Open Access. Powered by Scholars. Published by Universities.®

Communications Law Commons

Open Access. Powered by Scholars. Published by Universities.®

3087 Full-Text Articles 2416 Authors 826283 Downloads 98 Institutions

All Articles in Communications Law

Faceted Search

3087 full-text articles. Page 1 of 52.

Contents, 2018 The Catholic University of America, Columbus School of Law

Contents

Catholic University Journal of Law and Technology

No abstract provided.


Mobile Instant Messaging Evidence In Criminal Trials, Youngjin Choi 2018 The Catholic University of America, Columbus School of Law

Mobile Instant Messaging Evidence In Criminal Trials, Youngjin Choi

Catholic University Journal of Law and Technology

Mobile instant messaging, such as text messages, are a pervasive aspect of everyday life. The characteristics of the modern mobile instant messaging application, especially in comparison with other forms of more traditional electronic communication platforms, such as e-mail, text messaging, or computer-based instant messaging program, present a variety of evidentiary issues in trial.

To be relevant, mobile instant messaging evidence must be connected to a genuine issue at trial and not too attenuated from it. Authentication is also very important in determining whether it may be considered a non-hearsay statement. Although often otherwise admissible, mobile instant messaging evidence may still ...


Say What You Want: How Unfettered Freedom Of Speech On The Internet Creates No Recourse For Those Victimized, Wes Gerrie 2018 Syracuse University College of Law

Say What You Want: How Unfettered Freedom Of Speech On The Internet Creates No Recourse For Those Victimized, Wes Gerrie

Catholic University Journal of Law and Technology

In today’s society, virtually everyone relies on online posts in order to make decisions—from what products to purchase to what restaurants to visit. The introduction and increase of online communication has made posting reviews online a simpler, easier, and more efficient process. However, the increase of online communication has threatened the delicate balance between free speech and harmful speech.

A tangled web of recent case law and federal law exists which aggressively protects the free speech of online reviewers. The law has carved out immunity for the website operators that host an online reviewer’s comments, which in ...


Enforcing Constitutional Rights Through Computer Code, Steve Young 2018 The Catholic University of America, Columbus School of Law

Enforcing Constitutional Rights Through Computer Code, Steve Young

Catholic University Journal of Law and Technology

Lawmaking and enforcement has advanced since Hammurabi first wrote out his legal code thousands of years ago. Today, the American legal system relies on legislatively-enacted federal, state, county, and municipal legal codes, agency-created regulations, the judge-made common law, and various law enforcement entities. This can be a confusing and complex system of rules and their explanations with varying degrees of enforcement. Blockchain technology is an automatic and efficient alternative to written codes that must be humanly-enforced. There has been limited scholarly interest in the implications of a legal application of blockchain technology to a political system but there have been ...


Smart Baby Monitors: The Modern Nanny Or A Home Invader, Sarah Ensenat 2018 The Catholic University of America, Columbus School of Law

Smart Baby Monitors: The Modern Nanny Or A Home Invader, Sarah Ensenat

Catholic University Journal of Law and Technology

Smart baby monitors exist to help parents protect and watch over their children. The smart baby monitors act as a second set of eyes when parents cannot be in the same room as their children. Low-tech hackers take advantage of gaps in the security of smart baby monitors. A hacker violates a consumer’s privacy by gaining access to private information, viewing the home and its occupants, and even speaking to children through the monitor.

This comment advocates for stricter security legislation for smart baby monitors. Without new legislation, manufacturers of smart baby monitors do not apply or invest in ...


Dating Dangerously: Risks Lurking Within Mobile Dating Apps, Alyssa Murphy 2018 Catholic University of America (Student)

Dating Dangerously: Risks Lurking Within Mobile Dating Apps, Alyssa Murphy

Catholic University Journal of Law and Technology

In modern society, cell phones have become a virtual extension of most Americans. Advances in cell phone technology have given rise to the popularity of mobile dating applications (“apps”), which are capable of allowing users to date and meet potential partners without leaving the comfort of their own homes. The convenience and allure of mobile dating apps has led to a staggering increase in the number of crimes orchestrated against other users of the apps. Such crimes often include solicitation, stalking, murder, and human trafficking. Unsuspecting and trusting users fall victim to these crimes due to the false sense of ...


Masthead, 2018 The Catholic University of America, Columbus School of Law

Masthead

Catholic University Journal of Law and Technology

No abstract provided.


Democracy At Stake In The Digital Age: Engaging In The Net Neutrality Debate For The Preservation Of Free Speech And The Redemption Of Public Interest, Christina (Sung Min) Yoh 2018 Claremont McKenna College

Democracy At Stake In The Digital Age: Engaging In The Net Neutrality Debate For The Preservation Of Free Speech And The Redemption Of Public Interest, Christina (Sung Min) Yoh

CMC Senior Theses

Net neutrality is currently one of the most topical government policies up for debate. In the following paper, I will examine three cases in which net neutrality has been threatened by internet service providers and the Federal Communications Commission and reinforced by public interest groups, major website companies, and the public. The online regime has been a critical instrument in the outcome of all three cases, highlighting the role and influence of internet users in the virtual and physical public spheres.

Some say that the battle is already lost. FCC Chairman Ajit Pai and his Republican majority in the agency ...


The Fragility Of The Free American Press, RonNell Anderson Jones, Sonja R. West 2017 University of Utah S.J. Quinney College of Law

The Fragility Of The Free American Press, Ronnell Anderson Jones, Sonja R. West

Northwestern University Law Review

President Donald Trump has faced criticism for attacking the press and for abandoning longstanding traditions of accommodating and respecting it. This Essay argues that the national discussion spurred by Trump’s treatment of the press has fallen short of capturing the true seriousness of the situation. Trump’s assault on the custom of press accommodation follows a generation-long collapse of other major press protections. In order to fully understand the critical juncture at which American press freedom now stands, we must expand the discussion beyond talk of a rogue president’s aberrant attacks on the press and consider the increasingly ...


An Unsung Success Story: A Forty-Year Retrospective On U.S. Communications Policy, Christopher S. Yoo 2017 University of Pennsylvania Law School

An Unsung Success Story: A Forty-Year Retrospective On U.S. Communications Policy, Christopher S. Yoo

Faculty Scholarship

Looking backwards on the occasion of Telecommunications Policy’s fortieth anniversary reveals just how far U.S. communications policy has come. All of the major challenges of 1976, such as promoting competition in customer premises equipment, long distance, and television networking, have largely been overcome. Moreover, new issues that emerged later, such as competition in local telephone service and multichannel video program distribution, have also largely been solved. More often than not, the solution has been the result of structural changes that enhanced facilities-based competition rather than agency-imposed behavioral requirements. Moreover, close inspection reveals that in most cases, prodding by ...


Algorithmic Jim Crow, Margaret Hu 2017 Washington and Lee University School of Law

Algorithmic Jim Crow, Margaret Hu

Margaret Hu

This Article contends that current immigration- and security-related vetting protocols risk promulgating an algorithmically driven form of Jim Crow. Under the “separate but equal” discrimination of a historic Jim Crow regime, state laws required mandatory separation and discrimination on the front end, while purportedly establishing equality on the back end. In contrast, an Algorithmic Jim Crow regime allows for “equal but separate” discrimination. Under Algorithmic Jim Crow, equal vetting and database screening of all citizens and noncitizens will make it appear that fairness and equality principles are preserved on the front end. Algorithmic Jim Crow, however, will enable discrimination on ...


The Internet Will Not Break: Denying Bad Samaritans § 230 Immunity, Danielle Keats Citron, Benjamin Wittes 2017 University of Maryland Francis King Carey School of Law

The Internet Will Not Break: Denying Bad Samaritans § 230 Immunity, Danielle Keats Citron, Benjamin Wittes

Fordham Law Review

Section 230 is overdue for a rethinking. If courts do not construe the scope of federal immunity to avoid injustice, we argue, Congress should amend the law. This is not to discount the important role that the immunity provision has played over the past twenty years. Far from it. Section 230 immunity has enabled innovation and expression beyond the imagination of the operators of early bulletin boards and computer service providers the provision was designed to protect. But its overbroad interpretation has left victims of online abuse with no leverage against site operators whose business models facilitate abuse. This state ...


Terrorists Are Always Muslim But Never White: At The Intersection Of Critical Race Theory And Propaganda, Caroline Mala Corbin 2017 University of Miami School of Law

Terrorists Are Always Muslim But Never White: At The Intersection Of Critical Race Theory And Propaganda, Caroline Mala Corbin

Fordham Law Review

When you hear the word “terrorist,” who do you picture? Chances are, it is not a white person. In the United States, two common though false narratives about terrorists who attack America abound. We see them on television, in the movies, on the news, and, currently, in the Trump administration. The first is that “terrorists are always (brown) Muslims.” The second is that “white people are never terrorists.” Different strands of critical race theory can help us understand these two narratives. One strand examines the role of unconscious cognitive biases in the production of stereotypes, such as the stereotype of ...


The Internet As Marketplace Of Madness— And A Terrorist’S Best Friend, Thane Rosenbaum 2017 New York University School of Law

The Internet As Marketplace Of Madness— And A Terrorist’S Best Friend, Thane Rosenbaum

Fordham Law Review

The panel I was assigned to, for this distinguished gathering of scholars at Fordham Law School, where I had previously been a professor for twentythree years, was given the name, “Caution Against Overreaching.” Overreaching and the caution it occasions, in this case, refer to the First Amendment, a uniquely American absolutist, legalistic obsession. For many who fixate on such matters, the government must never be allowed to trample upon the unfettered free speech rights guaranteed under America’s first, and most favorite, Amendment.


Social Media Accountability For Terrorist Propaganda, Alexander Tsesis 2017 Loyola University School of Law

Social Media Accountability For Terrorist Propaganda, Alexander Tsesis

Fordham Law Review

Terrorist organizations have found social media websites to be invaluable for disseminating ideology, recruiting terrorists, and planning operations. National and international leaders have repeatedly pointed out the dangers terrorists pose to ordinary people and state institutions. In the United States, the federal Communications Decency Act’s § 230 provides social networking websites with immunity against civil law suits. Litigants have therefore been unsuccessful in obtaining redress against internet companies who host or disseminate third-party terrorist content. This Article demonstrates that § 230 does not bar private parties from recovery if they can prove that a social media company had received complaints about ...


Terror On Your Timeline: Criminalizing Terrorist Incitement On Social Media Through Doctrinal Shift, Zachary Leibowitz 2017 Fordham University School of Law

Terror On Your Timeline: Criminalizing Terrorist Incitement On Social Media Through Doctrinal Shift, Zachary Leibowitz

Fordham Law Review

The United States faces a barrage of threats from terrorist organizations on a daily basis. The government takes some steps to prevent these threats from coming to fruition, but not much is being done proactively. Any person can log into a social media account to preach hate and incite violence against the United States and its citizenry, and sometimes these words result in action. When speakers are not held accountable, they can continue to incite the masses to violent action across the United States. This Note proposes a new incitement doctrine to prevent these speakers from being able to spread ...


Algorithmic Jim Crow, Margaret Hu 2017 Washington and Lee University School of Law

Algorithmic Jim Crow, Margaret Hu

Fordham Law Review

This Article contends that current immigration- and security-related vetting protocols risk promulgating an algorithmically driven form of Jim Crow. Under the “separate but equal” discrimination of a historic Jim Crow regime, state laws required mandatory separation and discrimination on the front end, while purportedly establishing equality on the back end. In contrast, an Algorithmic Jim Crow regime allows for “equal but separate” discrimination. Under Algorithmic Jim Crow, equal vetting and database screening of all citizens and noncitizens will make it appear that fairness and equality principles are preserved on the front end. Algorithmic Jim Crow, however, will enable discrimination on ...


Terrorist Incitement On The Internet, Alexander Tsesis 2017 Loyola University School of Law

Terrorist Incitement On The Internet, Alexander Tsesis

Fordham Law Review

I organized this symposium to advance understanding of how terrorist communications drive and influence social, political, religious, civil, literary, and artistic conduct. Viewing terrorist speech through wide prisms of law, culture, and contemporary media can provide lawmakers, adjudicators, and administrators a better understanding of how to contain and prevent the exploitation of modern communication technologies to influence, recruit, and exploit others to perpetrate ideologically driven acts of violence. Undertaking such a multipronged study requires not only looking at the personal and sociological appeals that extreme ideology exerts but also considering how to create political, administrative, educational, and economic conditions to ...


Free Speech And The Confluence Of National Security And Internet Exceptionalism, Alan K. Chen 2017 University of Denver Sturm College of Law

Free Speech And The Confluence Of National Security And Internet Exceptionalism, Alan K. Chen

Fordham Law Review

In this Article, I argue that, notwithstanding these contemporary developments, the Court got it mostly right in Brandenburg. Or, I want to at least suggest that it is premature to reconstruct the Brandenburg test to address perceived changes in our global environment. For the most part, Brandenburg has succeeded in mediating the balance between protecting political or ideological advocacy and enabling the government to regulate actual incitement, even in the contemporary era. Moreover, I argue that society should be especially wary of calls to narrow Brandenburg’s speech-protective standard because such changes might be significantly influenced by the confluence of ...


The Role Of Internet Intermediaries In Tackling Terrorism Online, Raphael Cohen-Almagor 2017 University of Hull

The Role Of Internet Intermediaries In Tackling Terrorism Online, Raphael Cohen-Almagor

Fordham Law Review

Gatekeeping is defined as the work of third parties “who are able to disrupt misconduct by withholding their cooperation from wrongdoers.”1 Internet intermediaries need to be far more proactive as gatekeepers than they are now. Socially responsible measures can prevent the translation of violent thoughts into violent actions. Designated monitoring mechanisms can potentially prevent such unfortunate events. This Article suggests an approach that harnesses the strengths and capabilities of the public and private sectors in offering practical solutions to pressing problems. It proposes that internet intermediaries should fight stringently against terror and further argues that a responsible gatekeeping approach ...


Digital Commons powered by bepress