article, we argue that the reason for the ineffectiveness of truth-based solutions—such as fact-checking— is that they do not reach the heart of the problem. Both scholars and policymakers share the implicit or explicit belief that the rise of digital fake news is harmful mainly because it spreads false information, which lays …


Private Censorship, Disinformation And The First Amendment: Rethinking Online Platforms Regulation In The Era Of A Global Pandemic, Tzu- Chiang Huang Sep 2022

Private Censorship, Disinformation And The First Amendment: Rethinking Online Platforms Regulation In The Era Of A Global Pandemic, Tzu- Chiang Huang

Michigan Technology Law Review

The proliferation of online disinformation and the rise of private censorship are paradigmatic examples of the challenges to traditional First Amendment jurisprudence in an algorithmic society. The limitations of traditional First Amendment jurisprudence are amplified by the impact of the COVID-19 pandemic in two ways. On the one hand, in the wake of the pandemic, we have entered an “infodemic” era where the volume of disinformation, as well as the harm it causes have reached unprecedented levels. For example, health disinformation has contributed to vaccine hesitancy. On the other hand, even though the proliferation of online disinformation seems to suggest …


High School Coaches Call A Foul: Important Considerations For High School Coaches Considering A Defamation Claim, Mallory Shumaker Aug 2022

High School Coaches Call A Foul: Important Considerations For High School Coaches Considering A Defamation Claim, Mallory Shumaker

Jeffrey S. Moorad Sports Law Journal

No abstract provided.


The Three Laws: The Chinese Communist Party Throws Down The Data Regulation Gauntlet, William Chaskes Jul 2022

The Three Laws: The Chinese Communist Party Throws Down The Data Regulation Gauntlet, William Chaskes

Washington and Lee Law Review

Criticism of the Chinese Communist Party (CCP) runs a wide gamut. Accusations of human rights abuses, intellectual property theft, authoritarian domestic policies, disrespecting sovereign borders, and propaganda campaigns all have one common factor: the CCP’s desire to control information. Controlling information means controlling data. Lurking beneath the People’s Republic of China’s (PRC) tumultuous relationship with the rest of the world is the fight between nations to control their citizens’ data while also keeping it out of the hands of adversaries. The CCP’s Three Laws are its newest weapon in this data war.

One byproduct of the CCP’s emphasis on controlling …


The Kids Are All Right: The Law Of Free Expression And New Information Technologies, Mark Tushnet Jun 2022

The Kids Are All Right: The Law Of Free Expression And New Information Technologies, Mark Tushnet

Catholic University Law Review

Recently the literature on free expression has turned to the question, should the law of free expression be adjusted because of the availability of new information technologies (hereafter NIT), and if so, how? The only thing about NIT that distinguishes them from traditional media is that disseminating expression via NIT is much less expensive than doing so via traditional media. The tenor of recent scholarship on NIT and free expression is that the invention of NIT does support some modification of free expression law. This Essay argues that that conclusion might be correct, but that many of the arguments offered …


Paving A New (Hua)Wei: A Comparative Analysis Of International Approaches To Securing Information And Communication Technology Supply Chains, Jordan Villegas Jun 2022

Paving A New (Hua)Wei: A Comparative Analysis Of International Approaches To Securing Information And Communication Technology Supply Chains, Jordan Villegas

Catholic University Law Review

Recent amendments to Chinese Intelligence Laws codify affirmative obligations upon domestic companies and citizens alike, namely, that they must assist and support the Chinese Communist Party (CCP) in its intelligence gathering efforts. Coupling these laws with the international prevalence of Huawei, a Chinese telecommunications company comprising two-thirds of 5G equipment outside China, CCP compromised 5G equipment is an unassailable reality. This article explores five intelligence allied nations and how each has respectively addressed the risk posed by Huawei. It argues each nation’s policies are deducible to three primary approaches, categorically including: (1) promulgation of law explicitly excluding Huawei 5G equipment; …


Investing In Human Futures: How Big Tech And Social Media Giants Abuse Privacy And Manipulate Consumerism, Brett Dembrow May 2022

Investing In Human Futures: How Big Tech And Social Media Giants Abuse Privacy And Manipulate Consumerism, Brett Dembrow

University of Miami Business Law Review

Social media companies such as Facebook, Twitter, and Instagram originated with one seemingly innocent goal: “to bring the world closer together.”1 Now, these Big Tech giants own and operate some of the most powerful platforms in the world simply because of their unethical yet effective strategies to maintain their users’ attention. Social media companies have monetized the amount of time their users spend on their platforms by honing in on the individual preferences of each user and selling that access to advertisers. This heightened access to potential consumers and their preferences has become the most valuable marketing tool for digital …


Broadband In The Mountain State: Connectivity Linked To Local Options, Denali S. Hendrick May 2022

Broadband In The Mountain State: Connectivity Linked To Local Options, Denali S. Hendrick

West Virginia Law Review

No abstract provided.


How To Regulate Online Platforms: Why Common Carrier Doctrine Is Inappropriate To Regulate Social Networks And Alternate Approaches To Protect Rights, Edward W. Mclaughlin May 2022

How To Regulate Online Platforms: Why Common Carrier Doctrine Is Inappropriate To Regulate Social Networks And Alternate Approaches To Protect Rights, Edward W. Mclaughlin

Fordham Law Review Online

Concerns about the “concentrated control of so much speech in the hands of a few private parties” and their ability to suppress some user speech have led to calls to regulate online platforms like common carriers or public accommodations. Advocates of that regulation theorize that social media platforms host today’s public forum and are open to all comers and so should have a responsibility to be content neutral and allow all voices to be heard. Traditionally, the argument that private players, as opposed to only government actors, can violate individuals’ free speech rights was a progressive cause, but recently conservative …


Rage Against The Machine: Reducing Robocall Abuse To Protect At-Risk Consumers, Nicole Egan May 2022

Rage Against The Machine: Reducing Robocall Abuse To Protect At-Risk Consumers, Nicole Egan

University of Massachusetts Law Review

For most people, robocalls are nothing more than an annoying side-effect of owning a cell phone today. But a successful robocall scheme is still capable of wreaking financial and psychological havoc on its victims. Senior citizens and cognitively impaired individuals are often targeted by fraudulent phone calls or texts because they may have trouble understanding how to identify and protect themselves from robocall abuse. This Note proposes a collaborative solution to this problem by calling on the judiciary and legislatures to minimize the amount of robocalls received by American telephone consumers. By adopting a broader understanding of the law and …


Sunday Ticket: The Ninth Circuit's Expansion Of The Quick Look Test Could Incidentally Help Fans Watch More Football For Less Money, Matthew Oakley Apr 2022

Sunday Ticket: The Ninth Circuit's Expansion Of The Quick Look Test Could Incidentally Help Fans Watch More Football For Less Money, Matthew Oakley

Jeffrey S. Moorad Sports Law Journal

No abstract provided.


The Empty Promises Of Diversity Mou's: How The Fcc Can Strengthen Commitments To Racial Equity, Jeleesa Omala Apr 2022

The Empty Promises Of Diversity Mou's: How The Fcc Can Strengthen Commitments To Racial Equity, Jeleesa Omala

Journal of Civil Rights and Economic Development

(Excerpt)

African Americans have been systematically disenfranchised from nearly all sectors of American society since the country’s founding. As such, African Americans do not just perceive the problem of racial discrimination as a matter of personal prejudice but also a matter of survival. Without access to fundamental resources like higher education, healthcare, and economic opportunity, the quality of Black life decreases astronomically. The nation begins to equate being Black with being “less than,” and continues to disinvest in Black populations, which signals to Black people that their lives do not matter.

Nevertheless, determined Black entrepreneurs continue to fight to expand …


The Jurisprudence Of Public Concern In Anti-Slapp Law: Shifting Boundaries In State Statutory Protection Of Free Expression, Matthew D. Bunker, Emily Erickson Apr 2022

The Jurisprudence Of Public Concern In Anti-Slapp Law: Shifting Boundaries In State Statutory Protection Of Free Expression, Matthew D. Bunker, Emily Erickson

UC Law SF Communications and Entertainment Journal

No abstract provided.


From Utilitarianism To Fordism: How Americans Brought The Panopticon Home, Katherine Hoppe Apr 2022

From Utilitarianism To Fordism: How Americans Brought The Panopticon Home, Katherine Hoppe

UC Law SF Communications and Entertainment Journal

The COVID-19 pandemic forced many not considered essential employees into their homes. Many employers worried about employee accountability, leveraged surveillance techniques to maximize employee performance and ensure productivity. These technologies include screen monitoring software, video recordings of employees within their homes, monitoring of social media, and typing efficiency. While employees continue to work outside of the office, private employers will increasingly monitor employees in spaces traditionally considered private—including the home. As private and public life spheres continue to overlap, privacy for workers may erode. What kinds of surveillance have employees experienced in their homes since the Covid-19 lockdown orders? Moreover, …


Masthead Apr 2022

Masthead

UC Law SF Communications and Entertainment Journal

No abstract provided.


Digital Wild West: Foreign Social Media Bans, Data Privacy, And Free Speech, Tiange (Tim) Chen Apr 2022

Digital Wild West: Foreign Social Media Bans, Data Privacy, And Free Speech, Tiange (Tim) Chen

UC Law SF Communications and Entertainment Journal

No abstract provided.


Cut! . . . Out Of Credit Arbitration The Case For Giving Hollywood Directors A Formalized Dispute Resolution Procedure For Conflicts Of Attribution, Madeline Giles Apr 2022

Cut! . . . Out Of Credit Arbitration The Case For Giving Hollywood Directors A Formalized Dispute Resolution Procedure For Conflicts Of Attribution, Madeline Giles

UC Law SF Communications and Entertainment Journal

No abstract provided.


The New Bailments, Danielle D’Onfro Mar 2022

The New Bailments, Danielle D’Onfro

Washington Law Review

The rise of cloud computing has dramatically changed how consumers and firms store their belongings. Property that owners once managed directly now exists primarily on infrastructure maintained by intermediaries. Consumers entrust their photos to Apple instead of scrapbooks; businesses put their documents on Amazon’s servers instead of in file cabinets; seemingly everything runs in the cloud. Were these belongings tangible, the relationship between owner and intermediary would be governed by the common-law doctrine of bailment. Bailments are mandatory relationships formed when one party entrusts their property to another. Within this relationship, the bailees owe the bailors a duty of care …


Section 230 Of The Communications Decency Act: The “Good Samaritan” Law Which Grants Immunity To “Bad Samaritans”, Josh Slovin Mar 2022

Section 230 Of The Communications Decency Act: The “Good Samaritan” Law Which Grants Immunity To “Bad Samaritans”, Josh Slovin

Mercer Law Review

In 1989, the “world wide web” launched in the public domain, creating what we call today the “internet.” However, the internet was slow to catch on. In 1996, there were only 20 million American users on the internet. As the adoption of the internet by Americans slowly increased so did the development of internet websites and internet services. The United States Congress quickly began to see the pitfalls of the internet unfolding before its own eyes. In effect, the internet created a new venue for the dissemination of defamatory and elicit content.

Beginning in 1991, litigation commenced when individuals sought …


Burning The House To Roast A Pig: Examining Florida’S Controversial Social Media Law, Wes P. Rahn Mar 2022

Burning The House To Roast A Pig: Examining Florida’S Controversial Social Media Law, Wes P. Rahn

Mercer Law Review

The recent proliferation of social media platforms has revolutionized the way individuals convey ideas and communicate with one another. Social media has quickly become the most dominate form of communication, surpassing more traditional modes of communication such as newspapers and television. It is estimated that over two-thirds of American adults now use social networking sites. Moreover, an astonishing 90% of young adults use social media. Social media has not only become an integral part of American culture in terms of entertainment and communication, but has also become a useful tool for politicians and the electorate who wish to engage in …


Content Moderation Issues Online: Section 230 Is Not To Blame, Reese D. Bastian Feb 2022

Content Moderation Issues Online: Section 230 Is Not To Blame, Reese D. Bastian

Texas A&M Journal of Property Law

Section 230 of the Communications Decency Act (“Section 230”) is the glue that holds the Internet—as we know it today—together. Section 230 says, “No provider or user of an interactive computer service shall be treated as the publisher or speaker of any information provided by another information content provider.” Simply put, Section 230 says that websites or platforms are not liable for content posted by third parties. There are many critics who attribute the maladies of the online world to Section 230. Section 230 presents issues such as over-moderation by Interactive Computer Service (“ICS”) providers that can go as far …


Common Law Rules: Applying Common Law Principles To Reassigned Phone Number Disputes Under The Tcpa, Monica Fritsch Jan 2022

Common Law Rules: Applying Common Law Principles To Reassigned Phone Number Disputes Under The Tcpa, Monica Fritsch

American University Business Law Review

No abstract provided.


The Rise Of 5g Technology: How Internet Privacy And Protection Of Personal Data Is A Must In An Evolving Digital Landscape, Justin Rabine Jan 2022

The Rise Of 5g Technology: How Internet Privacy And Protection Of Personal Data Is A Must In An Evolving Digital Landscape, Justin Rabine

Catholic University Journal of Law and Technology

No abstract provided.


The Application Of The Right To Be Forgotten In The Machine Learning Context: From The Perspective Of European Laws, Zeyu Zhao Jan 2022

The Application Of The Right To Be Forgotten In The Machine Learning Context: From The Perspective Of European Laws, Zeyu Zhao

Catholic University Journal of Law and Technology

The right to be forgotten has been evolving for decades along with the progress of different statutes and cases and, finally, independently enacted by the General Data Protection Regulation, making it widely applied across Europe. However, the related provisions in the regulation fail to enable machine learning systems to realistically forget the personal information which is stored and processed therein.

This failure is not only because existing European rules do not stipulate standard codes of conduct and corresponding responsibilities for the parties involved, but they also cannot accommodate themselves to the new environment of machine learning, where specific information can …


À La Carte Cable: A Regulatory Solution To The Misinformation Subsidy, Christopher R. Terry, Eliezer J. Silberberg, Stephen Schmitz, John Stack, Eve Sando Jan 2022

À La Carte Cable: A Regulatory Solution To The Misinformation Subsidy, Christopher R. Terry, Eliezer J. Silberberg, Stephen Schmitz, John Stack, Eve Sando

Catholic University Journal of Law and Technology

Although “fake news” is as old as mass media itself, concerns over disinformation have reached a fever pitch in our current media environment. Online media outlets’ heavy reliance on user-generated content has altered the traditional gatekeeping functions and professional standards associated with traditional news organizations. The idea of objectivity-focused informational content has primarily been substituted for a realist acceptance of the power and popularity of opinion-driven “news.” This shift is starkly visible now: mainstream news media outlets knowingly spread hoaxes, conspiracy theories, and the like.

This current state of affairs is not some freak accident. The Supreme Court’s First Amendment …