Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Communications Law

Series

2018

Articles 1 - 22 of 22

Full-Text Articles in Law

The Esquire Case: A Lost Free Speech Landmark, Samantha Barbas Dec 2018

The Esquire Case: A Lost Free Speech Landmark, Samantha Barbas

Journal Articles

No abstract provided.


Who's Afraid Of Swiss Cheese? Resolving The Copyright Claims Of Non-Coauthors, D. Sean West Jun 2018

Who's Afraid Of Swiss Cheese? Resolving The Copyright Claims Of Non-Coauthors, D. Sean West

Seattle University Law Review SUpra

No abstract provided.


Law School News: 'Marketplace Of Ideas' Imperiled (04-05-2018), David A. Logan Apr 2018

Law School News: 'Marketplace Of Ideas' Imperiled (04-05-2018), David A. Logan

Life of the Law School (1993- )

No abstract provided.


Corporate Social Responsibility And Social Media Corporations: Incorporating Human Rights Through Rankings, Self-Regulation And Shareholder Resolutions, Erika George Apr 2018

Corporate Social Responsibility And Social Media Corporations: Incorporating Human Rights Through Rankings, Self-Regulation And Shareholder Resolutions, Erika George

Utah Law Faculty Scholarship

This article examines the emergence and evolution of selected ranking and reporting frameworks in the expanding realm of business and human rights advocacy. It explores how indicators in the form of rankings and reports evaluating the conduct of transnational corporate actors can serve as regulatory tools with potential to bridge a global governance gap that often places human rights at risk. This article examines the relationship of transnational corporations in the Internet communications technology sector (ICT sector) to human rights and the risks presented to the right to freedom of expression and the right to privacy when ICT sector companies …


"Fake News," No News, And The Needs Of Local Communities, Carol Pauli Mar 2018

"Fake News," No News, And The Needs Of Local Communities, Carol Pauli

Faculty Scholarship

The Quaker authors had in mind an ancient truth - that "love endures and overcomes" - and they were convinced that this truth is accessible to all. This article addresses truth at a more immediate and mundane level. It is concerned with the accurate information that local communities need in order to thrive.

The article proceeds in three steps. Part I reviews one way community needs were addressed when the first large-scale electronic communication technology entered individual homes in the form of radio and television. In those days, broadcasters had an affirmative duty to ascertain the problems of the communities …


Lowering Legal Barriers To Rpki Adoption, Christopher S. Yoo, David A. Wishnick Jan 2018

Lowering Legal Barriers To Rpki Adoption, Christopher S. Yoo, David A. Wishnick

All Faculty Scholarship

Across the Internet, mistaken and malicious routing announcements impose significant costs on users and network operators. To make routing announcements more reliable and secure, Internet coordination bodies have encouraged network operators to adopt the Resource Public Key Infrastructure (“RPKI”) framework. Despite this encouragement, RPKI’s adoption rates are low, especially in North America.

This report presents the results of a year-long investigation into the hypothesis—widespread within the network operator community—that legal issues pose barriers to RPKI adoption and are one cause of the disparities between North America and other regions of the world. On the basis of interviews and analysis of …


Microsoft Ireland, The Cloud Act, And International Lawmaking 2.0, Jennifer Daskal Jan 2018

Microsoft Ireland, The Cloud Act, And International Lawmaking 2.0, Jennifer Daskal

Articles in Law Reviews & Other Academic Journals

On March 23, President Trump signed the CLOUD Act, 1 thereby mooting one of the most closely watched Supreme Court cases this term: the Microsoft Ireland case. 2 This essay examines these extraordinary and fast-moving developments, explaining how the Act resolves the Supreme Court case and addresses the complicated questions of jurisdiction over data in the cloud. The developments represent a classic case of international lawmaking via domestic regulation, as mediated by major multinational corporations that manage so much of the world's data.


User-Generated Evidence, Rebecca Hamilton Jan 2018

User-Generated Evidence, Rebecca Hamilton

Articles in Law Reviews & Other Academic Journals

Around the world, people are using their smartphones to document atrocities. This Article is the first to address the implications of this important development for international criminal law. While acknowledging the potential benefits such user-generated evidence could have for international criminal investigations, the Article identifies three categories of concern related to its use: (i) user security; (ii) evidentiary bias; and (iii) fair trial rights. In the absence of safeguards, user-generated evidence may address current problems in international criminal justice at the cost of creating new ones and shifting existing problems from traditional actors, who have institutional backing, to individual users …


Defamation And Privacy In The Social Media Age: What Would Justice Brennan Think?, Stephen Wermiel Jan 2018

Defamation And Privacy In The Social Media Age: What Would Justice Brennan Think?, Stephen Wermiel

Articles in Law Reviews & Other Academic Journals

No abstract provided.


Narrative Topoi In The Digital Age, Jessica Silbey, Zahr Said Jan 2018

Narrative Topoi In The Digital Age, Jessica Silbey, Zahr Said

Faculty Scholarship

Decades of thoughtful law and humanities scholarship have made the case for using humanistic texts and methods in the legal classroom. We build on that scholarship by identifying and describing three “narrative topoi” of the twenty-first century – podcasts, twitter and fake news. We use the term “topos” (from the Greek meaning “place”) and its plural, “topoi,” to mean “a literary commonplace” and “general setting for discussion” in the context of literary forms. Like an identifiable genre, narrative topoi are familiar story paths for audiences to travel. These narrative topoi live in contemporary popular culture and are products of digital …


Real "Fake News" And Fake "Fake News", Lili Levi Jan 2018

Real "Fake News" And Fake "Fake News", Lili Levi

Articles

No abstract provided.


Fifty Years Of Foia In Operation, 1967-2017, Tuan N. Samahon Jan 2018

Fifty Years Of Foia In Operation, 1967-2017, Tuan N. Samahon

Working Paper Series

No abstract provided.


What Authorizes The Image? The Visual Economy Of Post-Secular Jurisprudence, Richard Sherwin Jan 2018

What Authorizes The Image? The Visual Economy Of Post-Secular Jurisprudence, Richard Sherwin

Articles & Chapters

In law’s visual economy our commitment to justice grows out of a renewed encounter with an interior libidinal source whose ongoing collective investment binds us to the nomos in which we live. We experience this corporeal bond in paintings, films, and video images on screens large and small. In the ethically inflected aesthetic of post-secular jurisprudence, justice is to law as beauty is to art. As distant as an abstract expressionist canvas, as close as any neighbor, or indeed any screen on which the neighbor becomes real to us. That is where we behold the source and instantiation of law’s …


#I🔫U: Considering The Context Of Online Threats, Lyrissa Barnett Lidsky, Linda Riedemann Norbutt Jan 2018

#I🔫U: Considering The Context Of Online Threats, Lyrissa Barnett Lidsky, Linda Riedemann Norbutt

UF Law Faculty Publications

The United States Supreme Court has failed to grapple with the unique interpretive difficulties presented by social media threats cases. Social media make hateful and threatening speech more common but also magnify the potential for a speaker's innocent words to be misunderstood People speak differently on different social media platforms, and architectural features of platforms, such as character limits, affect the meaning of speech. The same is true of other contextual clues unique to social media, such as gifs, hashtags, and emojis. Only by understanding social media contexts can legal decision-makers avoid overcriminalization of speech protected by the First Amendment. …


Are Privacy Laws Deficient?, Woodrow Hartzog Jan 2018

Are Privacy Laws Deficient?, Woodrow Hartzog

Faculty Scholarship

Privacy law around the world is deficient because it ignores design. Lawmakers have attempted to establish limits on the collection, use, and distribution of personal information. But they have largely overlooked the power of design. They have discounted the role that design plays in facilitating the conduct and harm privacy law is meant to prevent. Design pitches and picks privacy winners and losers, with people as data subjects and surveillance objects often on the losing side.


"Enemy Of The People": Negotiating News At The White House, Carol Pauli Jan 2018

"Enemy Of The People": Negotiating News At The White House, Carol Pauli

Faculty Scholarship

How can the press serve as a check on executive power when the president calls it “fake” and the White House denies facts? As journalists debate the right response, this article offers advice from the perspective of a journalist who is now in the legal academy. Drawing on legal scholarship in the field of conflict resolution — as well as literature in journalism and political science — this article analyzes the White House press briefing as a negotiation over both the content of news and the relationship of the press and president. It aims to help the press fulfill the …


Common Carriage’S Domain, Christopher S. Yoo Jan 2018

Common Carriage’S Domain, Christopher S. Yoo

All Faculty Scholarship

The judicial decision invalidating the Federal Communications Commission's first Open Internet Order has led advocates to embrace common carriage as the legal basis for network neutrality. In so doing, network neutrality proponents have overlooked the academic literature on common carriage as well as lessons from its implementation history. This Essay distills these learnings into five factors that play a key role in promoting common carriage's success: (1) commodity products, (2) simple interfaces, (3) stability and uniformity in the transmission technology, (4) full deployment of the transmission network, and (5) stable demand and market shares. Applying this framework to the Internet …


Visual Literacy For The Legal Profession, Richard K. Sherwin Jan 2018

Visual Literacy For The Legal Profession, Richard K. Sherwin

Articles & Chapters

Digital technology has transformed the way we communicate in society. Swept along on a digital tide, words, sounds, and images easily, and often, flow together. This state of affairs has radically affected not only our commercial and political practices in society, but also the way we practice law.

Unfortunately, legal education and legal theory have not kept up. Inconsistencies and unpredictability in the way courts ascertain the admissibility of various kinds of visual evidence and visual argumentation, lapses in the cross examination of visual evidence at trial, and inadequately theorized notions of visual meaning and the epistemology of affect tell …


Symposium: Truth, Trust And The First Amendment In The Digital Age: Foreword: Whither The Fourth Estate?, Lyrissa Barnett Lidsky Jan 2018

Symposium: Truth, Trust And The First Amendment In The Digital Age: Foreword: Whither The Fourth Estate?, Lyrissa Barnett Lidsky

UF Law Faculty Publications

As a professor of Media Law, I have devoted my career over the past quarter of a century to the idea that the press plays a special role in our democracy. That role is largely encapsulated by the concept of the press as Fourth Estate – an unofficial branch of government in our scheme of separation of powers that checks the power of the three official branches. In our constitutional scheme, the press is the watchdog that informs us what the legislative, executive, and judicial branches of government are up to and continually replenishes the stock of news – real …


Learned Hand's Seven Other Ideas About The Freedom Of Speech, Vincent A. Blasi Jan 2018

Learned Hand's Seven Other Ideas About The Freedom Of Speech, Vincent A. Blasi

Faculty Scholarship

I say “other” because, regarding the freedom of speech, Learned Hand has suffered the not uncommon fate of having his best ideas either drowned out or credited exclusively to others due to the excessive attention that has been bestowed on one of his lesser ideas. Sitting as a district judge in the case of Masses Publishing Co. v. Patten, Hand wrote the earliest judicial opinion about the freedom of speech that has attained canonical status. He ruled that under the recently passed Espionage Act of 1917, writings critical of government cannot be grounds for imposing criminal punishment or the …


Introduction: Troubling Transparency, David E. Pozen, Michael Schudson Jan 2018

Introduction: Troubling Transparency, David E. Pozen, Michael Schudson

Faculty Scholarship

Transparency is a value in the ascendance. Across the globe, the past several decades have witnessed a spectacular explosion of legislative reforms and judicial decisions calling for greater disclosure about the workings of public institutions. Freedom of information laws have proliferated, claims of a constitutional or supra-constitutional "right to know" have become commonplace, and an international transparency lobby has emerged as a civil society powerhouse. Open government is seen today in many quarters as a foundation of, if not synonymous with, good government.

At the same time, a growing number of scholars, advocates, and regulators have begun to raise hard …


Why Courts Fail To Protect Privacy: Race, Age, Bias, And Technology, Christopher Robertson, Bernard Chao, Ian Farrell, Catherine Durso Jan 2018

Why Courts Fail To Protect Privacy: Race, Age, Bias, And Technology, Christopher Robertson, Bernard Chao, Ian Farrell, Catherine Durso

Faculty Scholarship

The Fourth Amendment protects against unreasonable “searches and seizures,” but in the digital age of stingray devices and IP tracking, what constitutes a search or seizure? The Supreme Court has held that the threshold question is supposed to depend on and reflect the “reasonable expectations” of ordinary members of the public concerning their own privacy. For example, the police now exploit the “third party” doctrine to access data held by email and cell phone providers, without securing a warrant, on the Supreme Court’s intuition that the public has no expectation of privacy in that information. Is that assumption correct? If …