Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

2011

Communications Law

Discipline
Institution
Publication
Publication Type
File Type

Articles 1 - 30 of 56

Full-Text Articles in Law

The Evolution Of The Us Drm Debate, 1987-2006, Bill D. Herman Nov 2011

The Evolution Of The Us Drm Debate, 1987-2006, Bill D. Herman

Bill D. Herman

Scholars who discuss copyright often observe that the voices for stronger copyright have more financial and political capital than their opponents and thus tend to win in Congress. While the playing field is still quite slanted toward stronger copyright, the politics around the issue are much messier and less predictable. This study, a detailed political and legislative history of the major proposals regarding copyright and digital rights management from 1987 to 2006, illustrates how this policy dynamic has changed so drastically. In 1987, there was no organized opposition to copyright’s expansion. By 2006, however, there was a substantial coalition of …


Echostar-Directv In The 2011 Technological And Competitive Climate, Peter J. White Oct 2011

Echostar-Directv In The 2011 Technological And Competitive Climate, Peter J. White

Peter J White

The birth of satellite television took place in the late 1970s, and since then, the Direct Broadcast Satellite (DBS) industry has grown to over 30 million subscribers. In 2008, DirecTV and EchoStar—the leaders in the DBS market—had 20.1 million and 13.8 million subscribers respectively. DBS networks work by broadcasting digital signals from medium- and high-power satellites (100 to 400 watts per transponder) to receiver dish antennas as small as 18 inches. These satellites are placed in geosynchronous orbits, which means that they are always in the same position relative to the rotating earth. In the United States, the Federal Communications …


Rationales For And Against Regulatory Involvement In Resolving Internet Interconnection Disputes, Rob Frieden Oct 2011

Rationales For And Against Regulatory Involvement In Resolving Internet Interconnection Disputes, Rob Frieden

Rob Frieden

Internet Service Providers (“ISPs”) provide end users with access to and from the Internet cloud. In addition to providing the first and last mile carriage of traffic, ISPs secure upstream access to sources of content telecommunications carriers typically a paid (transit), or barter (peering) basis. Because a single ISP operates in two separate segments of traffic routing, the terms and conditions of network interconnection and the degree of marketplace competition can vary greatly. In this double-sided market, ISPs typically have many transit and peering opportunities upstream to content providers, but downstream end users may have a limited choice of ISP …


Aiming At The Wrong Target: The Audience Targeting Test For Personal Jurisdiction In Internet Defamation Cases, Sarah H. Ludington Oct 2011

Aiming At The Wrong Target: The Audience Targeting Test For Personal Jurisdiction In Internet Defamation Cases, Sarah H. Ludington

Sarah H. Ludington

No abstract provided.


Transparency, Scrutiny And Responsiveness: Fashioning A Private Space Within The Information Society., Andrew D. Murray Oct 2011

Transparency, Scrutiny And Responsiveness: Fashioning A Private Space Within The Information Society., Andrew D. Murray

Professor Andrew D Murray

No abstract provided.


Reconsidering Antitrust's Goals, Maurice E. Stucke Sep 2011

Reconsidering Antitrust's Goals, Maurice E. Stucke

College of Law Faculty Scholarship

Antitrust policy today is an anomaly. On the one hand, antitrust is thriving internationally. On the other hand, antitrust’s influence has diminished domestically. Over the past thirty years, there have been fewer antitrust investigations and private actions. Today the Supreme Court complains about antitrust suits, and places greater faith in the antitrust function being subsumed in a regulatory framework. So what happened to the antitrust movement in the United States?

Two import factors contributed to antitrust policy’s domestic decline. The first is salience, especially the salience of the U.S. antitrust goals. In the past thirty years, enforcers and courts abandoned …


Should Posts On Social Networking Websites Be Considered "Printed Publications" Under Patent Law?, Xiaojing Li Sep 2011

Should Posts On Social Networking Websites Be Considered "Printed Publications" Under Patent Law?, Xiaojing Li

Xiaojing Li

The emergence of social networking websites imposes a challenge to patent law. Courts should not make a blanket assumption that everything posted on social websites constitute a printed publication. Rather, courts should adopt a refined multiple factor test to help the analysis. This proposal would result in a balance between private and public interests in an invention, and therefore help achieve the ultimate goal of patent law.


The Protection Of Digital Information And Prevention Of Its Unauthorized Access And Use In Criminal Law, Carrie Leonetti, Moonho Song Sep 2011

The Protection Of Digital Information And Prevention Of Its Unauthorized Access And Use In Criminal Law, Carrie Leonetti, Moonho Song

Carrie Leonetti

There are a number of valuable intangible properties that do not have specific legislation devoted to their criminal regulation and protection, which poses a vexing problem for the world’s legal systems, which have had an unsatisfactory track record in protecting valuable information over the course of the previous century, giving rise to the need for laws that specifically address issues related to the protection of the integrity of digital information-storage systems. This Article focuses on the protection of these intangibles, when they are stored within a computer system, from their unauthorized use by, or interference from, third parties.

The Article …


The Protection Of Digital Information And Prevention Of Its Unauthorized Access And Use In Criminal Law, Carrie Leonetti, Moonho Song Sep 2011

The Protection Of Digital Information And Prevention Of Its Unauthorized Access And Use In Criminal Law, Carrie Leonetti, Moonho Song

Carrie Leonetti

There are a number of valuable intangible properties that do not have specific legislation devoted to their criminal regulation and protection, which poses a vexing problem for the world’s legal systems, which have had an unsatisfactory track record in protecting valuable information over the course of the previous century, giving rise to the need for laws that specifically address issues related to the protection of the integrity of digital information-storage systems. This Article focuses on the protection of these intangibles, when they are stored within a computer system, from their unauthorized use by, or interference from, third parties.

The Article …


The Protection Of Digital Information And Prevention Of Its Unauthorized Access And Use In Criminal Law, Carrie Leonetti, Moonho S Sep 2011

The Protection Of Digital Information And Prevention Of Its Unauthorized Access And Use In Criminal Law, Carrie Leonetti, Moonho S

Carrie Leonetti

There are a number of valuable intangible properties that do not have specific legislation devoted to their criminal regulation and protection, which poses a vexing problem for the world’s legal systems, which have had an unsatisfactory track record in protecting valuable information over the course of the previous century, giving rise to the need for laws that specifically address issues related to the protection of the integrity of digital information-storage systems. This Article focuses on the protection of these intangibles, when they are stored within a computer system, from their unauthorized use by, or interference from, third parties.

The Article …


The Protection Of Digital Information And Prevention Of Its Unauthorized Access And Use In Criminal Law, Carrie Leonetti, Moonho Song Sep 2011

The Protection Of Digital Information And Prevention Of Its Unauthorized Access And Use In Criminal Law, Carrie Leonetti, Moonho Song

Carrie Leonetti

There are a number of valuable intangible properties that do not have specific legislation devoted to their criminal regulation and protection, which poses a vexing problem for the world’s legal systems, which have had an unsatisfactory track record in protecting valuable information over the course of the previous century, giving rise to the need for laws that specifically address issues related to the protection of the integrity of digital information-storage systems. This Article focuses on the protection of these intangibles, when they are stored within a computer system, from their unauthorized use by, or interference from, third parties.

The Article …


The Protection Of Digital Information And Prevention Of Its Unauthorized Access And Use In Criminal Law, Carrie Leonetti, Moonho Song Sep 2011

The Protection Of Digital Information And Prevention Of Its Unauthorized Access And Use In Criminal Law, Carrie Leonetti, Moonho Song

Carrie Leonetti

There are a number of valuable intangible properties that do not have specific legislation devoted to their criminal regulation and protection, which poses a vexing problem for the world’s legal systems, which have had an unsatisfactory track record in protecting valuable information over the course of the previous century, giving rise to the need for laws that specifically address issues related to the protection of the integrity of digital information-storage systems. This Article focuses on the protection of these intangibles, when they are stored within a computer system, from their unauthorized use by, or interference from, third parties.

The Article …


Network Neutrality: The Global Dimension, Pierre Larouche Sep 2011

Network Neutrality: The Global Dimension, Pierre Larouche

Pierre Larouche

This paper first sets out a framework for understanding network neutrality, by organizing the various issues raised in the course of the network neutrality debate. Secondly, recent US legal and regulatory initiatives are briefly reviewed. Thirdly, the situation under EU law is surveyed. Finally, the conclusion compares the two regulatory responses and considers how the global network neutrality debate could unfold. In the short term, ISPs must take measures to deal with imbalances and congestion on their networks. Beyond that, in the longer term, ISPs are looking to introduce differentiated Quality of Service (QoS) offerings, so as to turn their …


Ada And The Internet: Standardizing The Accessibility Of Web Sites, Laura Corcoran Aug 2011

Ada And The Internet: Standardizing The Accessibility Of Web Sites, Laura Corcoran

Laura Corcoran

The Department of Justice (DOJ) is currently considering what standards should be applied to commercial web sites to make online information and services accessible to people with disabilities. Should the overall performance of a website be the measuring standard, or would compliance with technical rules be a sufficient measure of web accessibility?

There are dangers in adopting technical standards in DOJ regulations. The process of updating regulations is slow and will not keep pace with changing technology. Accessibility issues involving detailed technical standards would likely deteriorate into battles about computer programming techniques. Compliance with technical standards does not necessarily guarantee …


The Public Life Of The Virtual Self, Ari E. Waldman Aug 2011

The Public Life Of The Virtual Self, Ari E. Waldman

Ari E Waldman

While the Internet has changed dramatically since the early 1990s, the legal regime governing online speech and liability is still steeped in an early myth of the Internet user, completely hidden from other Internet users, in total control of his online experience and free to come and go as he pleases. This false image of the “virtual self” has also contributed to an ethos of lawlessness, irresponsibility and radical individuation online, allowing hate and harassment to run wild. I argue that the myth of the online anonym is not only false as a matter of technology, but also inaccurate – …


Electromagnetic Pulse And The U.S. Food Security Paradigm: Assumptions, Risks, And Recommendations, Maximilian Leeds Aug 2011

Electromagnetic Pulse And The U.S. Food Security Paradigm: Assumptions, Risks, And Recommendations, Maximilian Leeds

Maximilian Leeds

This paper analyzes the systemic dangers posed to the U.S. economy by an electromagnetic pulse (EMP), either naturally occurring or maliciously generated, from a food security perspective. Section I examines the modern structure of the U.S. food supply chain, analyzing the just-in-time international distribution model and criticizing it as vulnerable to systemic shock and cascade failure. Section II examines the function and history of the electromagnetic pulse, assesses its potential to serve as a catalyst for systemic breakdown in the domestic food supply chain, and explores the current state of food security planning in the United States pertaining to this …


Cyberlaw 2.0, Jacqueline Lipton Aug 2011

Cyberlaw 2.0, Jacqueline Lipton

Jacqueline D Lipton

In the early days of the Internet, Judge Frank Easterbrook famously dismissed the idea of an emerging field of cyberspace law as akin to a “law of the horse”— a pastiche of unrelated legal principles tied together only by virtue of applying to the Internet, having no unifying principles that would teach us anything meaningful. This article revisits Easterbrook’s assertions with the benefit of hindsight. It suggests that subsequent case law and legislative developments in fact do support a distinct cyberlaw field. It introduces the novel argument that cyberlaw is a global “law of the intermediated information exchange.” In other …


The Prospects For Protecting News Content Under The Digital Millennium Copyright Act, Priya Barnes Aug 2011

The Prospects For Protecting News Content Under The Digital Millennium Copyright Act, Priya Barnes

Priya Barnes

The DMCA was enacted to provide adequate legal safeguards against piracy so that content producers, such as music, software, movie and other media producers, would be incentivized to embrace the digital medium. The antitrafficking provision, in particular, imposes civil and criminal sanctions on technology manufacturers who offer the means to circumvent content producers’ digital access controls.

Since its enactment, the DMCA’s antitrafficking provisions have been invoked against hackers of digital music, movies and software. This article weighs the prospects for applying the antitrafficking provisions against news aggregators who access password protected digital news content for redistribution. It concludes that while …


Information Overload, Multi-Tasking, And The Socially Networked Jury: Why Prosecutors Should Approach The Media Gingerly, Andrew Taslitz Aug 2011

Information Overload, Multi-Tasking, And The Socially Networked Jury: Why Prosecutors Should Approach The Media Gingerly, Andrew Taslitz

Andrew E. Taslitz

The rise of computer technology, the internet, rapid news dissemination, multi-tasking, and social networking have wrought changes in human psychology that alter how we process news media. More specifically, news coverage of high-profile trials necessarily focuses on emotionally-overwrought, attention-grabbing information disseminated to a public having little ability to process that information critically. The public’s capacity for empathy is likewise reduced, making it harder for trial processes to overcome the unfair prejudice created by the high-profile trial. Market forces magnify these changes. Free speech concerns limit the ability of the law to alter media coverage directly, and the tools available to …


Meet The New Scarcity: A First Amendment Framework For Regulating Access To Digital Media Platforms, John Blevins Aug 2011

Meet The New Scarcity: A First Amendment Framework For Regulating Access To Digital Media Platforms, John Blevins

John F. Blevins

Digital media platforms such as broadband networks and search engines are increasingly viewed as “gatekeepers” that enjoy disproportionate influence over modern speech. Policymakers have responded by adopting regulations to ensure nondiscriminatory access to these platforms. This article examines the intersection of these new access regulations with the First Amendment. The literature continues to analyze these questions through the lens of traditional media technologies such as newspapers and broadcast television. Digital networks, however, differ from these prior technologies in critical, qualitative ways. First Amendment analysis of access regulations must therefore be updated to reflect these technological differences. Specifically, it must recognize …


Student Journalists V. School Administrators: A More Structured Way To Resolve Disputes, Jonathan Peters Aug 2011

Student Journalists V. School Administrators: A More Structured Way To Resolve Disputes, Jonathan Peters

Jonathan Peters

Public schools have wrestled for decades with the boundaries of free expression. Although students do not enjoy the same First Amendment rights as adults, they do not shed those rights at the schoolhouse gate. Disputes between student journalists and school administrators are common, and because they take place in the school environment, they have the potential to be disruptive. Student journalists and school administrators need a structured way to address and resolve those disputes.


The Evolution Of Regulation: 20th Century Lessons And 21st Century Opportunities, John W. Mayo Jul 2011

The Evolution Of Regulation: 20th Century Lessons And 21st Century Opportunities, John W. Mayo

John W Mayo

Abstract: Reflections on the evolution of regulatory policies over the past half-century afford the ability to not only identify important drivers to this evolution, but also to identify elements of regulation and deregulation that have been most successful in practice. The common element of these successes has been that they are "results-based." Based on these successes, this paper develops a model of "results-based regulation" through the identification of a set of principles that can used to guide 21st century regulatory practice. A consideration of regulation in the modern telecommunications industry serves as a proof of concept for the model of …


Rationales For And Against Fcc Involvement In Resolving Internet Service Provider Interconnection Disputes, Rob M. Frieden Jul 2011

Rationales For And Against Fcc Involvement In Resolving Internet Service Provider Interconnection Disputes, Rob M. Frieden

Rob Frieden

Internet Service Providers (“ISPs”) provide end users with access to and from the Internet cloud. In addition to providing the first and last mile carriage of traffic, ISPs secure upstream access to sources of content via other ISPs typically on a paid (transit), or barter (peering) basis. Because a single ISP operates in two separate segments of traffic routing, both the terms and conditions of network interconnection and the degree of marketplace competition can vary greatly. In this double-sided market, ISPs typically have many transit and peering opportunities upstream to content providers, but downstream end users may have a limited …


Rationales For And Against Fcc Involvement In Resolving Internet Service Provider Interconnection Disputes, Rob M. Frieden Jul 2011

Rationales For And Against Fcc Involvement In Resolving Internet Service Provider Interconnection Disputes, Rob M. Frieden

Rob Frieden

Internet Service Providers (“ISPs”) provide end users with access to and from the Internet cloud. In addition to providing the first and last mile carriage of traffic, ISPs secure upstream access to sources of content via other ISPs typically on a paid (transit), or barter (peering) basis. Because a single ISP operates in two separate segments of traffic routing, both the terms and conditions of network interconnection and the degree of marketplace competition can vary greatly. In this double-sided market, ISPs typically have many transit and peering opportunities upstream to content providers, but downstream end users may have a limited …


From Bad To Worst: Assessing The Long Term Consequences Of Four Controversial Fcc Decisions, Rob Frieden Jul 2011

From Bad To Worst: Assessing The Long Term Consequences Of Four Controversial Fcc Decisions, Rob Frieden

Rob Frieden

Far too many major decisions of the Federal Communications Commission (“FCC”) rely on flawed assumptions about the current and future telecommunications marketplace. If the FCC incorrectly overstates the current state of competition, it risks exacerbating its mistake going forward if actual competition proves unsustainable, or lackluster. In many key decisions the FCC cited robust competition in current and future markets as the basis for decisions that relax restrictions on incumbents, abandon strategies for promoting competition, or apply statutory definitions of services that trigger limited government oversight. The Commission ignores the secondary and tertiary consequences of decisions that deprive it of …


Evaluating Public Access Ombuds Programs: An Analysis Of The Experiences Of Virginia, Iowa And Arizona In Creating And Implementing Ombuds Offices To Handle Disputes Arising Under Open Government Laws, Daxton R. Stewart Jun 2011

Evaluating Public Access Ombuds Programs: An Analysis Of The Experiences Of Virginia, Iowa And Arizona In Creating And Implementing Ombuds Offices To Handle Disputes Arising Under Open Government Laws, Daxton R. Stewart

Daxton "Chip" Stewart

Ombuds offices have been established in several states to oversee disputes arising under state open government laws. The author conducted case studies of three of these programs. Using Dispute Systems Design theory, this article analyzes the major themes uncovered in the case studies of Virginia’s Freedom of Information Advisory Council, created in 2000; Iowa’s public records and open meetings position in the state office of the Citizens’ Aide/Ombudsman, established in 2001; and Arizona’s assistant ombuds for public access, created in 2007 in the Ombudsman/Citizens’ Aide office. Results showed that the offices largely comported with the major goals of ombuds programs …


Snyder V. Phelps And The Death Of Intentional Infliction Of Emotional Distress As A Speech-Based Tort, W Wat Hopkins Ph.D. Jun 2011

Snyder V. Phelps And The Death Of Intentional Infliction Of Emotional Distress As A Speech-Based Tort, W Wat Hopkins Ph.D.

WW Hopkins Ph.D.

From New York Times Co. v. Sullivan through Hustler Magazine v. Falwell, the Supreme Court of the United States established a reasonable balance between the rights of private persons to be free from unwarranted verbal attacks by groups or persons whose primary goal was self aggrandizement. The framework for that protection was the tort of intentional infliction of emotional distress, which required plaintiffs to overcome an onerous burden of proof in order to prevail. In March 2011, however, the Court ruled in Snyder v. Phelps that the verbal attack of the Westboro Baptist Church against Albert Snyder during and after …


Tethering The Fcc: The Case Against Chevron Deference For Jurisdictional Claims, Daniel Lyons May 2011

Tethering The Fcc: The Case Against Chevron Deference For Jurisdictional Claims, Daniel Lyons

Daniel Lyons

No abstract provided.


Let Charities Speak: 501(C)(3) Charitable Organizations After Citizens United, Paul D. Weitzel May 2011

Let Charities Speak: 501(C)(3) Charitable Organizations After Citizens United, Paul D. Weitzel

Paul D. Weitzel

This paper argues that tax deductible charities have a constitutional right to speak about politics. 501(c)(3) organizations include all tax deductible charities, including religious groups. Citizens United v. Federal Election Commission abrogated the ban on political speech by 501(c)(3) organizations by rejecting the reasoning in Regan v. Taxation with Representation of Washington. Regan found that 501(c)(3) organizations could be prohibited from speaking because they would still be able to speak through affiliate organizations. Citizens United rejected this argument when applied to for-profit corporations, and that reasoning applies equally to non-profit organizations. Citizens United also rejected the distinction between subsidies and …


Hey! You! Get Off Of My Cloud: Defining And Protecting The Metes And Bounds Of Privacy, Security, And Property In Cloud Computing, Timothy D. Martin May 2011

Hey! You! Get Off Of My Cloud: Defining And Protecting The Metes And Bounds Of Privacy, Security, And Property In Cloud Computing, Timothy D. Martin

Timothy D Martin

Cloud computing is a growing force in today’s interconnected technological world. It allows people and organizations to purchase computing power and resources on an as-needed, pay-as-you-go basis. Users can employ it to satisfy modest needs, such as simple word-processing tasks, or to create large-scale enterprise applications delivered on the web. But cloud computing raises questions of functionality, security, confidentiality, ethics, enforcement, and data ownership. The lack of a clear body of law defining and regulating law enforcement’s access to electronic data and ability to prosecute related crimes creates other risks and erodes confidence in cloud computing. This paper begins with …