Open Access. Powered by Scholars. Published by Universities.®

Communications Law Commons

Open Access. Powered by Scholars. Published by Universities.®

2159 Full-Text Articles 1588 Authors 681379 Downloads 81 Institutions

All Articles in Communications Law

Faceted Search

2159 full-text articles. Page 1 of 43.

Schools, Speech, And Smartphones: Online Speech And The Evolution Of The Tinker Standard, Aleaha Jones 2017 Duke Law

Schools, Speech, And Smartphones: Online Speech And The Evolution Of The Tinker Standard, Aleaha Jones

Duke Law & Technology Review

Under the Supreme Court’s holding in Tinker v. Des Moines Independent Community School District, public schools may only restrict student speech where the speech is reasonably forecasted to cause a “substantial and material disruption.” With online forums calling into question who may control speech and forecast its impact, the circuit courts have granted public schools broad authority to monitor, and punish, their students for online activity that occurs off-campus. The Supreme Court recently declined the opportunity to reverse this disturbing trend by denying certiorari for Bell v. Itawamba County. As a result, questions remain unanswered regarding students’ right to ...


What's In A Name: Cable Systems, Filmon, And Judicial Consideration Of The Applicability Of The Copyright Act's Compulsory License To Online Broadcasters Of Cable Content, Kathryn M. Boyd 2017 Duke Law

What's In A Name: Cable Systems, Filmon, And Judicial Consideration Of The Applicability Of The Copyright Act's Compulsory License To Online Broadcasters Of Cable Content, Kathryn M. Boyd

Duke Law & Technology Review

The way we consume media today is vastly different from the way media was consumed in 1976, when the Copyright Act created the compulsory license for cable systems. The compulsory license allowed cable systems, as defined by the Copyright Act, to pay a set fee for the right to air television programming rather than working out individual deals with each group that owned the copyright in the programming, and helped make television more widely accessible to the viewing public. FilmOn, a company that uses a mini-antenna system to capture and retransmit broadcast network signals, is now seeking access to the ...


Rethinking Children's Advertising Policies For The Digital Age, Angela J. Campbell 2017 Georgetown University Law Center

Rethinking Children's Advertising Policies For The Digital Age, Angela J. Campbell

Georgetown Law Faculty Publications and Other Works

This article describes major changes in how video content and advertising is delivered to consumers. Digital technologies such as broadband allow consumers to stream or download programming. Smart phones and tablets allow consumers to view screen content virtually anywhere at any time. Advertising has become personalized and integrated with other content.

Despite these major changes in the media markets, the framework for regulating advertising to children has not changed very much since the 1990s. This article argues that the existing regulatory framework must be reinvented to protect children in the digital age. It uses Google’s recently introduced YouTube Kids ...


Manhattan_Project.Exe: A Nuclear Option For The Digital Age, David Laton 2017 Laton & Strain LLC

Manhattan_Project.Exe: A Nuclear Option For The Digital Age, David Laton

Catholic University Journal of Law and Technology

This article explores the possible implications and consequences arising from the use of an artificial intelligence construct as a weapon of mass destruction. The digital age has ushered in many technological advances, as well as certain dangers. Chief among these pitfalls is the lack of reliable security found in critical information technology systems. These security gaps can give cybercriminals unauthorized access to highly sensitive computer networks that control the very infrastructure of the United States. Cyberattacks are rising in both frequency and severity and the response by the U.S. has been ineffective. A cyber-weapon of mass destruction (CWMD) implementing ...


Thriving In The Online Environment: Creating Structures To Promote Technology And Civil Liberties, Daniel W. Sutherland 2017 U.S. Department of Homeland Security

Thriving In The Online Environment: Creating Structures To Promote Technology And Civil Liberties, Daniel W. Sutherland

Catholic University Journal of Law and Technology

No abstract provided.


Targeted Advertising And The First Amendment: Student Privacy Vs. Protected Speech, Marco Crocetti 2017 Holland & Knight LLP

Targeted Advertising And The First Amendment: Student Privacy Vs. Protected Speech, Marco Crocetti

Catholic University Journal of Law and Technology

No abstract provided.


Telecommunications Infrastructure: Another O-Ring In The Economic Development Of The Third World, James Germano 2017 Williams Mullen

Telecommunications Infrastructure: Another O-Ring In The Economic Development Of The Third World, James Germano

Catholic University Journal of Law and Technology

No abstract provided.


How Many Likes Did It Get? Using Social Media Metrics To Establish Trademark Rights, Caroline Mrohs 2017 The Catholic University of America, Columbus School of Law

How Many Likes Did It Get? Using Social Media Metrics To Establish Trademark Rights, Caroline Mrohs

Catholic University Journal of Law and Technology

This comment asserts that there is a need for an update to the multifactor test considered by courts in determining the strength of a trademark. Traditional factors include the expenses an entity can afford to pay in advertising, but do not give any weight to the presence of the entity on social media to reach its target consumer group.


Autonomous Cars: Navigating The Patchwork Of Data Privacy Laws That Could Impact The Industry, Anthony Jones 2017 Catholic University of America (Student)

Autonomous Cars: Navigating The Patchwork Of Data Privacy Laws That Could Impact The Industry, Anthony Jones

Catholic University Journal of Law and Technology

No abstract provided.


Is Wifi Worth It: The Hidden Dangers Of Public Wifi, Ellie Shahin 2017 Catholic University of America (Student)

Is Wifi Worth It: The Hidden Dangers Of Public Wifi, Ellie Shahin

Catholic University Journal of Law and Technology

No abstract provided.


Table Of Contents, 2017 The Catholic University of America, Columbus School of Law

Table Of Contents

Catholic University Journal of Law and Technology

No abstract provided.


Masthead, 2017 The Catholic University of America, Columbus School of Law

Masthead

Catholic University Journal of Law and Technology

No abstract provided.


The Right To Attention, Jasper L. Tran 2017 George Mason University

The Right To Attention, Jasper L. Tran

Jasper L. Tran

What marketing, contracts, and healthcare—specifically informed consent and mandatory ultrasounds—have in common is the right to attention from the information receiver. However, scholarship most often focuses on the communicator’s perspective (e.g., how much information the communicator discloses) or on the information itself, but surprisingly, not much on the receiver’s perspective. This dearth of scholarship from the information receiver’s perspective is problematic, because the information receiver is often the “little guy” in the conversation. We own and are entitled to our attention because attention is a property right and part of our individual dignity. Yet ...


Legal Implications Of Direct Satellite Broadcasting – The U.N. Working Group, Nancy M. Lesko 2016 University of Georgia School of Law

Legal Implications Of Direct Satellite Broadcasting – The U.N. Working Group, Nancy M. Lesko

Georgia Journal of International & Comparative Law

No abstract provided.


Unprotected And Unpersuaded: The Fcc's Flawed Merger Review Procedures, Trey O'Callaghan 2016 Duke Law

Unprotected And Unpersuaded: The Fcc's Flawed Merger Review Procedures, Trey O'Callaghan

Duke Law & Technology Review

In CBS Corporation v. FCC, the D.C. Circuit struck down the Federal Communication Commission’s rules for protecting confidential information that it collects during certain merger proceedings. In response, the Commission released a new order, pursuant to the Charter, Time Warner, and Bright House merger proceeding, for protecting confidential information. This iBrief analyzes the policy and legal implications of the Order, arguing that the Order is unlawful because it violates the Trade Secrets Act and notice-and-comment rulemaking requirements.


“Hello…It’S Me. [Please Don’T Sue Me!]” Examining The Fcc’S Overbroad Calling Regulations Under The Tcpa, Marissa A. Potts 2016 Brooklyn Law School

“Hello…It’S Me. [Please Don’T Sue Me!]” Examining The Fcc’S Overbroad Calling Regulations Under The Tcpa, Marissa A. Potts

Brooklyn Law Review

Americans have received unwanted telemarketing calls for decades. In response to a rapid increase in pre-recorded calls made using autodialer devices, Congress enacted the Telephone Consumer Protection Act (TCPA) in 1992. The TCPA imposes restrictions on calls made to consumers’ residences and wireless phones using autodialer devices, even if they are not telemarketing calls. Congress appointed the Federal Communications Commission (FCC) to prescribe rules and regulations to enforce the TCPA. In 2015, the FCC released an order that defined autodialer more broadly under the statute. Consequently, devices that have the potential to become autodialers in the future, even if they ...


Like A Bad Neighbor; Hackers Are There: The Need For Data Security Legislation And Cyber Insurance In Light Of Increasing Ftc Enforcement Actions, Jennifer Gordon 2016 Brooklyn Law School

Like A Bad Neighbor; Hackers Are There: The Need For Data Security Legislation And Cyber Insurance In Light Of Increasing Ftc Enforcement Actions, Jennifer Gordon

Brooklyn Journal of Corporate, Financial & Commercial Law

Privacy has come to the forefront of the technology world as third party hackers are constantly attacking companies for their customers’ data. With increasing instances of compromised customer information; the Federal Trade Commission (FTC) has been bringing suit against companies for inadequate data security procedures. The FTC’s newfound authority to bring suit regarding cybersecurity breaches; based on the Third Circuit’s decision in FTC v. Wyndham Worldwide Corp.; is a result of inaction—Congress has been unable to pass sufficient cybersecurity legislation; causing the FTC to step in and fill the void in regulation. In the absence of congressional ...


Mitigating Cyber Risk In It Supply Chains, Maureen Wallace 2016 Cleveland-Marshall College of Law

Mitigating Cyber Risk In It Supply Chains, Maureen Wallace

The Global Business Law Review

This note argues that the United States needs to utilize current federal agencies to begin introducing cyber supply chain risk management regulation for IT supply chains. Cyber supply chain risk management is a critical area of cybersecurity that has barely been recognized by the United States government. The globalization of the digital world has introduced a new spectrum of risk management issues that affect the products exchanged by businesses and consumed by individuals and government agencies. While there have been some initiatives toward the promotion of tighter cybersecurity regulation, most initiatives only concern the public sector, leaving the private sector ...


“Time Works Changes”: Modernizing Fourth Amendment Law To Protect Cell Site Location Information, Alexander Porter 2016 Boston College Law School

“Time Works Changes”: Modernizing Fourth Amendment Law To Protect Cell Site Location Information, Alexander Porter

Boston College Law Review

In 2012, federal juries convicted two men of armed robbery based in part on historical cell site location information (“CSLI”) evidence. Historical CSLI can reproduce a person’s location with great specificity. Cell phone users generate CSLI automatically by operating their cellular phones. These facts raise serious privacy concerns. This Note argues that Congress must take action to ensure that law enforcement agents can access a suspect’s historical CSLI only after a neutral magistrate finds probable cause that a crime has been committed. Further, this Note argues that because cell phone users do not voluntarily convey CSLI to their ...


Should Youtube’S Content Id Be Liable For Misrepresentation Under The Digital Millennium Copyright Act?, Laura Zapata-Kim 2016 Boston College Law School

Should Youtube’S Content Id Be Liable For Misrepresentation Under The Digital Millennium Copyright Act?, Laura Zapata-Kim

Boston College Law Review

YouTube has quickly become the dominant player in the Internet video sharing platform market. To keep its leading position, it created an internal automated system to police potential copyright infringements known as Content ID. Generally, that system functions similarly to third-party computer automated systems that send takedown requests, yet it is exempt from liability for removing lawful videos under a safe harbor provided by the Digital Millennium Copyright Act of 1998 (“DMCA”). Although some industry experts first championed Content ID, many now question whether it unfairly favors copyright holders and YouTube itself at the expense of content creators and the ...


Digital Commons powered by bepress