Open Access. Powered by Scholars. Published by Universities.®

Communications Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Communications Law

2015

Articles 1 - 29 of 29

Full-Text Articles in Communications Law

Internet Governance Is Our Shared Responsibility, Vinton Cerf, Patrick Ryan, Max Senges Dec 2015

Internet Governance Is Our Shared Responsibility, Vinton Cerf, Patrick Ryan, Max Senges

Patrick T. Ryan

This essay looks at the the different roles that institutions play in the Internet governance ecosystem. We propose a model for thinking of Internet governance within the context of the layered model of the Internet. We use the example of the negotiations in Dubai in 2102 at the World Conference on International Telecommunications to show why it is important for different institutions within the governance system to focus on their areas of expertise (e.g., the ITU, ICANN, and IGF). Several areas of conflict are reviewed, such as the desire to promote more broadband infrastructure (a topic that is in the …


Regulating Interconnection (Lightly!), Daniel A. Lyons Oct 2015

Regulating Interconnection (Lightly!), Daniel A. Lyons

Daniel Lyons

No abstract provided.


Users' Patronage: The Return Of The Gift In The "Crowd Society", Giancarlo F. Frosio Sep 2015

Users' Patronage: The Return Of The Gift In The "Crowd Society", Giancarlo F. Frosio

Giancarlo Francesco Frosio

In this work, I discuss the tension between gift and market economy throughout the history of creativity. For millennia, the production of creative artifacts has lain at the intersection between gift and market economy. From the time of Pindar and Simonides – and until the Romanticism will commence a process leading to the complete commodification of creative artifacts – market exchange models run parallel to gift exchange. From Roman amicitia to the medieval and Renaissance belief that “scientia donum dei est, unde vendi non potest,” creativity has been repeatedly construed as a gift. Again, at the time of the British …


The Constitutional Considerations Of Multiple Media Ownership Regulation By The Federal Communications Commission, Jon L. Mills, John Moynahan, Richard Perlini, George Mcclure Aug 2015

The Constitutional Considerations Of Multiple Media Ownership Regulation By The Federal Communications Commission, Jon L. Mills, John Moynahan, Richard Perlini, George Mcclure

Jon L. Mills

Promoting the dissemination of diverse ideas with a minimum of governmental interference is the goal of the first amendment in protecting free press and free media. This goal is implicit in the public interest mandate of the Communications Act of 1934. A precise balance between restraint and diversity in first amendment policy appears impossible, but the process of decision should reflect both, with deference to restraint where possible. The Federal Communication Commission's Order in Docket 18110 failed to strike such a balance; any future action regarding cross-ownership of broadcast stations by newspapers would benefit by an increased recognition of the …


Constitutional Law - Due Process Clause - The Due Process Clause Of The Fifth Amendment Requires Fair Notice Of What Violates Federal Indecency Standards, Jon L. Mills Aug 2015

Constitutional Law - Due Process Clause - The Due Process Clause Of The Fifth Amendment Requires Fair Notice Of What Violates Federal Indecency Standards, Jon L. Mills

Jon L. Mills

Casenote regarding Fed. Commc’ns Comm’n v. Fox Television Stations, Inc., 132 S. Ct. 2307 (2012).


The Shaky Ground Of The Right To Be Delisted, Miquel Peguera Aug 2015

The Shaky Ground Of The Right To Be Delisted, Miquel Peguera

Miquel Peguera

It has long been discussed whether individuals should have a “right to be forgotten” online to suppress old information that could seriously interfere with their privacy and data protection rights. In the landmark case of Google Spain v AEPD, the Court of Justice of the European Union addressed the particular question of whether, under EU Data Protection Law, individuals have a right to have links delisted from the list of search results, in searches made on the basis of their name. It found that they do have this right – which can be best described as a “right to be …


The Doctrinal Toll Of "Information As Speech", Kyle Langvardt Aug 2015

The Doctrinal Toll Of "Information As Speech", Kyle Langvardt

Kyle Langvardt

The courts over the past two decades have reached a near-consensus that computer code, along with virtually every flow of data on the Internet, is “speech” for First Amendment purposes. Today, newer information technologies such as 3D printing, synthetic biology, and digital currencies promise to remake whole other spheres of non-expressive economic activity in the Internet's image. The rush to claim First Amendment protections for these non-expressive but code-dependent technologies has already begun with a lawsuit claiming First Amendment privileges for the Internet distribution of 3D-printable guns. Many similar suits will surely follow, all pursuing the common dream of a …


The Evolution Of Internet Service Providers From Partners To Adversaries: Tracking Shifts In Interconnection Goals And Strategies In The Internet’S Fifth Generation, Rob Frieden Jul 2015

The Evolution Of Internet Service Providers From Partners To Adversaries: Tracking Shifts In Interconnection Goals And Strategies In The Internet’S Fifth Generation, Rob Frieden

Rob Frieden

At the Internet’s inception, carriers providing the bit switching and transmission function largely embraced expanding connections and users as a primary service goal. These ventures refrained from metering traffic and charging for carriage based on the assumption that traffic volumes roughly matched, or that traffic measurement was not worth the bother in light of external funding from government grants. Most Internet Service Providers (“ISPs”) bartered network access through a process known as peering in lieu of metering traffic and billing for network use. As governments removed subsidies and commercial carriers invested substantial funds to build larger and faster networks, identifying …


Déjà Vu All Over Again: Questions And A Few Suggestions On How The Fcc Can Lawfully Regulate Internet Access, Rob Frieden Jul 2015

Déjà Vu All Over Again: Questions And A Few Suggestions On How The Fcc Can Lawfully Regulate Internet Access, Rob Frieden

Rob Frieden

This paper will examine the FCC’s March, 2015 Open Internet Order with an eye to assessing whether and how the Commission can successfully defend its decision in an appellate court. On two prior occasions, the FCC failed to convince a reviewing court that proposed regulatory safeguards do not unlawfully impose common carrier duties on private carriers. The Commission now has opted to reclassify broadband Internet access as common carriage, a decision sure to trigger a third court appeal. The FCC Open Internet Order offers several, possibly contradictory, justifications for its decision to apply Title II of the Communications Act, subject …


Toward A New Language Of Legal Drafting, Matthew Roach Jul 2015

Toward A New Language Of Legal Drafting, Matthew Roach

Matthew Roach

Lawyers should write in document markup language just like web developers, digital publishers, scientists, and almost everyone else.


An Approach To The Regulation Of Spanish Banking Foundations, Miguel Martínez Jun 2015

An Approach To The Regulation Of Spanish Banking Foundations, Miguel Martínez

Miguel Martínez

The purpose of this paper is to analyze the legal framework governing banking foundations as they have been regulated by Spanish Act 26/2013, of December 27th, on savings banks and banking foundations. Title 2 of this regulation addresses a construct that is groundbreaking for the Spanish legal system, still of paramount importance for the entire financial system insofar as these foundations become the leading players behind certain banking institutions given the high interest that foundations hold in the share capital of such institutions.


Overestimating Wireless Demand: Policy And Investment Implications Of Upward Bias In Mobile Data Forecasts, J. Armand Musey Cfa, Aalok Mehta May 2015

Overestimating Wireless Demand: Policy And Investment Implications Of Upward Bias In Mobile Data Forecasts, J. Armand Musey Cfa, Aalok Mehta

J. Armand Musey, CFA

In this paper, we present evidence of persistent errors in projections of wireless demand and examine the implications for wireless policy and investment. Mobile demand projections are relied upon in academic and government research and used for critically important telecommunications policy decisions, both domestically and internationally. The Federal Communications Commission, for example, used such projections to estimate a 275 MHz spectrum shortage by 2014 and featured such estimates in the U.S. National Broadband Plan as evidence for allocating additional spectrum for cellular services. The International Telecommunications Union Radiocommunication Sector endorsed in 2006 an estimate of a 1,280- to 1,720-MHz spectrum …


Network Neutrality And Consumer Demand For “Better Than Best Efforts” Traffic Management, Rob Frieden May 2015

Network Neutrality And Consumer Demand For “Better Than Best Efforts” Traffic Management, Rob Frieden

Rob Frieden

This paper assesses whether and how ISPs can offer quality of service enhancements, at premium prices for full motion video, while still complying with the new rules and regulations established by the Federal Communications Commission (“FCC”) in March, 2015. The paper explains that having made the controversial decision to reclassify all forms of Internet access as a telecommunications service, the FCC increases regulatory uncertainty. In particular, the FCC has failed to identify instances where “retail ISPs,” serving residential broadband subscribers, can offer quality of service enhancements that serve real consumer wants without harming competition and the ability of most content …


Right-Sizing Spectrum Auction Licenses: The Case For Smaller Geographic License Areas In The Tv Broadcast Incentive Auction, William H. Lehr Phd, J. Armand Musey Cfa Apr 2015

Right-Sizing Spectrum Auction Licenses: The Case For Smaller Geographic License Areas In The Tv Broadcast Incentive Auction, William H. Lehr Phd, J. Armand Musey Cfa

J. Armand Musey, CFA

The wireless sector is a key contributor to economic activity and growth. Over the next several years, wireless service providers are expected to invest $25 to $53 billion upgrading and expanding their networks to deploy 4G mobile broadband across the nation. All told, wireless broadband investment and the services and innovation supported by such investment are expected to add between $259 and $355 billion to US GDP each year through 2017. The Federal Communications Commission ("Commission" or "FCC") is currently designing the largest ever auction of terrestrial wireless spectrum, currently planned for late 2014 (the "Incentive Auction"). The purpose is …


Beyond Net Neutrality: International Examples Enabling Innovation And Consumer Choice In The Mobile Internet Ecosystem, Daniel Lyons Apr 2015

Beyond Net Neutrality: International Examples Enabling Innovation And Consumer Choice In The Mobile Internet Ecosystem, Daniel Lyons

Daniel Lyons

The FCC’s new Open Internet rules seek to limit interference by broadband service providers in markets for Internet-based content and applications. But to do so, the rules may significantly reduce the amount of innovation possible in the broadband service market. An aggressive interpretation of the rules suggests that broadband providers are generally required to offer customers access to all lawful Internet traffic, or none at all. This paper explores the way in which this all-or-nothing homogenization of the American broadband product differs from innovative non-net-neutral practices that are taking root in other countries, particularly in mobile markets. Around the world, …


Nailing Down The Deadlines: A Modified Peremption Scheme For Claims Against Design Professionals, Alex T. Robertson Mar 2015

Nailing Down The Deadlines: A Modified Peremption Scheme For Claims Against Design Professionals, Alex T. Robertson

Alex T Robertson

In Louisiana construction cases, the timeliness of a third party claim for indemnity is contingent on both the profession of the defendant and where the plaintiff files the suit.[1] This moving target effect has roots in Louisiana’s adoption of a single peremptive statute for construction cases in lieu of the previously controlling liberative prescription statutes.[2] Louisiana instituted peremption to create a shorter and fixed period of time for the possibility of a design professional to be sued from a design, which has several positive consequences--judicial efficiency, higher quality of evidence in construction cases, positive economic impact and heightened creativity in …


, The Law School Of The Future: How The Synergies Of Convergence Will Transform The Very Notion Of “Law Schools” During The 21st Century From “Places” To “Platforms”, Jeffrey A. Van Detta Mar 2015

, The Law School Of The Future: How The Synergies Of Convergence Will Transform The Very Notion Of “Law Schools” During The 21st Century From “Places” To “Platforms”, Jeffrey A. Van Detta

Jeffrey A. Van Detta

This article discusses the disruptive change in American (and trans-national) legal education that the convergence of technology and economics is bringing to legal education. It posits, and then defends, the following assertion about "law schools of the future":

“Law schools will no longer be ‘places’ in the sense of a single faculty located on a physical campus. In the future, law schools will consist of an array of technologies and instructional techniques brought to bear, in convergence, on particular educational needs and problems.”

This paper elaborates on that prediction, discussing the ways in which technology will positively impact legal education, …


The Self, The Stasi, The Nsa: Privacy, Knowledge, And Complicity In The Surveillance State, Richard Warner, Robert H. Sloan Mar 2015

The Self, The Stasi, The Nsa: Privacy, Knowledge, And Complicity In The Surveillance State, Richard Warner, Robert H. Sloan

Richard Warner

We focus on privacy in public. The notion dates back over a century, at least to the work of the German sociologist, Georg Simmel. Simmel observed that people voluntarily limit their knowledge of each other as they interact in a wide variety of social and commercial roles, thereby making certain information private relative to the interaction even if it is otherwise publicly available. Current governmental surveillance in the US (and elsewhere) reduces privacy in public. But to what extent?

The question matters because adequate self-realization requires adequate privacy in public. That in turn depends on informational norms, social norms that …


A Public Interest Perspective On Local Number Portability: Consumers, Competition And Other Risks, J. Armand Musey Cfa, Michael Calabrese Mar 2015

A Public Interest Perspective On Local Number Portability: Consumers, Competition And Other Risks, J. Armand Musey Cfa, Michael Calabrese

J. Armand Musey, CFA

Before the Commission finalizes the selection of a vendor for the Local Number Portability Administrator (“LNPA”) contract, the Commission should take this opportunity to reconsider the future role of the number portability system and of the LNPA in relation to market competition, public safety and the IP technology transition. The functionality of today’s LNP platform extends well beyond providing routine number porting services between telecom carriers. It has evolved into a significant component in the greater ecosystem of telecommunications competition, public safety and technological evolution. As a result, any changes to the LNPA now will have broader and evolving public …


Riley V. California: A Pyrric Victory For Privacy, Adam Lamparello Feb 2015

Riley V. California: A Pyrric Victory For Privacy, Adam Lamparello

Adam Lamparello

In Riley v. California, the United States Supreme Court ushered privacy protections into the digital era and signaled that the Fourth Amendment would not become a constitutional afterthought. The Court unanimously held that, absent exigent circumstances, law enforcement officers could not search any area of an arrestee’s cell phone, including the outgoing call log, without a warrant and probable cause. At first glance, Riley appears to be a landmark decision in favor of individual privacy rights. As with most things, however, the devil is in the details, and the details in Riley make any celebration over the seemingly enhanced …


Riley V. California: A Pyrric Victory For Privacy, Adam Lamparello Feb 2015

Riley V. California: A Pyrric Victory For Privacy, Adam Lamparello

Adam Lamparello

In Riley v. California, the United States Supreme Court ushered privacy protections into the digital era and signaled that the Fourth Amendment would not become a constitutional afterthought. The Court unanimously held that, absent exigent circumstances, law enforcement officers could not search any area of an arrestee’s cell phone, including the outgoing call log, without a warrant and probable cause. At first glance, Riley appears to be a landmark decision in favor of individual privacy rights. As with most things, however, the devil is in the details, and the details in Riley make any celebration over the seemingly enhanced …


Making A Mark: Taking A Glance At Trademarks And Graphic Infringement, Heather S. Ray Jan 2015

Making A Mark: Taking A Glance At Trademarks And Graphic Infringement, Heather S. Ray

Heather S Ray

No abstract provided.


The Doctrine Of True Threats: Protecting Our Ever-Shrinking First Amendment Rights In The New Era Of Communication, Mary M. Roark Jan 2015

The Doctrine Of True Threats: Protecting Our Ever-Shrinking First Amendment Rights In The New Era Of Communication, Mary M. Roark

Mary M Roark

The First Amendment provides that “Congress shall make no law . . . abridging the freedom of speech.” Such protection has withstood the test of time and is heralded as one of our most precious rights as Americans. “The hallmark of the protection of free speech is to allow ‘free trade in ideas’—even ideas that the overwhelming majority of people might find distasteful or discomforting." However, “[t]here are certain well-defined and narrowly limited classes of speech, the prevention and punishment of which has never been thought to raise any Constitutional problem." One such proscribable form of speech is the “true …


The Self, The Stasi, The Nsa: Privacy, Knowledge, And Complicity In The Surveillance State, Richard Warner, Robert H. Sloan Jan 2015

The Self, The Stasi, The Nsa: Privacy, Knowledge, And Complicity In The Surveillance State, Richard Warner, Robert H. Sloan

All Faculty Scholarship

We focus on privacy in public. The notion dates back over a century, at least to the work of the German sociologist, Georg Simmel. Simmel observed that people voluntarily limit their knowledge of each other as they interact in a wide variety of social and commercial roles, thereby making certain information private relative to the interaction even if it is otherwise publicly available. Current governmental surveillance in the US (and elsewhere) reduces privacy in public. But to what extent?

The question matters because adequate self-realization requires adequate privacy in public. That in turn depends on informational norms, social norms that …


Airbnb And The Housing Segment Of The Modern Sharing Economy: Are Short-Term Rental Restrictions An Unconstitutional Taking, Jamila Jefferson-Jones Jan 2015

Airbnb And The Housing Segment Of The Modern Sharing Economy: Are Short-Term Rental Restrictions An Unconstitutional Taking, Jamila Jefferson-Jones

Law Faculty Research Publications

No abstract provided.


Airbnb And The Housing Segment Of The Modern Sharing Economy: Are Short-Term Rental Restrictions An Unconstitutional Taking, Jamila Jefferson-Jones Jan 2015

Airbnb And The Housing Segment Of The Modern Sharing Economy: Are Short-Term Rental Restrictions An Unconstitutional Taking, Jamila Jefferson-Jones

Law Faculty Research Publications

No abstract provided.


The Evolution Of Internet Service Providers From Partners To Adversaries: Tracking Shifts In Interconnection Goals And Strategies In The Internet’S Fifth Generation, Rob Frieden Jan 2015

The Evolution Of Internet Service Providers From Partners To Adversaries: Tracking Shifts In Interconnection Goals And Strategies In The Internet’S Fifth Generation, Rob Frieden

Rob Frieden

This paper will examine new models for the carriage of Internet traffic with an eye toward providing insights on how the interconnection process has changed and what positive and negative consequences have resulted. Internet Service Provider (“ISP”) interconnection used to constitute a cooperative undertaking, but now it increasingly requires difficult and protracted negotiations between ventures that consider themselves adversaries in a winner take all transaction. The paper concludes that new commercial arrangements, such as paid peering, can achieve mutually beneficial outcomes. However, the paper also identifies instances where migration from traditional interconnection arrangements can harm consumers by reducing some of …


The Un-Territoriality Of Data, Jennifer Daskal Jan 2015

The Un-Territoriality Of Data, Jennifer Daskal

Articles in Law Reviews & Other Academic Journals

Territoriality looms large in our jurisprudence, particularly as it relates to the government’s authority to search and seize. Fourth Amendment rights turn on whether the search or seizure takes place territorially or extraterritorially; the government’s surveillance authorities depend on whether the target is located within the United States or without; and courts’ warrant jurisdiction extends, with limited exceptions, only to the borders’ edge. Yet the rise of electronic data challenges territoriality at its core. Territoriality, after all, depends on the ability to define the relevant “here” and “there,” and it presumes that the “here” and “there” have normative significance. The …


The Cycles Of Global Telecommunication Censorship And Surveillance, Jonathon Penney Jan 2015

The Cycles Of Global Telecommunication Censorship And Surveillance, Jonathon Penney

Articles, Book Chapters, & Popular Press

Internet censorship and surveillance is on the rise globally and cyber-warfare increasing in scope and intensity. To help understand these new threats commentators have grasped at historical analogies often with little regard for historical complexity or international perspective. Unfortunately, helpful new works on telecommunications history have focused primarily on U.S. history with little focus on international developments. There is thus a need for further internationally oriented investigation of telecommunications technologies, and their history. This essay attempts to help fill that void, drawing on case studies wherein global telecommunications technologies have been disrupted or censored — telegram censorship and surveillance, high …