Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Publication
- File Type
Articles 1 - 19 of 19
Full-Text Articles in Computer Law
The Evolution Of Internet Service Providers From Partners To Adversaries: Tracking Shifts In Interconnection Goals And Strategies In The Internet’S Fifth Generation, Rob Frieden
Rob Frieden
At the Internet’s inception, carriers providing the bit switching and transmission function largely embraced expanding connections and users as a primary service goal. These ventures refrained from metering traffic and charging for carriage based on the assumption that traffic volumes roughly matched, or that traffic measurement was not worth the bother in light of external funding from government grants. Most Internet Service Providers (“ISPs”) bartered network access through a process known as peering in lieu of metering traffic and billing for network use. As governments removed subsidies and commercial carriers invested substantial funds to build larger and faster networks, identifying …
Toward A New Language Of Legal Drafting, Matthew Roach
Toward A New Language Of Legal Drafting, Matthew Roach
Matthew Roach
Lawyers should write in document markup language just like web developers, digital publishers, scientists, and almost everyone else.
Network Neutrality And Consumer Demand For “Better Than Best Efforts” Traffic Management, Rob Frieden
Network Neutrality And Consumer Demand For “Better Than Best Efforts” Traffic Management, Rob Frieden
Rob Frieden
This paper assesses whether and how ISPs can offer quality of service enhancements, at premium prices for full motion video, while still complying with the new rules and regulations established by the Federal Communications Commission (“FCC”) in March, 2015. The paper explains that having made the controversial decision to reclassify all forms of Internet access as a telecommunications service, the FCC increases regulatory uncertainty. In particular, the FCC has failed to identify instances where “retail ISPs,” serving residential broadband subscribers, can offer quality of service enhancements that serve real consumer wants without harming competition and the ability of most content …
, The Law School Of The Future: How The Synergies Of Convergence Will Transform The Very Notion Of “Law Schools” During The 21st Century From “Places” To “Platforms”, Jeffrey A. Van Detta
, The Law School Of The Future: How The Synergies Of Convergence Will Transform The Very Notion Of “Law Schools” During The 21st Century From “Places” To “Platforms”, Jeffrey A. Van Detta
Jeffrey A. Van Detta
This article discusses the disruptive change in American (and trans-national) legal education that the convergence of technology and economics is bringing to legal education. It posits, and then defends, the following assertion about "law schools of the future":
“Law schools will no longer be ‘places’ in the sense of a single faculty located on a physical campus. In the future, law schools will consist of an array of technologies and instructional techniques brought to bear, in convergence, on particular educational needs and problems.”
This paper elaborates on that prediction, discussing the ways in which technology will positively impact legal education, …
The Self, The Stasi, The Nsa: Privacy, Knowledge, And Complicity In The Surveillance State, Richard Warner, Robert H. Sloan
The Self, The Stasi, The Nsa: Privacy, Knowledge, And Complicity In The Surveillance State, Richard Warner, Robert H. Sloan
Richard Warner
We focus on privacy in public. The notion dates back over a century, at least to the work of the German sociologist, Georg Simmel. Simmel observed that people voluntarily limit their knowledge of each other as they interact in a wide variety of social and commercial roles, thereby making certain information private relative to the interaction even if it is otherwise publicly available. Current governmental surveillance in the US (and elsewhere) reduces privacy in public. But to what extent?
The question matters because adequate self-realization requires adequate privacy in public. That in turn depends on informational norms, social norms that …
The Unexamined Life In The Era Of Big Data: Toward A Udaap For Data, Sean Brian
The Unexamined Life In The Era Of Big Data: Toward A Udaap For Data, Sean Brian
Sean Brian
No abstract provided.
The Costs And Benefits Of Regulatory Intervention In Internet Service Provider Interconnection Disputes: Lessons From Broadcaster-Cable Retransmission Consent Negotiations, Rob Frieden
Rob Frieden
This paper considers what limited roles the FCC may lawfully assume to ensure timely and fair interconnection and compensation agreements in the Internet ecosystem. The paper examines the FCC’s limited role in broadcaster-cable television retransmission consent negotiations with an eye toward assessing the applicability of this model. The FCC explicitly states that it lacks jurisdiction to prescribe terms, or to mandate binding arbitration. However, it recently interpreted its statutory authority to ensure “good faith” negotiations as allowing it to constrain broadcaster negotiating leverage by prohibiting multiple operators, having the largest market share, from joining in collective negotiations with cable operators. …
Internet Protocol Television And The Challenge Of “Mission Critical” Bits., Rob Frieden
Internet Protocol Television And The Challenge Of “Mission Critical” Bits., Rob Frieden
Rob Frieden
The Internet increasingly provides an alternative distribution medium for video and other types of high value, bandwidth intensive content. Many consumers have become “technology agnostic” about what kind of wireline or wireless medium provides service. However, they expect carriers to offer access anytime, anywhere, via any device and in any format. These early adopters of new technologies and alternatives to “legacy” media have no patience with the concept of “appointment television” that limits access to a specific time, on a single channel and in only one presentation format. This paper assesses whether and how Internet Service Providers (“ISPs”) can offer …
Drones, Henry H. Perritt Jr., Eliot O. Sprague
Drones, Henry H. Perritt Jr., Eliot O. Sprague
Henry H. Perritt, Jr.
Federal And State Authority For Network Neutrality And Broadband Regulation, Tejas N. Narechania
Federal And State Authority For Network Neutrality And Broadband Regulation, Tejas N. Narechania
Tejas N. Narechania
For the second time in less than four years, the D.C. Circuit has rebuffed the Federal Communications Commission’s attempt at imposing network neutrality rules on internet traffic. But in so doing, the D.C. Circuit affirmed the FCC’s theory of jurisdiction based on section 706 of the Telecommunications Act of 1996. This ruling has the significant effect of transforming a questionable source of authority into what may become the Commission’s most significant font of regulatory power.
Surprisingly, section 706 seems to give the Commission the power to implement a slightly revised set of network neutrality rules. By narrowing the scope of …
The Evolution Of The Digital Millennium Copyright Act; Changing Interpretations Of The Dmca And Future Implications For Copyright Holders, Hillary A. Henderson
The Evolution Of The Digital Millennium Copyright Act; Changing Interpretations Of The Dmca And Future Implications For Copyright Holders, Hillary A. Henderson
Hillary A Henderson
Copyright law rewards an artificial monopoly to individual authors for their creations. This reward is based on the belief that, by granting authors the exclusive right to reproduce their works, they receive an incentive and means to create, which in turn advances the welfare of the general public by “promoting the progress of science and useful arts.” Copyright protection subsists . . . in original works of authorship fixed in any tangible medium of expression, now known or later developed, from which they can be perceived, reproduced, or otherwise communicated, either directly or with the aid of a machine or …
Net Bias And The Treatment Of “Mission-Critical” Bits, Rob Frieden
Net Bias And The Treatment Of “Mission-Critical” Bits, Rob Frieden
Rob Frieden
The Internet increasingly provides an alternative distribution medium for video and other types of high value, bandwidth intensive content. Many consumers have become “technology agnostic” about what kind of wireline or wireless medium provides service. However, they expect carriers to offer access anytime, anywhere, via any device and in any distribution format. These early adopters of new technologies and alternatives to “legacy” media have no patience with the concept of “appointment television” that limits access to a specific time, on a particular channel and in a single presentation format. This paper assesses whether and how Internet Service Providers (“ISPs”) can …
Fixing Frand: A Pseudo-Pool Approach To Standards-Based Patent Licensing, Jorge Contreras
Fixing Frand: A Pseudo-Pool Approach To Standards-Based Patent Licensing, Jorge Contreras
Jorge L Contreras
Technical interoperability standards are critical elements of mobile telephones, laptop computers, digital files, and thousands of other products in the modern networked economy. Most such standards are developed in so-called voluntary standards-development organizations (SDOs) that require participants to license patents essential to the standard on terms that are “fair, reasonable and non-discriminatory” (FRAND). FRAND commitments are thought to avoid the problem of patent hold-up: the imposition of excessive royalty demands after a standard has been widely adopted in the market. While, at first blush, FRAND commitments seem to assure product vendors that patents will not obstruct the manufacture and sale …
Copyright Freeconomics, John M. Newman
Copyright Freeconomics, John M. Newman
John M. Newman
Innovation has wreaked creative destruction on traditional content platforms. During the decade following Napster’s rise and fall, industry organizations launched litigation campaigns to combat the dramatic downward pricing pressure created by the advent of zero-price, copyright-infringing content. These campaigns attracted a torrent of debate, still ongoing, among scholars and stakeholders—but this debate has missed the forest for the trees. Industry organizations have abandoned litigation efforts, and many copyright owners now compete directly with infringing products by offering licit content at a price of $0.
This sea change has ushered in an era of “copyright freeconomics.” Drawing on an emerging body …
Emerging Technologies And Dwindling Speech, Jorge R. Roig
Emerging Technologies And Dwindling Speech, Jorge R. Roig
Jorge R Roig
Threats Escalate: Corporate Information Technology Governance Under Fire, Lawrence J. Trautman
Threats Escalate: Corporate Information Technology Governance Under Fire, Lawrence J. Trautman
Lawrence J. Trautman Sr.
In a previous publication The Board’s Responsibility for Information Technology Governance, (with Kara Altenbaumer-Price) we examined: The IT Governance Institute’s Executive Summary and Framework for Control Objectives for Information and Related Technology 4.1 (COBIT®); reviewed the Weill and Ross Corporate and Key Asset Governance Framework; and observed “that in a survey of audit executives and board members, 58 percent believed that their corporate employees had little to no understanding of how to assess risk.” We further described the new SEC rules on risk management; Congressional action on cyber security; legal basis for director’s duties and responsibilities relative to IT governance; …
Decoding First Amendment Coverage Of Computer Source Code In The Age Of Youtube, Facebook And The Arab Spring, Jorge R. Roig
Decoding First Amendment Coverage Of Computer Source Code In The Age Of Youtube, Facebook And The Arab Spring, Jorge R. Roig
Jorge R Roig
Licensing As Digital Rights Management, From The Advent Of The Web To The Ipad, Reuven Ashtar
Licensing As Digital Rights Management, From The Advent Of The Web To The Ipad, Reuven Ashtar
Reuven Ashtar
This Article deals with the Digital Millennium Copyright Act’s anti-circumvention provision, Section 1201, and its relationship to licensing. It argues that not all digital locks and contractual notices qualify for legal protection under Section 1201, and attributes the courts’ indiscriminate protection of all Digital Rights Management (DRM) measures to the law’s incoherent formulation. The Article proposes a pair of filters that would enable courts to distinguish between those DRM measures that qualify for protection under Section 1201, and those that do not. The filters are shown to align with legislative intent and copyright precedent, as well as the approaches recently …
Invoking And Avoiding The First Amendment: How Internet Service Providers Leverage Their Status As Both Content Creators And Neutral Conduits, Rob M. Frieden
Invoking And Avoiding The First Amendment: How Internet Service Providers Leverage Their Status As Both Content Creators And Neutral Conduits, Rob M. Frieden
Rob Frieden
Much of the policy debate and scholarly literature on network neutrality has addressed whether the Federal Communications Commission (“FCC”) has statutory authority to require Internet Service Providers (“ISPs”) to operate in a nondiscriminatory manner. Such analysis largely focuses on questions about jurisdiction, the scope of lawful regulation, and the balance of power between stakeholders, generally adverse to government oversight, and government agencies, apparently willing to overcome the same inclination. The public policy debate primarily considers micro-level issues, without much consideration of broader concerns such as First Amendment values. While professing to support marketplace resource allocation and a regulation-free Internet, the …