Friday, May 14, 2010

ReTweet ReLawsuit? Novins v. Cannon, Civ. No. 09-5354 (DNJ April 27, 2010)

Phishing Scams

I am grateful for the new Web 3.0 era of Facebook and Twitter. I am grateful because my email inbox is no longer filled with stupid crap that my friends were constantly forwarding. I think that's why so many old folk like Facebook and Twitter – it is the institutionalization of forwarding crap. All those old jokes and hoaxes and puppies needing adoption and cancer patients in England who wish to be sent letters – that has all migrated to Facebook posts and Tweets. And instead of getting forwarded half of a billion times, now it gets retweeted. And now my email inbox is merely filled with offers of money making opportunities.

Which brings us to today's question: What happens when I retweet (forward, repost, whatever) a post which is defamatory? Sec. 230, the Good Samaritan Act, protects internet hosts which host content written by someone else that is defamatory. The internet host does not become a publisher of the content just by merit of hosting it (much in the same way that the telephone network does not become a publisher by transmitting defamatory statements, or the postal service does not become a publisher merely by delivering a defamatory message). What happens when I receive a message, written by someone else, that might be defamatory (regardless of whether I know it or not), and I forward it, retweet it, or repost it. And what if, hypothetically speaking, my last name is Cannon. Today's story involves just such a saga.

As always, in our review, the names have been changed – largely 'cause we never like to hear about anyone named "Cannon" being a defendant – and the story has been reformatted to fit your screen.

The facts of this case are relatively simple. Defendant Gilligan allegedly wrote a post that allegedly stated that Plaintiff Thurston Howell hires drug addicts, his clients suffer identity thefts, and that Plaintiff is mentally ill. Gilligan sent this message to Mary Ann, Ginger, and Skipper, who forwarded on to three friends (and so on and so on). Thurston Howell took his coconut satellite phone that the Professor had made for him, and used it to immediately call his attorney who was on retainer. The attorney sued everyone in sight for publication of a defamatory message about Thurston. The cause of action for defamation falls not only on those who voice the defamatory utterances, but also those who might then dare to "publish" those utterances.

Before the District Court in New Jersey (yes, somehow although our castaways are stranded in an island in the south Pacific, their case is heard in Jersey – makes sense doesn’t it?) is a motion to dismiss by defendants. In a Rule 12(b)(6) Motion to Dismiss, defendants argue that taken the alleged facts in light most favorable to Plaintiff, Plaintiff still has stated nothing that adds up to a legal cause of action.

The Court made quick work of this. Normally Sec. 230 protection is discussed in the context of the protection of a web host, such as a review site where a third party has posted a negative comment about a plaintiff. This case does not involve a host but instead "users of an interactive service." As Sec. 230(c)(1) states, "[n]o provider or user of an interactive computer service shall be treated as the publisher or speaker of any information provided by another information content provider." The Court affirms the well established principle that potential liability for third party content falls upon the third party, and not on others on the Internet.

Plaintiffs' allegations in this case—as against all of the defendants other than Gilligan —are very similar to the situation where a person operates a website that displays other people's comments. Defendants are alleged to have republished a defamatory web posting or email originally authored by Gilligan. As multiple courts have accepted, there is no relevant distinction between a user who knowingly allows content to be posted to a website he or she controls and a user who takes affirmative steps to republish another person's content; CDA immunity applies to both. As the Ninth Circuit aptly noted in Batzel v. Smith, "The scope of immunity cannot turn on whether the publisher approaches the selection process as one of inclusion or removal, as the difference is one of method or degree, not substance." Similarly, it does not matter how Defendants republished the alleged defamatory statements—whether by email, website post, or some other method. The point is that all the Defendants in this case—with the exception of Gilligan—acted as re-publishers of another person's information, and as such they are protected by the CDA.

Retweet, repost, forward – it's all the same. According to this Court, you are not a publisher and therefore not liable for third party content. The cause of action as against everyone – but Gilligan the author – gets the boot.

Let's see what today's lesson is: "Wheel of Morality, turn, turn, turn - Tell us what lesson we should learn." [Whirl, Click, Click, Clock]: Skipper's real name was Jonas Grumby! That might explain why they got ship wrecked.

[Disclaimer]

Wednesday, May 12, 2010

[Event] Toward a Sustainable Spectrum Policy: Rethinking Federal Spectrum June 3

PK is announcing the following:

Toward a Sustainable Spectrum Policy: Rethinking Federal Spectrum
A conference hosted by Public Knowledge
(Click to RSVP)
June 3, 2010

The Washington Court Hotel on Capitol Hill
525 New Jersey Ave., NW
Washington DC, 20001

Panel 1: Federal Secondary Markets

Panelists will address the Public Knowledge white paper, "Federal Spectrum Secondary Markets: A Third Way Forward for Federal Spectrum Reform," released for the event.

Panel 2: Improving Federal Spectrum Management

This panel will focus on the second white paper released by Public Knowledge, also writted by Harold Feld and Gregory Rose: "Transparency, Efficiency, Access: How To Reform Federal Spectrum Management."

Agenda:

8:00 a.m. Coffee and Registration


8:45 a.m. Welcome (Gigi B. Sohn)

9:00 a.m. Overview Presentation: Averting The “Spectrum Crisis”

9:30 a.m. Panel 1: Federal Secondary Markets

Panelists:
Coleman Bazelon, Principal, The Brattle Group
Kathy Brown, Senior Vice President, Public Policy
Development, Verizon (invited)
Chris Duffus, Senior Vice President, Spectrum Bridge
Rick Whitt, Washington Telecom Counsel, Google (invited)
Jim Kohlenberger, Chief of Staff, Office of Science &

Technology Programs (invited)

Respondents:
Harold Feld. Legal Director, Public Knowledge
Gregory Rose, Principal, Econometric Consulting

10:45 a.m. Networking Break

11:00 a.m. Panel 2: Increasing Transparency and Efficiency for Federal Spectrum

Moderator:
TBA

Panelists:

Kathleen Ham, Vice President for Federal Regulatory

Affairs, T-Mobile
Janice Obuchowski, President, Freedom
Technologies (invited)
Jessica Rosenworcel, Senior Counsel, Senate Commerce
Committee (invited)
Karl Nebbia, Deputy Associate Administrator, NTIA

Respondents:
Harold Feld
Gregory Rose

12:15 p.m. Adjourn*

This is a widely attended event.

[EVENT] Future of Music Coalition: DC Policy Day 2010

New America and Future of Music are announcing:

"An event hosted by the New America Foundation

"This year has already seen a host of policy developments that will affect the entire music ecosystem - from the FCC’s authority to regulate the internet to international copyright concerns to the impact of health care reform on the music community.

Event Time and Location
Tuesday, May 25, 2010 - 11:00am - 6:00pm
New America Foundation
1899 L Street NW Suite 400
Washington, DC, 20036
"D.C. Policy Day 2010 will bring these issues into focus through informed presentations and panel discussions. A live webcast, available on this page, will bring the conversation to a global audience of artists, academics, industry professionals, journalists, music fans and more.

"Topics to be covered include the hotly debated Anti-Counterfeiting Trade Agreement (ACTA), the recent Live Nation/Ticketmaster merger, efforts to preserve an open internet, and the health insurance landscape for musicians following the passage of historic health care legislation. Policy Day 2010 will also examine how the creative industries are faring under current Washington leadership as we head into a new election cycle.

"Join us for this FREE event in Washington, DC hosted by the New America Foundation. Can’t make it to the District? Be sure to tune in to our interactive live webcast, which can be found on this page the day of the event.

"For more information please visit the Future of Music Coalition's website at http://futureofmusic.org/events/dc-policy-day-201.

Tuesday, May 11, 2010

[EVENT] June 11 Online Censorship – Implications of Content Filtering for Content Access At Home and Abroad

Forum 1: Online Censorship – Implications of Content Filtering for Content Access At Home and Abroad

Date: Friday, June 11, 2010, 9:30am – 2:00pm.
Location: Dickstein Shapiro Conference Center
1825 Eye Street, Northwest, Washington D.C.

Description: "Internet content and applications providers face a large and growing number of challenges from governmental filtering and censorship in countries around the globe. Companies such as Google and Facebook have developed a range of responses to practices adopted by governments in China, Turkey, Australia, and elsewhere. The filtering practices themselves, and content providers’ responses to them, have domestic ramifications and relevance for policy debates in the U.S. about privacy, freedom of expression, and access to online content. In the first event of its 2010 forum series, MAP will lead a dialogue between experts on filtering and representatives from affected providers to discuss the consequences of control over access and speech in the domestic and international contexts."

Monday, May 10, 2010

[Event] Federal Communications Oversight and Authority: Who Is in Charge? May 11

NetCaucus AC Briefing on Net Neutrality (5-11-2010)

Federal Communications Oversight and Authority: Who Is in Charge?
Tuesday, May 11, 2010 - 12:00 am – 1:30 pm
Luncheon Panel Discussion U.S. Capitol Visitors Center, Room SVC 209/208

(Located on the North or right-hand side of the lower level)
Please RSVP to rsvp@netcaucus.org or via phone to 202-638-4370.

On Thursday, FCC Chairman Julius Genachowski and General Counsel Austin Schlick announced a new plan to ensure the FCC's oversight and regulatory authority over broadband Internet access services. This new proposal and its outlook will be discussed at length by our panelists on May 11. We look forward to seeing you there!

Panelists:

  • Markham Erickson, Holch & Erickson LLP and Executive Director, Open Internet Coalition [bio]
  • Jonathan E. Nuechterlein, Partner, WilmerHale [bio]
  • Gigi Sohn, Public Knowledge [bio]
  • Christopher Yoo, University of Pennsylvania Law School [bio]

What: Luncheon Panel Discussion (Lunch will be served; this is a widely attended event.)
Where: U.S. Capitol Visitors Center, Room SVC 209/208
When: Tuesday, May 11, 2010 12:00 pm – 1:30 pm
RSVP: Please send RSVPs to rsvp@netcaucus.org or via phone to 202-638-4370.

This widely attended educational briefing is hosted by the Congressional Internet Caucus Advisory Committee (ICAC), part of a 501 (c)(3) charitable organization. Congressional staff and members of the press welcome. The ICAC is a private sector organization comprised of public interest groups, trade associations, non-profits, and corporations. More information on the ICAC is available at www.netcaucus.org.

Advisory Committee to the Congressional Internet Caucus
1634 I Street NW - Washington, DC 20006
www.NetCaucus.org
Find us on Facebook!

[Event] THE FCC'S AUTHORITY OVER BROADBAND ACCESS

THE FCC'S AUTHORITY OVER BROADBAND ACCESS
Co-hosted by the Berkman Center for Internet & Society at Harvard
University, and the Wharton School, University of Pennsylvania

Thursday, May 27, 2010, 9:00am-12:30pm
National Press Club -- 529 14th Street, NW, Washington DC


Attendance is free, but space is limited. To register, RSVP at the
link above, or email Amar Ashar with your name and affiliation.

* * *
On what basis, if any, does the FCC exercise jurisdiction over
broadband access in pursuit of national goals? FCC Chairman
Genachowski announced on May 6 that he intended to pursue a "Third
Way" between the current "ancillary authority" approach and full
imposition of Title II "telecommunications service" obligations on
Internet providers. Just what does this approach mean for the future
of broadband competition, Internet-based innovation, and the National
Broadband Plan? At this non-partisan event, legal experts and former
senior policy-makers will analyze how the U.S. arrived at this point,
and what steps the FCC and other branches of government should take
now.

Session 1: The History and Context of the Debate
- Moderator Kevin Werbach (The Wharton School, Univ. of Pennsylvania)
- John Nakahata (Partner, Wiltshire & Grannis; former Chief of Staff, FCC)
- Jessica Rosenworcel (Sr. Counsel, Senate Commerce Committee)
- John Windhausen (Telopoly; former Sr. Counsel, Senate Commerce Committee)

Session 2: The Third Way - What Happens Next?
- Moderator Kevin Werbach (The Wharton School, Univ. of Pennsylvania)
- Yochai Benkler (Harvard Law School)
- Susan Crawford (Univ. of Michigan Law School)
- James Speta (Northwestern University Law School)

A complimentary continental breakfast will be served.

Please direct all questions to Amar Ashar at ashar@cyber.law.harvard.edu.

Thursday, May 06, 2010

A Hack. A Scrape. A Crash. A Lawsuit. Snap-On Business Solutions, Inc., v O'Neil Associates, Inc., 5:09-CV-1547 (ND Ohio April 16, 2010)

In today's story, we hear a tale of a business deal gone sour, the alleged hacking and crashing of a computer system, data that are free except when it's not, and words that don’t always mean what they appear to mean. And while the characters in our story managed to have at least six disputes, we once again only focus on the federal causes of action, ignoring the other stuff.

The facts of this case involve an old favorite – a relationship breakup. And as always, in our story the names have been changed to protect the innocent (and to be totally Dragnet-like, I have acquired one of those really square haircuts). The story has been reformatted to fit your screen.

In this case, Third Party Thurston hired Plaintiff Penelope to make a database of Third Thurston's products for sale. Plaintiff's databases include pictures, links, and searchability. Plaintiff hosted the database on its servers and provided host network security. Third Thurston was responsible for authorization security (issuing and maintaining user names and passwords). The parties further agreed that all the work that went into creating the database was the property of Plaintiff – but that the data in the database constituted Third Thurston's trade secrets. Thurston provided Plaintiff with all the data and information about Thurston's products in order to make the database.

After a while Third Thurston decided he wanted to go with Defendant Daffy to make the database. When Thurston asked Plaintiff Penelope for the data, Plaintiff said, "Nope." Third Thurston then asked Defendant Daffy to "scrape" Plaintiff's database for the data. This scraping took place over several months and allegedly caused spikes in traffic loads on Plaintiff's servers. Plaintiff Penelope took offense at this scraping, blocked Defendant Daffy's IP Addresses, and sued Defendant Daffy (not Third Thurston). Defendant and Plaintiff are, of course, in the same line of business.

In this decision, the Court had before it a motion for Summary Judgment. In a motion for summary judgment, the moving party argues that no facts are in dispute and that the case can be resolved on paper, without a trial. If relevant facts are in dispute, then a motion for summary judgment fails. There are two federal causes of action: (1) Computer Fraud and Abuse Act and (2) Copyright Infringement.

Computer Fraud and Abuse Act: This is another example of the CFAA being used for a civil remedy – normally we hear about the CFAA in the context of criminal convictions. The question at hand is whether Defendant Daffy's access of Plaintiff Penelope's computers was authorized. This not a case, the Court points out, where a contract has been dissolved – and one party attempts access after termination of the contract having lost authorization. The contract between Plaintiff and Third Thurston was still in place, and Third Thurston was in charge of access authorization. Doesn’t that mean that Third Thurston gets to say who gets access and who does not? Third Thurston gave Defendant authorization to access the database. It seems like the access is authorized.

But the Court is not convinced that Third Thurston had the ability to authorized access to just anyone. There is some factual ambiguity as to the full scope of Thurston's authority. A part of the contract between the parties indicates that Thurston could only authorize access by Dealers, and the Dealers could use the database only "for its intended purpose" (how's that for vague!). On the one hand its plaintiff's servers, on the other hand Thurston got to hand out authorizations, but on the other hand it was just suppose to be "for the intended purpose." Where does that leave us, asks the Court. That creates a factual dispute (what is the scope of Thurston's authority) – and therefore the motion for summary judgment is denied.

Copyright Infringement: The second cause of action is for copyright infringement. This cause of action, as they say in legal jargon, "steps in the doo-doo." First, some basics. Ideas and facts are not copyrightable. It's original creative intellectual work that is copyrightable. The fact that the Earth is the center of the universal and that the Sun revolves around the Earth – is not copyrightable. Ptolemy's treaty explaining the whole Earth-is-the-center-of-the-universe thing is copyrightable. Now if I take a whole bunch of facts, and arrange them in a database – the database is not copyrightable. But if I add original structure or navigation or content to the database in order to improve the user experience, those creative enhancements are copyrightable. And it is on this legal boundary that a long list of legal battles have been pounded out – when does data which is not protected by copyright become protected by copyright when placed in a database?

Plaintiff argues that when defendant scraped the database, it copied the improvements and the creative aspects of Plaintiff's work. Defendant argues in its motion for summary judgment, "Nut uh. Plaintiff's 'database does not possess the minimal degree of creativity required for copyright protection because its structure is obvious.'" The Court points out that when Defendant scraped the database, it took the link structure and navigation information – along with a bunch of other stuff. Defendant reiterated its argument – "yeah, but you're Honor.The structure of the data, I mean it was obvious."

"Oh yeah??" exclaimed the Court (in A Few Brave Men like moment). "If the structure of the data in the database is obvious, how come you marketing pitch to Thurston was that that you would provide a better database by altering the arrangement of the data."

Whoops. Guess you cant argue that the arrangement of the data in the database you scraped was obvious, when your whole business plan rests on the fact that there are different ways of arranging the data – and your way is better. Score one for the Judge. Since Plaintiff's enhancements to the database could arguably be protected by copyright, defendant's motion for summary judgment once again fails.

Okay class, now here is your extra credit question. In Round Two of this case, assume ultimately hypothetically that it is found that the database is the property of Third Thurston, and that it was properly within the scope of Thurston's authority to grant access authorization to the database to Daffy. Plaintiff blocked Daffy's access by blocking Daffy's IP numbers. Does Thurston have a cause of action against Plaintiff for blocking an authorized user – and if so, what would that cause of action be?

Technology & Marketing Law Blog has an excellent review of this case, going over all of the causes of action. Technology & Marketing Law Blog make a number of astute observations – including the obvious – if you contract with someone to do data work for you, include a provision that says the data and database is yours - and if you say gimme gimme, you gettie gettie.

[Disclaimer]

Thursday, April 22, 2010

[RFC] FCC Commences Inquiry On Survivability Of America’s Broadband Infrastructure

News Release: "The Federal Communications Commission (FCC) today launched an inquiry on the ability of existing broadband networks to withstand significant damage or severe overloads as a result of natural disasters, terrorist attacks, pandemics or other major public emergencies, as recommended in the National Broadband Plan.

"As Americans increasingly rely on broadband services for so many aspects of their lives, including public safety and national security, it is critical for the FCC to gain a better understanding of the survivability of existing networks and explore potential measures to reduce network vulnerability to failures in network equipment or severe overload conditions in emergencies.

"Although core broadband networks are generally presumed to be quite resilient, there may be weaknesses closer to the network edge. Accordingly, today’s Notice of Inquiry (NOI) seeks comment, analysis and information on the present state of the resiliency and redundancy of broadband networks to withstand physical damage and severe network overload. This is a vitally important first step in ensuring that the FCC can take all necessary actions to ensure ongoing broadband communications in times of disaster or crisis.

"The NOI includes the following questions related to the resiliency of broadband networks:

  • What are the major single points of failure in broadband architectures?
  • What measures do communications providers already take to minimize the potential for single points of failure?
  • What provisions are made by communications providers to ensure the survivability of cell sites relied on by first responders?
  • What are the most effective and widely deployed physical security best practices?
  • Should traffic to and from critical emergency response agencies and for critical services be prioritized on the networks during emergencies?
  • What steps have been taken to ensure redundancy and diversity of physical network links to hardware?
  • Is the capacity of residential access networks sufficient to handle sudden surges or overloads in traffic during, for example, a pandemic emergency?
  • What network management practices are in place to handle overloads during emergencies?
"The FCC looks forward to reviewing the record and exploring how best to further improve and secure America’s broadband infrastructure into the future. The deadline for comments on the issues presented by the NOI will be 45 days and reply comments 75 days after publication in the Federal Register.

Action by the Commission, April 21, 2010, by Notice of Inquiry (FCC 10-62). Chairman Genachowski, and Commissioners Copps, McDowell, Clyburn and Baker. Separate Statements issued by Chairman Genachowski, and Commissioners Copps, McDowell, Clyburn and Baker. PS Docket No. 10-92.

Public Safety and Homeland Security Bureau (PSHSB) contact is Jeff Goldthorp, Chief of the Communications Systems Analysis Division, at (202) 418-1096.

4/21/10 FCC Commences Inquiry on Survivability of America's Broadband Infrastructure. News Release: NOI:


[RFC] FCC Launches Inquiry On Proposed Cyber Security Certification Program For Communications Service Providers

Press Release: "The Federal Communications Commission (FCC) today adopted a Notice of Inquiry (NOI) that seeks public comment on the proposed creation of a new voluntary cyber security certification program that would encourage communications service providers to implement a full range of cyber security best practices. This National broadband Plan recommendation serves as a first step to implementing a comprehensive roadmap to help counter cyber attacks and better protect America’s communications infrastructure.

"Enhancing the cyber security of the nation’s infrastructure is critical to the proper functioning of communications networks serving America’s financial institutions, national energy grid, medical institutions, educational system, and public safety. Yet, broadband communications networks are susceptible to malicious attack. Despite the increasing threat of cyber attacks, many communications end-users do not consider cyber security a priority. In 2008, a Data Breach Investigations report concluded that 87-percent of cyber breaches could have been avoided if reasonable security controls had been in place.

"The goals of a voluntary cyber security certification program would be to:
  • Increase the security of the nation’s communications infrastructure;
  • Promote a culture of more vigilant cyber security among participants in the market for communications services; and
  • Offer consumers (or end-users) more complete information about their communication providers’ cyber security practices and ability to better protect their personal computer hardware and online activity from cyber attacks.
"The NOI seeks comment on a voluntary certification program under which private sector auditors or the FCC would conduct security assessments of participating communications service providers’ networks, including their compliance with stringent cyber security practices developed by a broad-based public-private partnership. Providers whose networks successfully completed this assessment would then be able to market their networks as complying with these FCC network security requirements.

"Further, the NOI includes the following questions regarding the proposal:
  • The benefits and costs of such a program.
  • Whether such a program will create a significant incentive for providers to increase the security of their systems and improve their cyber security practices.
  • Whether public knowledge of providers’ cyber security practices would contribute to broader implementation by industry.
  • Whether the scope of the certification program should be open to all communications service providers or should be limited to certain types of providers. If the latter, how should this be limited?
  • What the overall framework should be for the certification criteria.
  • The composition of a certification authority and whether it should be open to all segments of the potentially affected industries.
  • The operating procedures of a certification authority.
  • Who should be responsible for establishing the requirements that auditors must meet to be accredited to conduct cyber security assessments under the proposed program?
  • What should be the appropriate certification criteria, accreditation procedures, and requirements to maintain certification once obtained?
  • Whether the network security criteria should be definitive and objectively measurable or established on a case-by-case basis.
  • The development and application of assessment standards.
  • The form and duration of the security certificate, the renewal process, and permissible uses by providers of the security certificate.
  • How appeals of certification issues should be handled.
  • Whether any Commission enforcement process should be implemented for this program.
The NOI seeks comment on other actions, including voluntary incentives the Commission can take to improve cyber security and asks about actions the Commission can take to better educate consumers, businesses and government agencies about cyber security.

Action by the Commission, April 21, 2010, by Notice of Inquiry (FCC 10-63). Chairman Genachowski, and Commissioners Copps, McDowell, Clyburn and Baker. Separate Statements issued by Chairman Genachowski, and Commissioners Copps, McDowell, Clyburn and Baker. PS Docket No. 10-93.


Public Safety and Homeland Security Bureau (PSHSB) contact is Jeff Goldthorp, Chief of the Communications Systems Analysis Division, at (202) 418-1096.

4/21/10 FCC Launches Inquiry on Proposed Cyber Security Certification Program for Communications Service Providers. News Release : NOI



[RFC] FCC Kicks Off Universal Service Reform

Press Release: "The Federal Communications Commission today took its first step toward a once-in-a-generation transformation of the Universal Service Fund from supporting networks providing plain old telephone service into an effective and efficient tool for making affordable, high-quality broadband communications service available to all Americans.

"The National Broadband Plan that the Commission sent to Congress last month identified the need for comprehensive universal service reform that does not unnecessarily burden consumers. Today’s Notice of Inquiry (NOI) and Notice of Proposed Rulemaking (NPRM) begin the hard work of implementing the Plan’s recommendations, which include cutting inefficiencies in existing support of voice services and creating a Connect America Fund (CAF) that directly supports broadband without increasing the size of the Universal Service Fund over the current baseline projection.

"The NOI asks for public comment on the use of an economic model to precisely target support for areas where there is no private-sector business case for carriers to provide broadband and voice services. The economic model developed in the Plan estimates the gap between the cost of deploying broadband services to Americans living in unserved areas and the potential additional revenue generated from the broadband investment. The NOI seeks comment on how that model could be adapted to determine efficient levels of universal service support to provide all Americans with broadband access.

"The NOI also seeks comment on how to quickly provide consumers in unserved areas with broadband access while the Commission is considering final rules to implement fully the new CAF funding mechanism.

"The NPRM seeks comments on a number of proposals to cut legacy universal service spending in high-cost areas and to shift support to broadband communications. These proposals include capping the overall size of the high-cost program at 2010 levels; re-examining the current regulatory framework for smaller carriers in light of competition and growth in unregulated revenues; and phasing out support for multiple competitors in areas where the market cannot support even one provider.

"Action by the Commission April 21 by Notice of Inquiry and Notice of Proposed Rulemaking (FCC 10-58). Chairman Genachowski, Commissioners Copps, McDowell, Clyburn, and Baker. Separate statements issued by Chairman Genachowski, Copps, McDowell, Clyburn, and Baker. Docket 10-90

4/21/10 FCC Kicks Off Universal Service Reform. News Release: NOI & NPRM:


Wednesday, April 21, 2010

New Book: Winning the Silicon Sweepstakes: Can the United States Compete in Global Telecommunications.

Prof Rob Frieden is announcing a new book publication:
I am pleased to report that the Yale University Press has published my latest book entitled Winning the Silicon Sweepstakes: Can the United States Compete in Global Telecommunications. See Book Overview.

With comprehensive documentation, I challenge the conventional wisdom and sponsored research that claims the U.S. has best in class telecommunications infrastructure and services produced by an optimal, competitive marketplace. I demonstrate that the glide path of deregulation has handicapped the nation’s competitive advantage, and has contributed to a comparatively mediocre standing of the U.S. in both broadband and wireless markets.

I assert the need for smarter, better calibrated, light-handed regulation coupled with efforts to promote greater consumer digital literacy. Rather than rely almost exclusively on marketplace self-regulation portions of the telecommunications marketplace need a government referee able to resolve disputes and safeguard consumers.

The book asks and answers such questions as:

• How can the United States demonstrate global best practices in some information and communications technology markets, such as software and computing, but woefully lag in others, such as in wireless and broadband services?

• If the information revolution was supposed to “change everything” how did over $1 trillion in investment largely evaporate in three years?

• How can incumbent telephone companies successfully argue the need for governments to create incentives for investment in next generation networks while at the same time claiming the existence of robust competition eliminates the need for any other sort of government involvement?

• Why has the U.S. largely failed to bridge the Digital Divide despite having created subsidy mechanisms that invest billions annually in never achieved solutions?

• If the telecommunications marketplace has become so robustly competitive, where are the usual consumer benefits of lower prices, diverse choices, and responsive customer service?

• Why does it appear that incumbent ventures can belatedly embrace new technologies yet eventually extend their market power by acquiring or extinguishing most competitive threats through mergers and acquisitions? and

• Why does it appear that the next generation Internet will become less open, neutral and accessible possibly tipping the competitive playing field in favor of “walled gardens” of content and services offered by incumbents keen on disadvantaging newcomers offering the “next best thing”?

[RFC] NTIA Information Privacy and Innovation in the Internet Economy

Press Release "U.S. Commerce Secretary Gary Locke today announced the launch of an initiative designed to gather public input and review the nexus between privacy policy and innovation in the Internet economy. In addition, Locke also announced the formation of a Department of Commerce-wide Internet Policy Task Force to identify leading public policy and operational issues impacting the U.S. private sector's ability to realize the potential for economic growth and job creation through the Internet.

"Because of the vital role the Internet plays in driving innovation throughout the economy, the Department has made it a top priority to ensure that the Internet remains open for innovation while promoting an environment respectful of individual privacy expectations," Locke said. "In these difficult economic times, nothing is more important to American prosperity than jumpstarting our engine of innovation."

Through a Notice of Inquiry (NOI) published in the Federal Register, the Commerce Department is seeking public comment from all Internet stakeholders – commercial, academic and civil society sectors and citizens – on the impact of current privacy laws in the United States and around the world on the pace of innovation in the information economy. [Comments Due 45 Days After Fed Reg Publication]The Department seeks to understand whether current privacy laws serve consumer interests and fundamental democratic values.

The Internet Policy Task Force is exploring current privacy frameworks, and ways to address the challenges of the new Internet economy and society in a manner that preserves and enhances personal privacy protection.

The Task Force is comprised of staff members from the National Telecommunications and Information Administration (NTIA), the International Trade Administration (ITA), the National Institute of Standards and Technology (NIST) and the Patent and Trademark Office (PTO), and will be coordinated through the Commerce Department's Office of Policy and Strategic Planning, which reports to the Secretary.

In addition to privacy and innovation, the Internet Policy Task Force will examine cyber security, online copyright protection and international barriers to moving data around the globe, and the ability of entrepreneurs, and small- and medium-sized businesses to expand their operations via the Internet.

On May 7, 2010, the Department will hold a public meeting to discuss stakeholder views and to further facilitate public discussion on privacy policy in the United States. After analyzing public comments in response to this NOI, the Department will issue a report contributing to the administration’s domestic policy and international engagement on privacy.

A copy of the NOI is available at www.ntia.doc.gov.

Monday, April 19, 2010

[EVENT] FTC to Host Public Roundtable to Review Whether Technology Changes Warrant Changes to the Children's Online Privacy Protection Rule

Press Release: "In light of rapidly changing technology such as the increased use of smartphones and other devices to access the Internet, the Federal Trade Commission will host a public roundtable, “Protecting Kids' Privacy Online: Reviewing the COPPA Rule,” on June 2, 2010 to explore whether to update the Children's Online Privacy Protection Rule. The Rule was enacted in 2000 and requires Web site operators to obtain parental consent before collecting, using, or disclosing personal information from children under 13. Roundtable topics will include:
  • Whether the Rule should be applied to emerging media such as mobile devices, interactive television, and interactive gaming;
  • Potential expansion of the Rule to cover more items of information that might be collected from children; and,
  • A review of the parental verification methods used by Web site operators.

"For a more detailed list of topics, see the Commission's March 24, 2010 request for public comment on the COPPA Rule, at http://www.ftc.gov/opa/2010/03/coppa.shtm .

"The roundtable will be held at the FTC Conference Center at 601 New Jersey Avenue N.W. in Washington, DC. It is free and open to the public. Pre-registration is not required. Members of the public and press who wish to participate but who cannot attend can view a live webcast at ftc.gov.

"Individuals and organizations may submit requests to participate as panelists and may recommend topics for inclusion in the agenda. The requests and recommendations should be submitted electronically to childrensprivacyroundtable@ftc.gov . Prospective panelists should submit a statement detailing their expertise on the issues to be addressed and contact information no later than May 5, 2010. Panelists will be selected based on expertise and the need to include a broad range of views.

. . . . .

MEDIA CONTACT: Office of Public Affairs
202-326-2180

STAFF CONTACT:
Phyllis Marcus or Mamie Kresses
Bureau of Consumer Protection
202-326-2854 or 202-326-2070

Thursday, April 15, 2010

1910 Radio Station in Arlington Virgina (Ooooops)

Over the years I have become quite a communications history buff. History is great with echos of policy debates reverberating through the ages. This short history story comes from Arlington Virgina, my home town - and also the home town of the 1910 US Navy Radio station. Back in the day, before broadcast radio - before the Federal Communications Commission - heck even before the Federal Radio Commission -- folk were interested in "wireless" as a means for ship-to-shore communications. Marconi monopolized commercial wireless telegraph service to shipping - while the US Navy took interest in the ability to communicate with the fleet at see. The first federal agency to exercise regulatory spectrum authority was in fact not the FCC but the US Navy.


Anyway, on with this great story....



Pike 200 Minute: Arlington Radio (US Navy Radio Station 1910)

Friday, March 26, 2010

[RFC] FTC Seeks Comment on Children's Online Privacy Protections; Questions Whether Changes to Technology Warrant Changes to Agency Rule

Press Release March 24: "In light of rapidly evolving technology and changes in the way children use and access the Internet, the Federal Trade Commission is seeking public comment on the costs and benefits of an FTC rule designed to protect children online.

"The FTC’s Children’s Online Privacy Protection Act (COPPA) Rule became effective on April 21, 2000. COPPA imposes requirements on operators of Web sites or online services that are aimed at children under 13 years of age, or that knowingly collect personal information from children under 13. Among other things, the Rule requires that online operators notify parents and get their permission before collecting, using, or disclosing personal information from children. It also requires that the operators keep the information they collect from children secure, and prohibits them from requiring children to turn over any more personal information than is reasonably necessary to participate in activities on their Web sites.

"In 2005, the FTC initiated a congressionally required review of the Rule, and after considering extensive public comment decided to retain it without change. However, the Commission believes that changes to the online environment over the past five years, including children’s increasing use of mobile technology to access the Internet, warrant reexamining the Rule.

"In a Federal Register notice to be published shortly, the FTC poses its standard regulatory review questions and identifies several areas where public comment would be especially useful. Among other things, the FTC asks:

  • What implications for COPPA enforcement are raised by mobile communications, interactive television, interactive gaming, or other similar interactive media.
  • For input on the use of automated systems – those that filter out any personally identifiable information prior to posting – to review children’s Web submissions.
  • Whether operators have the ability to contact specific individuals using information collected from children online, such as persistent IP addresses, mobile geolocation data, or information collected in connection with behavioral advertising, and whether the Rule’s definition of “personal information” should be expanded accordingly.
  • Whether there are additional technological methods to obtain verifiable parental consent that should be added to the COPPA Rule, and whether any of the methods currently included should be removed.
  • Whether parents are exercising their right under the Rule to review or delete personal information collected from their children, and what challenges operators face in authenticating parents.
  • Whether the Rule’s process for FTC approval of self-regulatory guidelines – known as safe harbor programs – has enhanced compliance, and whether the criteria for FTC approval and oversight of the guidelines should be modified in any way.

"Copies of the Federal Register Notice and the public comments received will be posted on the FTC’s Web site at: http://www.ftc.gov/privacy/privacyinitiatives/childrens.html.

"The 90-day comment period will end on June 30, 2010. The Commission also will hold a public roundtable on the COPPA Rule review on Wednesday, June 2, 2010, at the FTC Conference Center, 601 New Jersey Avenue, N.W., Washington, DC.

"Interested parties can submit written comments electronically or in paper form, by following the instructions in the Invitation To Comment part of the “Supplementary Information” section. Comments in electronic form should be submitted using the following Web link: https://public.commentworks.com/ftc/2010copparulereview (and following the instructions on the web-based form). Comments in paper form should be mailed or delivered to: Federal Trade Commission, Office of the Secretary, Room H-135 (Annex E), 600 Pennsylvania Avenue, N.W., Washington, DC 20580.

Saturday, February 27, 2010

In Which We Learn that It's a Bad Idea to Hack Into Your Spouse's Email: Global Policy Partners, Inc. v. Yessin, (EDVa Nov. 24, 2009)

One hundred years ago when I was a judicial clerk at DC Superior Court, the worst docket was divorce court. The parties hated each other. They were nasty to each other. The attorneys were nasty. Everyone would do vindictive things to each other. It was horrible. Nothing was worse.

Oh yeah, there was something worse. Divorce where all the parties are lawyers – a law firm break up. ("Argh! Make that bad people stop!" says the judicial clerk buried in motions and pleadings).

Today's case is the best of both worlds; it involves a married couple engaged in a contentious divorce who also happened to be busting up their firm. Global Policy Partners, Inc. v. Yessin, No. l:09cv859 (EDVa Nov. 24, 2009). The question for the court was: when Defendant decided to log into Plaintiff's email account in order to read Plaintiff's emails to her divorce attorney – did Defendant violate the Computer Fraud and Abuse Act – had he hacked her email account without authority?

The alleged facts of the case are a bit messy; here is a simplified, made-for-TV, version (story has been changed to fit your screen): Plaintiff lived in State A, Defendant lived in State B, they were partners in the ACME firm, and Defendant was the manager of the ACME firm. The Parties were engaged in a contested divorce and dissolution of their firm. Defendant allegedly stumbled upon Plaintiff's email password and used it to access Plaintiff's email at the ACME firm, reading messages between Plaintiff and her divorce attorney. Plaintiff became suspicious and changed her password. Defendant still tried to gain access to Plaintiff's account and even sought the assistance of the Help Desk to gain the new password.

Plaintiff filed suit in federal court. As a part of Plaintiff's complaint, Plaintiff alleges that Defendant violated the Computer Fraud and Abuse Act, the Electronic Communications Privacy Act, and the Stored Communications Act – in additional to several state causes of action. Defendant moved to dismiss Plaintiff's complaint for failure to state a cause of action. The question before the court here was not whether Plaintiff wins the case – it's merely should the case go forward: has Plaintiff stated a claim that is plausible, that she could eventually win as a matter of law if she provides sufficient evidence?

As many of the experts in this area of law will tell you, ECPA is a complicated area of law, and this case hits on two big complications: when does a party have authority to access a computer system and when is an email message in transit such that reading the email message is an interception.

This case confused me on several grounds. First, ECPA, CFAA, and SCA normally are talked about as restraints on police power (when do the police get to wiretap your phone), or conversely are laws used by the police to nail a criminal (for instances, the guys in the parking lot of the hardware box store sniffing credit card numbers out of the unencrypted WiFi signal). This case involves a civil cause of action between two civilians – no police involved here at all (oh yeah, goes the dumb guy, the law does restrain the actions of civilians and does provide a private right of action).

The Federal Court proceeded with its analysis by lumping the Computer Fraud and Abuse Act (18 U.S.C. § 1030 (a)) claim with the Stored Communications Act (18 U.S.C. § 2701(a)) claim, and analyzing whether Defendant's access of the Plaintiff's email at ACME was authorized. He was, after all, the manager at ACME. Wouldn't that mean he has authorization to access any of the firm's assets?

It's not so simple says the court. Yes, generically, the manager of a firm ought to have authority to access the firm's computer assets; but some situations merit a further exploration of facts: "authorization to access a computer network is analyzed 'on the basis of the expected norms of intended use.'" The Court notes that the following facts cut against Defendant: Defendant used a password to access an email account that was not his, and Defendant lacked a legitimate business reason to access that account.

Defendant responds that State B law authorizes him, as manager, to act as an agent of the firm for purposes of carrying out the ordinary business of transferring or affecting the firm's real property. To quote the Court: "Really?!?!" The court pointed out that authority to transfer real property is not exactly the same as authority to spy on your wife by hacking into her email to her divorce attorney. The court further pointed out that spying on one's wife is not normally considered "ordinary business." Motion denied.

Therefore, the Court concludes, Plaintiff has alleged sufficient facts to establish a plausible cause of action that Defendant hacked her account without authorization pursuant to the Computer Fraud and Abuse Act and the Store Communications Act (again, not that Plaintiff wins, merely that this cause of action gets to go to trial).

Now here comes the tricky part. The third cause of action is a violation of the Electronic Communications Privacy Act, or, in plain English, did Defendant intercept Plaintiff's email. The begged question is, when is an email in transit such that it can be intercepted, and when is it not. If Defendant read Plaintiff's email before Plaintiff had read it, is that interception? What about after plaintiff read it?

In the words of the Court,

Courts applying the ECPA have consistently held that a qualifying "intercept" occurs only where the acquisition of the communication occurs contemporaneously with its transmission by its sender. Thus, interception includes accessing messages in transient storage on a server during the course of transmission, but does not include accessing the messages stored on a destination server . . . a qualifying "intercept" under the ECPA [] can only occur where an e-mail communication is accessed at some point between the time the communication is sent and the time it is received by the destination server, at which point it becomes a "stored communication" within the meaning of the SCA.

Think of it this way, football fans: can you intercept a passed football after it has been caught? While it's true that you might be able to force a fumble, this aint an interception (even if the result on the scoreboard is the same).

In this case, Plaintiff's emails were sitting on her computer on the ACME network. Defendant had to illicitly use Plaintiff's password to get at them, and after Plaintiff had changed the password, Defendant was closed out. The emails had reached their destination server; thus, Plaintiff had not alleged facts pursuant to which an ECPA claim could be successful. The Court dismissed this cause of action.

Here is another place I got confused. You see, if it were the police that wanted access to this email, the fact that Plaintiff had not opened the email would be relevant. If the email has been unopened for less than 181 days, the police needs a warrant to gain access to it. If the email has been opened or it's been more than 181 days, the police needs a subpoena. 18 U.S.C. § 2703(a) & (b). But all of this is irrelevant as there are no police involved in this scenario. And as the Court notes, all of this falls under the Stored Communications Act – not ECPA.

Let's see what today's lesson is: "Wheel of Morality, turn, turn, turn - Tell us what lesson we should learn." [Whirl, Click, Click, Clock]: Attorneys should not be permitted to marry.

[Disclaimer]


FTC: How to File a Complaint

From the FTC (I received nothing free from them - oh yes I did - a really nice OnGuard Online Pen that doubles as a highlighter)....

The Federal Trade Commission wants readers of Cyber Telecom to be aware that the FTC wants to hear about it when consumers are taken in by scams.

Our new animated How to File a Complaint video shows them how and includes examples of the kinds of things someone might complain to the FTC about. View the video at ftc.gov/multimedia/video/scam-watch/file-a-complaint.shtm (in Spanish at http://ftc.gov/multimedia/video/scam-watch/file-a-complaint_es.shtm), or youtube.com/FTCvideos. Please feel free to link to or grab the video for your site. People can help stop scams, rip-offs and fraudsters by sharing their experience with the FTC.




The video's announcement comes as the FTC releases its report listing the kind of consumer complaints filed with the agency in 2009. Read more at http://ftc.gov/opa/2010/02/2009fraud.shtm.

Thanks so much,

Get Ready for National Consumer Protection Week: March 7-13, 2010

www.consumer.gov/ncpw



Tuesday, February 23, 2010

New Items :: NIST IPv6 :: Open Net Deadlines :: Broadband Survey :: ERate Revised :: Broadband Natl Prioritites :: Future of Media ::

New Items
  • 2/23/10 Wireline Competition Bureau Extends Open Internet Reply Comment Deadline to April 8, 2010. Order: Word | Acrobat
  • 2/23/10 93 Million Americans Disconnected From Broadband Opportunities. News Release: Word | Acrobat OBI Working Paper Series NO. 1: Acrobat Broadband Service Capability Survey: Acrobat
  • 2/19/10 FCC Gives School E-rate Programs More Flexibility to Allow Community Use of Broadband Services. Order & NPRM: Word | Acrobat News Release (2/18/10): Word | Acrobat Genachowski Statement: Word | Acrobat Copps Statement: Word | Acrobat McDowell Statement: Word | Acrobat Clyburn Statement: Word | Acrobat
  • 2/18/10 Broadband Plan's Working Recommendations for Key National Priorities Unveiled. News Release: Word | Acrobat Report: Acrobat Genachowski Statement: Word | Acrobat
  • 2/18/10 Report From Steve Waldman on Future of Media. Waldman Presentation: Acrobat Copps Statement: Word | Acrobat McDowell Statement: Word | Acrobat
  • 2/18/10 The Future of Media and Information Needs of Communities in a Digital Age, Extension of Comment Dates. Order: Word | Acrobat
  • 2/22/10 FCC Proposes Rule Changes to Improve Decision-Making and Efficiency, Promote Participation in FCC Proceedings.
    NPRM ( Ex Parte Rules ): Word | Acrobat
    NPRM ( Procedural Rules ): Word | Acrobat
    News Release (2/18/10): Word | Acrobat
    Genachowski Statement: Word | Acrobat
    Copps Statement: Word | Acrobat
    McDowell Statement: Word | Acrobat
    Clyburn Statement: Word | Acrobat
    Presentation on Procedural Rules NPRM: Acrobat
    Presentation on Ex Parte Rules NPRM: Acrobat
  • Released: 02/16/2010. Comment Sought On Notice Of Proposed Rulemaking Regarding The E-Rate Program And Compliance With The Protecting Children In The 21st Century Act. (Da No. 10-248). (Dkt No 02-6 ) Granted Extensions Of Comment And Reply Comment Dates. Comments Due: 02/25/2010. Reply Comments Due: 03/12/2010. WCB . Contact: Regina Brown at (202) 418-7400, TTY: (202) 418-0484 TXT

FCC Gives School E-Rate Programs More Flexibility To Allow Community Use Of Broadband Services

Enabling Off-Hours Public Access to School Networks Spreads Benefit of E-rate at No Cost to Universal Service Fund

Washington D.C. – The Federal Communications Commission today adopted an order that enables schools that receive funding from the E-rate program (more formally, the schools and libraries universal service support program) to allow members of the general public to use the schools' Internet access during non-operating hours. This change attracted broad support in comments received while developing the National Broadband Plan.

This action will leverage universal service funding to serve a larger population at no increased cost to the E-rate program. If a school chooses to allow community access, the general public will be able to use the Internet access already present in schools for purposes such as job searches and applications, digital literacy programs, and online access to governmental services and resources. Increasing community access to the Internet is particularly critical in communities where residential adoption of broadband Internet access has historically lagged, including many rural, minority, and Tribal communities. Libraries already may provide Internet access to their communities using E-rate support. Today's order enables schools to provide similar access to the public.

Currently, Commission rules require schools to certify that they will use E-rate funded services solely for “educational purposes,” defined as activities that are integral, immediate, and proximate to the education of students. As a result, services and facilities purchased by schools using E-rate funding remain largely unused during evenings, weekends, school holidays, and summer breaks. Waiving the relevant rules will maximize the use of facilities and services supported by the E-rate program by giving schools the option to open their E-rate funded facilities to members of the public during non-operating hours.

The waiver of the Commission's rules is effective from adoption of the order through funding year 2010 (which ends June 30, 2011). This waiver is subject to the following conditions: (1) schools participating in the E-rate program are not permitted to request more services than are necessary for “educational purposes”; (2) any community use of E-rate funded services at a school facility is limited to non-operating hours, such as after school hours or during times when the students are out of school; and (3) consistent with the Communications Act, schools may not resell discounted services or network capacity. This order and notice do not permit or require any changes to E-rate applications due on February 19, 2010.

In addition, the Commission adopted a notice of proposed rulemaking, which seeks comment on revising the Commission's rules to make today's change permanent. The Commission also seeks comment on conditions that should be established to guard against potential additional costs being imposed on the E-rate program and to reduce the likelihood of waste, fraud, and abuse.

The E-rate program commits $2.25 billion in funding annually to schools and libraries for eligible telecommunications services, Internet access, internal connections, and basic maintenance of internal connections.

Action by the Commission February 18, 2010, by Order and Notice of Proposed Rulemaking (FCC 10-33). Chairman Genachowski, Commissioners Copps, McDowell, Clyburn, and Baker, with Chairman Genachowski, Commissioners Copps, McDowell, and Clyburn issuing separate statements.

-FCC-

News and information about the Federal Communications Commission is available at www.fcc.gov .


Feb. 22, 2010 SP 800-119 DRAFT Guidelines for the Secure Deployment of IPv6

NIST announces the public comment release of Special Publication (SP) 800-119, Guidelines for the Secure Deployment of IPv6 . IPv6 (Internet Protocol version 6) is the next generation Internet Protocol, accommodating vastly increased address space. This document describes and analyzes IPv6's new and expanded protocols, services, and capabilities, including addressing, DNS, routing, mobility, quality of service, multihoming, and IPsec. For each component, there is a detailed analysis of the differences between IPv4 and IPv6, the security ramifications and any unknown aspects. It characterizes new security threats posed by the transition to IPv6 and provides guidelines on IPv6 deployment, including transition, integration, configuration, and testing. It also addresses more recent significant changes in the approach to IPv6 transition.


NIST requests comments on Draft SP 800-119 by April 23, 2010. Please submit comments to draft-sp800-119-comments@nist.gov with "Comments SP 800-119" in the subject line.

draft-sp800-119_feb2010.pdf (2.3 MB)

Wednesday, February 17, 2010

TPRC Call for Papers

The Telecommunications Policy Research Conference is one of the truly great communications policy conferences, held annually in Arlington VA.

CALL FOR PAPERS

TPRC Presents

The 38th Research Conference on

Communication,Information, and Internet Policy

Hosted by the Center for Technology and the Law

George Mason University Law School

Arlington, Virginia

Friday, October 1, 2010,through Sunday,October 3, 2010

www.tprc.org

TPRC is an annual conference on communication, information and internet policy that convenes international and interdisciplinary practitioners and researchers from academia, industry, government, and nonprofit organizations together with policymakers. The purpose of the conference is to acquaint policymakers with the best of recent research and to familiarize researchers with the knowledge requirements of policymakers and industry. The conference agenda will consist of papers selected from reviewed, submitted abstracts, student papers and selected panel submissions.

TPRC is now soliciting abstracts of papers, panel proposals, and student papers for presentation at the 2010 conference. Proposals should be based on current theoretical or empirical research relevant to communication and information policy, and may be from any disciplinary perspective. TPRC seeks submissions of disciplinary, comparative, multidisciplinary or interdisciplinary excellence. Subject areas of particular interest include, but are not limited to the following: (Click on topic below for topic descriptions. To submit an abstract, please use the submit button at the end of each topic description.)

  1. Network Competition, Policy and Management
  2. Broadband Deployment, Adoption and Measurement
  3. Spectrum Policy
  4. Societal Issues: Universalty and Affordable Access
  5. The Transformation and Future of Media
  6. The Transformation and Future of Intellectual Property and Digital Rights
  7. Privacy, Security, Identity and Trust
  8. Internet Governance and Institutional Strategies for Information Policy
  9. Advanced Mobile Services: Broadband, Video and New Applications
  10. The Internet Ecosystem
  11. Other Emerging Topics are highly encouraged

Submissions are due by March 31, 2010. Abstracts and panel proposals must be submitted electronically at http://www.tprc.org by following the submit button at the end of each topic description. Abstracts are not to exceed 500 words. For paper abstracts, please identify the methods, central ideas, and outcomes (obtained or expected) of the research. Responses will be made by May 15, 2010. Selected papers will be due to TPRC on August,15th 2010 and one author of the paper is expected to present the accepted submission.

Students are encouraged to submit papers for the student paper competition Click Here for Student Papers CFP. Full Student papers must be submitted by April 30, 2010.

We also welcome theme and industry-specific but not vendor-specific panel proposals. These should include the Panel topic, a brief abstract, the name of the Panel Moderator and an initial list of proposed panelists. The Panel proposals should be submitted by March 31, 2010

Wednesday, January 20, 2010

[RFC] Comment Sought On Notice Of Proposed Rulemaking Regarding The E-Rate Program And Compliance With The Protecting Children In The 21st Century Act

Comment Date: February 18, 2010; Reply Comment Date: March 5, 2010

"On November 5, 2009, the Commission released a notice of proposed rulemaking (NPRM) seeking comment on revising rules regarding the schools and libraries universal service support mechanism, also known as the E-rate program, to comply with the requirements of the Protecting Children in the 21st Century Act. Among other things, section 215 of the Protecting Children in the 21st Century Act, titled Promoting Online Safety in Schools, revised section 254(h)(5)(B) of the Communications Act of 1934, as amended, by adding a new certification requirement for elementary and secondary schools that have computers with Internet access and receive discounts under the E-rate program. The Commission also proposed to revise related Commission rules to reflect existing statutory language more accurately.

"Interested parties may file comments on or before February 18, 2010, and reply comments on or before March 5, 2010. All pleadings are to reference CC Docket No. 02-6. Comments may be filed using the Commission’s Electronic Comment Filing System (ECFS) or by filing paper copies. [See original notice for detailed filing instructions and ex parte notice]

"For further information, please contact Anita Cheng or Regina Brown, Telecommunications Access Policy Division, Wireline Competition Bureau at (202) 418-7400 or TTY (202) 418-0484.


"Released: 01/20/2010. Comment Sought On Notice Of Proposed Rulemaking Regarding The E-Rate Program And Compliance With The Protecting Children In The 21st Century Act. (DA No. 10-102). (Dkt No 02-6 ). Comments Due: 02/18/2010. Reply Comments Due: 03/05/2010. WCB . Contact: Anita Cheng or Regina Brown at (202) 418-0792, TTY: (202) 418-0484


http://hraunfoss.fcc.gov/edocs_public/attachmatch/DA-10-102A1.doc
http://hraunfoss.fcc.gov/edocs_public/attachmatch/DA-10-102A1.pdf
http://hraunfoss.fcc.gov/edocs_public/attachmatch/DA-10-102A1.txt