Open Access. Powered by Scholars. Published by Universities.®

Communications Law Commons

Open Access. Powered by Scholars. Published by Universities.®

3,125 Full-Text Articles 2,445 Authors 826,283 Downloads 99 Institutions

All Articles in Communications Law

Faceted Search

3,125 full-text articles. Page 1 of 47.

Fool Me Once: Regulating "Fake News" And Other Online Advertising, Abby Wood, Ann M. Ravel, Irina Dykhne 2018 University of Southern California

Fool Me Once: Regulating "Fake News" And Other Online Advertising, Abby Wood, Ann M. Ravel, Irina Dykhne

University of Southern California Legal Studies Working Paper Series

A lack of transparency for online political advertising has long been a problem in American political campaigns. Disinformation attacks that American voters have experienced since the 2016 campaign have made the need for regulatory action more pressing.

Platforms desire self-regulation and have only recently come around to supporting transparency regulations. While government must not regulate the content of political speech, it can, and should, force transparency into the process. We propose several interventions aimed at transparency. Most importantly, campaign finance regulators should require platforms to store and make available ads run on their platforms, as well as the audience at ...


Privacy, Screened Out: Analyzing The Threat To Individual Privacy Rights And Fifth Amendment Protections In State V. Stahl, Jesse Coulon 2018 Boston College Law School

Privacy, Screened Out: Analyzing The Threat To Individual Privacy Rights And Fifth Amendment Protections In State V. Stahl, Jesse Coulon

Boston College Law Review

Courts across the United States have applied Fifth Amendment protections to passcodes, as long as those passcodes are not a foregone conclusion. In order for a court to determine that a passcode is a forgone conclusion, and thus not testimonial in nature, the prosecution must show that they knew the existence, possession, and authenticity of the evidence that would be discovered by the compelled passcode, before the passcode is compelled. The foregone conclusion doctrine was established, and had been used, to balance the need of law enforcement to gather incriminating evidence while still protecting defendants’ Fifth Amendment rights. In 2016 ...


Legal Limbo: The Fifth Circuit's Decision In Turner V. Driver Fails To Clarify The Contours Of The Public's First Amendment Right To Record The Police, Stephanie Johnson 2018 Boston College Law School

Legal Limbo: The Fifth Circuit's Decision In Turner V. Driver Fails To Clarify The Contours Of The Public's First Amendment Right To Record The Police, Stephanie Johnson

Boston College Law Review

On February 16, 2017, the U.S. Court of Appeals for the Fifth Circuit, in Turner v. Driver, held that the public has a First Amendment right to record the police that is subject only to reasonable time, place, and manner restrictions. Although Turner established that the public has a First Amendment right to film the police, the decision skirted the question of whether the particular conduct in Turner—video recording police activity and/or video recording the police station—was an activity protected by the First Amendment. This Comment argues that the Fifth Circuit erred in not clarifying the ...


Writing The Access Code: Enforcing Commercial Web Accessibility Without Regulations Under Title Iii Of The Americans With Disabilities Act, Daniel Sorger 2018 Boston College Law School

Writing The Access Code: Enforcing Commercial Web Accessibility Without Regulations Under Title Iii Of The Americans With Disabilities Act, Daniel Sorger

Boston College Law Review

A growing number of private lawsuits allege that businesses are violating Title III of the Americans with Disabilities Act because their websites are inaccessible to disabled individuals. Courts remain divided, however, on the extent to which commercial websites are covered under Title III. Additionally, the Department of Justice has not promulgated commercial web accessibility regulations—adding further uncertainty to the private enforcement regime. This Note argues that Title III broadly covers commercial websites, but that private enforcement is not positioned to spur lasting, broad-based Title III compliance. It proposes that large-scale litigation, state attorney general action, and state laws should ...


If Technology Is The Hare, Is Congress The Tortoise? Split Circuits In The Wake Of Dahda, Michael Koch 2018 Boston College Law School

If Technology Is The Hare, Is Congress The Tortoise? Split Circuits In The Wake Of Dahda, Michael Koch

Boston College Law Review

In United States v. Dahda, the U.S. Court of Appeals for the Tenth Circuit held that, under Title III of the Omnibus Crime Control and Safe Streets Act of 1968 (“Title III”), the lower court properly denied Dahda’s motion to suppress evidence gathered by law enforcement using a mobile interception device—a device that wiretaps cell phones. A key part of the decision focused on the definition of mobile interception devices. The Tenth Circuit defined them as devices used to intercept communications that are movable. The Seventh Circuit, in contrast, has defined mobile interception devices as devices used ...


The Communications Decency Act: Immunity For Internet-Facilitated Commercial Sexual Exploitation, Haley C. Halverson 2018 National Center on Sexual Exploitation

The Communications Decency Act: Immunity For Internet-Facilitated Commercial Sexual Exploitation, Haley C. Halverson

Dignity: A Journal on Sexual Exploitation and Violence

This paper reviews the original intent and historical application of the Communications Decency Act (CDA), most notably Section 230, with special regard to cases of Internet-facilitated commercial sexual exploitation. Although the CDA was originally created to protect children online, Section 230 of the CDA has been interpreted by the courts to grant broad immunities to websites facilitating the sexual exploitation of children and adults alike. Through analyzing the genesis and evolution of the CDA, it becomes clear that court interpretations of Section 230 are starkly inconsistent with original Congressional intent, and that the primary way to avoid de facto decriminalization ...


Contents, 2018 The Catholic University of America, Columbus School of Law

Contents

Catholic University Journal of Law and Technology

No abstract provided.


Mobile Instant Messaging Evidence In Criminal Trials, Youngjin Choi 2018 The Catholic University of America, Columbus School of Law

Mobile Instant Messaging Evidence In Criminal Trials, Youngjin Choi

Catholic University Journal of Law and Technology

Mobile instant messaging, such as text messages, are a pervasive aspect of everyday life. The characteristics of the modern mobile instant messaging application, especially in comparison with other forms of more traditional electronic communication platforms, such as e-mail, text messaging, or computer-based instant messaging program, present a variety of evidentiary issues in trial.

To be relevant, mobile instant messaging evidence must be connected to a genuine issue at trial and not too attenuated from it. Authentication is also very important in determining whether it may be considered a non-hearsay statement. Although often otherwise admissible, mobile instant messaging evidence may still ...


Say What You Want: How Unfettered Freedom Of Speech On The Internet Creates No Recourse For Those Victimized, Wes Gerrie 2018 Syracuse University College of Law

Say What You Want: How Unfettered Freedom Of Speech On The Internet Creates No Recourse For Those Victimized, Wes Gerrie

Catholic University Journal of Law and Technology

In today’s society, virtually everyone relies on online posts in order to make decisions—from what products to purchase to what restaurants to visit. The introduction and increase of online communication has made posting reviews online a simpler, easier, and more efficient process. However, the increase of online communication has threatened the delicate balance between free speech and harmful speech.

A tangled web of recent case law and federal law exists which aggressively protects the free speech of online reviewers. The law has carved out immunity for the website operators that host an online reviewer’s comments, which in ...


Enforcing Constitutional Rights Through Computer Code, Steve Young 2018 The Catholic University of America, Columbus School of Law

Enforcing Constitutional Rights Through Computer Code, Steve Young

Catholic University Journal of Law and Technology

Lawmaking and enforcement has advanced since Hammurabi first wrote out his legal code thousands of years ago. Today, the American legal system relies on legislatively-enacted federal, state, county, and municipal legal codes, agency-created regulations, the judge-made common law, and various law enforcement entities. This can be a confusing and complex system of rules and their explanations with varying degrees of enforcement. Blockchain technology is an automatic and efficient alternative to written codes that must be humanly-enforced. There has been limited scholarly interest in the implications of a legal application of blockchain technology to a political system but there have been ...


Smart Baby Monitors: The Modern Nanny Or A Home Invader, Sarah Ensenat 2018 The Catholic University of America, Columbus School of Law

Smart Baby Monitors: The Modern Nanny Or A Home Invader, Sarah Ensenat

Catholic University Journal of Law and Technology

Smart baby monitors exist to help parents protect and watch over their children. The smart baby monitors act as a second set of eyes when parents cannot be in the same room as their children. Low-tech hackers take advantage of gaps in the security of smart baby monitors. A hacker violates a consumer’s privacy by gaining access to private information, viewing the home and its occupants, and even speaking to children through the monitor.

This comment advocates for stricter security legislation for smart baby monitors. Without new legislation, manufacturers of smart baby monitors do not apply or invest in ...


Dating Dangerously: Risks Lurking Within Mobile Dating Apps, Alyssa Murphy 2018 Catholic University of America (Student)

Dating Dangerously: Risks Lurking Within Mobile Dating Apps, Alyssa Murphy

Catholic University Journal of Law and Technology

In modern society, cell phones have become a virtual extension of most Americans. Advances in cell phone technology have given rise to the popularity of mobile dating applications (“apps”), which are capable of allowing users to date and meet potential partners without leaving the comfort of their own homes. The convenience and allure of mobile dating apps has led to a staggering increase in the number of crimes orchestrated against other users of the apps. Such crimes often include solicitation, stalking, murder, and human trafficking. Unsuspecting and trusting users fall victim to these crimes due to the false sense of ...


Masthead, 2018 The Catholic University of America, Columbus School of Law

Masthead

Catholic University Journal of Law and Technology

No abstract provided.


Democracy At Stake In The Digital Age: Engaging In The Net Neutrality Debate For The Preservation Of Free Speech And The Redemption Of Public Interest, Christina (Sung Min) Yoh 2018 Claremont McKenna College

Democracy At Stake In The Digital Age: Engaging In The Net Neutrality Debate For The Preservation Of Free Speech And The Redemption Of Public Interest, Christina (Sung Min) Yoh

CMC Senior Theses

Net neutrality is currently one of the most topical government policies up for debate. In the following paper, I will examine three cases in which net neutrality has been threatened by internet service providers and the Federal Communications Commission and reinforced by public interest groups, major website companies, and the public. The online regime has been a critical instrument in the outcome of all three cases, highlighting the role and influence of internet users in the virtual and physical public spheres.

Some say that the battle is already lost. FCC Chairman Ajit Pai and his Republican majority in the agency ...


What About Small Businesses? The Gdpr And Its Consequences For Small U.S.-Based Companies, Craig McAllister 2017 Brooklyn Law School

What About Small Businesses? The Gdpr And Its Consequences For Small U.S.-Based Companies, Craig Mcallister

Brooklyn Journal of Corporate, Financial & Commercial Law

Fast-approaching changes to European data privacy law will have consequences around the globe. Historically, despite having dramatically different approaches to data privacy and data protection, the European Union and the United States developed a framework to ensure that the highspeed freeway that is transatlantic data transfer moved uninterrupted. That framework was overturned in the wake of revelations regarding U.S. surveillance practices, and amidst skepticism that the United States did not adequately protect personal data. Further, the European Union enacted the General Data Protection Regulation (GDPR), a sweeping overhaul of the legal data protection landscape that will take effect in ...


The Fragility Of The Free American Press, RonNell Anderson Jones, Sonja R. West 2017 University of Utah S.J. Quinney College of Law

The Fragility Of The Free American Press, Ronnell Anderson Jones, Sonja R. West

Northwestern University Law Review

President Donald Trump has faced criticism for attacking the press and for abandoning longstanding traditions of accommodating and respecting it. This Essay argues that the national discussion spurred by Trump’s treatment of the press has fallen short of capturing the true seriousness of the situation. Trump’s assault on the custom of press accommodation follows a generation-long collapse of other major press protections. In order to fully understand the critical juncture at which American press freedom now stands, we must expand the discussion beyond talk of a rogue president’s aberrant attacks on the press and consider the increasingly ...


An Unsung Success Story: A Forty-Year Retrospective On U.S. Communications Policy, Christopher S. Yoo 2017 University of Pennsylvania Law School

An Unsung Success Story: A Forty-Year Retrospective On U.S. Communications Policy, Christopher S. Yoo

Faculty Scholarship

Looking backwards on the occasion of Telecommunications Policy’s fortieth anniversary reveals just how far U.S. communications policy has come. All of the major challenges of 1976, such as promoting competition in customer premises equipment, long distance, and television networking, have largely been overcome. Moreover, new issues that emerged later, such as competition in local telephone service and multichannel video program distribution, have also largely been solved. More often than not, the solution has been the result of structural changes that enhanced facilities-based competition rather than agency-imposed behavioral requirements. Moreover, close inspection reveals that in most cases, prodding by ...


Algorithmic Jim Crow, Margaret Hu 2017 Washington and Lee University School of Law

Algorithmic Jim Crow, Margaret Hu

Margaret Hu

This Article contends that current immigration- and security-related vetting protocols risk promulgating an algorithmically driven form of Jim Crow. Under the “separate but equal” discrimination of a historic Jim Crow regime, state laws required mandatory separation and discrimination on the front end, while purportedly establishing equality on the back end. In contrast, an Algorithmic Jim Crow regime allows for “equal but separate” discrimination. Under Algorithmic Jim Crow, equal vetting and database screening of all citizens and noncitizens will make it appear that fairness and equality principles are preserved on the front end. Algorithmic Jim Crow, however, will enable discrimination on ...


How Elonis Failed To Clarify The Analysis Of "True Threats" In Social Media Cases And The Subsequent Need For Congressional Response, Jessica L. Opila 2017 University of Michigan Law School

How Elonis Failed To Clarify The Analysis Of "True Threats" In Social Media Cases And The Subsequent Need For Congressional Response, Jessica L. Opila

Michigan Telecommunications and Technology Law Review

Social media and other internet communications have altered the way people communicate with one another, including the way people threaten one another. In 2015, the United States Supreme Court decided Elonis v. United States, which imposed a heightened mental state requirement for federal prosecutions of threats issued in interstate commerce. Although the statute, 18 U.S.C. § 875(c), has no mental state requirement, the Supreme Court held that, consistent with the principles of criminal law, only those with guilty minds should be convicted and thus some showing of subjective intent is required. The opinion did not name the requisite ...


Terrorist Incitement On The Internet, Alexander Tsesis 2017 Loyola University School of Law

Terrorist Incitement On The Internet, Alexander Tsesis

Fordham Law Review

I organized this symposium to advance understanding of how terrorist communications drive and influence social, political, religious, civil, literary, and artistic conduct. Viewing terrorist speech through wide prisms of law, culture, and contemporary media can provide lawmakers, adjudicators, and administrators a better understanding of how to contain and prevent the exploitation of modern communication technologies to influence, recruit, and exploit others to perpetrate ideologically driven acts of violence. Undertaking such a multipronged study requires not only looking at the personal and sociological appeals that extreme ideology exerts but also considering how to create political, administrative, educational, and economic conditions to ...


Digital Commons powered by bepress