If I ever had any hope of “keeping up” with developments in the regulation of information technology—or even the nine specific areas I explored in The Laws of Disruption—that hope was lost long ago. The last few months I haven’t even been able to keep up just sorting the piles of printouts of stories I’ve “clipped” from just a few key sources, including The New York Times, The Wall Street Journal, CNET News.com and The Washington Post.
Better late than never, I’ve finally given a close read to the Notice of Inquiry issued by the FCC on June 17th. (See my earlier comments, “FCC Votes for Reclassification, Dog Bites Man”.) In some sense there was no surprise to the contents; the Commission’s legal counsel and Chairman Julius Genachowski had both published comments over a month before the NOI that laid out the regulatory scheme the Commission now has in mind for broadband Internet access.
Chairman Genachowski’s “Third Way” comments proposed an option that he hoped would satisfy both extremes. The FCC would abandon efforts to find new ways to meet its regulatory goals using “ancillary jurisdiction” under Title I (an avenue the D.C. Circuit had wounded, but hadn’t actually exterminated, in the Comcast decision), but at the same time would not go as far as some advocates urged and put broadband Internet completely under the telephone rules of Title II.
The decision was a surprise for me. I had fully expected the Court to reject outright the experiment in granting patents to paper-and-pencil business methods launched by the Federal Circuit in 1998 with the State Street decision. Especially since the Federal Circuit itself, in its rejection of Bilski’s application, had all but dismissed State Street as the disaster most businesses—even businesses who have benefited from business method patents–know it to be.
I’m late to the party, but I wanted to say a few things about the District Court’s decision in the Viacom v. YouTube case this week and. This will be a four-part post, covering:
1. The holding
2. The economic principle behind it
3. The next steps in the case
4. A review of the errors in legal analysis and procedure committed by reporters covering the case
Not surprisingly, FCC Commissioners voted 3 to 2 today to open a Notice of Inquiry on changing the classification of broadband Internet access from an “information service” under Title I of the Communications Act to “telecommunications” under Title II. (Title II was written for telephone service, and most of its provisions pre-date the breakup of the former AT&T monopoly.) The story has been widely reported, including posts from The Washington Post, CNET, Computerworld, and The Hill.
As CNET’s Marguerite Reardon counts it, at least 282 members of Congress have already asked the FCC not to proceed with this strategy, including 74 Democrats.
On paper, of course, this sounds like a fine idea. As Palo Alto State Senator Joe Simitian, the bill’s sponsor, put it, “The Internet makes many things easier. One of those, unfortunately, is pretending to be someone else. When that happens with the intent of causing harm, folks need a law they can turn to.”
Or do they?
The Problem with New Laws for New Technology
SB1411 would make a great exam question of short paper assignment for an information law course. It’s short, is loaded with good intentions, and on first blush looks perfectly reasonable—just extending existing harassment, intimidation and fraud laws to the modern context of online activity. Unfortunately, a careful read reveals all sorts of potential problems and unintended consequences.
I participated last week in a Techdirt webinar titled, “What IT needs to know about Law.” (You can read Dennis Yang’s summary here, or follow his link to watch the full one-hour discussion. Free registration required.)
The key message of The Laws of Disruption is that IT and other executives need to know a great deal about law—and more all the time. And Techdirt does an admirable job of reporting the latest breakdowns between innovation and regulation on a daily basis. So I was happy to participate.
Legally-Defensible Security
Not surprisingly, there were far too many topics to cover in a single seminar, so we decided to focus narrowly on just one: potential legal liability when data security is breached, whether through negligence (lost laptop) or the criminal act of a third party (hacking attacks). We were fortunate to have as the main presenter David Navetta, founding partner with The Information Law Group, who had recently written an excellent article on what he calls “legally-defensible security” practices.
The announcement yesterday from key Congressional Democrats of an effort to reform the Communications Act put me in a nostalgic mood. Here follows one of my longest efforts yet to bury the lede.
One of my favorite courses in law school was Abner Mikva’s “Legislative Process” course, which he taught while serving on the D.C. Circuit Court of Appeals and before his tenure as White House counsel to President Clinton. Mikva had previously served in Congress; indeed, one of the first votes I ever cast was for Mikva while an undergraduate at Northwestern University.
(It was a remarkable period at the law school. The year Mikva signed on as a lecturer was also the first year on the faculty for three professors just starting their academic careers: Larry Lessig, Elena Kagan, and Barack Obama. I took two classes with Lessig, including an independent study on the impact of technology on the practice of law, but regrettably none from the other two.) Continue reading →
Over the weekend, I published an op-ed in The Des Moines Register encouraging the FCC to heed the lessons of the first national broadband plan, the one Secretary of the Treasury Albert Gallatin sent to Congress in 1808.
Gallatin was a remarkable figure in the early history of the federal government, and his accomplishments include being the longest-serving Treasury secretary (1801-1812) to date. His report on the Subject of Public Roads and Canals, completed at the request of Congress, remains one of the seminal documents in the history of American infrastructure. It is a masterpiece of dispassionate policy-making and clear-headed writing.
Alas, the document is available nowhere online, and the only in-print copy I can find is published by the aptly-named Dodo Press. This is indeed unfortunate given the renewed interest in network infrastructure as a form of national technology. The NBP published in March by the FCC, despite its nearly 400 pages and thousands of footnotes, makes no reference to Gallatin or his plan. Continue reading →
Multiple media sources are now reporting that the FCC, contrary to reports from earlier this week, has decided to go ahead with an effort to change the classification of broadband Internet service from a Title I “information service” to a Title II “telecommunications service,” if only to salvage the proposed rulemaking on the open and transparent Internet. (See stories on The Wall Street Journal and The Washington Post as well as Ars Technica.)
Those of us who aren’t on the FCC’s official leak list will have to wait with the rest of the rabble to get a look at just how the FCC proposes to effect this radical change in communications law. Will it apply to all broadband Internet–including cable, fiber, DSL, satellite, wireless and broadband over power lines? Will the FCC propose to regulate only as much as needed to get the jurisdiction the D.C. Circuit says it doesn’t have under Title I to implement the NPRM, or will they throw in some additional provisions to achieve other goals–such as the reform of the Universal Service Fund? Will state and local regulators get to share in the fun of telling ISPs how best to run their business?
The Technology Liberation Front is the tech policy blog dedicated to keeping politicians' hands off the 'net and everything else related to technology. Learn more about TLF →