By Austin Gaddis (Colorado Law 2L)
As the Federal Communications Commission (FCC) prepares for its much-anticipated vote on Chairman Wheeler’s net neutrality proposal on Thursday, Republicans on the Commission and in Congress are using the opportunity to stage one final battle before the votes are in and the lawsuits begin. Under the Chairman’s proposal, both fixed and mobile broadband services would be regulated under Title II of the Communications Act, which would ban throttling, blocking, and paid prioritization of Internet traffic by Internet service providers (ISPs).
Commissioner Ajit Pai, a Republican, has taken the helm as the chief critic of Wheeler’s plan, often dubbing it “the President’s plan” in a reference to President Obama’s public push to put pressure on the FCC—an independent regulatory agency—to adopt strong net neutrality regulations. Commissioner Pai’s foray into the debate represents the most high-profile opposition of his tenure at the Commission.
On Capitol Hill, Republican lawmakers are also using their platform (and gavels) to put implicit and explicit pressure on FCC as it prepares for Thursday’s vote. Currently, three congressional committees have lined up to investigate the White House’s influence on FCC’s decision-making process, especially since Chairman Wheeler seemed to be signaling a different approach to the net neutrality proceedings before the President’s public campaign in support of strong Title II regulations late last year. One committee, the House Energy and Commerce Committee, has decided to delve even more into the commission’s operations, calling attention to Chairman Wheeler’s use of the agency’s “delegated authority.”
In an address at Colorado Law several weeks ago, Chairman Wheeler outlined his vision for the future of broadband under a Title II regime, delivering what TechCrunch called an “explanatory manifesto of the Chairman’s thinking.” In the speech, he attempted to respond to critics of his plan who think of Title II regulation as an outdated relic of the past, calling instead for a modernized Title II that addresses the unique opportunities and challenges that the Internet poses in the contemporary world.
Articles we’re reading:
- Commissioner Pai’s Op-Ed (with FTC Commissioner Joshua Wright): The Internet isn’t broken. Obama doesn’t need to ‘fix’ it. (Chicago Tribune)
- Weiser and Werbach: Playing Politics with the Internet? (Huffington Post)
- Why Twitter faves #NetNeutrality (Twitter Blog)
- 4 Predictions About the FCC’s Net Neutrality Vote (DCInno)
- House Panel to Hold Net Neutrality Hearing Day Before FCC Vote (The Hill)
- Net neutrality debate: Far from over (Politico)
(by James Frazier, Melissa S. Jensen, and Samantha Moodie, Student Attorneys)
Last Friday, the TLPC, the American Foundation for the Blind, the American Council of the Blind, and the Library Copyright Alliance filed a comment at the U.S. Copyright Office requesting a renewal of the exemption to Section 1201 of the Digital Millennium Copyright Act aimed at making e-books more accessible to people who are blind, visually impaired, or print disabled and authorized entities. If renewed, the exemption would increase access to literary works and educational resources for people who are blind, visually impaired, or print disabled.
Take a look at the long-form comment attached here, and stay tuned for the Copyright Office’s decision later this year.
(by James Frazier, Student Attorney)
Planes, automobiles, and artificial intelligence. This week, the FAA released new rules regulating drones, Apple and Sony threw their hats into the autonomous automobile arena, and Great Britain announced that it will release new rules governing driverless car testing in the UK. Mike Hean, a Swiss entrepreneur, suggested that driverless cars should be programed with advanced artificial intelligence that would allow an Uber-style ride sharing app. Indeed, Hean believes that driverless car should be able to own themselves, and even earn their own income. Tying these threads together, MIT’s Tech Review released an article this week outlining some contemporary concerns about artificial intelligence.
(by Joseph de Raismes, Colorado Law 3L)
This week, I would like to look at internet privacy, how privacy tools are funded, and what the future of privacy should look like.
Last week, ProPublica ran Julia Angwin’s excellent profile of GnuPG’s lead developer Werner Koch. Koch wrote the free email encryption tool GNuPG in 1997, and has been keeping the project alive basically single-handedly ever since. In response to ProPublica’s profile, Koch received an outpouring of support in the form of private donations and grants.
Werner Koch’s situation drew the attention of cryptographer Matt Green, who questioned the entire framework of how we fund the long-term development of privacy tools. In his post, Matt draws attention to the fact that the US government has been an extremely important funding source for key privacy tools, but questions the sustainability of the current framework for funding research and development in this area.
In light of the Snowden revelations, real name systems, perma-cookies, browser fingerprinting, and other sophisticated tracking measures, internet privacy seems more and more like a thing of the past. Is internet privacy a value that should be fostered (and funded) in a cohesive manner?
Last week, we filed three comments in response to the Copyright Office’s DMCA Section 1201 Tri-annual Exemption Notice of Proposed Rulemaking: a Short Comment for Class 27 (Medical Devices), a Short Comment for Class 22 (Vehicle Software), and a Long Comment for Class 25 (Security Research). All comments were filed on behalf of our client, Professor Matthew Green.
Professor Green is an Assistant Research Professor in the Information Security Institute at Johns Hopkins University and needs to be able to circumvent various access controls on software and devices in the process of conducting good faith security research. Such circumvention is chilled by Section 1201 of the Digital Millennium Copyright Act (DMCA). In our long comment, we argue for an exemption to Section 1201’s anti-circumvention provisions and show that preventing circumvention of access controls is chilling good faith security research and creating other adverse effects. Our short comments reiterate this point with respect to specific types of security research and urge the Copyright Office to grant a broad exemption to the Section 1201 anti-circumvention rules for all forms of good faith security research.
Next up in the proceedings is the second round of public comments filed by those that oppose each exemption. The objection comment deadline is March 27, 2015. Following that, there will be a third round of public comments in which supporters can respond to the objectors’ comments. This round closes on May 1, 2015, after which the Copyright Office will begin the internal process of making their decisions.
( by Allison N. Daley, Colorado Law 2L)
This week I want to focus on a specific area of tech law and policy: health care. With the advent of telemedicine as a way of providing health care at a distance, there is exciting potential for innovation, however with this innovation comes new challenges in law and policy.
As just one example, there is a new app, Harbinger, that transmits communication from Emergency Medical Service (EMS) workers in an ambulance to hospitals in real time. The hope is that such technology can improve care by sending protected health information (PHI) such as drivers licenses and insurance cards to hospitals for faster registration. The app even allows EMS workers to send pictures and videos of injuries or accident scenes for more rapid diagnosis and treatment.
With this great technology, however, privacy concerns abound. Because cell phones store data on the device itself, PHI is much more likely to fall into the wrong hands if a cell phone is lost or stolen. While the Health Insurance Portability and Accountability Act (HIPAA) does not have any official rules banning the use of cell phones, the HIPAA Privacy Rule requires health care providers to implement appropriate safeguards to reasonably protect health information.
In order to solve this problem, the Harbinger app promises:
[P]atient information is encrypted with today’s most advanced methods. The data is transported to our server with the industry standard for banks and credit cards, and is stored in an encrypted format.
While this sounds like it may satisfy HIPAA standards, patients and hospitals will likely still have concerns about this new technology. The founders, both Coloradoans, are currently negotiating with hospitals and we may see the system operating by the end of the year.
For more information, check out Harbinger’s website.
See you next week!