Open Access. Powered by Scholars. Published by Universities.®

Communications Law Commons

Open Access. Powered by Scholars. Published by Universities.®

3,225 Full-Text Articles 2,583 Authors 1,048,308 Downloads 110 Institutions

All Articles in Communications Law

Faceted Search

3,225 full-text articles. Page 6 of 53.

Ng9-1-1, Cybersecurity, And Contributions To The Model Framework For A Secure National Infrastructure, Andrew Jackson Coley 2018 The Catholic University of America, Columbus School of Law

Ng9-1-1, Cybersecurity, And Contributions To The Model Framework For A Secure National Infrastructure, Andrew Jackson Coley

Catholic University Journal of Law and Technology

9-1-1 call networks form the foundation of emergency communications infrastructure. However, a lack of funding and taking such networks for granted has led to a gradual yet predictable outdating of this critical infrastructure. Fortunately, recent efforts have acknowledged as such, and dedicated public safety officials have worked to update 9-1-1 systems to Next Generation 9-1-1 (NG9-1-1).
NG9-1-1 is an IP-based network with 21stcentury technology capable of handling increased call volume, more resilient networks, and providing significantly more data to first responders, among litany of other advancements. With this much needed advancement comes the responsibilities of ensuring a secure ...


Comcast-Nbcu, Netflix, And The Fcc: The Dual Merger Review Process As A House Of Cards, Matthew J. Razzano 2018 Notre Dame Law School

Comcast-Nbcu, Netflix, And The Fcc: The Dual Merger Review Process As A House Of Cards, Matthew J. Razzano

Notre Dame Law Review Online

This Essay argues that the FCC inconsistently dissects market trends, and its costly processes—paired with DOJ review—stymie growth in the telecommunications industry. Part I traces the history of dual review and compares the FCC’s procedures with the DOJ’s. Part II evaluates the Comcast-NBCU deal— its history, the FCC Order, and the conditions imposed. Part III argues that the FCC is not adept at analyzing telecommunications transactions, and is certainly not adept at predicting market developments. It then claims that the Comcast-NBCU deal unearthed serious problems in the dual review process. Specifically, jurisdictional restrictions facing the FCC ...


Alexa, Who Owns My Pillow Talk? Contracting, Collaterizing, And Monetizing Consumer Privacy Through Voice-Captured Personal Data, Anne Logsdon Smith 2018 Catholic University of America (Student)

Alexa, Who Owns My Pillow Talk? Contracting, Collaterizing, And Monetizing Consumer Privacy Through Voice-Captured Personal Data, Anne Logsdon Smith

Catholic University Journal of Law and Technology

With over one-fourth of households in the U.S. alone now using voice-activated digital assistant devices such as Amazon’s Echo (better known as “Alexa”) and Google’s Home, companies are recording and transmitting record volumes of voice data from the privacy of people’s homes to servers across the globe. These devices capture conversations about everything from online shopping to food preferences to entertainment recommendations to bedtime stories, and even phone and appliance use. With “Big Data” and business analytics expected to be a $203 billion-plus industry by 2020, companies are racing to acquire and leverage consumer data by ...


Democracy At Stake In The Digital Age: Engaging In The Net Neutrality Debate For The Preservation Of Free Speech And The Redemption Of Public Interest, Christina (Sung Min) Yoh 2018 Claremont McKenna College

Democracy At Stake In The Digital Age: Engaging In The Net Neutrality Debate For The Preservation Of Free Speech And The Redemption Of Public Interest, Christina (Sung Min) Yoh

CMC Senior Theses

Net neutrality is currently one of the most topical government policies up for debate. In the following paper, I will examine three cases in which net neutrality has been threatened by internet service providers and the Federal Communications Commission and reinforced by public interest groups, major website companies, and the public. The online regime has been a critical instrument in the outcome of all three cases, highlighting the role and influence of internet users in the virtual and physical public spheres.

Some say that the battle is already lost. FCC Chairman Ajit Pai and his Republican majority in the agency ...


Enforcing Constitutional Rights Through Computer Code, Steve Young 2018 The Catholic University of America, Columbus School of Law

Enforcing Constitutional Rights Through Computer Code, Steve Young

Catholic University Journal of Law and Technology

Lawmaking and enforcement has advanced since Hammurabi first wrote out his legal code thousands of years ago. Today, the American legal system relies on legislatively-enacted federal, state, county, and municipal legal codes, agency-created regulations, the judge-made common law, and various law enforcement entities. This can be a confusing and complex system of rules and their explanations with varying degrees of enforcement. Blockchain technology is an automatic and efficient alternative to written codes that must be humanly-enforced. There has been limited scholarly interest in the implications of a legal application of blockchain technology to a political system but there have been ...


Masthead, 2018 The Catholic University of America, Columbus School of Law

Masthead

Catholic University Journal of Law and Technology

No abstract provided.


Table Of Contents, 2018 The Catholic University of America, Columbus School of Law

Table Of Contents

Catholic University Journal of Law and Technology

No abstract provided.


Masthead, Editor In Chief 2018 The Catholic University of America, Columbus School of Law

Masthead, Editor In Chief

Catholic University Journal of Law and Technology

No abstract provided.


Deepfake Videos: When Seeing Isn't Believing, Holly Kathleen Hall 2018 Arkansas State University - Main Campus

Deepfake Videos: When Seeing Isn't Believing, Holly Kathleen Hall

Catholic University Journal of Law and Technology

Videos, known as deepfakes, use readily available software to create a work that shows people saying and doing things they may never have uttered or engaged in. The technology making the videos appear very authentic is advancing at such a rate that people may not be able to detect if the videos are fact or fiction. Given the hasty acceptance of other forms of fake news in society, deepfake videos have the ability to affect the nature of information the public receives about candidates and policies. This study examines the potential use of deepfake videos in the democratic process, analyzes ...


Privacy Of Information And Dna Testing Kits, Shanna Raye Mason 2018 Catholic University of America (Student)

Privacy Of Information And Dna Testing Kits, Shanna Raye Mason

Catholic University Journal of Law and Technology

In modern times, consumers desire for more control over their own health and healthcare. With this growing interest of control, direct to consumer DNA testing kits have never been more popular. However, many consumers are unaware of the potential privacy concerns associated with such use. This comment examines the popularity and privacy risks that are likely unknown to the individual consumer. This comment also addresses the shortcomings of the Health Insurance Portability and Accountability Act of 1996 (HIPAA), as well as the Genetic Information Nondiscrimination Act of 2008 (GINA) in regard to protecting individual’s genetic information from misuse. This ...


Protecting The Democratic Role Of The Press: A Legal Solution To Fake News, Andrea Butler 2018 Washington University in St. Louis

Protecting The Democratic Role Of The Press: A Legal Solution To Fake News, Andrea Butler

Washington University Law Review

It is difficult to discuss the 2016 presidential election without including the impact of fake news in the conversation, and most commentators deplore the effect of fake news’ proliferation across the internet on American politics and the public. These conversations have centered on the impact fake news had on the presidential election, as well as concerns that the general public is unable to identify fake news. There have even been more immediately dangerous consequences stemming from fake news, such as a gunman showing up to a D.C. pizzeria to liberate children he believed Hillary Clinton was holding hostage there ...


Mobile Instant Messaging Evidence In Criminal Trials, Youngjin Choi 2018 The Catholic University of America, Columbus School of Law

Mobile Instant Messaging Evidence In Criminal Trials, Youngjin Choi

Catholic University Journal of Law and Technology

Mobile instant messaging, such as text messages, are a pervasive aspect of everyday life. The characteristics of the modern mobile instant messaging application, especially in comparison with other forms of more traditional electronic communication platforms, such as e-mail, text messaging, or computer-based instant messaging program, present a variety of evidentiary issues in trial.

To be relevant, mobile instant messaging evidence must be connected to a genuine issue at trial and not too attenuated from it. Authentication is also very important in determining whether it may be considered a non-hearsay statement. Although often otherwise admissible, mobile instant messaging evidence may still ...


Dating Dangerously: Risks Lurking Within Mobile Dating Apps, Alyssa Murphy 2018 Catholic University of America (Student)

Dating Dangerously: Risks Lurking Within Mobile Dating Apps, Alyssa Murphy

Catholic University Journal of Law and Technology

In modern society, cell phones have become a virtual extension of most Americans. Advances in cell phone technology have given rise to the popularity of mobile dating applications (“apps”), which are capable of allowing users to date and meet potential partners without leaving the comfort of their own homes. The convenience and allure of mobile dating apps has led to a staggering increase in the number of crimes orchestrated against other users of the apps. Such crimes often include solicitation, stalking, murder, and human trafficking. Unsuspecting and trusting users fall victim to these crimes due to the false sense of ...


Say What You Want: How Unfettered Freedom Of Speech On The Internet Creates No Recourse For Those Victimized, Wes Gerrie 2018 Syracuse University College of Law

Say What You Want: How Unfettered Freedom Of Speech On The Internet Creates No Recourse For Those Victimized, Wes Gerrie

Catholic University Journal of Law and Technology

In today’s society, virtually everyone relies on online posts in order to make decisions—from what products to purchase to what restaurants to visit. The introduction and increase of online communication has made posting reviews online a simpler, easier, and more efficient process. However, the increase of online communication has threatened the delicate balance between free speech and harmful speech.

A tangled web of recent case law and federal law exists which aggressively protects the free speech of online reviewers. The law has carved out immunity for the website operators that host an online reviewer’s comments, which in ...


The Tortoise And The Hare Of International Data Privacy Law: Can The United States Catch Up To Rising Global Standards?, Matthew Humerick 2018 The Catholic University of America, Columbus School of Law

The Tortoise And The Hare Of International Data Privacy Law: Can The United States Catch Up To Rising Global Standards?, Matthew Humerick

Catholic University Journal of Law and Technology

Technological developments spur the development of big data on a global scale. The breadth of data companies collect, maintain, process, and transmit affects nearly every country and organization around the world. Inherent to big data are issues of data protection and transfers to third countries. While many jurisdictions emphasize the importance of protecting consumer data, such as the European Union, others, like the United States, do not. To circumvent this issue, the United States and European Union contracted around data privacy standard discrepancies through the Safe Harbor Agreement, which eased cross-border data transfers. However, the Court of Justice of the ...


Assessing Assisted Reproductive Technology, Raymond C. O'Brien 2018 The Catholic University of America, Columbus School of Law

Assessing Assisted Reproductive Technology, Raymond C. O'Brien

Catholic University Journal of Law and Technology

Technological innovation possesses both opportunity and challenge. Because assisted reproductive technology (ART) involves sexual intimacy, parenthood, personhood, gender identity, privacy, legacy, and a plethora of religious, historical, sociological, and ethical underpinnings, the challenges presented in such technological innovation are substantial. Nonetheless, the opportunities are significant and progressive. Because of in vitro fertilization, gestational and genetic surrogacy, posthumous conception, and mitochondrial replacement therapy, humans now have the opportunity to overcome infertility, gender obstacles to parentage, dynastic limitations, and diseases that have long plagued mothers and infants. However, challenges include the exploitation of surrogates, unequal access to ART services, possibilities of cloning ...


Smart Baby Monitors: The Modern Nanny Or A Home Invader, Sarah Ensenat 2018 The Catholic University of America, Columbus School of Law

Smart Baby Monitors: The Modern Nanny Or A Home Invader, Sarah Ensenat

Catholic University Journal of Law and Technology

Smart baby monitors exist to help parents protect and watch over their children. The smart baby monitors act as a second set of eyes when parents cannot be in the same room as their children. Low-tech hackers take advantage of gaps in the security of smart baby monitors. A hacker violates a consumer’s privacy by gaining access to private information, viewing the home and its occupants, and even speaking to children through the monitor.

This comment advocates for stricter security legislation for smart baby monitors. Without new legislation, manufacturers of smart baby monitors do not apply or invest in ...


What Authorizes The Image? The Visual Economy Of Post-Secular Jurisprudence, Richard Sherwin 2018 New York Law School

What Authorizes The Image? The Visual Economy Of Post-Secular Jurisprudence, Richard Sherwin

Articles & Chapters

In law’s visual economy our commitment to justice grows out of a renewed encounter with an interior libidinal source whose ongoing collective investment binds us to the nomos in which we live. We experience this corporeal bond in paintings, films, and video images on screens large and small. In the ethically inflected aesthetic of post-secular jurisprudence, justice is to law as beauty is to art. As distant as an abstract expressionist canvas, as close as any neighbor, or indeed any screen on which the neighbor becomes real to us. That is where we behold the source and instantiation of ...


Visual Literacy For The Legal Profession, Richard K. Sherwin 2018 New York Law School

Visual Literacy For The Legal Profession, Richard K. Sherwin

Articles & Chapters

Digital technology has transformed the way we communicate in society. Swept along on a digital tide, words, sounds, and images easily, and often, flow together. This state of affairs has radically affected not only our commercial and political practices in society, but also the way we practice law.

Unfortunately, legal education and legal theory have not kept up. Inconsistencies and unpredictability in the way courts ascertain the admissibility of various kinds of visual evidence and visual argumentation, lapses in the cross examination of visual evidence at trial, and inadequately theorized notions of visual meaning and the epistemology of affect tell ...


Native Advertising In Social Media: Is The Ftc’S “Reasonable Consumer” Reasonable?, Celine Shirooni 2018 J.D. (2018) Washington University School of Law

Native Advertising In Social Media: Is The Ftc’S “Reasonable Consumer” Reasonable?, Celine Shirooni

Washington University Journal of Law & Policy

This note explores native advertising – advertising that has a semblance of editorial content – on social media how the Federal Trade Commission has struggled to address concerns about the ethical implications of the practice. Shirooni argues that the “reasonable consumer” test used by the FTC to determine whether an advertisement is deceptive is both outdated and too broad in the context of social media and proposes a modification of the test to fit the expectations of the typical user of social media applications.


Digital Commons powered by bepress