Last Week in Tech Policy Vol. 27: Space, the Final Frontier…

(by Savannah Schaefer, Colorado Law 3L)

In policy circles, we spend a lot of time talking about unintended consequences and how new pieces of legislation or regulation balance economic efficiency against other pieces of the public interest. Often, we see aspects of old issues recycled when new technologies and circumstances emerge and must determine whether and to what extent new issues require new treatment.

As we turn to space—the final frontier—and encourage our peers to boldly go where no one has gone before, we must consider just how different extraterrestrial expansion is from continental and what lessons to keep in mind as we launch.

Continue reading “Last Week in Tech Policy Vol. 27: Space, the Final Frontier…”

Last Week in Tech Policy Vol. 26: Fair Play, Fair Pay?

(by Molly Hogan, Colorado Law 3L)

Many of our discussions about the different aspects of technology law involve evolving technologies and how antiquated laws can be applied to situations that their drafters could not have fathomed. This week, I wanted to bring it back to discuss a debate surrounding a technology that is over 100 years old: the radio.

Despite the coming and going of records, 8-tracks, cassettes, CDs, and now MP3s and beyond, music fans have long been able to rely on the AM/FM radio to hear new music and old classics. Unbeknownst to most listeners is the fact that those artists whose songs play on the radio are not receiving copyright royalties for the airplay.

Continue reading “Last Week in Tech Policy Vol. 26: Fair Play, Fair Pay?”

Last Week in Tech Law and Policy, Vol. 25: The CISA/CISPA See-Saw of Cybersecurity

The government intelligence community has long vocally advocated for so-called “backdoors” in encrypted digital communications systems. Proponents of these special modes of entry and intercept into otherwise protected databases and communications believe they are a necessary part of national security in the modern age. However, attempts to statutorily codify these ideas have met significant opposition.

Not to be deterred, the government is currently seeking alternate ways to gather information about suspected criminals and terrorists. Two weeks ago, the Senate passed the Cybersecurity Intelligence Sharing Act (CISA). This bill seeks primarily to permit information technology companies to “voluntarily” share information about security threats with the Department of Homeland Security. Companies would be given immunity both from liability and from FOIA requests regarding this information sharing. A proposed amendment that would have required the scrubbing of personally identifiable information in this information sharing failed to pass.

Continue reading “Last Week in Tech Law and Policy, Vol. 25: The CISA/CISPA See-Saw of Cybersecurity”