Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Series

Communications Law

2015

Institution
Keyword
Publication

Articles 1 - 20 of 20

Full-Text Articles in Law

Newsroom: Fcc's Sohn On Consumer Protection, Roger Williams University School Of Law Sep 2015

Newsroom: Fcc's Sohn On Consumer Protection, Roger Williams University School Of Law

Life of the Law School (1993- )

No abstract provided.


The 4th Annual Professor Anthony J. Santoro Business Law Lecture Series: Consumer Protection In The Broadband Era: The Role Of The Fcc, Roger Williams University School Of Law Sep 2015

The 4th Annual Professor Anthony J. Santoro Business Law Lecture Series: Consumer Protection In The Broadband Era: The Role Of The Fcc, Roger Williams University School Of Law

School of Law Conferences, Lectures & Events

No abstract provided.


Cloud Computing, Contractibility, And Network Architecture, Christopher S. Yoo Apr 2015

Cloud Computing, Contractibility, And Network Architecture, Christopher S. Yoo

All Faculty Scholarship

The emergence of the cloud is heightening the demands on the network in terms of bandwidth, ubiquity, reliability, latency, and route control. Unfortunately, the current architecture was not designed to offer full support for all of these services or to permit money to flow through it. Instead of modifying or adding specific services, the architecture could redesigned to make Internet services contractible by making the relevant information associated with these services both observable and verifiable. Indeed, several on-going research programs are exploring such strategies, including the NSF’s NEBULA, eXpressive Internet Architecture (XIA), ChoiceNet, and the IEEE’s Intercloud projects.


No. 9 - Cybersecurity And National Defense: Building A Public-Private Partnership, Rebecca H. White, C. Donald Johnson, Loch K. Johnson, Quentin E. Hodgson, Jamil Jaffer, Clete D. Johnson, Victoria Woodbine, Timothy L. Meyer, Adam Golodner, Barry Hensley, Andrea Matwyshyn, Jacob Olcott Apr 2015

No. 9 - Cybersecurity And National Defense: Building A Public-Private Partnership, Rebecca H. White, C. Donald Johnson, Loch K. Johnson, Quentin E. Hodgson, Jamil Jaffer, Clete D. Johnson, Victoria Woodbine, Timothy L. Meyer, Adam Golodner, Barry Hensley, Andrea Matwyshyn, Jacob Olcott

Occasional Papers Series

Organized and sponsored by the Dean Rusk Center for International Law and Policy, Cybersecurity and National Defense: Building a Public-Private Partnership was a daylong conference exploring issues related to the national security dimensions of cyber attacks as well as the role of the private sector in addressing cybersecurity risks. The overarching theme was the scope of public-private collaboration in addressing cybersecurity risks and the potential for future cooperation between government and the private sector. Clete D. Johnson, Chief Counsel for Cybersecurity at the Federal Communications Commission gave a lunchtime address on the FCC’s approach to communications security in the Internet …


Code Of Best Practices In Fair Use For The Visual Arts, College Art Association, Patricia Aufderheide, Peter Jaszi Feb 2015

Code Of Best Practices In Fair Use For The Visual Arts, College Art Association, Patricia Aufderheide, Peter Jaszi

Copyright, Fair Use, Scholarly Communication, etc.

The mission of the College Art Association (CAA) is to promote the visual arts and their understanding through advocacy, intellectual engagement, and a commitment to the diversity of practices and practitioners. CAA contributes to the visual arts profession as a whole through scholarly publications, advocacy, exchange of research and new work, and the development of standards and guidelines that reflect the best practices of the field. The Code of Best Practices in Fair Use for the Visual Arts is based on a consensus of professionals in the visual arts who use copyrighted images, texts, and other materials in their creative …


Abc V. Aereo And The Humble Judge, James Y. Stern Jan 2015

Abc V. Aereo And The Humble Judge, James Y. Stern

Faculty Publications

No abstract provided.


The Self, The Stasi, The Nsa: Privacy, Knowledge, And Complicity In The Surveillance State, Richard Warner, Robert H. Sloan Jan 2015

The Self, The Stasi, The Nsa: Privacy, Knowledge, And Complicity In The Surveillance State, Richard Warner, Robert H. Sloan

All Faculty Scholarship

We focus on privacy in public. The notion dates back over a century, at least to the work of the German sociologist, Georg Simmel. Simmel observed that people voluntarily limit their knowledge of each other as they interact in a wide variety of social and commercial roles, thereby making certain information private relative to the interaction even if it is otherwise publicly available. Current governmental surveillance in the US (and elsewhere) reduces privacy in public. But to what extent?

The question matters because adequate self-realization requires adequate privacy in public. That in turn depends on informational norms, social norms that …


Airbnb And The Housing Segment Of The Modern Sharing Economy: Are Short-Term Rental Restrictions An Unconstitutional Taking, Jamila Jefferson-Jones Jan 2015

Airbnb And The Housing Segment Of The Modern Sharing Economy: Are Short-Term Rental Restrictions An Unconstitutional Taking, Jamila Jefferson-Jones

Law Faculty Research Publications

No abstract provided.


Airbnb And The Housing Segment Of The Modern Sharing Economy: Are Short-Term Rental Restrictions An Unconstitutional Taking, Jamila Jefferson-Jones Jan 2015

Airbnb And The Housing Segment Of The Modern Sharing Economy: Are Short-Term Rental Restrictions An Unconstitutional Taking, Jamila Jefferson-Jones

Law Faculty Research Publications

No abstract provided.


The Un-Territoriality Of Data, Jennifer Daskal Jan 2015

The Un-Territoriality Of Data, Jennifer Daskal

Articles in Law Reviews & Other Academic Journals

Territoriality looms large in our jurisprudence, particularly as it relates to the government’s authority to search and seize. Fourth Amendment rights turn on whether the search or seizure takes place territorially or extraterritorially; the government’s surveillance authorities depend on whether the target is located within the United States or without; and courts’ warrant jurisdiction extends, with limited exceptions, only to the borders’ edge. Yet the rise of electronic data challenges territoriality at its core. Territoriality, after all, depends on the ability to define the relevant “here” and “there,” and it presumes that the “here” and “there” have normative significance. The …


Taming The "Feral Beast": Cautionary Lessons From British Press Reform, Lili Levi Jan 2015

Taming The "Feral Beast": Cautionary Lessons From British Press Reform, Lili Levi

Articles

No abstract provided.


The Cycles Of Global Telecommunication Censorship And Surveillance, Jonathon Penney Jan 2015

The Cycles Of Global Telecommunication Censorship And Surveillance, Jonathon Penney

Articles, Book Chapters, & Popular Press

Internet censorship and surveillance is on the rise globally and cyber-warfare increasing in scope and intensity. To help understand these new threats commentators have grasped at historical analogies often with little regard for historical complexity or international perspective. Unfortunately, helpful new works on telecommunications history have focused primarily on U.S. history with little focus on international developments. There is thus a need for further internationally oriented investigation of telecommunications technologies, and their history. This essay attempts to help fill that void, drawing on case studies wherein global telecommunications technologies have been disrupted or censored — telegram censorship and surveillance, high …


Keeping The State’S Secrets: Ireland’S Road From ‘Official’ Secrets To Freedom Of Information, Michael Foley Jan 2015

Keeping The State’S Secrets: Ireland’S Road From ‘Official’ Secrets To Freedom Of Information, Michael Foley

Books/Book chapters

The introduction of the Freedom of Information act in Ireland in 1997 was a profound change for a state, a civil service and political system far more comfortable with official secrets. It has had a transformational effect on relations between citizen and the state, and has been useful for journalists despite many challenges. After its introduction it was then amended, with high costs and limitations imposed. It has subsequently been amended again to restore much of its previous powers.


Cyber Espionage Or Cyber War?: International Law, Domestic Law, And Self-Protective Measures, Christopher S. Yoo Jan 2015

Cyber Espionage Or Cyber War?: International Law, Domestic Law, And Self-Protective Measures, Christopher S. Yoo

All Faculty Scholarship

Scholars have spent considerable effort determining how the law of war (particularly jus ad bellum and jus in bello) applies to cyber conflicts, epitomized by the Tallinn Manual on the International Law Applicable to Cyber Warfare. Many prominent cyber operations fall outside the law of war, including the surveillance programs that Edward Snowden has alleged were conducted by the National Security Agency, the distributed denial of service attacks launched against Estonia and Georgia in 2007 and 2008, the 2008 Stuxnet virus designed to hinder the Iranian nuclear program, and the unrestricted cyber warfare described in the 1999 book by …


Data Breach (Regulatory) Effects, David Thaw Jan 2015

Data Breach (Regulatory) Effects, David Thaw

Articles

No abstract provided.


Reasonable Expectations Of Privacy Settings: Social Media And The Stored Communications Act, David Thaw, Christopher Borchert, Fernando Pinguelo Jan 2015

Reasonable Expectations Of Privacy Settings: Social Media And The Stored Communications Act, David Thaw, Christopher Borchert, Fernando Pinguelo

Articles

In 1986, Congress passed the Stored Communications Act (“SCA”) to provide additional protections for individuals’ private communications content held in electronic storage by third parties. Acting out of direct concern for the implications of the Third-Party Records Doctrine — a judicially created doctrine that generally eliminates Fourth Amendment protections for information entrusted to third parties — Congress sought to tailor the SCA to electronic communications sent via and stored by third parties. Yet, because Congress crafted the SCA with language specific to the technology of 1986, courts today have struggled to apply the SCA consistently with regard to similar private …


A Market-Oriented Analysis Of The 'Terminating Access Monopoly' Concept, Jonathan E. Nuechterlein, Christopher S. Yoo Jan 2015

A Market-Oriented Analysis Of The 'Terminating Access Monopoly' Concept, Jonathan E. Nuechterlein, Christopher S. Yoo

All Faculty Scholarship

Policymakers have long invoked the concept of a “terminating access monopoly” to inform communications policy. Roughly speaking, the concept holds that a consumer-facing network provider, no matter how small or how subject to retail competition, generally possesses monopoly power vis-à-vis third-party senders of communications traffic to its customers. Regulators and advocates have routinely cited that concern to justify regulatory intervention in a variety of contexts where the regulated party may or may not have possessed market power in any relevant retail market.

Despite the centrality of the terminating access monopoly to modern communications policy, there is surprisingly little academic literature …


Moore’S Law, Metcalfe’S Law, And The Theory Of Optimal Interoperability, Christopher S. Yoo Jan 2015

Moore’S Law, Metcalfe’S Law, And The Theory Of Optimal Interoperability, Christopher S. Yoo

All Faculty Scholarship

Many observers attribute the Internet’s success to two principles: Moore’s Law and Metcalfe’s Law. These precepts are often cited to support claims that larger networks are inevitably more valuable and that costs in a digital environment always decrease. This Article offers both a systematic description of both laws and then challenges the conventional wisdom by exploring their conceptual limitations. It also explores how alternative mechanisms, such as gateways and competition, can permit the realization benefits typically attributed to Moore’s Law and Metcalfe’s Law without requiring increases in network size.


The Dawn Of Social Intelligence (Socint), Laura K. Donohue Jan 2015

The Dawn Of Social Intelligence (Socint), Laura K. Donohue

Georgetown Law Faculty Publications and Other Works

More information about citizens’ lives is recorded than ever before. Because the data is digitized, it can be accessed, analyzed, shared, and combined with other information to generate new knowledge. In a post-9/‌11 environment, the legal standards impeding access to such data have fallen. Simultaneously, the advent of global communications and cloud computing, along with network convergence, have expanded the scope of information available. The U.S. government has begun to collect and to analyze the associated data.

The result is the emergence of what can be termed “social intelligence” (SOCINT), which this Article defines as the collection of digital data …


Ethics For Media Lawyers: The Lessons Of Ferguson, Leonard M. Niehoff Jan 2015

Ethics For Media Lawyers: The Lessons Of Ferguson, Leonard M. Niehoff

Articles

Ferguson, Missouri, has a population of roughly 21,000 people. Thirty cities in Missouri have larger populations. The Edward Jones Dome, where the St. Louis Rams play football, seats three times as many people. Most of us had never heard of Ferguson prior to August 9, 2014, when a police oficer named Darren Wilson shot and killed an unarmed black teenager named Michael Brown. But, to paraphrase the grim observation of Ambrose Bierce, war is how Americans learn geography. So, as violence and vandalism erupted on its streets, the nation turned its attention toward Ferguson and labored to understand the place, …