Open Access. Powered by Scholars. Published by Universities.®

Communications Law Commons

Open Access. Powered by Scholars. Published by Universities.®

2,999 Full-Text Articles 2,411 Authors 826,283 Downloads 102 Institutions

All Articles in Communications Law

Faceted Search

2,999 full-text articles. Page 1 of 47.

Curtailing Online Service Provider Immunity From Liability: An Advocacy For The Entension Of Roommates.Com, Corey Patton 2018 Seattle University School of Law

Curtailing Online Service Provider Immunity From Liability: An Advocacy For The Entension Of Roommates.Com, Corey Patton

Seattle University Law Review

Section 230 of the Communications Decency Act (CDA) was enacted following the controversial decision in Stratton Oakmont, Inc. v. Prodigy Servs. Co., where an interactive computer service provider was held liable for a libelous message posted by a user on one of its financial message boards. The court determined that the service provider was a “publisher” of the libelous message for the purposes of state law because it had engaged in screening and moderating of other objectionable posts on its message boards but failed to remove the libelous message in question. Because the service provider voluntarily self-policed some of the ...


Remnants Of Net Neutrality: Policing Unlawful Content Through Broadband Providers, Aaron Lerman 2018 Brooklyn Law School

Remnants Of Net Neutrality: Policing Unlawful Content Through Broadband Providers, Aaron Lerman

Brooklyn Journal of Corporate, Financial & Commercial Law

The 2015 Open Internet Order, released by The Federal Communication Commission (FCC), introduced sweeping, new rules that promised to preserve an equal and open Internet to consumers. These rules, otherwise known as “Net Neutrality,” prohibited broadband and internet service providers from impairing, blocking, or throttling access to “lawful content” online. But with a new administration and agenda, the FCC’s 2017 Restoring Internet Freedom Order repealed Net Neutrality. Since then, various states have pushed back against the repeal, with some adopting their own versions of the 2015 Open Internet Order’s Net Neutrality, keeping most of the rule language intact ...


Big Brother Is Listening To You: Digital Eavesdropping In The Advertising Industry, Dacia Green 2018 Duke Law

Big Brother Is Listening To You: Digital Eavesdropping In The Advertising Industry, Dacia Green

Duke Law & Technology Review

In the Digital Age, information is more accessible than ever. Unfortunately, that accessibility has come at the expense of privacy. Now, more and more personal information is in the hands of corporations and governments, for uses not known to the average consumer. Although these entities have long been able to keep tabs on individuals, with the advent of virtual assistants and “always-listening” technologies, the ease by which a third party may extract information from a consumer has only increased. The stark reality is that lawmakers have left the American public behind. While other countries have enacted consumer privacy protections, the ...


Online Terrorist Speech, Direct Government Regulation, And The Communications Decency Act, Steven Beale 2018 Duke Law

Online Terrorist Speech, Direct Government Regulation, And The Communications Decency Act, Steven Beale

Duke Law & Technology Review

The Communications Decency Act (CDA) provides Internet platforms complete liability protection from user-generated content. This Article discusses the costs of this current legal framework and several potential solutions. It proposes three modifications to the CDA that would use a carrot and stick to incentivize companies to take a more active role in addressing some of the most blatant downsides of user-generated content on the Internet. Despite the modest nature of these proposed changes, they would have a significant impact.


The Battlefield Of Tomorrow, Today: Can A Cyberattack Ever Rise To An “Act Of War?”, Christopher M. Sanders 2018 SJ Quinney College of Law, University of Utah

The Battlefield Of Tomorrow, Today: Can A Cyberattack Ever Rise To An “Act Of War?”, Christopher M. Sanders

Utah Law Review

In a sense, war has not changed. The end results will always remain the same: death and destruction; even if that destruction is not fully tangible. The results may be instantaneous, or they may be delayed. It is only the means implemented to achieve these destructive ends that evolve. Cyberwarfare is a product of that evolution. Most importantly, we must always remain abreast of evolution and the changes in warfare in order to effectively and efficiently respond to new attacks, and to prevent them as well.

This Note sheds light on recent evolution in warfare. It enlightens the reader of ...


China's Anti-Corruption Crackdown And The Foreign Corrupt Practices Act, Daniel C.K. Chow 2018 Ohio State University Moritz College of Law

China's Anti-Corruption Crackdown And The Foreign Corrupt Practices Act, Daniel C.K. Chow

Texas A&M Law Review

China’s highly publicized crackdown on corruption may affect the type and number of cases in China that arise under the Foreign Corrupt Practices Act (“FCPA”), but it should not be assumed that the crackdown will necessarily lead to fewer FCPA prosecutions. Although there is some overlap of the goals of China’s corruption crackdown and the goals of the FCPA, China’s crackdown also serves important goals of the ruling Communist Party. The main goal of the current crackdown is to reinforce the Party’s power by targeting enemies and rivals of the current leadership. The crackdown is not ...


Unfaithful But Not Without Privacy Protections: The Seventh Circuit Addresses When Courts Should Consider An E-Mail Interception Unlawful In Epstein V. Epstein, Joseph Noreña 2018 Boston College Law School

Unfaithful But Not Without Privacy Protections: The Seventh Circuit Addresses When Courts Should Consider An E-Mail Interception Unlawful In Epstein V. Epstein, Joseph Noreña

Boston College Law Review

On December 14, 2016, the United States Court of Appeals for the Seventh Circuit, in Epstein v. Epstein, held that contemporaneousness is not a determinative factor at the pleadings stage of a claim for the unlawful interception of electronic communications under the Federal Wiretap Act (“FWA”). In so doing, the Seventh Circuit partly departed from the way in which other Federal Circuit Courts had previously considered the statutory language of the FWA, specifically the definitions of “electronic communication” and “intercept” under 18 U.S.C. § 2510(4), (12). This Comment argues that the Seventh Circuit’s holding that contemporaneousness is ...


Fool Me Once: Regulating "Fake News" And Other Online Advertising, Abby Wood, Ann M. Ravel, Irina Dykhne 2018 University of Southern California

Fool Me Once: Regulating "Fake News" And Other Online Advertising, Abby Wood, Ann M. Ravel, Irina Dykhne

University of Southern California Legal Studies Working Paper Series

A lack of transparency for online political advertising has long been a problem in American political campaigns. Disinformation attacks that American voters have experienced since the 2016 campaign have made the need for regulatory action more pressing.

Platforms desire self-regulation and have only recently come around to supporting transparency regulations. While government must not regulate the content of political speech, it can, and should, force transparency into the process. We propose several interventions aimed at transparency. Most importantly, campaign finance regulators should require platforms to store and make available ads run on their platforms, as well as the audience at ...


The Predictors Of Juvenile Recidivism: Testimonies Of Adult Students 18 Years And Older Exiting From Alternative Education, La Toshia Palmer 2018 Brandman University

The Predictors Of Juvenile Recidivism: Testimonies Of Adult Students 18 Years And Older Exiting From Alternative Education, La Toshia Palmer

Dissertations

Purpose: The purpose of this descriptive, qualitative study was to identify and describe the importance of the predictors of juvenile recidivism and the effectiveness of efforts to prevent/avoid juvenile recidivism as perceived by previously detained, arrested, convicted, and/or incarcerated adult students 18 years of age and older exiting from alternative education in Northern California. A second purpose was to explore the types of support provided by alternative schools and the perceived importance of the support to avoid recidivism according to adult students 18 years of age and older exiting from alternative education.

Methodology: This qualitative, descriptive research design ...


Privacy, Screened Out: Analyzing The Threat To Individual Privacy Rights And Fifth Amendment Protections In State V. Stahl, Jesse Coulon 2018 Boston College Law School

Privacy, Screened Out: Analyzing The Threat To Individual Privacy Rights And Fifth Amendment Protections In State V. Stahl, Jesse Coulon

Boston College Law Review

Courts across the United States have applied Fifth Amendment protections to passcodes, as long as those passcodes are not a foregone conclusion. In order for a court to determine that a passcode is a forgone conclusion, and thus not testimonial in nature, the prosecution must show that they knew the existence, possession, and authenticity of the evidence that would be discovered by the compelled passcode, before the passcode is compelled. The foregone conclusion doctrine was established, and had been used, to balance the need of law enforcement to gather incriminating evidence while still protecting defendants’ Fifth Amendment rights. In 2016 ...


Legal Limbo: The Fifth Circuit's Decision In Turner V. Driver Fails To Clarify The Contours Of The Public's First Amendment Right To Record The Police, Stephanie Johnson 2018 Boston College Law School

Legal Limbo: The Fifth Circuit's Decision In Turner V. Driver Fails To Clarify The Contours Of The Public's First Amendment Right To Record The Police, Stephanie Johnson

Boston College Law Review

On February 16, 2017, the U.S. Court of Appeals for the Fifth Circuit, in Turner v. Driver, held that the public has a First Amendment right to record the police that is subject only to reasonable time, place, and manner restrictions. Although Turner established that the public has a First Amendment right to film the police, the decision skirted the question of whether the particular conduct in Turner—video recording police activity and/or video recording the police station—was an activity protected by the First Amendment. This Comment argues that the Fifth Circuit erred in not clarifying the ...


Law School News: 'Marketplace Of Ideas' Imperiled (04-05-2018), David A. Logan 2018 Roger Williams University School of Law

Law School News: 'Marketplace Of Ideas' Imperiled (04-05-2018), David A. Logan

Life of the Law School (1993- )

No abstract provided.


Corporate Social Responsibility And Social Media Corporations: Incorporating Human Rights Through Rankings, Self-Regulation And Shareholder Resolutions, Erika George 2018 S.J. Quinney College of Law, University of Utah

Corporate Social Responsibility And Social Media Corporations: Incorporating Human Rights Through Rankings, Self-Regulation And Shareholder Resolutions, Erika George

Utah Law Faculty Scholarship

This article examines the emergence and evolution of selected ranking and reporting frameworks in the expanding realm of business and human rights advocacy. It explores how indicators in the form of rankings and reports evaluating the conduct of transnational corporate actors can serve as regulatory tools with potential to bridge a global governance gap that often places human rights at risk. This article examines the relationship of transnational corporations in the Internet communications technology sector (ICT sector) to human rights and the risks presented to the right to freedom of expression and the right to privacy when ICT sector companies ...


Writing The Access Code: Enforcing Commercial Web Accessibility Without Regulations Under Title Iii Of The Americans With Disabilities Act, Daniel Sorger 2018 Boston College Law School

Writing The Access Code: Enforcing Commercial Web Accessibility Without Regulations Under Title Iii Of The Americans With Disabilities Act, Daniel Sorger

Boston College Law Review

A growing number of private lawsuits allege that businesses are violating Title III of the Americans with Disabilities Act because their websites are inaccessible to disabled individuals. Courts remain divided, however, on the extent to which commercial websites are covered under Title III. Additionally, the Department of Justice has not promulgated commercial web accessibility regulations—adding further uncertainty to the private enforcement regime. This Note argues that Title III broadly covers commercial websites, but that private enforcement is not positioned to spur lasting, broad-based Title III compliance. It proposes that large-scale litigation, state attorney general action, and state laws should ...


If Technology Is The Hare, Is Congress The Tortoise? Split Circuits In The Wake Of Dahda, Michael Koch 2018 Boston College Law School

If Technology Is The Hare, Is Congress The Tortoise? Split Circuits In The Wake Of Dahda, Michael Koch

Boston College Law Review

In United States v. Dahda, the U.S. Court of Appeals for the Tenth Circuit held that, under Title III of the Omnibus Crime Control and Safe Streets Act of 1968 (“Title III”), the lower court properly denied Dahda’s motion to suppress evidence gathered by law enforcement using a mobile interception device—a device that wiretaps cell phones. A key part of the decision focused on the definition of mobile interception devices. The Tenth Circuit defined them as devices used to intercept communications that are movable. The Seventh Circuit, in contrast, has defined mobile interception devices as devices used ...


The Communications Decency Act: Immunity For Internet-Facilitated Commercial Sexual Exploitation, Haley C. Halverson 2018 National Center on Sexual Exploitation

The Communications Decency Act: Immunity For Internet-Facilitated Commercial Sexual Exploitation, Haley C. Halverson

Dignity: A Journal on Sexual Exploitation and Violence

This paper reviews the original intent and historical application of the Communications Decency Act (CDA), most notably Section 230, with special regard to cases of Internet-facilitated commercial sexual exploitation. Although the CDA was originally created to protect children online, Section 230 of the CDA has been interpreted by the courts to grant broad immunities to websites facilitating the sexual exploitation of children and adults alike. Through analyzing the genesis and evolution of the CDA, it becomes clear that court interpretations of Section 230 are starkly inconsistent with original Congressional intent, and that the primary way to avoid de facto decriminalization ...


Contents, 2018 The Catholic University of America, Columbus School of Law

Contents

Catholic University Journal of Law and Technology

No abstract provided.


Say What You Want: How Unfettered Freedom Of Speech On The Internet Creates No Recourse For Those Victimized, Wes Gerrie 2018 Syracuse University College of Law

Say What You Want: How Unfettered Freedom Of Speech On The Internet Creates No Recourse For Those Victimized, Wes Gerrie

Catholic University Journal of Law and Technology

In today’s society, virtually everyone relies on online posts in order to make decisions—from what products to purchase to what restaurants to visit. The introduction and increase of online communication has made posting reviews online a simpler, easier, and more efficient process. However, the increase of online communication has threatened the delicate balance between free speech and harmful speech.

A tangled web of recent case law and federal law exists which aggressively protects the free speech of online reviewers. The law has carved out immunity for the website operators that host an online reviewer’s comments, which in ...


Enforcing Constitutional Rights Through Computer Code, Steve Young 2018 The Catholic University of America, Columbus School of Law

Enforcing Constitutional Rights Through Computer Code, Steve Young

Catholic University Journal of Law and Technology

Lawmaking and enforcement has advanced since Hammurabi first wrote out his legal code thousands of years ago. Today, the American legal system relies on legislatively-enacted federal, state, county, and municipal legal codes, agency-created regulations, the judge-made common law, and various law enforcement entities. This can be a confusing and complex system of rules and their explanations with varying degrees of enforcement. Blockchain technology is an automatic and efficient alternative to written codes that must be humanly-enforced. There has been limited scholarly interest in the implications of a legal application of blockchain technology to a political system but there have been ...


Smart Baby Monitors: The Modern Nanny Or A Home Invader, Sarah Ensenat 2018 The Catholic University of America, Columbus School of Law

Smart Baby Monitors: The Modern Nanny Or A Home Invader, Sarah Ensenat

Catholic University Journal of Law and Technology

Smart baby monitors exist to help parents protect and watch over their children. The smart baby monitors act as a second set of eyes when parents cannot be in the same room as their children. Low-tech hackers take advantage of gaps in the security of smart baby monitors. A hacker violates a consumer’s privacy by gaining access to private information, viewing the home and its occupants, and even speaking to children through the monitor.

This comment advocates for stricter security legislation for smart baby monitors. Without new legislation, manufacturers of smart baby monitors do not apply or invest in ...


Digital Commons powered by bepress