Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- University of Michigan Law School (3)
- University of Florida Levin College of Law (2)
- American University Washington College of Law (1)
- Brigham Young University (1)
- Brooklyn Law School (1)
-
- Columbia Law School (1)
- Georgetown University Law Center (1)
- Santa Clara Law (1)
- Singapore Management University (1)
- University of Georgia School of Law (1)
- University of Miami Law School (1)
- University of Missouri-Kansas City School of Law (1)
- University of New Hampshire (1)
- University of Pennsylvania Carey Law School (1)
- University of Pittsburgh School of Law (1)
- Yeshiva University, Cardozo School of Law (1)
- Keyword
-
- FCC (3)
- Media (2)
- Privacy (2)
- Technology (2)
- AI (1)
-
- AWS (1)
- Advertising (1)
- Antimedia sentiment (1)
- Antimedia violence (1)
- Artificial intelligence (1)
- Autonomous weapon systems (1)
- Bollea v. Gawker (1)
- Broadband (1)
- Broadcasting (1)
- CAN-SPAM Act (1)
- Cable (1)
- Children (1)
- Communications Law (1)
- Communications law (1)
- Competition (1)
- Consent (1)
- Constitutional argument (1)
- Constitutional law (1)
- Contempt (1)
- Criminal Law (1)
- Customer premises equipment (1)
- Cybersecurity (1)
- Data breach (1)
- Data encryption (1)
- Data protection (1)
Articles 1 - 19 of 19
Full-Text Articles in Law
An Unsung Success Story: A Forty-Year Retrospective On U.S. Communications Policy, Christopher S. Yoo
An Unsung Success Story: A Forty-Year Retrospective On U.S. Communications Policy, Christopher S. Yoo
All Faculty Scholarship
Looking backwards on the occasion of Telecommunications Policy’s fortieth anniversary reveals just how far U.S. communications policy has come. All of the major challenges of 1976, such as promoting competition in customer premises equipment, long distance, and television networking, have largely been overcome. Moreover, new issues that emerged later, such as competition in local telephone service and multichannel video program distribution, have also largely been solved. More often than not, the solution has been the result of structural changes that enhanced facilities-based competition rather than agency-imposed behavioral requirements. Moreover, close inspection reveals that in most cases, prodding by the courts …
Personal Data Protection Act 2012: Understanding The Consent Obligation, Man Yip
Personal Data Protection Act 2012: Understanding The Consent Obligation, Man Yip
Research Collection Yong Pung How School Of Law
The Personal Data Protection Act 20121 (“PDPA”) provides the baseline standards of protection of personal data and works in tandem with existing law to provide comprehensive protection. The birth of the legislation clearly signals Singapore’s commitment to protect the collection, use and disclosure of personal data in the age of big data and its awareness of the importance of such protection in strengthening Singapore’s position as a leading commercial hub. Significantly, the PDPA protection model balances “both the rights of individuals to protect their personal data” against “the needs of organisations to collect, use or disclose personal data for legitimate …
Comments To The Federal Trade Commission On The Can-Spam Rule Review, 16 C.F.R. Part 316, Project No. R711010, Roger Allan Ford
Comments To The Federal Trade Commission On The Can-Spam Rule Review, 16 C.F.R. Part 316, Project No. R711010, Roger Allan Ford
Law Faculty Scholarship
These comments respond to the Federal Trade Commission’s request for public comment on the CAN-SPAM Rule, 16 C.F.R. Part 316.
The CAN-SPAM Act set a minimum baseline for consumer protections that senders of unsolicited commercial email must respect. These protections have been largely effective at giving consumers the ability to manage how a large group of companies uses their email addresses for marketing. At the same time, the Act has had little effect on the volume of unsolicited commercial email or on the amount of email sent by scammers and fraudsters. The Act and its implementing Rule, then, have been …
Mass Communication Law And Policy Research And The Values Of Free Expression, Edward L. Carter
Mass Communication Law And Policy Research And The Values Of Free Expression, Edward L. Carter
Faculty Publications
Mass communication law and policy research, including on values and theory of freedom of expression, has played an important role in Journalism & Mass Communication Quarterly for decades. Mass communication law research in Quarterly reached a high point with a special issue on the First Amendment in 1992 and numerous articles in the decade that followed. A relationship is explored between First Amendment theory and structural archetypes of constitutional argument. Future research could focus on international law and contemporary challenges involving technology, surveillance and changes in democratic citizenship.
In Re Akhbar Beirut & Al Amin, Monica Hakimi
In Re Akhbar Beirut & Al Amin, Monica Hakimi
Articles
On August 29, 2016, the Special Tribunal for Lebanon (Tribunal) sentenced a corporate media enterprise and one of its employees for contemptuously interfering with the Tribunal's proceedings in Ayyash, a prosecution concerning the February 2005 terrorist attack that killed former Lebanese Prime Minister Rafiq Hariri. The contempt decision is significant for two reasons: (1) it adopts an expansive definition of the crime of contempt to restrict a journalist's freedom of expression; and (2) it is the first international judicial decision to hold a corporate entity criminally responsible.
Fcc Comment: In The Matter Of Connect America Fund, Allen S. Hammond Iv
Fcc Comment: In The Matter Of Connect America Fund, Allen S. Hammond Iv
Broadband Institute of California
The Broadband Institute of California (BBIC) and the Broadband Regulatory Clinic of Santa Clara Law (BRC) petition the Commission to expressly consider the needs of rural tribal lands in promulgating regulations regarding spectrum allocated for the development of 5G technologies, and encourages the Commission to work with prospective auction participants, broadband service providers and tribal communities to develop 5G use cases targeting rural and tribal needs. Presently, barriers to broadband deployment across tribal lands include geographical isolation, low population densities, difficult terrain, and political fragmentation arising from tribal governance issues. The first portion of this Comment explains these particularly crippling …
The Commercial Difference, Felix T. Wu
The Commercial Difference, Felix T. Wu
Articles
When it comes to the First Amendment, commerciality does, and should, matter. This Article develops the view that the key distinguishing characteristic of corporate or commercial speech is that the interest at stake is “derivative,” in the sense that we care about the speech interest for reasons other than caring about the rights of the entity directly asserting a claim under the First Amendment. To say that the interest is derivative is not to say that it is unimportant, and one could find corporate and commercial speech interests to be both derivative and strong enough to apply heightened scrutiny to …
Rethinking Children's Advertising Policies For The Digital Age, Angela J. Campbell
Rethinking Children's Advertising Policies For The Digital Age, Angela J. Campbell
Georgetown Law Faculty Publications and Other Works
This article describes major changes in how video content and advertising is delivered to consumers. Digital technologies such as broadband allow consumers to stream or download programming. Smart phones and tablets allow consumers to view screen content virtually anywhere at any time. Advertising has become personalized and integrated with other content.
Despite these major changes in the media markets, the framework for regulating advertising to children has not changed very much since the 1990s. This article argues that the existing regulatory framework must be reinvented to protect children in the digital age. It uses Google’s recently introduced YouTube Kids app …
Notice And Standing In The Fourth Amendment: Searches Of Personal Data, Jennifer Daskal
Notice And Standing In The Fourth Amendment: Searches Of Personal Data, Jennifer Daskal
Articles in Law Reviews & Other Academic Journals
In at least two recent cases, courts have rejected service providers' capacity to raise Fourth Amendment claims on behalf of their customers. These holdings rely on longstanding Supreme Court doctrine establishing a general rule against third parties asserting the Fourth Amendment rights of others. However, there is a key difference between these two recent cases and those cases on which the doctrine rests. The relevant Supreme Court doctrine stems from situations in which someone could take action to raise the Fourth Amendment claim, even if the particular thirdparty litigant could not. In the situations presented by the recent cases, by …
Nonsense You Say, Nicholas W. Allard
Intentional Infliction Of Emotional Distress & The Hulk Hogan Sex Tape: Examining A Forgotten Cause Of Action In Bollea V. Gawker Media, The Gap It Reveals In Iied’S Constitutionalization, And A Path Forward For Revenge Porn Victims, Clay Calvert
UF Law Faculty Publications
This Article examines Hulk Hogan's successful, yet largely overlooked, cause of action for intentional infliction of emotional distress (IIED) before a Florida jury in 2016 in Bollea v. Gawker Media, LLC. In doing so, the Article explores critical factual differences between Bollea and the U.S. Supreme Court's two decisions constitutionalizing the IIED tort, Hustler Magazine v. Falwell and Snyder v. Phelps. Despite such distinctions, the Article discusses the trial court's instruction to the jury to consider a First Amendment-based, public-concern defense - one closely akin to that in Snyder - on Hulk Hogan's IIED claim. The Article also …
Bankrupt Marketplace: First Amendment Theory And The 2016 Presidential Election, Leonard M. Niehoff
Bankrupt Marketplace: First Amendment Theory And The 2016 Presidential Election, Leonard M. Niehoff
Articles
In this article I advance two arguments. The first is that 2016 was a particularly important year for freedom of speech and the press, although not for conventional reasons. The second is that hte events of 2016 revealed that one of the essential components of our democracy - the central role that free expression plays in the democratic process - is in a state of serious dysfunction, if not crisis.
Are Trump's Attacks On The Media Adversely Affecting Public Opinion?, Leonard M. Niehoff
Are Trump's Attacks On The Media Adversely Affecting Public Opinion?, Leonard M. Niehoff
Articles
Both during the election cycle and as president of the United States, Donald Trump has enthusiastically and aggressively attacked the media. On Twitter, in speeches, and at rallies he has repeatedly deployed his favorite “f words” against mainstream broadcast, print, and online news sources: “fake,” “fraudulent,” “failing,” and (phonetically) “phony.” Some attacks have been personal to individual journalists, some have been more institutionally focused, and some have been made in contexts that appeared to create physical risk to reporters who were present. But whatever the variation in lavors, the frequency of the attacks has remained constant. Indeed, Trump has devoted …
Indecency Four Years After Fox Television Stations: From Big Papi To A Porn Star, An Egregious Mess At The Fcc Continues, Clay Calvert, Minch Minchin, Keran Billaud, Kevin Bruckenstein, Tershone Phillips
Indecency Four Years After Fox Television Stations: From Big Papi To A Porn Star, An Egregious Mess At The Fcc Continues, Clay Calvert, Minch Minchin, Keran Billaud, Kevin Bruckenstein, Tershone Phillips
UF Law Faculty Publications
Using the WDBJ case as an analytical springboard, this article examines the tumultuous state of the FCC's indecency enforcement regime more than three years after the Supreme Court's June 2012 opinion in Fox Television Stations. Part I of this article briefly explores the missed First Amendment opportunities in Fox Television Stations, as well as some possible reasons why the Supreme Court chose to avoid the free-speech questions in that case." Part II addresses the FCC's decision in September 2012 to target only egregious instances of broadcast indecency and, in the process, to jettison hundreds of thousands of complaints that had …
How The United States Postal Service (Usps) Could Encourage More Local Economic Development, Randall K. Johnson
How The United States Postal Service (Usps) Could Encourage More Local Economic Development, Randall K. Johnson
Faculty Works
No abstract provided.
Lessons Learned Too Well: Anonymity In A Time Of Surveillance, A. Michael Froomkin
Lessons Learned Too Well: Anonymity In A Time Of Surveillance, A. Michael Froomkin
Articles
It is no longer reasonable to assume that electronic communications can be kept private from governments or private-sector actors. In theory, encryption can protect the content of such communications, and anonymity can protect the communicator's identity. But online anonymity-one of the two most important tools that protect online communicative freedom-is under practical and legal attack all over the world. Choke-point regulation, online identification requirements, and data-retention regulations combine to make anonymity very difficult as a practical matter and, in many countries, illegal. Moreover, key internet intermediaries further stifle anonymity by requiring users to disclose their real names.
This Article traces …
Debating Autonomous Weapon Systems, Their Ethics, And Their Regulation Under International Law, Kenneth Anderson, Matthew C. Waxman
Debating Autonomous Weapon Systems, Their Ethics, And Their Regulation Under International Law, Kenneth Anderson, Matthew C. Waxman
Faculty Scholarship
An international public debate over the law and ethics of autonomous weapon systems (AWS) has been underway since 2012, with those urging legal regulation of AWS under existing principles and requirements of the international law of armed conflict, on the one side, in argument with opponents who favor, instead, a preemptive international treaty ban on all such weapons, on the other. This Chapter provides an introduction to this international debate, offering the main arguments on each side. These include disputes over defining an AWS, the morality and law of automated targeting and target selection by machine, and the interaction of …
The “Sovereigns Of Cyberspace” And State Action: The First Amendment’S Application (Or Lack Thereof) To Third-Party Platforms, Jonathan Peters
The “Sovereigns Of Cyberspace” And State Action: The First Amendment’S Application (Or Lack Thereof) To Third-Party Platforms, Jonathan Peters
Scholarly Works
Many scholars have commented that the state action doctrine forecloses use of the First Amendment to constrain the policies and practices of online service providers. But few have comprehensively studied this issue, and the seminal article exploring “[c]yberspace and the [s]tate [a]ction [d]ebate” is fifteen years old, published before the U.S. Supreme Court reformulated the federal approach to state action. It is important to give the state action doctrine regular scholarly attention, not least because it is increasingly clear that “the private sector has a shared responsibility to help safeguard free expression.” It is critical to understand whether the First …
Cybersecurity Stovepiping, David Thaw
Cybersecurity Stovepiping, David Thaw
Articles
Most readers of this Article probably have encountered – and been frustrated by – password complexity requirements. Such requirements have become a mainstream part of contemporary culture: "the more complex your password is, the more secure you are, right?" So the cybersecurity experts tell us… and policymakers have accepted this "expertise" and even adopted such requirements into law and regulation.
This Article asks two questions. First, do complex passwords actually achieve the goals many experts claim? Does using the password "Tr0ub4dor&3" or the passphrase "correcthorsebatterystaple" actually protect your account? Second, if not, then why did such requirements become so widespread? …