|
CyberLaw Course Outlines |
© Cybertelecom ::Below is a list of sample syllabi for Internet law courses, designed to suggest possible courses of study. The problem is that there is so much good stuff to consider. There is a wealth of informative literature and history to review. It all depends upon what you want to study - how a course should be modeled. A course on Internet Governance would be significantly different from a course on the Internet in Communications Policy. Each subject area can be unraveled into a whole course of study (and even then just barely scraped the surface of the subject matter).
This is an expanding process that will scale. The first part of the process (which I am currently in) is to brain storm. Next, I will focus on individual syllabi - developing into mature products. And of course, as with everything in this area, most of this will be out of date before I have finished.
Themes
- Common Carriage
- Role of communications network in society
- Market Disruption
- Market growth and innovation
Model Outlines
- Communications Law
- Internet in Communications Policy
- Internet Policy
- Federal Internet Law
- Cybercrime
- Cybersecurity
- Friending Privacy: Online Privacy
- The First Amendment
- Intellectual Property
- Media
Communications Law
- Origins of Common Carriage
- Carrier of third party goods
- Economic Power; Significant Market Power
- Public Interest objectives (disabilities, public safety, law enforcement)
- Benjamin Franklin and the Postal Service
- Recurring Themes
- Content of choice (AP and Western Union)
- Destination of Choice (Strowger Switch)
- Device of choice (Hush a Phone; Carterphone)
- Industrial Policy
What is the difference between the objectives of a policy and the way in which a policy is implemented?
- Government Funded Telegraph
- First Transatlantic Cables
- Civil War
- Western Union and AP, and the Progressive Era
- Invention / Patent Era
- Voice Telegraph
- Patent wars
- Competition Era
- Monopoly Era
- Interconnection, Access to Credit, Western Electric and access to equipment
- Regulatory Oversight
- Common Carrier agreements
- Antitrust I: Kingsbury Agreement
- Interconnection as tool for barrier to entry
At the turn of the century, AT&T President Theodore Vail evangelized that competition resulted in the duplication of investment and was inefficient. "Two exchange systems in the same community, each serving the same members, cannot be conceived of as a permancy, nor can the service in either be furnished at any material reduction because of competition, if return on investment and proper maintenance be taken into account. Duplication of plant is a waste to the investor. Duplication of charges is a waste to the user." Theodore Vail, 1907. AT&T was repeating this mantra into the 1970s when MCI challenged to enter its market. Was AT&T right or partially right? Was AT&T wrong or partially wrong? Should the telecommunications market been opened to competition at the turn of the 20th Century? Was the USG effort in 1996 to introduce competition into the market place futile?
- Interstate Commerce Commission
- Federal Communications Commission
- Universal Service
- Stowger Switch
- WWI - Nationalization
- Labor / Unions
- Price regulation
Do communications networks always evolve towards monopoly or significant market power? Is there a way of maintaining competition in the telecommunications market or does the network market always tend towards a "natural monopoly"?
Model Class Units
Introduction to Telecom Law and Common Carriage Telephone Policy Part I: Invention through Divestiture Telephone Policy Part II: Telecom Act through PSTN Transition The Internet in Communications Policy Part I: The Computer Inquiries
Internet in Communications Policy Part II: VoIP Internet in Communications Policy Part III: Broadband Internet
- Powell Doctrine / Open Access
- Network Neutrality
Interconnection Part I: From Railroads to AT&T
Interconnection Part II: The Evolution of Internet Interconnection Administrative Procedure Law - Reintroduction of Competition
- CPE: Hush-a-phone; Carterfone
- Interconnection as tool for barrier to entry
- Antitrust II:
- Western Union
- Information Service
- Long Distance/ MCI
- Interconnection as tool for barrier to entry
- Telecommunications Liberalization
- Antitrust III: Divestiture
- Access Charges
- Interconnection as extracting rent
- Telecommunications Act of 1996 :: Competition or Consolidation
- Policy achieved through competition
- Codification of Computer Inquiries, not quite
Questions
- Did the Telecommunications Act of 1996 fail?
- Did the Telecommunications Act of 1996 anticipate the commercial Internet?
- PSTN Transition
Is telecommunications regulation effective? If so, what does telecommunications regulation achieve? Why is telecommunications regulation still necessary in the age of the Internet? If telecommunications regulation is not effective, was it ever effective? What policy objectives did telecommunications regulation achieve that, in your opinion, it no longer achieves?
John Brooks, Telephone: The First Hundred Years (Harper & Row 1975)
Internet in Communications Policy
What did the broadband plan achieve? Is the broadband plan guiding current USG broadband policy? What percentage of Broadband Plan recommendations have been implemented?
Social Policy Objectives
- Digital Divide / Universal Service
- Public Safety
- EAS
- 911
- Surveillance and CALEA
- ADA
- Privacy
- Marconi
- Early Radio. Department of the Navy
- The Titanic
- Federal Radio Commission
- Policy: Interference; Scarecity
- Federal Communications Commission
- License Assignment
- Beauty Pagents
- Auctions
- Unlicensed
Michael Marcus, WiFi and Bluetooth: The Path from Carter and Reagan era Faith in Deregulation to Widespread Products Impacting Our World, PPT, Unleashing Unlicensed: How WiFi Got Its Regulatory Grove, An IEP Conference at GMU (April 4, 2008)
Unlicensed spectrum appears to fall prey to the tragedy of the commons. Is unlicensed spectrum an efficient communications policy and if not, how could spectrum be better allocated?
- Mobile
- Policy achieved through competition
- Interstate Commerce Commission
- Common Carriage
- The Communications Act of 1934
- "Indendent Agency"
- Congressional Oversight
- Commission Structure
- The Telecommunications Act of 1996
- Administrative Procedures Act
- Judicial Review
- Chevron
Reading
- Chevron U. S. A. Inc. v. Natural Resources Defense Council, Inc., 467 US 837 (1984)
- Verizon v. FCC, DC Cir. Jan. 14, 2014
- City of Arlington, TX v. FCC, 133 S. Ct. 1863 (2013)
Questions
- Imagine Congress wanted to eliminate Chevron agency deference, preventing agencies from promulgating policies that appear inconsistent with Congressional will. How could Congress achieve this? What would be the drawbacks or consequences? Would the courts, who could no longer rely on agency expertise, become defacto regulatory agencies, duplicating regulatory proceedings to evaluate results? What lessons can be drawn from Judge Greene's antitrust proceeding breaking up Ma Bell?
- Can a regulatory agency change its mind? If so, how is a regulatory agency able to change its mind?
- Who gets to participate in the following decision making processes and how much influence do they have: judicial decisions, legislative decisions, agency decisions?
- Arbitrary and Capricious
- Jurisdiction; Ancillary Jurisdiction
- Statutory Authority
- Ancillary Jurisdiction
- Merger Review and Antitrust
Questions
- On what grounds can an aggreived party challenge an FCC promulgation of a new rule?
- An aggreived party believes that ISPs should not be forced to implement the requirements of CALEA. In what forum should the aggreived party petition the decision makers?
- An aggreived party objects to statements and submissions to the record in an administrative proceedure. The aggreived party believes that the submission is unsubstantiated and hearsay. How can the aggreived party object to the submission to the record
- The Recurring Cycle
Tim Wu, Master Switch
- EH on Internet and Radio
Reading
- Innovator's Dilemma
- Jerry Kang, Communications Law and Policy (4th Ed. 2012) [Delnero] [AU Law]
- Jonathan E. Neuchterlein and Philip J. Weiser, Digital Crossroads: American Communications Policy in the Internet Age (2nd Ed. 2013) [Delnero]
- Siegel, Paul.Communication Law in America, 4thEd. (Lanham, MD: Rowman &Littlefield Publishers, Inc., 2014).
- Telecommunications Law and Policy (Third Edition 2012), by Stuart M. Benjamin, Douglas G. Lichtman, Howard A. Shelanski and Philip J. Weiser [Fomali]
Example Syllabi
- Matthew Delnero, Communications Law (Fall 2013) GMU
- Akilah Fomali, Telecom Law 2013
- Lee Brown, Law of Mass Communications 2013, California State Uni Long Beach
- Ken Fellman, Preston Padden, Telecom Law and Policy 2012
- Rob Frieden, Telecommunications Law and Regulation, Penn State University 2011
- Prof. Linden, Communications Law 2000, University of Missouri Kansas City
- David Ostroff, Telecom Law and Regulation
The Internet in Communications Policy
Computer Inquiries
- Jurisdiction
- Internet over the telephone network
- Computer I (1968)
- Computer II (Basic versus Enhanced Services)
- Computer III (CEI)
- Telecommunications Act
- Industrial policy: Telecommunications liberalization (access charges)
- Stevens Report (hands off)
Reading
- Robert Cannon, The Legacy of the Computer Inquiries
- Kevin Werback, Digital Tornado FCC
What problem structurally did the FCC have with the enforceability of its Computer Inquiry rules?
How could the beneficiaries of the Computer Inquiries, small, innovative, market entering firms, seek enforcement of the rules? How would the enhance service providers overcome the burden that the information necessary for enforcement was in the hands of the telecommunications companies?
Cyberlibertarianism
- See Historical Evolution of Internet Policy
- CDA and the ACLU v Reno
- Hands off The Internet
- Unfettered Internet
AOL / TW Merger and the Instant Messaging conditions
Open Access
- Powell Doctrine
- Forebearance of Common Carriage status and unintended consequences, Prof. Barbara Cherry
- Brandx
- Computer II argument
National Cable & Telecommunications Ass’n v. Brand X Internet Services, 545 U.S. 967 (2005)
- Jurisdiction
Network Neutrality
- Broadband Principles
- Jurisdiction (Ancillary Jurisdiction must be ancillary to something)
- Open Internet 2010
Verizon v. FCC, DC Cir. Jan. 14, 2014
- Open Internet 2015
- Jurisdiction
John Oliver, Net Neutrality: Last Week Tonight with John Oliver (HBO) YouTube 2014
Questions
- Is the commercial Internet a telecommunications service?
- How does Internet network economics differ from previous telecommunications service economics?
- Do Internet access service providers have significant market power? Over whom?
- Is there a problem of discriminatory behavior on the part of Internet access service providers? How is this problem the same as or different that previous discriminatory behavior problems experience with telecommunications services?
- If network neutrality rules are removed, what will the Internet look like in five years?
Internet Interconnection
VoIP
- Innovation and Disruption
- ACTA Petition
- Competitive Pressure
- Stevens Report :: Impact of VoIP on Universal Service
- Industrial Policy:
- "Regulatory holiday"
- Arbitrage
- Functional Approach - or why do we regulate??
- Free World Dial Up
Its 2003. A VoIP phone like those provided by Vonage looks like and functions like a regular PSTN phone (mostly). How should a VoIP phone like Vonage, which operates using the North American Number Plan, fall within regulatory policy? Why?
- PSTN Transition
- Vonage and 911
- interconnected VoIP
- CVAA
- Hurricane Katrina
- PSTN Transition
Other Topics
- IPv6 Transition
- ADA
- Cybersecurity
- Media
Interconnection
Interconnection introduction
- Ability
- Network Effect
- Bottlenecks
- Incentives
- Increase network effect
- Increase barriers to market entry
- Extract rent from vertical or horizontal firms using the network
Railroads
Telegraph
Telephone
- Dual Service Era, Kingsbury Accord, and Universal Service
Milton Mueller, Universal Service : Competition, Interconnection and Monopoly in the Making of the American Telephone System (MIT Press 1997)
Consistent with the design of AT&T Pres. Theodore Vail, at the turn of the century AT&T became the government sanctioned monopoly, precluding competition from the market place. Government policy at that time established the policy framework for regulation of Ma Bell as a monopoly for the next 100 years. At this nascent point, was there an alternative policy approach that could have promoted competition? Could the era of Dual Service been established as the policy model, with competitive network offerings?
- Carterphone and Hushaphone
- MCI
- Divestiture and Access Charges
- Mobile Phone Service
- PSTN Transition
Interconnection and Backbones
- Internet Interconnection Introduction
- NSFNET and the three tiered topology
- Internet Exchange Points
- Evolution of Interconnection
- Interconnection 1980s: Origins (ARPANET, CSNET, NSFNET, CIX)
- Interconnection 1990s : Three Tiered Network with Settlement Free Peering and the creation of the Transit Business Model
- 1990s dePeering
- Appeals for regulatory intervention (Sec. 706, Digital Handshake)
- ICAIS
- Interconnection 2000s: Routing Around Transit (CDNs, Donut Peering, IXPs, Building Your Own Backbone)
- AOL / TW Merger and Instant Messaging
What problem was the FCC seeking to solve with the IM merger condition? Did the FCC effectively solve this problem? What lessons can be drawn from the FCC's IM merger condition?
- WCIT
- GAO Report
- Interconnection disputes between backbones
- Interconnection 2010s: Rise of the Access Networks and Paid Peering
- Rise of video content competing with traditional MVPD services
- 2010s merger conditions
Is it appropriate for the regulatory to be implementing regulatory policy through merger conditions instead of through an APA rulemaking proceeding?
Have the FCC's merger conditions historically been effective or enforceable?
- Open Internet
- Interconnection disputes between access networks and 'upstream' networks
- READING:
- Michael Kende, Digital Handshake
- William Norton, DrPeering and the Interconnection Playbook
Readings in Internet Policy
Intro
- Where Wizards Stayed up Late
- NSFNET Report, MERIT
- Is there such a thing as "cyberlaw"?
- David Clark, End to End (as design principle)
- Cyberlaw and the Law of the Horse
- The Victorian Internet
- Barry M. Leiner, Vinton G. Cerf, David D. Clark, Robert E. Kahn, Leonard Kleinrock, Daniel C. Lynch, Jon Postel, Larry G. Roberts and Stephen Wolff, A Brief History of the Internet, Internet Society; available at: http://www.isoc.org/internet/history/brief.shtml
Cyberlibertarian 1990s
- Prof. David D. Clark, A Cloudy Crystal Ball -- Visions of the Future, p. 551, 24th IETF, July 16, 1992 (presentation given at the 24th Internet Engineering Task Force) (slide presentation, in which Prof. Clark stated what became the motto of the IETF: "We reject: kings, presidents and voting. We believe in: rough consensus and running code." See also The Tao of the IETF
- John Perry Barlow, A Declaration of Independence for Cyberspace
- Johnson, David R. and Post, David G., Law and Borders - The Rise of Law in Cyberspace. Stanford Law Review, Vol. 48, p. 1367, 1996.
- David Isenberg, “Rise of the Stupid Network” (1997)
- Communications Decency Act
- Sec. 230, Good Samaritan
- Federal Communications Commission 1990s
- Computer Inquiries
- Steven's Report
- Digital Tornado
- Digital Handshake
- Internet Governance
- White Paper
- Milton Mueller, Ruling the Root
Cyberprogressives 2000s
- Lessig, CODE
- Lemley, Lessig, End to End as policy objective
- Clay Sharky, Here Comes Everybody: The Power of Organizing Without Organizations (2008) and Cognitive Surplus: Creativity and Generosity in a Connected Age (2010).
- Internet Freedom
- Network Neutrality
Cyber Realism
- The Internet becomes the norm
- Born Digital
- Cybersecurity
- Surveillance
- Timothy Wu, The Master Switch
- 2016 Election
Internet History: Hippies & Soldiers: Origins of the Internet
Pre ARPANet
- Sputnik
- Paul Baran, RAND
- AT&T rejects packet switching
ARPANET
- History:
- Licklider,
- Robert Taylor, Larry Roberts
- Vint Cerf, Steve Crocker, Jon Postel
- AT&T rejects the ARPANet
- ARPANet becomes the Internet
- Telenet
- Design
- End to End
- David Isenberg, “Rise of the Stupid Network” (1997)
- The trust network and unintended consequenses
- Layered Model
- Permissionless Innovation
- Sir Tim Berners-Lee and the open World Wide Web
- The laboratory of innovation: The Garage
- Open Internet
- Telephone for computers
NSFNET
- Motivation of companies to learn packet switching
- AUP
- MCI Email
- CIX
- Privitization
- Al Gore
NSFNET Final Report 1987-1995
Public Internet
- Internet in Communications Policy
- Internet and Culture
Reading
- Barry M. Leiner, Vinton G. Cerf, David D. Clark, Robert E. Kahn, Leonard Kleinrock, Daniel C. Lynch, Jon Postel, Larry G. Roberts and Stephen Wolff, A Brief History of the Internet, Internet Society; available at: http://www.isoc.org/internet/history/brief.shtml
- Tim Berners-Lee, Weaving the Web: The Original Design and Ulitmate Desitiny of the World Wide Web
- Katie Hafner, Matthew Lyon, Where Wizards Stay Up Late (Simon & Schuster 1998)
Federal Internet Law
- Will the real Internet please stand up? Definition of te Internet?
- What is cyberspace?
READING:
- Cannon, Robert, Will the Real Internet Please Stand Up: An Attorney's Quest to Define the Internet (March 2004). Telecommunications Policy Research Conference 2002. Available at SSRN: https://ssrn.com/abstract=516603 or http://dx.doi.org/10.2139/ssrn.516603
- Definition of the Internet, Federal Networking Council
- Statutory definitions of the Internet
How do you define a network? How do you define the Internet? How do you define the Public Telephone Network? How do you define the telecommunications service network?
- Internet History
- Internet Policy
- Internet Privacy
- Internet and First Amendment
- Internet in Communications Policy
Internet governance
- USG
- DOD
- ARPA
- DCA
- NSF
- CSNET
- NSFNET
- Privitization
- ComPriv and ANS
- The NAPs
- Federal Networking Council
- DOC NTIA
- FCC
- Community based
- IETF
Reading
- Prof. David D. Clark, A Cloudy Crystal Ball -- Visions of the Future, p. 551, 24th IETF, July 16, 1992 (presentation given at the 24th Internet Engineering Task Force) (slide presentation, in which Prof. Clark stated what became the motto of the IETF: "We reject: kings, presidents and voting. We believe in: rough consensus and running code."
- The Tao of the IETF
In 1992, Prof. David Clark declared "We reject: kings, presidents and voting. We believe in: rough consensus and running code." This became a mantra of the cyberlibertarian era. Is that mantra still valid today? Why or why not?
- IANA
- IANA Function Transition
- ICANN
- Green Paper / White Paper
- Transparency
- Accountability
- Authority
Management of Internet Domain Names and Addresses, a statement of policy. NTIA June 5, 1998
Questions
- If ICANN is a multistakeholder organization operating on a global basis, to whom it is accountable and how is it accountable?
- Is ICANN a successful model of governance?
- How is consensus driven governance different than other forms of government? Is "consensus" the same as "unanimous"? How is consensus achieved?
- ITU (WCIT)
- NANOG
- Intellectual Property
- Cybersecurity
- Cybercrime
- Ecommerce
- Internet Liability
- Liability for Third Party Content
- 47 USC 230
- DMCA / Notice and Takedown
- Electronic Communications Privacy Act
- Network Neutrality
- Offensive Content
- eGovernment
- Open Government
- Government Services online
- eFOIA
- Access to Government Records
Reading
- JAMES GRIMMELMAN, INTERNET LAW: CASES AND MATERIALS, 5TH ED. (Semaphore Press 2015)
Example Syllabi
- Kevin Werbach, Internet Law and Policy 2016
- Prof. Grimmelmann, New York Law School, Internet Law
- Eric Goldman, Internet Law, Santa Clara University
- Prof Weinberg, Lex 8256: Seminar: The Law in Cyberspace
- Jessica Litman's List of Cyberlaw Courses From Law Schools
- Camille Chin, Cyberspace Law 2000
- Prof. David Post's Law of Cyberspace - Fall 1996
- Prof. Michael Froomkin's Law and the Internet Seminar
- Pamela Samuelson, Cyberlaw 1997
Cybercrime
Definition
- Crimes over the network
- Crimes to the network
Access
- Access to information; access to systems
- Unauthorized access
- Criminalization of Terms of Service
- Lori Drew
- Hacking
- Wifi Networks
- Open Wifi Networks
- Google Spyfi
- Theft of service
- Phone Phreaks
- Improving security
- Threat vectors
- Law:
- READING
- Cliff Stoll, The Cuckoo's Egg
Searching & Seizure, Evidence & Forensics
Surveillance Friending Braindeis READING: CCIPS, Searching & Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations Crimes Over the Network
- Spam, Phishing
- Can Spam Act
- Fraud
- Ransomware
- Stalking
- Identity Theft
Spyware Intellectual Property Theft Gambling Example Syllabi
- Prof. Chris Jay Hoffnagle, Computer Crime Law, Berkeley (Fall 2012)
- Adjunct Professor Ronald N. Weikers, CyberCrime, Course Number CR0014LEC, Spring 2004
Cybersecurity
Definition
- Threat vectors
History
- Morris Worm
- Stuxnet
- READING: Cliff Stoll, The Cuckoo's Egg
Policy
- White House Cybersecurity Policy
- FISMA
- Roles of different agencies
- DHS
- NIST
- Authentication
- Cyberwar
- Information Warfare
Friending Brandeis: Surveillance
Friending Brandeis: Privacy: From Self Regulation to Surveillance State
- FTC - Self Regulation
- Children's Online Privacy Protection Act
- FTC - Beyond Self Regulation
The Origins of the 4th Amendment
The First Revolution: The Telephone
- Brandeis
- Olmstead
- Katz
- ECPA
The Second Revolution: Computer Networks
- ECPA
- FISA
The Third Revolution: Web 3.0 and User Generated Content
- Social Media - Expectation of Privacy
- Pew Internet
- danah boyd
- The Surveillance State
- Snowden
- Patriot Act
- Use of social media (use of social media information to review applications for government benefits)
- Corporate Surveillance
- Employer / Employee Monitoring
Online Privacy
- Surveillance: Friending Braindeis
- Children's Privacy
- COPPA
- Advertising and profiling
- Internet of Things; Cloud
- Network Privacy, the FCC, and CPNI
- Right to Privacy (Tort)
- European Privacy
- Safe Harbor (NTIA)
- Post Snowden
- Corporate Surveillance
- Big Data
- Workplace Monitoring
- Identity Theft
Who owns the data? How can the Right to Privacy and the Right to be forgotten be reconciled with the First Amendment?
First Amendment
- First Amendment
- Prior Restraint
- Strict Scrutiny
- Narrowly Tailored
- Overbreadth
- Vague
- Time, Place, and Manner
- Obscenity
- Child Pornography
- Other (copyright, defamation, harassment)
- Anonymous Speech
- Broadcast, Media
- FCC v Fox Television Stations
- Pacifica
- Red Lion
- v-chip
- Cable
- News
- Pentagon Papers
- Telephone
- Internet
- Internet history - design objectives
- Laws
- Communications Decency Act
- Reno v. ACLU
- Is it broadcast TV?
- Legacy
- Hands off the Internet
- Cyberlibertarianism
- Unfettered Internet
- 47 USC 230(c)
- Third Party Content
- Protection for making Internet safe
- Child Online Protection Act
- Childrens Internet Protection Act
- Truth in Domain Names Act
- Reports
- Thornburgh Report
- COPA Commission
- Age Verification
- Filters
- Digital Literacy
- Bogie men
- We Loved Your GPA but then we saw your tweets
- Empowerment
- Tanya Byron, We are raising our children in captivity
- OSTWG Report
- To Tweet or Not to Tweet
- Child Safe Viewing Act Report
- Byron Report :: We are raising our children in captivity
- Berkman Center Report
- Online Safety and Technology Working Group Report
- Other issues
- Cyberbullying
- Revenge Porn
- Hate Speech
- Stalking
- Copyright
- Commercial Speech
- Spam
- Internet Freedom
- State Department Policy and activities
- VOA funded activities
- TOR
- USA Anti-Freedom activities
- Snowden
- BART communications network shut down
- Cyberwar
- Crypto
- Arab Spring
Rebecca MacKinnon, Consent of the Networked
Who does Internet Freedom and New Media favor? Does it favor disruption and revolution? Or does Internet Freedom and New Media empower those in power as much as it empowers dissidents? Has New Media been a win or a loss?
Internet and Intellectual Property
- Copyright
- Pre DMCA
- DMCA
- Youtube
- Viacom?
- Anticircumvention
- Cellphone unlocking
- Peer to Peer
- Is it legal to link
- Metatags
- Framing
- Linking
- Deep Linking
- Linking to known infringing content
- Fair use
- Public Domain
- "Economic Impact"
- ICE
- SOPA
- No Electronic Theft Act
- Trademark
- Trademarks 101
- Domain Name Cybersquatting
- DNS
- UDRP
- AntiCybersquatter Consumer Protect Act
- Parody / Gripe Sites
- PETA
- Verizon
- Patents
- "Patent Trolls"
- Patent Wars
- Patent Warehousing
- Counterfeit goods sales
- ICE
Sample Syllabi
- University of Missouri Rolla CS 317 Computers and the Law a/k/a Intellectual Property for Computer Scientists
Media
Policy
- Spectrum
- Scarecity
- Public Trust
- Public Safety (EAS)
Broadcast
- History
- Antitrust / NBC
- Ownership
- Obligations
- Educational
- Digital TV Transition
Cable
- Ancillary Jurisdiction
- Content negotiations
- Must carry
- ReTransmission Consent
- PEG
- Market Disruption: Over the Top Video
First Amendment
The Attention Marketplace
- Twitter, and the Return of Real Time TV
- Over the Top Video
- Interconnection and barriers to market entry
News / Fourth Estate
- Associated Press, Western Union, and the Progressive Era
- The Communications Needs of Local Communities, FCC Report
- Audience becomes front line reporter
- Information Gathering
- Tiananmen Square
- Broken Business Models
- Revenue from classified ads, real estate
- New Media
- 2016 Election, Fake News and lack of authoritative media voice
- Wikipedia
- Market Disruption: New Media
Reading
Has market disruption in the area of news media been a good thing or a bad thing? Explain?
- The Information Needs of Communities, FCC 2010
- Paul Starr, The Creation of the Media (Basic Books 2004)
Legal
- Copyright
- Libel and Defamation
- SLAPP Suits
- Privacy
Reading
- Mass Media Law, Don R. Pember and Clay Calvert, McGraw Hill (used in undergraduate courses)
- Mass Communication Law in Arkansas, Bruce L. Plopper, 4th ed.
- Public Communication & The Law, Middleton, Chamberlin & Bunker,
Ecommerce
- Delivery rules
- Internet Privacy
- FTC Title V
- Taxation
- Internet Tax Freedom Act
- SPAM
- Electronic Signatures
- Click Wrap agreements
- Notice