Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Internet (37)
- Regulation (17)
- Book Review (9)
- Federal Communications Commission (9)
- First Amendment (8)
-
- FCC (7)
- Technology (7)
- Communications Decency Act (6)
- Copyright Law (6)
- Network Neutrality (6)
- Cyberspace (5)
- Digital Millennium Copyright Act (5)
- Privacy (5)
- Broadband (4)
- Competition (4)
- Digital Communications Policy (4)
- Internet Access (4)
- Pornography (4)
- Telecommunications Policy (4)
- 1996 Act (3)
- CDA (3)
- Constitutionality (3)
- Copyright Infringement (3)
- Cyberspace Law (3)
- DMCA (3)
- Defamation (3)
- Discrimination (3)
- FTC (3)
- Federal Trade Commission (3)
- Freedom of Speech (3)
Articles 1 - 30 of 112
Full-Text Articles in Law
Wikileaks And The First Amendment, Geoffrey R. Stone
Wikileaks And The First Amendment, Geoffrey R. Stone
Federal Communications Law Journal
FCBA Distinguished Speaker Series
In November 2010, Julian Assange's WikiLeaks collaborated with major media organizations to release thousands of classified U.S. State Department documents. American soldier Bradley Manning stands accused of leaking those documents to the website. In response, Congress introduced the SHIELD Act to amend the Espionage Act of 1917, making it a crime for any person to disseminate any classified information concerning American intelligence or the identity of a classified informant. Such sweeping language, while possibly constitutional as applied to government employees like Manning, is plainly unconstitutional as applied to those like Assange and WikiLeaks who subsequently publish …
Law And The Open Internet, Adam Candeub, Daniel Mccartney
Law And The Open Internet, Adam Candeub, Daniel Mccartney
Federal Communications Law Journal
The FCC has issued a new set of Internet access regulations and policies (namely Preserving the Open Internet Broadband Industry Practices, Report and Order, FCC 10-201, rel. Dec. 23, 2010), which would prohibit broadband service providers like AT&T or Comcast from discriminating against unaffiliated content providers. The FCC's proceedings, and the network neutrality debate, concentrate on two economic questions: (1) whether to broadband service providers can or will steer traffic to affiliated content limiting consumer access, and (2) how to preserve the Internet's capacity for creativity and innovation. Yet despite the prominence of economics in the debate, economic theory cannot …
Bart Cell Phone Service Shutdown: Time For A Virtual Forum?, Rachel Lackert
Bart Cell Phone Service Shutdown: Time For A Virtual Forum?, Rachel Lackert
Federal Communications Law Journal
The balancing act between protecting First Amendment rights and the necessity of law enforcement to maintain the public order is not simple under normal circumstances. On August 11, 2011, San Francisco's Bay Area Rapid Transit ("BART") created a paradigm embodying the very essence of this problem by shutting down cell phone and Internet service to prevent citizens from organizing and planning a protest. Both the constitutional and telecommunications law implications of BART's cell phone and Internet shutdown beg for analysis and reform, especially in an age of rapidly advancing technology. This Note analyzes the legal implications of BART's shutdown, and …
Should Cyber Exploitation Ever Constitute A Demonstration Of Hostile Intent That May Violate Un Charter Provisions Prohibiting The Threat Or Use Of Force?, Anna Wortham
Federal Communications Law Journal
More and more, the United States and other countries rely on complex infrastructures that are primarily controlled by information technology. Although extremely destructive cyber threats and attacks against nations are a reality, the laws governing cyber exploitation have not kept pace with this threat. Because the United States and other nations may use cyber capabilities offensively as well as defensively, it is important that the laws for engaging in such cyber conflict be well defined. Currently, it seems unlikely that cyber exploitation can ever be regarded as a threat or use of force under the UN Charter because it is …
Behavioral Advertising: The Cryptic Hunter And Gatherer Of The Internet, Joanna Penn
Behavioral Advertising: The Cryptic Hunter And Gatherer Of The Internet, Joanna Penn
Federal Communications Law Journal
In an era where three out of every four Americans have Internet access, the term "surfing" has transformed from riding waves into running the risk of having private information gathered, stored, and disseminated-all without the user's knowledge or permission. This new found online practice, known as "behavioral advertising," is a veritable goldmine for those companies that know the game. But will the FTC or Congress soon make new rules concerning how to play? This Note begins by explaining the differences between behavioral targeting and retargeting and the techniques that the two methods use to collect data. This Note then explores …
An End To End-To-End? A Review Essay Of Barbara Van Schewick’S Internet Architecture And Innovation, Adam Candeub
An End To End-To-End? A Review Essay Of Barbara Van Schewick’S Internet Architecture And Innovation, Adam Candeub
Federal Communications Law Journal
Amidst much controversy, the FCC released its landmark "network neutrality" order in December 2010. This regulation prohibits Internet service providers, such as Verizon or Comcast, from discriminating in favor of traffic or content that they own or with which they are affiliated. Professor Barbara van Schewick's recently published book, Internet Architecture and Innovation, could not be timelier. Employing a variety of economic and technical arguments, van Schewick defends the type of regulation the FCC passed as necessary to preserve the Internet's potential for innovation. My central critique of Internet Architecture is its deployment of economic theories on one side of …
Is It Time To Recreate The E-Rate Program?, Lynne Holt, Mary Galligan
Is It Time To Recreate The E-Rate Program?, Lynne Holt, Mary Galligan
Federal Communications Law Journal
The Schools and Libraries program, commonly known as the "E-rate" program, was created by the FCC in 1997, as authorized by the federal Telecommunications Act of 1996. The E-rate program provides eligible schools and libraries with discounts of 20 to 90 percent from the rates charged by providers of telecommunications services, Internet access, and internal network connections. These discounts are paid from the federal Universal Service Fund under the regulatory oversight of the FCC. The FCC has modified certain aspects of the program since its inception but has not modified its highest programmatic funding priorities-support for telecommunications and Internet access. …
Wiretapping The Internet: The Expansion Of The Communications Assistance To Law Enforcement Act To Extend Government Surveillance, Christa M. Hibbard
Wiretapping The Internet: The Expansion Of The Communications Assistance To Law Enforcement Act To Extend Government Surveillance, Christa M. Hibbard
Federal Communications Law Journal
Criminal use of the Internet to circumvent traditional government phone wiretaps has inspired the Obama Administration to create a proposal to expand the Communications Assistance to Law Enforcement Act ("CALEA"). CALEA was passed in 1994 to regulate telephone and broadband companies to ensure compliance with standards to enable government wiretapping. The proposed amendment of CALEA would allow the government to require all communications service providers to meet technical standards necessary to comply with a wiretap order. The expansion of CALEA would likely widen its scope to social networking sites, instant messaging, gaming consoles that allow conversation among multiple players, and …
From Betamax To Youtube: How Sony Corporation Of America V. Universal City Studios, Inc. Could Still Be A Standard For New Technology, Veronica Corsaro
From Betamax To Youtube: How Sony Corporation Of America V. Universal City Studios, Inc. Could Still Be A Standard For New Technology, Veronica Corsaro
Federal Communications Law Journal
Internet technological innovations, particularly the development of Peer-to-Peer ("P2P") networks and the proliferation of user-generated content sites, have introduced considerable challenges for the application of copyright law and infringement liability. The response from the courts and Congress has been mixed, with severe legal curtails being applied to P2P technology while usergenerated content sites have been afforded a level of protection against infringement claims as part of the Digital Millennium Copyright Act's section 512 "safe harbor" provisions. However, these provisions have raised concerns about the issue of secondary copyright liability, a matter that has still been left undefined. This Note will …
How Elevation Of Corporate Free Speech Rights Affects Legality Of Network Neutrality, Barbara A. Cherry
How Elevation Of Corporate Free Speech Rights Affects Legality Of Network Neutrality, Barbara A. Cherry
Federal Communications Law Journal
In Citizens United v. Federal Election Commission (2010), the U.S. Supreme Court overruled a century of precedent to hold that corporations must be treated identically to natural persons with regard to political speech. This Article describes how the Court's decision is a radical departure from history that mirrors the FCC's flawed analysis in its classification of broadband Internet access services as an information service with no separable telecommunications component subject to common carriage regulation. Overall, the combinatorial effect of Citizens United and the FCC's classification of broadband access service as an information service is to elevate the constitutional free speech …
It’S A Mad, Mad Internet: Globalization And The Challenges Presented By Internet Censorship, Jessica E. Bauml
It’S A Mad, Mad Internet: Globalization And The Challenges Presented By Internet Censorship, Jessica E. Bauml
Federal Communications Law Journal
The advent of the Internet has brought tremendous technological advancements and growth to the world. However, it has also become a source of conflict, particularly when different countries attempt to regulate this very ubiquitous and amorphous medium. The most notable controversy has arisen in China home to the world's most advanced system of Internet censorship, which levies harsh penalties on those who violate the country's strict censorship laws. China's "Great Firewall" has raised many eyebrows and is garnishing substantial criticism in response to the human rights abuses that result from the jailing and reported torture of Chinese dissidents. Yet the …
The End-To-End Argument And Application Design: The Role Of Trust, David D. Clark, Marjory S. Blumenthal
The End-To-End Argument And Application Design: The Role Of Trust, David D. Clark, Marjory S. Blumenthal
Federal Communications Law Journal
Symposium: Rough Consensus and Running Code: Integrating Engineering Principles into Internet Policy Debates, held at the University of Pennsylvania's Center for Technology Innovation and Competition on May 6-7, 2010.
Policy debates about the evolution of the Internet show varying degrees of understanding about the underlying technology. A fundamental principle of the design of the Internet, from the early 1980s, is the so-called "end-to-end argument" articulated in a seminal technical paper. Intended to provide guidance for what kind of capability is built into a network as opposed to the devices that use the network, the end-to-end argument has been invoked in …
Resilience: Building Better Users And Fair Trade Practices In Information, Andrea M. Matwyshyn
Resilience: Building Better Users And Fair Trade Practices In Information, Andrea M. Matwyshyn
Federal Communications Law Journal
Symposium: Rough Consensus and Running Code: Integrating Engineering Principles into Internet Policy Debates, held at the University of Pennsylvania's Center for Technology Innovation and Competition on May 6-7, 2010.
In the discourse on communications and new media policy, the average consumer-the user-is frequently eliminated from the equation. This Article presents an argument rooted in developmental psychology theory regarding the ways that users interact with technology and the resulting implications for data privacy law. Arguing in favor of a user-centric construction of policy and law, the Author introduces the concept of resilience. The concept of resilience has long been discussed in …
Rough Consensus And Running Code: Integrating Engineering Principles Into Internet Policy Debates, Christopher S. Yoo
Rough Consensus And Running Code: Integrating Engineering Principles Into Internet Policy Debates, Christopher S. Yoo
Federal Communications Law Journal
Symposium: Rough Consensus and Running Code: Integrating Engineering Principles into Internet Policy Debates, held at the University of Pennsylvania's Center for Technology Innovation and Competition on May 6-7, 2010.
Wireless Efficiency Versus Net Neutrality, Charles L. Jackson
Wireless Efficiency Versus Net Neutrality, Charles L. Jackson
Federal Communications Law Journal
Symposium: Rough Consensus and Running Code: Integrating Engineering Principles into Internet Policy Debates, held at the University of Pennsylvania's Center for Technology Innovation and Competition on May 6-7, 2010.
This Article first addresses congestion and congestion control in the Internet. It shows how congestion control has always depended upon altruistic behavior by end users. Equipment failures, malicious acts, or abandonment of altruistic behavior can lead to severe congestion within the Internet. Consumers benefit when network operators are able to control such congestion. One tool for controlling such congestion is giving higher priority to some applications, such as telephone calls, and …
The Internet Ecosystem: The Potential For Discrimination, Dick Grunwald
The Internet Ecosystem: The Potential For Discrimination, Dick Grunwald
Federal Communications Law Journal
Symposium: Rough Consensus and Running Code: Integrating Engineering Principles into Internet Policy Debates, held at the University of Pennsylvania's Center for Technology Innovation and Competition on May 6-7, 2010.
This Article explores how the emerging Internet architecture of "cloud computing," content distribution networks, private peering and data-center services can simultaneously foster a perception of "unfair" network access while at the same time enabling significant competition for services, content, and innovation. A key enabler of these changes is the emergence of technologies that lower the barrier for entry in developing and deploying new services. Another is the design of successful Internet …
Spectrum Miscreants, Vigilantes, And Kangaroo Courts: The Return Of The Wireless Wars, Christian Sandvig
Spectrum Miscreants, Vigilantes, And Kangaroo Courts: The Return Of The Wireless Wars, Christian Sandvig
Federal Communications Law Journal
Symposium: Rough Consensus and Running Code: Integrating Engineering Principles into Internet Policy Debates, held at the University of Pennsylvania's Center for Technology Innovation and Competition on May 6-7, 2010.
It is axiomatic that government licensing is a foundational requirement for the use of the electromagnetic spectrum. Yet in some bands there is no licensing requirement, providing an empirical site that can be used to examine wireless coexistence without licenses. This Article draws on ethnographic work with wireless Internet Service Providers to report on the extralegal means that are used to share or allocate spectrum in these license exempt bands. Operators …
Restraining Amazon.Com's Orwellian Potential: The Computer Fraud And Abuse Act As Consumer Rights Legislation, Alicia C. Sanders
Restraining Amazon.Com's Orwellian Potential: The Computer Fraud And Abuse Act As Consumer Rights Legislation, Alicia C. Sanders
Federal Communications Law Journal
In 2009, Amazon.com decided to correct a potential copyright violation by deleting e-books by George Orwell and Ayn Rand from the Kindles of users who had already purchased the offending texts. Two of those users, Justin Gawronski and Antoine Bruguier, claimed that Amazon.com had violated the Computer Fraud and Abuse Act (CFAA) by accessing their Kindles without authorization. The plaintiffs also relied on other causes of action, including breach of contract and trespass to chattels. Although the dispute quickly settled, the Gawronski lawsuit remains a useful case study that shows why the CFAA is a useful protection for consumers. Recently, …
Access To Media All A-Twitter: Revisiting Gertz And The Access To Media Test In The Age Of Social Networking, Ann E. O'Connor
Access To Media All A-Twitter: Revisiting Gertz And The Access To Media Test In The Age Of Social Networking, Ann E. O'Connor
Federal Communications Law Journal
Plaintiffs' access to media has long been a factor in defamation cases, enabling courts to determine whether that plaintiff is a public figure who must meet the actual malice standard, or whether that plaintiff is a private figure worthy of greater protection from defamation. This component of the public-private distinction can no longer be applied with clear precision, given the advent of social networking and today's world of widespread media access. In light of the massive changes that have taken place in the media world, the access to media test must be revisited and appropriately retailored to avoid an inappropriate …
The Challenge Of Developing Effective Public Policy On The Use Of Social Media By Youth, John Palfrey
The Challenge Of Developing Effective Public Policy On The Use Of Social Media By Youth, John Palfrey
Federal Communications Law Journal
Symposium: Essays from Time Warner Cable's Research Program on Digital Communications.
Introduction To Essays On The Future Of Digital Communications, Ferando R. Laguarda
Introduction To Essays On The Future Of Digital Communications, Ferando R. Laguarda
Federal Communications Law Journal
Symposium: The Future of Digital Communications: Essays from Time Warner Cable's Research Program on Digital Communications.
The Future Of Digital Communications Research And Policy, Scott Wallsten
The Future Of Digital Communications Research And Policy, Scott Wallsten
Federal Communications Law Journal
Symposium: Essays from Time Warner Cable's Research Program on Digital Communications.
The Changing Patterns Of Internet Usage, Christopher S. Yoo
The Changing Patterns Of Internet Usage, Christopher S. Yoo
Federal Communications Law Journal
Symposium: Essays from Time Warner Cable's Research Program on Digital Communications.
Revisiting The Regulatory Status Of Broadband Internet Access: A Policy Framework For Net Neutrality And An Open Competitive Internet, Lee L. Selwyn, Helen E. Golding
Revisiting The Regulatory Status Of Broadband Internet Access: A Policy Framework For Net Neutrality And An Open Competitive Internet, Lee L. Selwyn, Helen E. Golding
Federal Communications Law Journal
A decade of broadband access deregulation has landed the FCC at a legal deadend. After the D.C. Circuit's Comcast decision, the FCC finds itself unable to enforce its "net neutrality" goals. To reassert its jurisdiction over "net neutrality," the FCC proposes to reclassify broadband Internet access as a Title II "telecommunications service" while continuing to forbear from most other facets of common carrier regulation. The FCC's current dilemma results from an unfortunate combination of unverified predictive judgments associating deregulation with investment; overly optimistic assessments of competition in the consumer broadband market; the abandonment of the "bright line" between transmission and …
The Challenge Of Increasing Civic Engagement In The Digital Age, Nicol Turner-Lee
The Challenge Of Increasing Civic Engagement In The Digital Age, Nicol Turner-Lee
Federal Communications Law Journal
Symposium: Essays from Time Warner Cable's Research Program on Digital Communications.
The Challenge Of Increasing Broadband Capacity, Dale N. Hatfield
The Challenge Of Increasing Broadband Capacity, Dale N. Hatfield
Federal Communications Law Journal
Symposium: Essays from Time Warner Cable's Research Program on Digital Communications.
Pacifica Reconsidered: Implications For The Current Controversy Over Broadcast Indecency, Angela J. Campbell
Pacifica Reconsidered: Implications For The Current Controversy Over Broadcast Indecency, Angela J. Campbell
Federal Communications Law Journal
In 2009, the Supreme Court upheld the FCC's finding in Fox TV Stations v. Federal Communications Commission that the broadcast of "fleeting expletives" violated a federal law prohibiting the broadcast of indecency, but remanded the case for consideration of the broadcast networks' claims that the FCC action violated the First Amendment. On remand, the Second Circuit found that the FCC's prohibition against "fleeting expletives" was unconstitutionally vague. It is widely expected that the Supreme Court will review this decision and that the networks will ask the Court to reconsider its 1978 decision in Pacifica Foundation v. Federal Communications Commission. This …
Thwack!! Take That, User-Generated Content!: Marvel Enterprises V. Ncsoft, Carl Michael Szabo
Thwack!! Take That, User-Generated Content!: Marvel Enterprises V. Ncsoft, Carl Michael Szabo
Federal Communications Law Journal
Comic-book heroes show us how to be valiant, how to fight for those less fortunate, and, in some circumstances, how to combat those who break the law. Such is the situation in the case of Marvel Enterprises, Inc. v. NCSofl Corp., a battle between user-generated content and the copyright violations that resulted.
While the issue of copyright liability has been seen in hundreds of comments and notes from courts and attorneys alike, the issue of copyright liability on the internet remains an open question that if not addressed, could endanger the protection afforded to authors. Federal and state suits have …
The Sound Of Money: Securing Copyright, Royalties, And Creative "Progress" In The Digital Music Revolution, Armen Boyajian
The Sound Of Money: Securing Copyright, Royalties, And Creative "Progress" In The Digital Music Revolution, Armen Boyajian
Federal Communications Law Journal
Academics and popular critics alike want to distill, reform, or altogether destroy U.S. copyright law as we know it. Much of this stems from animosity toward the old-guard record industry's alleged practices of overcharging consumers, underpaying royalties to artists, and suing teenagers and grandmas. But what those calling for reform all seem to neglect is a tiny but inevitable fact: for the first time in history, composers and recording artists can keep their copyrights.
Tangible media sales are being replaced by P2P file sharing, retail downloads, and streaming Webcasts. Digital technologies and wireless networks have opened prime channels for music …
Derailed By The D.C. Circuit: Getting Network Management Regulation Back On Track, Edward B. Mulligan V
Derailed By The D.C. Circuit: Getting Network Management Regulation Back On Track, Edward B. Mulligan V
Federal Communications Law Journal
As the Internet continues to play a more central role in the daily lives of Americans, concerns about how Internet service providers manage their networks have arisen. Responding to these concerns and recognizing the importance of maintaining the open and competitive nature of the Internet, the FCC has taken incremental steps to regulate network management practices. Perhaps the most significant of these steps was its August 2008 Memorandum Decision and Order in which the FCC condemned Comcast Corporation's network management practices as "discriminatory and arbitrary." In that Order, the FCC required that Comcast (1) adopt new practices that complied with …