Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Series

Communications Law

2014

Institution
Keyword
Publication

Articles 1 - 30 of 31

Full-Text Articles in Law

Copyright, Fair Use And Author’S Rights Ii (October/November 2014), Paul Royster Nov 2014

Copyright, Fair Use And Author’S Rights Ii (October/November 2014), Paul Royster

University of Nebraska-Lincoln Libraries: Conference Presentations and Speeches

Copyright is a battlefield, and an author’s control over his/her own work can easily become collateral damage or go missing in action. Many publishers believe they have an inherent right to own the intellectual property arising from your grant-funded research and to live off the earnings of written works that you had little choice but to give them for free or pay them to publish. In this session you will learn more about U.S. Copyright Law, Author’s Rights, and protecting your Intellectual Property. Faculty members Paul Royster and Sue Gardner will speak on Copyright, Fair Use, and Author Rights. You …


Teece's Competing Through Innovation, Herbert J. Hovenkamp Oct 2014

Teece's Competing Through Innovation, Herbert J. Hovenkamp

All Faculty Scholarship

This essay reviews David J. Teece's book, Competing Through Innovation: Technological Strategies and Antitrust Policies (2013).


Systematic Ict Surveillance By Employers: Are Your Personal Activities Private?, Arlene J. Nicholas Jul 2014

Systematic Ict Surveillance By Employers: Are Your Personal Activities Private?, Arlene J. Nicholas

Faculty and Staff - Articles & Papers

This paper reviews the various methods of information and communications technology (ICT) that is used by employers to peer into the work lives and, in some cases, private lives of employees. Some of the most common methods – such as computer and Internet monitoring, video surveillance, and global positioning systems (GPS) – have resulted in employee disciplines that have been challenged in courts. This paper provides background information on United States (U.S.) laws and court cases which, in this age of easily accessible information, mostly support the employer. Assessments regarding regulations and policies, which will need to be continually updated …


U.S. Vs. European Broadband Deployment: What Do The Data Say?, Christopher S. Yoo Jun 2014

U.S. Vs. European Broadband Deployment: What Do The Data Say?, Christopher S. Yoo

All Faculty Scholarship

As the Internet becomes more important to the everyday lives of people around the world, commentators have tried to identify the best policies increasing the deployment and adoption of high-speed broadband technologies. Some claim that the European model of service-based competition, induced by telephone-style regulation, has outperformed the facilities-based competition underlying the US approach to promoting broadband deployment. The mapping studies conducted by the US and the EU for 2011 and 2012 reveal that the US led the EU in many broadband metrics.

• High-Speed Access: A far greater percentage of US households had access to Next Generation Access (NGA) …


Leveraging Mining Demand For Internet And Telecommunications Infrastructure For Broad Economic Development: Models, Opportunities And Challenges, Perrine Toledano, Clara Roorda Jun 2014

Leveraging Mining Demand For Internet And Telecommunications Infrastructure For Broad Economic Development: Models, Opportunities And Challenges, Perrine Toledano, Clara Roorda

Columbia Center on Sustainable Investment Staff Publications

The initial phase of the Leveraging Mining-Related Infrastructure Investments for Development project consisted of a worldwide survey of regulatory, commercial and operating case studies of shared use of mining-related infrastructure. This Policy Paper delivers the findings for internet and telecommunications.


Competition Policy And The Technologies Of Information, Herbert J. Hovenkamp Jun 2014

Competition Policy And The Technologies Of Information, Herbert J. Hovenkamp

All Faculty Scholarship

When we speak about information and competition policy we are usually thinking about oral or written communications that have an anticompetitive potential, and mainly in the context of collusion of exclusionary threats. These are important topics. Indeed, among the most difficult problems that competition policy has had to confront over the years is understanding communications that can be construed as either threats to exclude or as offers to collude or facilitators of collusion.

My topic here, however, is the relationship between information technologies and competition policy. Technological change can both induce and undermine the use of information to facilitate anticompetitive …


Idaho Gag Law Hides Horrors Of Ag Industry, Lauren Carasik May 2014

Idaho Gag Law Hides Horrors Of Ag Industry, Lauren Carasik

Media Presence

No abstract provided.


Drones, Henry H. Perritt Jr., Eliot O. Sprague Apr 2014

Drones, Henry H. Perritt Jr., Eliot O. Sprague

All Faculty Scholarship

Abstract

Drone technology is evolving rapidly. Microdrones—what the FAA calls “sUAS”—already on the market at the $1,000 level, have the capability to supplement manned helicopters in support of public safety operations, news reporting, and powerline and pipeline patrol, when manned helicopter support is infeasible, untimely, or unsafe.

Larger drones–"machodrones”–are not yet available outside battlefield and counterterrorism spaces. Approximating the size of manned helicopters, but without pilots, or with human pilots being optional, their design is still in its infancy as designers await greater clarity in the regulatory requirements that will drive airworthiness certification.

This article evaluates drone technology and design …


Uk Defamation Act 2013: Key Changes, Kee Yang Low Mar 2014

Uk Defamation Act 2013: Key Changes, Kee Yang Low

Research Collection Yong Pung How School Of Law

The much awaited new legislation affecting English defamation law received Royal Assent in April 2013, ushering in changes substantive as well as cosmetic. Some of the substantive changes are radical and reflect the increasing emphasis on the right of freedom of expression. This comment deals with the key changes brought about by the new Defamation Act 2013.


Response To Questions In The First White Paper, 'Modernizing The Communications Act', Randolph J. May, Richard A. Epstein, Justin (Gus) Hurwitz, Daniel Lyons, James B. Speeta, Christopher S. Yoo Jan 2014

Response To Questions In The First White Paper, 'Modernizing The Communications Act', Randolph J. May, Richard A. Epstein, Justin (Gus) Hurwitz, Daniel Lyons, James B. Speeta, Christopher S. Yoo

All Faculty Scholarship

The House Energy and Commerce Committee has begun a process to review and update the Communications Act of 1934, last revised in any material way in 1996. As the Committee begins the review process, this paper responds to questions posed by the Committee that all relate, in fundamental ways, to the question: "What should a modern Communications Act look like?"


The Response advocates a "clean slate" approach under which the regulatory silos that characterize the current statute would be eliminated, along with almost all of the ubiquitous 'public interest' delegation of authority found throughout the Communications Act. The replacement regime …


Journalism Standards And "The Dark Arts": The U.K.'S Leveson Inquiry And The U.S. Media In The Age Of Surveillance, Lili Levi Jan 2014

Journalism Standards And "The Dark Arts": The U.K.'S Leveson Inquiry And The U.S. Media In The Age Of Surveillance, Lili Levi

Articles

No abstract provided.


Pinterest And Copyright's Safe Harbors For Internet Providers, Michael W. Carroll Jan 2014

Pinterest And Copyright's Safe Harbors For Internet Providers, Michael W. Carroll

Articles in Law Reviews & Other Academic Journals

Has the time come to substantially revise the Copyright Act to better adapt the law to the ever-evolving digital environment? A number of influential sources appear to think so. If their initiatives gain momentum, it will be important to consider lessons learned from the first such effort fifteen years ago when Congress made far-reaching changes to copyright law by extending the term of copyright for twenty years and by enacting a package of reform proposals known as the Digital Millennium Copyright Act (“DMCA”). This Article intertwines the story of one important provision of the DMCA - safe harbors for Internet …


Material Falsity In Defamation Cases: The Supreme Court's Call For Contextual Analysis, Charles D. Tobin, Leonard M. Niehoff Jan 2014

Material Falsity In Defamation Cases: The Supreme Court's Call For Contextual Analysis, Charles D. Tobin, Leonard M. Niehoff

Articles

In the book The Phantom Tollbooth, one of the characters, Milo, declares that he comes from a faraway land called Context. After a circuitous journey through many strange cities, bearing names that have meanings Milo struggles to understand, he finds himself back at home in his bedroom.

Context, by and large, is the home base for courts in defining the boundaries between actionable and nonactionable speech. Often, after circuitous travels through precedent and logic, courts meander back to the simple notion that the meaning and legal significance of words are determined by their context.


Common Sense And Key Questions, Stuart M. Benjamin Jan 2014

Common Sense And Key Questions, Stuart M. Benjamin

Faculty Scholarship

No abstract provided.


Did The National Security Agency Destroy The Prospects For Confidentiality And Privilege When Lawyers Store Clients' Files In The Cloud--And What, If Anything, Can Lawyers And Law Firms Realistically Do In Response?, Sarah Jane Hughes Jan 2014

Did The National Security Agency Destroy The Prospects For Confidentiality And Privilege When Lawyers Store Clients' Files In The Cloud--And What, If Anything, Can Lawyers And Law Firms Realistically Do In Response?, Sarah Jane Hughes

Articles by Maurer Faculty

No abstract provided.


Procedural Architecture Matters: Innovation Policy At The Federal Communications Commission, J. Brad Bernthal Jan 2014

Procedural Architecture Matters: Innovation Policy At The Federal Communications Commission, J. Brad Bernthal

Publications

This Article examines the puzzle of whether today's Federal Communications Commission ("FCC" or the "Agency") is institutionally suited to craft telecommunications innovation policy and, if not, what changes are needed to better equip the Agency to respond to twenty-first century realities. Evaluation of FCC innovation policy performance is stubbornly difficult. Some criticize the FCC as a brake on innovation yet, under the FCC's oversight, the United States' communications industry has become an innovative engine propelling the overall economy more than ever before. It is difficult to untangle whether the FCC deserves credit for helping usher in today's communications age, whether …


Aaron Swartz’S Fbi Files Jan 2014

Aaron Swartz’S Fbi Files

United States Department of Justice: Publications and Materials

Aaron Hillel Swartz (November 8, 1986 – January 11, 2013) was an American computer programmer, writer, political organizer and Internet Hacktivist.

Swartz was involved in the development of the web feed format RSS, the organization Creative Commons, the website framework web.py and the social news site, Reddit, in which he became a partner after its merger with his company, Infogami. Swartz's later work focused on sociology, civic awareness and activism.

He helped launch the Progressive Change Campaign Committee in 2009 to learn more about effective online activism. In 2010 he became a research fellow at Harvard University's Safra Research Lab …


Aaron Swartz’S Secret Service Files Jan 2014

Aaron Swartz’S Secret Service Files

United States Department of Justice: Publications and Materials

These documents concern the indictment in Massachusetts for downloading JSTOR content from MIT library network.

Parts 1 & 2 are included in the main document.

Additional files are linked below, as follows:

Part 3 (3 files) -- 379 pages, 4067 pages (spreadsheet), & 190 pages (photos)

Part 4 -- 1 page

Part 5 -- 1 page

Part 6 -- 1 page

Part 7 -- 7 pages

Part 8 -- 237,397 pages (yes)

Part 9 -- 90 pages

Part 10 -- 259 pages

Part 11 -- 17 pages

Part 12 -- (not released as of 9/29/2014)

Part 13 -- 254 pages …


Possible Paradigm Shifts In Broadband Policy, Christopher S. Yoo Jan 2014

Possible Paradigm Shifts In Broadband Policy, Christopher S. Yoo

All Faculty Scholarship

Debates over Internet policy tend to be framed by the way the Internet existed in the mid-1990s, when the Internet first became a mass-market phenomenon. At the risk of oversimplifying, the Internet was initially used by academics and tech-savvy early adopters to send email and browse the web over a personal computer connected to a telephone line via networks interconnected through in a limited way. Since then, the Internet has become much larger and more diverse in terms of users, applications, technologies, and business relationships. More recently, Internet growth has begun to slow both in terms of the number of …


Wickard For The Internet? Network Neutrality After Verizon V. Fcc, Christopher S. Yoo Jan 2014

Wickard For The Internet? Network Neutrality After Verizon V. Fcc, Christopher S. Yoo

All Faculty Scholarship

The D.C. Circuit’s January 2014 decision in Verizon v. FCC represented a major milestone in the debate over network neutrality that has dominated communications policy for the past decade. This article analyzes the implications of the D.C. Circuit’s ruling, beginning with a critique of the court’s ruling that section 706 of the Telecommunications Act of 1996 gave the Federal Communications Commission (FCC) the authority to mandate some form of network neutrality. Examination of the statute’s text, application of canons of construction such as ejusdem generis and noscitur a sociis, and a perusal of the statute’s legislative history all raise questions …


The Efficacy Of Cybersecurity Regulation, David Thaw Jan 2014

The Efficacy Of Cybersecurity Regulation, David Thaw

Articles

Cybersecurity regulation presents an interesting quandary where, because private entities possess the best information about threats and defenses, legislatures do – and should – deliberately encode regulatory capture into the rulemaking process. This relatively uncommon approach to administrative law, which I describe as Management-Based Regulatory Delegation, involves the combination of two legislative approaches to engaging private entities' expertise. This Article explores the wisdom of those choices by comparing the efficacy of such private sector engaged regulation with that of a more traditional, directive mode of regulating cybersecurity adopted by the state legislatures. My analysis suggests that a blend of these …


Surveillance At The Source, David Thaw Jan 2014

Surveillance At The Source, David Thaw

Articles

Contemporary discussion concerning surveillance focuses predominantly on government activity. These discussions are important for a variety of reasons, but generally ignore a critical aspect of the surveillance-harm calculus – the source from which government entities derive the information they use. The source of surveillance data is the information "gathering" activity itself, which is where harms like "chilling" of speech and behavior begin.

Unlike the days where satellite imaging, communications intercepts, and other forms of information gathering were limited to advanced law enforcement, military, and intelligence activities, private corporations now play a dominant role in the collection of information about individuals' …


Enlightened Regulatory Capture, David Thaw Jan 2014

Enlightened Regulatory Capture, David Thaw

Articles

Regulatory capture generally evokes negative images of private interests exerting excessive influence on government action to advance their own agendas at the expense of the public interest. There are some cases, however, where this conventional wisdom is exactly backwards. This Article explores the first verifiable case, taken from healthcare cybersecurity, where regulatory capture enabled regulators to harness private expertise to advance exclusively public goals. Comparing this example to other attempts at harnessing industry expertise reveals a set of characteristics under which regulatory capture can be used in the public interest. These include: 1) legislatively-mandated adoption of recommendations by an advisory …


Communications Privacy For And By Whom?, Ryan Calo Jan 2014

Communications Privacy For And By Whom?, Ryan Calo

Articles

A response to Professor Orin Kerr's The Next Generation Communications Privacy Act, which makes a series of quiet assumptions, however, that readers may find controversial.

First, the Article reads as though ECPA exists only to protect citizens from public officials. According to its text and to case law, however, ECPA also protects private citizens from one another in ways any new act should revisit.

Second, the Article assumes that society should address communications privacy with a statute, whereas specific experiences with ECPA suggest that the courts may be better suited to address communications privacy—for reasons Professor Kerr himself offers. …


Merger Review By The Federal Communications Commission: Comcast-Nbc Universal, Christopher S. Yoo Jan 2014

Merger Review By The Federal Communications Commission: Comcast-Nbc Universal, Christopher S. Yoo

All Faculty Scholarship

The Communications Act of 1934 created a dual review process in which mergers in the communications industry are reviewed by the Federal Communications Commission (FCC) as well as the antitrust authorities. Commentators have criticized dual review not only as costly and redundant, but also as subject to substantive and procedural abuse. The process of clearing the 2011 Comcast-NBC Universal merger provides a useful case study to examine whether such concerns are justified. A review of the empirical context reveals that the FCC intervened even though the relevant markets were not structured in a way that would ordinarily raise anticompetitive concerns. …


Artificial Meaning, Lawrence B. Solum Jan 2014

Artificial Meaning, Lawrence B. Solum

Georgetown Law Faculty Publications and Other Works

This Essay investigates the concept of artificial meaning, meanings produced by entities other than individual natural persons. That investigation begins in Part I with a preliminary inquiry into the meaning of “meaning,” in which the concept of meaning is disambiguated. The relevant sense of “meaning” for the purpose of this inquiry is captured by the idea of communicative content, although the phrase “linguistic meaning” is also a rough equivalent. Part II presents a thought experiment, The Chinese Intersection, which investigates the creation of artificial meaning produced by an AI that creates legal rules for the regulation of a hyper-complex conflux …


Zombies Among Us: Injunctions In Defamation Cases Come Back From The Dead, Jim Stewart, Leonard M. Niehoff Jan 2014

Zombies Among Us: Injunctions In Defamation Cases Come Back From The Dead, Jim Stewart, Leonard M. Niehoff

Articles

Here's a scary thought: an individual, unhappy with negative statements that have been made about him, sues for defamation and persuades the trial court to issue an injunction prohibiting the speaker from engaging in that speech again. An appellate court reviews the injunction and, in large measure, upholds it. This creepy scenario brings shudders to free speech and media advocates, who have long viewed such injunctions as prior restraints that the First Amendment forbids in all but the most extreme and extraordinary cases. As a recent decision from the Michigan Court of Appeals demonstrates, however, decades of United States Supreme …


Toward A Closer Integration Of Law And Computer Science, Christopher S. Yoo Jan 2014

Toward A Closer Integration Of Law And Computer Science, Christopher S. Yoo

All Faculty Scholarship

Legal issues increasingly arise in increasingly complex technological contexts. Prominent recent examples include the Stop Online Piracy Act (SOPA) and the Protect Intellectual Property Act (PIPA), network neutrality, the increasing availability of location information, and the NSA’s surveillance program. Other emerging issues include data privacy, online video distribution, patent policy, and spectrum policy. In short, the rapid rate of technological change has increasingly shown that law and engineering can no longer remain compartmentalized into separate spheres. The logical response would be to embed the interaction between law and policy deeper into the fabric of both fields. An essential step would …


Panel Iii: The Future Of The Press And Privacy, Amy Gajda, Clay Calvert, Tom Bivins, Amy Sanders, Stephen Ward Jan 2014

Panel Iii: The Future Of The Press And Privacy, Amy Gajda, Clay Calvert, Tom Bivins, Amy Sanders, Stephen Ward

Faculty Scholarship

No abstract provided.


Sender Side Transmission Rules For The Internet, Tejas N. Narechania, Tim Wu Jan 2014

Sender Side Transmission Rules For The Internet, Tejas N. Narechania, Tim Wu

Faculty Scholarship

Since 1966, the Federal Communications Commission has, one way or another, protected businesses that deliver services over the nation’s communications infrastructure. But in January 2014, the U.S. Court of Appeals for the D.C. Circuit struck down the FCC’s net neutrality rules contained in its 2010 Open Internet Order. FCC Chairman Tom Wheeler has since indicated that he will take up the D.C. Circuit’s invitation to implement rules that, consistent with historic practice, “will meet the court’s test for preventing improper blocking of and discrimination among Internet traffic.”

Chairman Wheeler’s statement invites an obvious question: presuming that the FCC wants …