Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Communications Law

Telecommunications

Institution
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 132

Full-Text Articles in Law

Aclp - Navigating The Bead Weeds - Vetting Subgrantees - March 2024, New York Law School Mar 2024

Aclp - Navigating The Bead Weeds - Vetting Subgrantees - March 2024, New York Law School

Reports and Resources

No abstract provided.


Aclp - Comments Re Nys Bead Initial Proposal Volume 2 - December 2023, New York Law School Dec 2023

Aclp - Comments Re Nys Bead Initial Proposal Volume 2 - December 2023, New York Law School

Reports and Resources

No abstract provided.


Aclp - Comments Re Tn Bead Initial Proposal Volume 2 - December 2023, New York Law School Dec 2023

Aclp - Comments Re Tn Bead Initial Proposal Volume 2 - December 2023, New York Law School

Reports and Resources

No abstract provided.


Aclp - Comments To The Fcc Re Net Neutrality - December 2023, New York Law School Dec 2023

Aclp - Comments To The Fcc Re Net Neutrality - December 2023, New York Law School

Reports and Resources

No abstract provided.


Navigating The Bead Weeds - Project Areas - November 2023, New York Law School Nov 2023

Navigating The Bead Weeds - Project Areas - November 2023, New York Law School

Reports and Resources

No abstract provided.


Aclp - State Broadband Profile - New York (October 2023), New York Law School Oct 2023

Aclp - State Broadband Profile - New York (October 2023), New York Law School

Reports and Resources

No abstract provided.


Aclp - State Broadband Profile - Tennessee (July 2023), New York Law School Jul 2023

Aclp - State Broadband Profile - Tennessee (July 2023), New York Law School

Reports and Resources

No abstract provided.


Aclp - Further Updated Estimates Of State Bead Allocations - As Of June 16, 2023, New York Law School Jun 2023

Aclp - Further Updated Estimates Of State Bead Allocations - As Of June 16, 2023, New York Law School

Reports and Resources

No abstract provided.


Aclp - Updated Estimates Of State Bead Allocations - As Of June 2023, New York Law School Jun 2023

Aclp - Updated Estimates Of State Bead Allocations - As Of June 2023, New York Law School

Reports and Resources

No abstract provided.


Aclp - Comments To Ntia Re Digital Equity Act Grants Programs - May 2023, New York Law School May 2023

Aclp - Comments To Ntia Re Digital Equity Act Grants Programs - May 2023, New York Law School

Reports and Resources

No abstract provided.


Aclp - Updated Overview Of Iija Digital Equity Grant Programs - March 2023, New York Law School Jan 2023

Aclp - Updated Overview Of Iija Digital Equity Grant Programs - March 2023, New York Law School

Reports and Resources

No abstract provided.


Aclp - Updated Estimates Of State Bead Allocations - As Of January 2023, New York Law School Jan 2023

Aclp - Updated Estimates Of State Bead Allocations - As Of January 2023, New York Law School

Reports and Resources

No abstract provided.


Aclp - Overview Of Bead Program (Updated) - October 2022, New York Law School Oct 2022

Aclp - Overview Of Bead Program (Updated) - October 2022, New York Law School

Reports and Resources

No abstract provided.


Aclp - Broadband Planning Tool Kit - October 2022, New York Law School Oct 2022

Aclp - Broadband Planning Tool Kit - October 2022, New York Law School

Reports and Resources

This Tool Kit provides state and local policymakers with a range of resources and analyses for use during broadband planning. The Tool Kit focuses on the array of grant and other funding opportunities available to states and localities as a result of the Infrastructure Investment & Jobs Act, as well as other pandemic-era stimulus programs. However, the Tool Kit is also useful for broadband planning outside of these specific funding programs. Indeed, the Tool Kit offers foundational planning resources that can be used now and in the future by officials, ISPs, and other stakeholders in the broadband space.


Aclp - Overview Of Bead Nofo - June 2022, New York Law School Jun 2022

Aclp - Overview Of Bead Nofo - June 2022, New York Law School

Reports and Resources

No abstract provided.


A Guide To Federal Broadband Funding Programs - Overview Of Bead (Updated) - June 2022, New York Law School Jun 2022

A Guide To Federal Broadband Funding Programs - Overview Of Bead (Updated) - June 2022, New York Law School

Reports and Resources

No abstract provided.


Symmetry And (Network) Neutrality, Tejas N. Narechania Dec 2020

Symmetry And (Network) Neutrality, Tejas N. Narechania

Michigan Law Review Online

In this short Essay, I take the opportunity to highlight one further potential asymmetry that may yet emerge from the Supreme Court’s application of Chevron’s many doctrines. Drawing on then-Judge Kavanaugh’s disdissental from the D.C. Circuit’s decision affirming network neutrality rules, I suggest that there is at least one vote on the Supreme Court—and perhaps more—for an asymmetric approach to the major questions doctrine. Moreover, I demonstrate how asymmetry in this context is deeply irrational. As applied to network neutrality, the asymmetry has at least one of two effects. One, it might simply favor one large industry over another, …


Net Neutrality: An Explainer, Kincaid C. Brown Jan 2020

Net Neutrality: An Explainer, Kincaid C. Brown

Law Librarian Scholarship

Net neutrality is the idea that internet services or broadband providers should treat all content streaming through their systems the same, and providers who use their discretion to create “fast lanes,” block particular content, or throttle (slow down) internet speeds are not in keeping with how the internet ought to work.


Telecommunications Infrastructure: Another O-Ring In The Economic Development Of The Third World, James Germano Jan 2017

Telecommunications Infrastructure: Another O-Ring In The Economic Development Of The Third World, James Germano

Catholic University Journal of Law and Technology

No abstract provided.


Lessons Learned Too Well: Anonymity In A Time Of Surveillance, A. Michael Froomkin Jan 2017

Lessons Learned Too Well: Anonymity In A Time Of Surveillance, A. Michael Froomkin

Articles

It is no longer reasonable to assume that electronic communications can be kept private from governments or private-sector actors. In theory, encryption can protect the content of such communications, and anonymity can protect the communicator's identity. But online anonymity-one of the two most important tools that protect online communicative freedom-is under practical and legal attack all over the world. Choke-point regulation, online identification requirements, and data-retention regulations combine to make anonymity very difficult as a practical matter and, in many countries, illegal. Moreover, key internet intermediaries further stifle anonymity by requiring users to disclose their real names.

This Article traces …


Closing Fireside Chat With The Assistant Attorney General For The U.S. Department Of Justice Antitrust Division, William Baer, Philip J. Weiser Jan 2016

Closing Fireside Chat With The Assistant Attorney General For The U.S. Department Of Justice Antitrust Division, William Baer, Philip J. Weiser

Publications

This Closing Fireside Chat was the final session of the 16th annual Silicon Flatirons Center conference, The Digital Broadband Migration: The Evolving Industry Structure of the Digital Broadband Landscape, held on Feb. 1, 2016 in the Wittemyer Courtroom of the University of Colorado Law School.

"At the time this conference was held, William J. Baer was Assistant Attorney General for Antitrust in the United States Department of Justice. On April 17, 2016, President Obama asked Mr. Baer to become Acting Associate Attorney General of the United States. Video of this interview with Assistant Attorney General Baer is available at https://www.youtube.com/watch?v=C351xEX0h4g …


Newsroom: Fcc's Sohn On Consumer Protection, Roger Williams University School Of Law Sep 2015

Newsroom: Fcc's Sohn On Consumer Protection, Roger Williams University School Of Law

Life of the Law School (1993- )

No abstract provided.


Deregulation Of Telephone Services In Ohio, Frank P. Darr Jul 2015

Deregulation Of Telephone Services In Ohio, Frank P. Darr

Akron Law Review

Part I reviews the market changes that exist and which, in part, drive the regulatory changes and have emerged because of them. Parts II and III establish the basic regulatory schemes that existed prior and subsequent to divestiture and deregulation at the federal level. Part IV sets out the Ohio regulatory structure which previously controlled the actions of the Ohio commission. Parts V and VI then address the response of the Ohio commission and supreme court to the changes at the federal level and note some potential institutional barriers to deregulation. Part VII introduces the legislative response to deregulation, House …


Overestimating Wireless Demand: Policy And Investment Implications Of Upward Bias In Mobile Data Forecasts, J. Armand Musey Cfa, Aalok Mehta May 2015

Overestimating Wireless Demand: Policy And Investment Implications Of Upward Bias In Mobile Data Forecasts, J. Armand Musey Cfa, Aalok Mehta

J. Armand Musey, CFA

In this paper, we present evidence of persistent errors in projections of wireless demand and examine the implications for wireless policy and investment. Mobile demand projections are relied upon in academic and government research and used for critically important telecommunications policy decisions, both domestically and internationally. The Federal Communications Commission, for example, used such projections to estimate a 275 MHz spectrum shortage by 2014 and featured such estimates in the U.S. National Broadband Plan as evidence for allocating additional spectrum for cellular services. The International Telecommunications Union Radiocommunication Sector endorsed in 2006 an estimate of a 1,280- to 1,720-MHz spectrum …


Cloud Computing, Contractibility, And Network Architecture, Christopher S. Yoo Apr 2015

Cloud Computing, Contractibility, And Network Architecture, Christopher S. Yoo

All Faculty Scholarship

The emergence of the cloud is heightening the demands on the network in terms of bandwidth, ubiquity, reliability, latency, and route control. Unfortunately, the current architecture was not designed to offer full support for all of these services or to permit money to flow through it. Instead of modifying or adding specific services, the architecture could redesigned to make Internet services contractible by making the relevant information associated with these services both observable and verifiable. Indeed, several on-going research programs are exploring such strategies, including the NSF’s NEBULA, eXpressive Internet Architecture (XIA), ChoiceNet, and the IEEE’s Intercloud projects.


Close But No Cigar: Telecommunications In Cuba, Jodi Benassi Apr 2015

Close But No Cigar: Telecommunications In Cuba, Jodi Benassi

Jodi Benassi

No abstract provided.


Telecommunications - Joint Ventures - The Significance Of The At&T-Philips Joint Venture, Edward P. Hudson Apr 2015

Telecommunications - Joint Ventures - The Significance Of The At&T-Philips Joint Venture, Edward P. Hudson

Georgia Journal of International & Comparative Law

No abstract provided.


In All Fairness: Using Political Broadcast Access Doctrine To Tailor Public Campaign Fund Matching, Andrew V. Moshirnia, Aaron T. Dozeman Apr 2015

In All Fairness: Using Political Broadcast Access Doctrine To Tailor Public Campaign Fund Matching, Andrew V. Moshirnia, Aaron T. Dozeman

University of Michigan Journal of Law Reform

Recent United States Supreme Court decisions have undermined the viability of campaign public financing systems, a vital tool for fighting political corruption. First, Citizens United v. FEC allowed privately financed candidates and independent groups to spend unlimited amounts of money on campaigning. Publicly financed candidates now risk being vastly outspent. Second, Arizona Free Enterprise Club’s Freedom PAC v. Bennett invalidated a proportional fund matching system whereby privately financed candidates’ or independent groups’ spending triggered funds to publicly funded candidates. These decisions effectuate a libertarian speech doctrine: all speakers, individual or corporate, must be absolutely unburdened. To comply with this approach, …


No More Shortcuts: Protect Cell Site Location Data With A Warrant Requirement, Lauren E. Babst Jan 2015

No More Shortcuts: Protect Cell Site Location Data With A Warrant Requirement, Lauren E. Babst

Michigan Telecommunications & Technology Law Review

In modern society, the cell phone has become a virtual extension of most Americans, managing all kinds of personal and business matters. Modern cell tower technology allows cell service providers to accumulate a wealth of individuals’ location information while they use their cell phones, and such data is available for law enforcement to obtain without a warrant. This is problematic under the Fourth Amendment, which protects reasonable expectations of privacy. Under the Katz two-prong test, (1) individuals have an actual, subjective expectation of privacy in their cell site location data, and (2) society is prepared to acknowledge that expectation as …


The Cycles Of Global Telecommunication Censorship And Surveillance, Jonathon Penney Jan 2015

The Cycles Of Global Telecommunication Censorship And Surveillance, Jonathon Penney

Articles, Book Chapters, & Popular Press

Internet censorship and surveillance is on the rise globally and cyber-warfare increasing in scope and intensity. To help understand these new threats commentators have grasped at historical analogies often with little regard for historical complexity or international perspective. Unfortunately, helpful new works on telecommunications history have focused primarily on U.S. history with little focus on international developments. There is thus a need for further internationally oriented investigation of telecommunications technologies, and their history. This essay attempts to help fill that void, drawing on case studies wherein global telecommunications technologies have been disrupted or censored — telegram censorship and surveillance, high …