Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- University of Pennsylvania Carey Law School (9)
- University of Nebraska - Lincoln (3)
- University of Pittsburgh School of Law (3)
- Columbia Law School (2)
- University of Michigan Law School (2)
-
- American University Washington College of Law (1)
- Brooklyn Law School (1)
- Chicago-Kent College of Law (1)
- Duke Law (1)
- Georgetown University Law Center (1)
- Maurer School of Law: Indiana University (1)
- Salve Regina University (1)
- Singapore Management University (1)
- University of Colorado Law School (1)
- University of Miami Law School (1)
- University of Washington School of Law (1)
- Western New England University School of Law (1)
- Keyword
-
- Innovation (4)
- Regulation (4)
- Communications Law (3)
- Copyright (3)
- FCC (3)
-
- Net neutrality (3)
- Administrative Law (2)
- Antitrust (2)
- Cybersecurity (2)
- Defamation (2)
- Horizontal integration (2)
- ICT (2)
- Information security (2)
- Information service (2)
- Internet (2)
- Netflix (2)
- Patents (2)
- Privacy (2)
- Technology (2)
- Telecommunications law and policy (2)
- VDSL (2)
- Vertical integration (2)
- 4G LTE (1)
- 4G Long Term Evolution (LTE) (1)
- AI (1)
- Agriculture (1)
- Air and Space Law (1)
- American Civil Liberties Union (1)
- Ancillary jurisdiction (1)
- Animal cruelty (1)
- Publication
-
- All Faculty Scholarship (10)
- Articles (7)
- Faculty Scholarship (3)
- United States Department of Justice: Publications and Materials (2)
- Articles by Maurer Faculty (1)
-
- Articles in Law Reviews & Other Academic Journals (1)
- Columbia Center on Sustainable Investment Staff Publications (1)
- Faculty and Staff - Articles & Papers (1)
- Georgetown Law Faculty Publications and Other Works (1)
- Media Presence (1)
- Publications (1)
- Research Collection Yong Pung How School Of Law (1)
- University of Nebraska-Lincoln Libraries: Conference Presentations and Speeches (1)
Articles 1 - 30 of 31
Full-Text Articles in Law
Copyright, Fair Use And Author’S Rights Ii (October/November 2014), Paul Royster
Copyright, Fair Use And Author’S Rights Ii (October/November 2014), Paul Royster
University of Nebraska-Lincoln Libraries: Conference Presentations and Speeches
Copyright is a battlefield, and an author’s control over his/her own work can easily become collateral damage or go missing in action. Many publishers believe they have an inherent right to own the intellectual property arising from your grant-funded research and to live off the earnings of written works that you had little choice but to give them for free or pay them to publish. In this session you will learn more about U.S. Copyright Law, Author’s Rights, and protecting your Intellectual Property. Faculty members Paul Royster and Sue Gardner will speak on Copyright, Fair Use, and Author Rights. You …
Teece's Competing Through Innovation, Herbert J. Hovenkamp
Teece's Competing Through Innovation, Herbert J. Hovenkamp
All Faculty Scholarship
This essay reviews David J. Teece's book, Competing Through Innovation: Technological Strategies and Antitrust Policies (2013).
Systematic Ict Surveillance By Employers: Are Your Personal Activities Private?, Arlene J. Nicholas
Systematic Ict Surveillance By Employers: Are Your Personal Activities Private?, Arlene J. Nicholas
Faculty and Staff - Articles & Papers
This paper reviews the various methods of information and communications technology (ICT) that is used by employers to peer into the work lives and, in some cases, private lives of employees. Some of the most common methods – such as computer and Internet monitoring, video surveillance, and global positioning systems (GPS) – have resulted in employee disciplines that have been challenged in courts. This paper provides background information on United States (U.S.) laws and court cases which, in this age of easily accessible information, mostly support the employer. Assessments regarding regulations and policies, which will need to be continually updated …
U.S. Vs. European Broadband Deployment: What Do The Data Say?, Christopher S. Yoo
U.S. Vs. European Broadband Deployment: What Do The Data Say?, Christopher S. Yoo
All Faculty Scholarship
As the Internet becomes more important to the everyday lives of people around the world, commentators have tried to identify the best policies increasing the deployment and adoption of high-speed broadband technologies. Some claim that the European model of service-based competition, induced by telephone-style regulation, has outperformed the facilities-based competition underlying the US approach to promoting broadband deployment. The mapping studies conducted by the US and the EU for 2011 and 2012 reveal that the US led the EU in many broadband metrics.
• High-Speed Access: A far greater percentage of US households had access to Next Generation Access (NGA) …
Leveraging Mining Demand For Internet And Telecommunications Infrastructure For Broad Economic Development: Models, Opportunities And Challenges, Perrine Toledano, Clara Roorda
Leveraging Mining Demand For Internet And Telecommunications Infrastructure For Broad Economic Development: Models, Opportunities And Challenges, Perrine Toledano, Clara Roorda
Columbia Center on Sustainable Investment Staff Publications
The initial phase of the Leveraging Mining-Related Infrastructure Investments for Development project consisted of a worldwide survey of regulatory, commercial and operating case studies of shared use of mining-related infrastructure. This Policy Paper delivers the findings for internet and telecommunications.
Competition Policy And The Technologies Of Information, Herbert J. Hovenkamp
Competition Policy And The Technologies Of Information, Herbert J. Hovenkamp
All Faculty Scholarship
When we speak about information and competition policy we are usually thinking about oral or written communications that have an anticompetitive potential, and mainly in the context of collusion of exclusionary threats. These are important topics. Indeed, among the most difficult problems that competition policy has had to confront over the years is understanding communications that can be construed as either threats to exclude or as offers to collude or facilitators of collusion.
My topic here, however, is the relationship between information technologies and competition policy. Technological change can both induce and undermine the use of information to facilitate anticompetitive …
Idaho Gag Law Hides Horrors Of Ag Industry, Lauren Carasik
Idaho Gag Law Hides Horrors Of Ag Industry, Lauren Carasik
Media Presence
No abstract provided.
Drones, Henry H. Perritt Jr., Eliot O. Sprague
Drones, Henry H. Perritt Jr., Eliot O. Sprague
All Faculty Scholarship
Abstract
Drone technology is evolving rapidly. Microdrones—what the FAA calls “sUAS”—already on the market at the $1,000 level, have the capability to supplement manned helicopters in support of public safety operations, news reporting, and powerline and pipeline patrol, when manned helicopter support is infeasible, untimely, or unsafe.
Larger drones–"machodrones”–are not yet available outside battlefield and counterterrorism spaces. Approximating the size of manned helicopters, but without pilots, or with human pilots being optional, their design is still in its infancy as designers await greater clarity in the regulatory requirements that will drive airworthiness certification.
This article evaluates drone technology and design …
Uk Defamation Act 2013: Key Changes, Kee Yang Low
Uk Defamation Act 2013: Key Changes, Kee Yang Low
Research Collection Yong Pung How School Of Law
The much awaited new legislation affecting English defamation law received Royal Assent in April 2013, ushering in changes substantive as well as cosmetic. Some of the substantive changes are radical and reflect the increasing emphasis on the right of freedom of expression. This comment deals with the key changes brought about by the new Defamation Act 2013.
Response To Questions In The First White Paper, 'Modernizing The Communications Act', Randolph J. May, Richard A. Epstein, Justin (Gus) Hurwitz, Daniel Lyons, James B. Speeta, Christopher S. Yoo
Response To Questions In The First White Paper, 'Modernizing The Communications Act', Randolph J. May, Richard A. Epstein, Justin (Gus) Hurwitz, Daniel Lyons, James B. Speeta, Christopher S. Yoo
All Faculty Scholarship
The House Energy and Commerce Committee has begun a process to review and update the Communications Act of 1934, last revised in any material way in 1996. As the Committee begins the review process, this paper responds to questions posed by the Committee that all relate, in fundamental ways, to the question: "What should a modern Communications Act look like?"
The Response advocates a "clean slate" approach under which the regulatory silos that characterize the current statute would be eliminated, along with almost all of the ubiquitous 'public interest' delegation of authority found throughout the Communications Act. The replacement regime …
Journalism Standards And "The Dark Arts": The U.K.'S Leveson Inquiry And The U.S. Media In The Age Of Surveillance, Lili Levi
Articles
No abstract provided.
Pinterest And Copyright's Safe Harbors For Internet Providers, Michael W. Carroll
Pinterest And Copyright's Safe Harbors For Internet Providers, Michael W. Carroll
Articles in Law Reviews & Other Academic Journals
Has the time come to substantially revise the Copyright Act to better adapt the law to the ever-evolving digital environment? A number of influential sources appear to think so. If their initiatives gain momentum, it will be important to consider lessons learned from the first such effort fifteen years ago when Congress made far-reaching changes to copyright law by extending the term of copyright for twenty years and by enacting a package of reform proposals known as the Digital Millennium Copyright Act (“DMCA”). This Article intertwines the story of one important provision of the DMCA - safe harbors for Internet …
Material Falsity In Defamation Cases: The Supreme Court's Call For Contextual Analysis, Charles D. Tobin, Leonard M. Niehoff
Material Falsity In Defamation Cases: The Supreme Court's Call For Contextual Analysis, Charles D. Tobin, Leonard M. Niehoff
Articles
In the book The Phantom Tollbooth, one of the characters, Milo, declares that he comes from a faraway land called Context. After a circuitous journey through many strange cities, bearing names that have meanings Milo struggles to understand, he finds himself back at home in his bedroom.
Context, by and large, is the home base for courts in defining the boundaries between actionable and nonactionable speech. Often, after circuitous travels through precedent and logic, courts meander back to the simple notion that the meaning and legal significance of words are determined by their context.
Common Sense And Key Questions, Stuart M. Benjamin
Common Sense And Key Questions, Stuart M. Benjamin
Faculty Scholarship
No abstract provided.
Did The National Security Agency Destroy The Prospects For Confidentiality And Privilege When Lawyers Store Clients' Files In The Cloud--And What, If Anything, Can Lawyers And Law Firms Realistically Do In Response?, Sarah Jane Hughes
Articles by Maurer Faculty
No abstract provided.
Procedural Architecture Matters: Innovation Policy At The Federal Communications Commission, J. Brad Bernthal
Procedural Architecture Matters: Innovation Policy At The Federal Communications Commission, J. Brad Bernthal
Publications
This Article examines the puzzle of whether today's Federal Communications Commission ("FCC" or the "Agency") is institutionally suited to craft telecommunications innovation policy and, if not, what changes are needed to better equip the Agency to respond to twenty-first century realities. Evaluation of FCC innovation policy performance is stubbornly difficult. Some criticize the FCC as a brake on innovation yet, under the FCC's oversight, the United States' communications industry has become an innovative engine propelling the overall economy more than ever before. It is difficult to untangle whether the FCC deserves credit for helping usher in today's communications age, whether …
Aaron Swartz’S Fbi Files
United States Department of Justice: Publications and Materials
Aaron Hillel Swartz (November 8, 1986 – January 11, 2013) was an American computer programmer, writer, political organizer and Internet Hacktivist.
Swartz was involved in the development of the web feed format RSS, the organization Creative Commons, the website framework web.py and the social news site, Reddit, in which he became a partner after its merger with his company, Infogami. Swartz's later work focused on sociology, civic awareness and activism.
He helped launch the Progressive Change Campaign Committee in 2009 to learn more about effective online activism. In 2010 he became a research fellow at Harvard University's Safra Research Lab …
Aaron Swartz’S Secret Service Files
Aaron Swartz’S Secret Service Files
United States Department of Justice: Publications and Materials
These documents concern the indictment in Massachusetts for downloading JSTOR content from MIT library network.
Parts 1 & 2 are included in the main document.
Additional files are linked below, as follows:
Part 3 (3 files) -- 379 pages, 4067 pages (spreadsheet), & 190 pages (photos)
Part 4 -- 1 page
Part 5 -- 1 page
Part 6 -- 1 page
Part 7 -- 7 pages
Part 8 -- 237,397 pages (yes)
Part 9 -- 90 pages
Part 10 -- 259 pages
Part 11 -- 17 pages
Part 12 -- (not released as of 9/29/2014)
Part 13 -- 254 pages …
Possible Paradigm Shifts In Broadband Policy, Christopher S. Yoo
Possible Paradigm Shifts In Broadband Policy, Christopher S. Yoo
All Faculty Scholarship
Debates over Internet policy tend to be framed by the way the Internet existed in the mid-1990s, when the Internet first became a mass-market phenomenon. At the risk of oversimplifying, the Internet was initially used by academics and tech-savvy early adopters to send email and browse the web over a personal computer connected to a telephone line via networks interconnected through in a limited way. Since then, the Internet has become much larger and more diverse in terms of users, applications, technologies, and business relationships. More recently, Internet growth has begun to slow both in terms of the number of …
Wickard For The Internet? Network Neutrality After Verizon V. Fcc, Christopher S. Yoo
Wickard For The Internet? Network Neutrality After Verizon V. Fcc, Christopher S. Yoo
All Faculty Scholarship
The D.C. Circuit’s January 2014 decision in Verizon v. FCC represented a major milestone in the debate over network neutrality that has dominated communications policy for the past decade. This article analyzes the implications of the D.C. Circuit’s ruling, beginning with a critique of the court’s ruling that section 706 of the Telecommunications Act of 1996 gave the Federal Communications Commission (FCC) the authority to mandate some form of network neutrality. Examination of the statute’s text, application of canons of construction such as ejusdem generis and noscitur a sociis, and a perusal of the statute’s legislative history all raise questions …
The Efficacy Of Cybersecurity Regulation, David Thaw
The Efficacy Of Cybersecurity Regulation, David Thaw
Articles
Cybersecurity regulation presents an interesting quandary where, because private entities possess the best information about threats and defenses, legislatures do – and should – deliberately encode regulatory capture into the rulemaking process. This relatively uncommon approach to administrative law, which I describe as Management-Based Regulatory Delegation, involves the combination of two legislative approaches to engaging private entities' expertise. This Article explores the wisdom of those choices by comparing the efficacy of such private sector engaged regulation with that of a more traditional, directive mode of regulating cybersecurity adopted by the state legislatures. My analysis suggests that a blend of these …
Surveillance At The Source, David Thaw
Surveillance At The Source, David Thaw
Articles
Contemporary discussion concerning surveillance focuses predominantly on government activity. These discussions are important for a variety of reasons, but generally ignore a critical aspect of the surveillance-harm calculus – the source from which government entities derive the information they use. The source of surveillance data is the information "gathering" activity itself, which is where harms like "chilling" of speech and behavior begin.
Unlike the days where satellite imaging, communications intercepts, and other forms of information gathering were limited to advanced law enforcement, military, and intelligence activities, private corporations now play a dominant role in the collection of information about individuals' …
Enlightened Regulatory Capture, David Thaw
Enlightened Regulatory Capture, David Thaw
Articles
Regulatory capture generally evokes negative images of private interests exerting excessive influence on government action to advance their own agendas at the expense of the public interest. There are some cases, however, where this conventional wisdom is exactly backwards. This Article explores the first verifiable case, taken from healthcare cybersecurity, where regulatory capture enabled regulators to harness private expertise to advance exclusively public goals. Comparing this example to other attempts at harnessing industry expertise reveals a set of characteristics under which regulatory capture can be used in the public interest. These include: 1) legislatively-mandated adoption of recommendations by an advisory …
Communications Privacy For And By Whom?, Ryan Calo
Communications Privacy For And By Whom?, Ryan Calo
Articles
A response to Professor Orin Kerr's The Next Generation Communications Privacy Act, which makes a series of quiet assumptions, however, that readers may find controversial.
First, the Article reads as though ECPA exists only to protect citizens from public officials. According to its text and to case law, however, ECPA also protects private citizens from one another in ways any new act should revisit.
Second, the Article assumes that society should address communications privacy with a statute, whereas specific experiences with ECPA suggest that the courts may be better suited to address communications privacy—for reasons Professor Kerr himself offers. …
Merger Review By The Federal Communications Commission: Comcast-Nbc Universal, Christopher S. Yoo
Merger Review By The Federal Communications Commission: Comcast-Nbc Universal, Christopher S. Yoo
All Faculty Scholarship
The Communications Act of 1934 created a dual review process in which mergers in the communications industry are reviewed by the Federal Communications Commission (FCC) as well as the antitrust authorities. Commentators have criticized dual review not only as costly and redundant, but also as subject to substantive and procedural abuse. The process of clearing the 2011 Comcast-NBC Universal merger provides a useful case study to examine whether such concerns are justified. A review of the empirical context reveals that the FCC intervened even though the relevant markets were not structured in a way that would ordinarily raise anticompetitive concerns. …
Artificial Meaning, Lawrence B. Solum
Artificial Meaning, Lawrence B. Solum
Georgetown Law Faculty Publications and Other Works
This Essay investigates the concept of artificial meaning, meanings produced by entities other than individual natural persons. That investigation begins in Part I with a preliminary inquiry into the meaning of “meaning,” in which the concept of meaning is disambiguated. The relevant sense of “meaning” for the purpose of this inquiry is captured by the idea of communicative content, although the phrase “linguistic meaning” is also a rough equivalent. Part II presents a thought experiment, The Chinese Intersection, which investigates the creation of artificial meaning produced by an AI that creates legal rules for the regulation of a hyper-complex conflux …
Zombies Among Us: Injunctions In Defamation Cases Come Back From The Dead, Jim Stewart, Leonard M. Niehoff
Zombies Among Us: Injunctions In Defamation Cases Come Back From The Dead, Jim Stewart, Leonard M. Niehoff
Articles
Here's a scary thought: an individual, unhappy with negative statements that have been made about him, sues for defamation and persuades the trial court to issue an injunction prohibiting the speaker from engaging in that speech again. An appellate court reviews the injunction and, in large measure, upholds it. This creepy scenario brings shudders to free speech and media advocates, who have long viewed such injunctions as prior restraints that the First Amendment forbids in all but the most extreme and extraordinary cases. As a recent decision from the Michigan Court of Appeals demonstrates, however, decades of United States Supreme …
Toward A Closer Integration Of Law And Computer Science, Christopher S. Yoo
Toward A Closer Integration Of Law And Computer Science, Christopher S. Yoo
All Faculty Scholarship
Legal issues increasingly arise in increasingly complex technological contexts. Prominent recent examples include the Stop Online Piracy Act (SOPA) and the Protect Intellectual Property Act (PIPA), network neutrality, the increasing availability of location information, and the NSA’s surveillance program. Other emerging issues include data privacy, online video distribution, patent policy, and spectrum policy. In short, the rapid rate of technological change has increasingly shown that law and engineering can no longer remain compartmentalized into separate spheres. The logical response would be to embed the interaction between law and policy deeper into the fabric of both fields. An essential step would …
Panel Iii: The Future Of The Press And Privacy, Amy Gajda, Clay Calvert, Tom Bivins, Amy Sanders, Stephen Ward
Panel Iii: The Future Of The Press And Privacy, Amy Gajda, Clay Calvert, Tom Bivins, Amy Sanders, Stephen Ward
Faculty Scholarship
No abstract provided.
Sender Side Transmission Rules For The Internet, Tejas N. Narechania, Tim Wu
Sender Side Transmission Rules For The Internet, Tejas N. Narechania, Tim Wu
Faculty Scholarship
Since 1966, the Federal Communications Commission has, one way or another, protected businesses that deliver services over the nation’s communications infrastructure. But in January 2014, the U.S. Court of Appeals for the D.C. Circuit struck down the FCC’s net neutrality rules contained in its 2010 Open Internet Order. FCC Chairman Tom Wheeler has since indicated that he will take up the D.C. Circuit’s invitation to implement rules that, consistent with historic practice, “will meet the court’s test for preventing improper blocking of and discrimination among Internet traffic.”
Chairman Wheeler’s statement invites an obvious question: presuming that the FCC wants …