Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Series

Communications Law

2017

Institution
Keyword
Publication

Articles 1 - 20 of 20

Full-Text Articles in Law

An Unsung Success Story: A Forty-Year Retrospective On U.S. Communications Policy, Christopher S. Yoo Nov 2017

An Unsung Success Story: A Forty-Year Retrospective On U.S. Communications Policy, Christopher S. Yoo

All Faculty Scholarship

Looking backwards on the occasion of Telecommunications Policy’s fortieth anniversary reveals just how far U.S. communications policy has come. All of the major challenges of 1976, such as promoting competition in customer premises equipment, long distance, and television networking, have largely been overcome. Moreover, new issues that emerged later, such as competition in local telephone service and multichannel video program distribution, have also largely been solved. More often than not, the solution has been the result of structural changes that enhanced facilities-based competition rather than agency-imposed behavioral requirements. Moreover, close inspection reveals that in most cases, prodding by the courts …


Personal Data Protection Act 2012: Understanding The Consent Obligation, Man Yip Sep 2017

Personal Data Protection Act 2012: Understanding The Consent Obligation, Man Yip

Research Collection Yong Pung How School Of Law

The Personal Data Protection Act 20121 (“PDPA”) provides the baseline standards of protection of personal data and works in tandem with existing law to provide comprehensive protection. The birth of the legislation clearly signals Singapore’s commitment to protect the collection, use and disclosure of personal data in the age of big data and its awareness of the importance of such protection in strengthening Singapore’s position as a leading commercial hub. Significantly, the PDPA protection model balances “both the rights of individuals to protect their personal data” against “the needs of organisations to collect, use or disclose personal data for legitimate …


Data Collection And The Regulatory State, Hillary Green, James Cooper, Ahmed Ghappour, Felix Wu Sep 2017

Data Collection And The Regulatory State, Hillary Green, James Cooper, Ahmed Ghappour, Felix Wu

Articles

The following remarks were given on January 27, 2017 during the Connecticut Law Review's symposium, "Privacy, Security & Power: The State of Digital Surveillance."


Comments To The Federal Trade Commission On The Can-Spam Rule Review, 16 C.F.R. Part 316, Project No. R711010, Roger Allan Ford Aug 2017

Comments To The Federal Trade Commission On The Can-Spam Rule Review, 16 C.F.R. Part 316, Project No. R711010, Roger Allan Ford

Law Faculty Scholarship

These comments respond to the Federal Trade Commission’s request for public comment on the CAN-SPAM Rule, 16 C.F.R. Part 316.

The CAN-SPAM Act set a minimum baseline for consumer protections that senders of unsolicited commercial email must respect. These protections have been largely effective at giving consumers the ability to manage how a large group of companies uses their email addresses for marketing. At the same time, the Act has had little effect on the volume of unsolicited commercial email or on the amount of email sent by scammers and fraudsters. The Act and its implementing Rule, then, have been …


Mass Communication Law And Policy Research And The Values Of Free Expression, Edward L. Carter Jul 2017

Mass Communication Law And Policy Research And The Values Of Free Expression, Edward L. Carter

Faculty Publications

Mass communication law and policy research, including on values and theory of freedom of expression, has played an important role in Journalism & Mass Communication Quarterly for decades. Mass communication law research in Quarterly reached a high point with a special issue on the First Amendment in 1992 and numerous articles in the decade that followed. A relationship is explored between First Amendment theory and structural archetypes of constitutional argument. Future research could focus on international law and contemporary challenges involving technology, surveillance and changes in democratic citizenship.


In Re Akhbar Beirut & Al Amin, Monica Hakimi Jul 2017

In Re Akhbar Beirut & Al Amin, Monica Hakimi

Articles

On August 29, 2016, the Special Tribunal for Lebanon (Tribunal) sentenced a corporate media enterprise and one of its employees for contemptuously interfering with the Tribunal's proceedings in Ayyash, a prosecution concerning the February 2005 terrorist attack that killed former Lebanese Prime Minister Rafiq Hariri. The contempt decision is significant for two reasons: (1) it adopts an expansive definition of the crime of contempt to restrict a journalist's freedom of expression; and (2) it is the first international judicial decision to hold a corporate entity criminally responsible.


Fcc Comment: In The Matter Of Connect America Fund, Allen S. Hammond Iv May 2017

Fcc Comment: In The Matter Of Connect America Fund, Allen S. Hammond Iv

Broadband Institute of California

The Broadband Institute of California (BBIC) and the Broadband Regulatory Clinic of Santa Clara Law (BRC) petition the Commission to expressly consider the needs of rural tribal lands in promulgating regulations regarding spectrum allocated for the development of 5G technologies, and encourages the Commission to work with prospective auction participants, broadband service providers and tribal communities to develop 5G use cases targeting rural and tribal needs. Presently, barriers to broadband deployment across tribal lands include geographical isolation, low population densities, difficult terrain, and political fragmentation arising from tribal governance issues. The first portion of this Comment explains these particularly crippling …


The Commercial Difference, Felix T. Wu May 2017

The Commercial Difference, Felix T. Wu

Articles

When it comes to the First Amendment, commerciality does, and should, matter. This Article develops the view that the key distinguishing characteristic of corporate or commercial speech is that the interest at stake is “derivative,” in the sense that we care about the speech interest for reasons other than caring about the rights of the entity directly asserting a claim under the First Amendment. To say that the interest is derivative is not to say that it is unimportant, and one could find corporate and commercial speech interests to be both derivative and strong enough to apply heightened scrutiny to …


Rethinking Children's Advertising Policies For The Digital Age, Angela J. Campbell Jan 2017

Rethinking Children's Advertising Policies For The Digital Age, Angela J. Campbell

Georgetown Law Faculty Publications and Other Works

This article describes major changes in how video content and advertising is delivered to consumers. Digital technologies such as broadband allow consumers to stream or download programming. Smart phones and tablets allow consumers to view screen content virtually anywhere at any time. Advertising has become personalized and integrated with other content.

Despite these major changes in the media markets, the framework for regulating advertising to children has not changed very much since the 1990s. This article argues that the existing regulatory framework must be reinvented to protect children in the digital age. It uses Google’s recently introduced YouTube Kids app …


Nonsense You Say, Nicholas W. Allard Jan 2017

Nonsense You Say, Nicholas W. Allard

Faculty Scholarship

No abstract provided.


Notice And Standing In The Fourth Amendment: Searches Of Personal Data, Jennifer Daskal Jan 2017

Notice And Standing In The Fourth Amendment: Searches Of Personal Data, Jennifer Daskal

Articles in Law Reviews & Other Academic Journals

In at least two recent cases, courts have rejected service providers' capacity to raise Fourth Amendment claims on behalf of their customers. These holdings rely on longstanding Supreme Court doctrine establishing a general rule against third parties asserting the Fourth Amendment rights of others. However, there is a key difference between these two recent cases and those cases on which the doctrine rests. The relevant Supreme Court doctrine stems from situations in which someone could take action to raise the Fourth Amendment claim, even if the particular thirdparty litigant could not. In the situations presented by the recent cases, by …


Bankrupt Marketplace: First Amendment Theory And The 2016 Presidential Election, Leonard M. Niehoff Jan 2017

Bankrupt Marketplace: First Amendment Theory And The 2016 Presidential Election, Leonard M. Niehoff

Articles

In this article I advance two arguments. The first is that 2016 was a particularly important year for freedom of speech and the press, although not for conventional reasons. The second is that hte events of 2016 revealed that one of the essential components of our democracy - the central role that free expression plays in the democratic process - is in a state of serious dysfunction, if not crisis.


Indecency Four Years After Fox Television Stations: From Big Papi To A Porn Star, An Egregious Mess At The Fcc Continues, Clay Calvert, Minch Minchin, Keran Billaud, Kevin Bruckenstein, Tershone Phillips Jan 2017

Indecency Four Years After Fox Television Stations: From Big Papi To A Porn Star, An Egregious Mess At The Fcc Continues, Clay Calvert, Minch Minchin, Keran Billaud, Kevin Bruckenstein, Tershone Phillips

UF Law Faculty Publications

Using the WDBJ case as an analytical springboard, this article examines the tumultuous state of the FCC's indecency enforcement regime more than three years after the Supreme Court's June 2012 opinion in Fox Television Stations. Part I of this article briefly explores the missed First Amendment opportunities in Fox Television Stations, as well as some possible reasons why the Supreme Court chose to avoid the free-speech questions in that case." Part II addresses the FCC's decision in September 2012 to target only egregious instances of broadcast indecency and, in the process, to jettison hundreds of thousands of complaints that had …


The “Sovereigns Of Cyberspace” And State Action: The First Amendment’S Application (Or Lack Thereof) To Third-Party Platforms, Jonathan Peters Jan 2017

The “Sovereigns Of Cyberspace” And State Action: The First Amendment’S Application (Or Lack Thereof) To Third-Party Platforms, Jonathan Peters

Scholarly Works

Many scholars have commented that the state action doctrine forecloses use of the First Amendment to constrain the policies and practices of online service providers. But few have comprehensively studied this issue, and the seminal article exploring “[c]yberspace and the [s]tate [a]ction [d]ebate” is fifteen years old, published before the U.S. Supreme Court reformulated the federal approach to state action. It is important to give the state action doctrine regular scholarly attention, not least because it is increasingly clear that “the private sector has a shared responsibility to help safeguard free expression.” It is critical to understand whether the First …


How The United States Postal Service (Usps) Could Encourage More Local Economic Development, Randall K. Johnson Jan 2017

How The United States Postal Service (Usps) Could Encourage More Local Economic Development, Randall K. Johnson

Faculty Works

No abstract provided.


Cybersecurity Stovepiping, David Thaw Jan 2017

Cybersecurity Stovepiping, David Thaw

Articles

Most readers of this Article probably have encountered – and been frustrated by – password complexity requirements. Such requirements have become a mainstream part of contemporary culture: "the more complex your password is, the more secure you are, right?" So the cybersecurity experts tell us… and policymakers have accepted this "expertise" and even adopted such requirements into law and regulation.

This Article asks two questions. First, do complex passwords actually achieve the goals many experts claim? Does using the password "Tr0ub4dor&3" or the passphrase "correcthorsebatterystaple" actually protect your account? Second, if not, then why did such requirements become so widespread? …


Intentional Infliction Of Emotional Distress & The Hulk Hogan Sex Tape: Examining A Forgotten Cause Of Action In Bollea V. Gawker Media, The Gap It Reveals In Iied’S Constitutionalization, And A Path Forward For Revenge Porn Victims, Clay Calvert Jan 2017

Intentional Infliction Of Emotional Distress & The Hulk Hogan Sex Tape: Examining A Forgotten Cause Of Action In Bollea V. Gawker Media, The Gap It Reveals In Iied’S Constitutionalization, And A Path Forward For Revenge Porn Victims, Clay Calvert

UF Law Faculty Publications

This Article examines Hulk Hogan's successful, yet largely overlooked, cause of action for intentional infliction of emotional distress (IIED) before a Florida jury in 2016 in Bollea v. Gawker Media, LLC. In doing so, the Article explores critical factual differences between Bollea and the U.S. Supreme Court's two decisions constitutionalizing the IIED tort, Hustler Magazine v. Falwell and Snyder v. Phelps. Despite such distinctions, the Article discusses the trial court's instruction to the jury to consider a First Amendment-­based, public-concern defense - one closely akin to that in Snyder - on Hulk Hogan's IIED claim. The Article also …


Are Trump's Attacks On The Media Adversely Affecting Public Opinion?, Leonard M. Niehoff Jan 2017

Are Trump's Attacks On The Media Adversely Affecting Public Opinion?, Leonard M. Niehoff

Articles

Both during the election cycle and as president of the United States, Donald Trump has enthusiastically and aggressively attacked the media. On Twitter, in speeches, and at rallies he has repeatedly deployed his favorite “f words” against mainstream broadcast, print, and online news sources: “fake,” “fraudulent,” “failing,” and (phonetically) “phony.” Some attacks have been personal to individual journalists, some have been more institutionally focused, and some have been made in contexts that appeared to create physical risk to reporters who were present. But whatever the variation in lavors, the frequency of the attacks has remained constant. Indeed, Trump has devoted …


Lessons Learned Too Well: Anonymity In A Time Of Surveillance, A. Michael Froomkin Jan 2017

Lessons Learned Too Well: Anonymity In A Time Of Surveillance, A. Michael Froomkin

Articles

It is no longer reasonable to assume that electronic communications can be kept private from governments or private-sector actors. In theory, encryption can protect the content of such communications, and anonymity can protect the communicator's identity. But online anonymity-one of the two most important tools that protect online communicative freedom-is under practical and legal attack all over the world. Choke-point regulation, online identification requirements, and data-retention regulations combine to make anonymity very difficult as a practical matter and, in many countries, illegal. Moreover, key internet intermediaries further stifle anonymity by requiring users to disclose their real names.

This Article traces …


Debating Autonomous Weapon Systems, Their Ethics, And Their Regulation Under International Law, Kenneth Anderson, Matthew C. Waxman Jan 2017

Debating Autonomous Weapon Systems, Their Ethics, And Their Regulation Under International Law, Kenneth Anderson, Matthew C. Waxman

Faculty Scholarship

An international public debate over the law and ethics of autonomous weapon systems (AWS) has been underway since 2012, with those urging legal regulation of AWS under existing principles and requirements of the international law of armed conflict, on the one side, in argument with opponents who favor, instead, a preemptive international treaty ban on all such weapons, on the other. This Chapter provides an introduction to this international debate, offering the main arguments on each side. These include disputes over defining an AWS, the morality and law of automated targeting and target selection by machine, and the interaction of …