Open Access. Powered by Scholars. Published by Universities.®

Communications Law Commons

Open Access. Powered by Scholars. Published by Universities.®

3,225 Full-Text Articles 2,583 Authors 1,048,308 Downloads 110 Institutions

All Articles in Communications Law

Faceted Search

3,225 full-text articles. Page 7 of 53.

We Want Wi-Fi: The Fcc’S Intervention In Municipal Broadband Networks, Catherine L. Schwarze 2018 J.D./LLM (2018) Washington University School of Law

We Want Wi-Fi: The Fcc’S Intervention In Municipal Broadband Networks, Catherine L. Schwarze

Washington University Journal of Law & Policy

This note examines a Sixth Circuit ruling against the Federal Communication Commission which found that North Carolina and Tennessee had the authority to limit expansion of municipal broadband services. Schwarze argues that Tennessee v. FCC greatly interferes with the mission of the FCC to spread communications access and proposes a solution by way of a partnership among state governments, municipalities, and private broadband companies to increase access to high-speed internet to areas that lack such services.


Native Advertising In Social Media: Is The Ftc’S “Reasonable Consumer” Reasonable?, Celine Shirooni 2018 J.D. (2018) Washington University School of Law

Native Advertising In Social Media: Is The Ftc’S “Reasonable Consumer” Reasonable?, Celine Shirooni

Washington University Journal of Law & Policy

This note explores native advertising – advertising that has a semblance of editorial content – on social media how the Federal Trade Commission has struggled to address concerns about the ethical implications of the practice. Shirooni argues that the “reasonable consumer” test used by the FTC to determine whether an advertisement is deceptive is both outdated and too broad in the context of social media and proposes a modification of the test to fit the expectations of the typical user of social media applications.


The Tipping Point – Reevaluating The Asnef-Equifax Separation Of Competition Of Data Privacy Law In The Wake Of The 2017 Equifax Data Breach, Olivia Altmayer 2018 Northwestern Pritzker School of Law

The Tipping Point – Reevaluating The Asnef-Equifax Separation Of Competition Of Data Privacy Law In The Wake Of The 2017 Equifax Data Breach, Olivia Altmayer

Northwestern Journal of International Law & Business

Contrary to the Court of Justice for the European Union’s decision in the Asnef-Equifax case, in a world of big data, it is inefficient and ineffective to treat EU competition law and EU data protection law as entirely separate legal considerations. Reevaluating this stance is critical in sectors where customer data is highly sensitive, and therefore highly valuable to those who steal it, particularly for the financial and healthcare sectors. Looking forward, companies that store and use biometric data will have to be similarly scrutinized. To correct this problem, the EU has numerous paths it can take: (a) continue ...


"Fake News," No News, And The Needs Of Local Communities, Carol Pauli 2018 Texas A&M University School of Law

"Fake News," No News, And The Needs Of Local Communities, Carol Pauli

Faculty Scholarship

The Quaker authors had in mind an ancient truth - that "love endures and overcomes" - and they were convinced that this truth is accessible to all. This article addresses truth at a more immediate and mundane level. It is concerned with the accurate information that local communities need in order to thrive.

The article proceeds in three steps. Part I reviews one way community needs were addressed when the first large-scale electronic communication technology entered individual homes in the form of radio and television. In those days, broadcasters had an affirmative duty to ascertain the problems of the communities they served ...


"Enemy Of The People": Negotiating News At The White House, Carol Pauli 2018 Texas A&M University School of Law

"Enemy Of The People": Negotiating News At The White House, Carol Pauli

Faculty Scholarship

How can the press serve as a check on executive power when the president calls it “fake” and the White House denies facts? As journalists debate the right response, this article offers advice from the perspective of a journalist who is now in the legal academy. Drawing on legal scholarship in the field of conflict resolution — as well as literature in journalism and political science — this article analyzes the White House press briefing as a negotiation over both the content of news and the relationship of the press and president. It aims to help the press fulfill the urgent public ...


Why Study The Internet?, Joe Fitzgerald 2018 Bard College

Why Study The Internet?, Joe Fitzgerald

Senior Projects Fall 2018

Senior Project submitted to The Division of Social Studies of Bard College.


Real "Fake News" And Fake "Fake News", Lili Levi 2018 University of Miami School of Law

Real "Fake News" And Fake "Fake News", Lili Levi

Articles

No abstract provided.


Introduction: Troubling Transparency, David E. Pozen, Michael Schudson 2018 Columbia Law School

Introduction: Troubling Transparency, David E. Pozen, Michael Schudson

Faculty Scholarship

Transparency is a value in the ascendance. Across the globe, the past several decades have witnessed a spectacular explosion of legislative reforms and judicial decisions calling for greater disclosure about the workings of public institutions. Freedom of information laws have proliferated, claims of a constitutional or supra-constitutional "right to know" have become commonplace, and an international transparency lobby has emerged as a civil society powerhouse. Open government is seen today in many quarters as a foundation of, if not synonymous with, good government.

At the same time, a growing number of scholars, advocates, and regulators have begun to raise hard ...


What About Small Businesses? The Gdpr And Its Consequences For Small U.S.-Based Companies, Craig McAllister 2017 Brooklyn Law School

What About Small Businesses? The Gdpr And Its Consequences For Small U.S.-Based Companies, Craig Mcallister

Brooklyn Journal of Corporate, Financial & Commercial Law

Fast-approaching changes to European data privacy law will have consequences around the globe. Historically, despite having dramatically different approaches to data privacy and data protection, the European Union and the United States developed a framework to ensure that the highspeed freeway that is transatlantic data transfer moved uninterrupted. That framework was overturned in the wake of revelations regarding U.S. surveillance practices, and amidst skepticism that the United States did not adequately protect personal data. Further, the European Union enacted the General Data Protection Regulation (GDPR), a sweeping overhaul of the legal data protection landscape that will take effect in ...


Fake News: No One Is Liable, And That Is A Problem, Emma M. Savino 2017 University at Buffalo School of Law (Student)

Fake News: No One Is Liable, And That Is A Problem, Emma M. Savino

Buffalo Law Review

No abstract provided.


The Fragility Of The Free American Press, RonNell Andersen Jones, Sonja R. West 2017 University of Utah S.J. Quinney College of Law

The Fragility Of The Free American Press, Ronnell Andersen Jones, Sonja R. West

Northwestern University Law Review

President Donald Trump has faced criticism for attacking the press and for abandoning longstanding traditions of accommodating and respecting it. This Essay argues that the national discussion spurred by Trump’s treatment of the press has fallen short of capturing the true seriousness of the situation. Trump’s assault on the custom of press accommodation follows a generation-long collapse of other major press protections. In order to fully understand the critical juncture at which American press freedom now stands, we must expand the discussion beyond talk of a rogue president’s aberrant attacks on the press and consider the increasingly ...


An Unsung Success Story: A Forty-Year Retrospective On U.S. Communications Policy, Christopher S. Yoo 2017 University of Pennsylvania Law School

An Unsung Success Story: A Forty-Year Retrospective On U.S. Communications Policy, Christopher S. Yoo

Faculty Scholarship at Penn Law

Looking backwards on the occasion of Telecommunications Policy’s fortieth anniversary reveals just how far U.S. communications policy has come. All of the major challenges of 1976, such as promoting competition in customer premises equipment, long distance, and television networking, have largely been overcome. Moreover, new issues that emerged later, such as competition in local telephone service and multichannel video program distribution, have also largely been solved. More often than not, the solution has been the result of structural changes that enhanced facilities-based competition rather than agency-imposed behavioral requirements. Moreover, close inspection reveals that in most cases, prodding by ...


Algorithmic Jim Crow, Margaret Hu 2017 Washington and Lee University School of Law

Algorithmic Jim Crow, Margaret Hu

Margaret Hu

This Article contends that current immigration- and security-related vetting protocols risk promulgating an algorithmically driven form of Jim Crow. Under the “separate but equal” discrimination of a historic Jim Crow regime, state laws required mandatory separation and discrimination on the front end, while purportedly establishing equality on the back end. In contrast, an Algorithmic Jim Crow regime allows for “equal but separate” discrimination. Under Algorithmic Jim Crow, equal vetting and database screening of all citizens and noncitizens will make it appear that fairness and equality principles are preserved on the front end. Algorithmic Jim Crow, however, will enable discrimination on ...


Revisiting Net Neutrality, Daniel A. Lyons 2017 Boston College Law School

Revisiting Net Neutrality, Daniel A. Lyons

Boston College Law School Faculty Papers

No abstract provided.


The Role Of Internet Intermediaries In Tackling Terrorism Online, Raphael Cohen-Almagor 2017 University of Hull

The Role Of Internet Intermediaries In Tackling Terrorism Online, Raphael Cohen-Almagor

Fordham Law Review

Gatekeeping is defined as the work of third parties “who are able to disrupt misconduct by withholding their cooperation from wrongdoers.”1 Internet intermediaries need to be far more proactive as gatekeepers than they are now. Socially responsible measures can prevent the translation of violent thoughts into violent actions. Designated monitoring mechanisms can potentially prevent such unfortunate events. This Article suggests an approach that harnesses the strengths and capabilities of the public and private sectors in offering practical solutions to pressing problems. It proposes that internet intermediaries should fight stringently against terror and further argues that a responsible gatekeeping approach ...


The Internet As Marketplace Of Madness— And A Terrorist’S Best Friend, Thane Rosenbaum 2017 New York University School of Law

The Internet As Marketplace Of Madness— And A Terrorist’S Best Friend, Thane Rosenbaum

Fordham Law Review

The panel I was assigned to, for this distinguished gathering of scholars at Fordham Law School, where I had previously been a professor for twentythree years, was given the name, “Caution Against Overreaching.” Overreaching and the caution it occasions, in this case, refer to the First Amendment, a uniquely American absolutist, legalistic obsession. For many who fixate on such matters, the government must never be allowed to trample upon the unfettered free speech rights guaranteed under America’s first, and most favorite, Amendment.


Terrorist Incitement On The Internet, Alexander Tsesis 2017 Loyola University School of Law

Terrorist Incitement On The Internet, Alexander Tsesis

Fordham Law Review

I organized this symposium to advance understanding of how terrorist communications drive and influence social, political, religious, civil, literary, and artistic conduct. Viewing terrorist speech through wide prisms of law, culture, and contemporary media can provide lawmakers, adjudicators, and administrators a better understanding of how to contain and prevent the exploitation of modern communication technologies to influence, recruit, and exploit others to perpetrate ideologically driven acts of violence. Undertaking such a multipronged study requires not only looking at the personal and sociological appeals that extreme ideology exerts but also considering how to create political, administrative, educational, and economic conditions to ...


The Internet Will Not Break: Denying Bad Samaritans § 230 Immunity, Danielle Keats Citron, Benjamin Wittes 2017 University of Maryland Francis King Carey School of Law

The Internet Will Not Break: Denying Bad Samaritans § 230 Immunity, Danielle Keats Citron, Benjamin Wittes

Fordham Law Review

Section 230 is overdue for a rethinking. If courts do not construe the scope of federal immunity to avoid injustice, we argue, Congress should amend the law. This is not to discount the important role that the immunity provision has played over the past twenty years. Far from it. Section 230 immunity has enabled innovation and expression beyond the imagination of the operators of early bulletin boards and computer service providers the provision was designed to protect. But its overbroad interpretation has left victims of online abuse with no leverage against site operators whose business models facilitate abuse. This state ...


Free Speech And The Confluence Of National Security And Internet Exceptionalism, Alan K. Chen 2017 University of Denver Sturm College of Law

Free Speech And The Confluence Of National Security And Internet Exceptionalism, Alan K. Chen

Fordham Law Review

In this Article, I argue that, notwithstanding these contemporary developments, the Court got it mostly right in Brandenburg. Or, I want to at least suggest that it is premature to reconstruct the Brandenburg test to address perceived changes in our global environment. For the most part, Brandenburg has succeeded in mediating the balance between protecting political or ideological advocacy and enabling the government to regulate actual incitement, even in the contemporary era. Moreover, I argue that society should be especially wary of calls to narrow Brandenburg’s speech-protective standard because such changes might be significantly influenced by the confluence of ...


Entertaining Satan: Why We Tolerate Terrorist Incitement, Andrew Koppelman 2017 Northwestern University

Entertaining Satan: Why We Tolerate Terrorist Incitement, Andrew Koppelman

Fordham Law Review

Words are dangerous. That is why governments sometimes want to suppress speech. The law of free speech reflects a settled decision that, at the time that law was adopted, the dangers were worth tolerating. But people keep dreaming up nasty new things to do with speech. Recently, the Islamic State of Iraq and Syria (ISIS) and other terrorist organizations have employed a small army of Iagos on the internet to recruit new instruments of destruction. Some of what they have posted is protected speech under present First Amendment law. In response, scholars have suggested that there should be some new ...


Digital Commons powered by bepress