FOR EDUCATIONAL USE ONLY
University of Colorado Law Review
Part IV: How (if at all) to Regulate the Internet
*1203 NET REGULATION: TAKING STOCK AND LOOKING FORWARD
Yochai Benkler [FNa1]
Copyright © 2000 University of Colorado Law Review, Inc.; Yochai Benkler
Imagine that there were an
American Administration in the second half of the fifteenth century. Imagine
that it issued its major policy statement on the introduction of printing,
entitled "Framework for Print-Based Commerce." And imagine that,
after two or three perfunctory sentences about how print would revolutionize
religion, science, language, and political discourse, the statement went on to
focus its policy planning exclusively on making sure that the print environment
was safe for glossy magazine advertisements, that printed order forms and
back-of-the-form standard contracts were enforceable, and that publishers of
popular novels had copyright protection. If this sounds silly, then you should
take a look at the Administration's Framework for Global Electronic Commerce
[FN1] from 1997.
Fear not--I have no intention of boring you with a tedious review of a three- year-old document in an area in which those three years account for about half the life of public concern with the issue--internet regulation. My description of the document is here merely to motivate an exercise I think we are almost ready for in "Net" [FN2] regulation--taking stock and evaluating our direction.
In order to separate, at least initially, the task of taking stock from the inevitable normative bias entailed by one's own sense of what things are "important," the basic text of this evaluation was developed by a rather mechanistic method. *1204 Part I presents a survey of all bills introduced in Congress and all public laws passed by both houses and signed by the President that contain the terms "internet," "electronic commerce," or one of a number of other terms that should capture references to the Net in the legislative branch. [FN3] The idea behind this methodology is to capture a zeitgeist, rather than to identify comprehensively all instances of Net regulation. Needless to say, this method excludes important instances of regulation, like federal agency decisions, executive actions, and state regulations. Nonetheless, the breadth of the sweep of congressional action and the nature of congressional politics suggest that surveying the bills as well as the laws passed should give us a good picture of the issues that have been seen during the 1990s, by at least some significant constituency, as appropriate for legislative action.
The survey suggests that Net regulation until now has involved three clusters of issues: (1) harnessing the Net to provide traditional public goods, like education and access to government information; (2) developing the future physical and intellectual infrastructure for the Net; and (3) establishing patterns of control over information flows in society, where entrenched patterns of control have been destabilized by the new technology. This is not to say that regulatory efforts have always cohered, or that a broad understanding of the importance of these three regulatory roles has always driven them. But these categories do begin to organize our thoughts about the issues of Net regulation and suggest a more-or-less coherent methodology for thinking about regulatory choices and placing them in context with other regulatory choices about Net regulation.
Part II describes the three clusters and explains how the first two clusters should properly be seen as being about Net regulation, no less than the third. Part III identifies the structure of regulation that falls within the third cluster. It consistently involves destabilization of patterns of control over information flows, the emergence of a range of regulatory options for response to this destabilization--each with differing outcomes for the distribution of control over information flows--and a regulatory choice that pushes towards a new, stable pattern of control. Part IV concludes by suggesting that a *1205 consistent methodological approach to Net regulation should be taken in the future--an approach that identifies the relationship between the "problem" requiring regulation and the effects of the technology on information flows, and then designs an institutional response that can be justified given its expected effects on the flow of information in our society and polity.
A. Background and Methodology
The concept of regulating the Net--in the lawmaking or regulatory sense, rather than engineering sense--did not exist prior to the 1990s because "the Net" did not yet exist as a society-wide communications medium. Legislative acts in the early 1990s were responses to specific issues raised by computer- based, usually closed-system, electronic communications. Courts and commentators addressed issues of service provider liability for defamation with respect to proprietary commercial online services like CompuServe or Prodigy, or dial-up bulletin board services ("BBS"). [FN4] They dealt with issues regarding internal employer local area networks ("LANs"), proprietary e-mail gateways, and wide area networks ("WANs"), primarily involving employer- employee relations regarding privacy. [FN5] They expressed concerns over electronic contracting--concerns raised by the increase in, but mostly hoped for, business-to-business electronic data interchange ("EDI"). [FN6] The broader conceptual framework of "regulating the Net" was that, in the not-too- distant future, there would be an "Information Superhighway" whose development required a regulatory focus on traditional telecommunications and cable regulation, with the *1206 intent of harnessing these mature industries to build the infrastructure for the Information Superhighway. [FN7]
The development of the World Wide Web ("Web"), and of Mosaic as a graphical user interface ("GUI") to it, coupled with America Online's ("AOL") phenomenal success as the first proprietary service to provide a gateway to the internet, changed all that. It turned out that the Net was not in the future; it was here. There may have been some resistance among "the natives" to the users who came from "aol.com," but that was quickly swept away by the sheer volume of participation in what suddenly became the new popular (not to say mass) medium. [FN8]
In order to impose some measure of discipline in the unavoidably normative exercise of evaluating Net regulation, I have taken a rather laborious and automatic approach to developing the initial text of my analysis. Rather than selecting a series of "important" or "representative" documents--judgments that inevitably already reflect my assumptions on the matter--this article offers a description of all bills and statutes introduced in or passed by Congress that include any one of a number of terms that indicate reference to what we might be interested in as "Net regulation." The following overview is the result of a Lexis search of all bills introduced in the United States Congress and all public laws passed by Congress and signed by the President, which use the terms "internet," "electronic commerce," "e- commerce," "world wide web," or "interactive" close to "computer" or "online." [FN9] There were 15 such bills and joint resolutions in the 101st Congress, 23 in the 102d Congress, 34 in the 103d Congress, 66 in the 104th Congress, *1207 275 in the 105th Congress, and 348 introduced in the first session of the 106th Congress, for a total of 761. A total of sixty-two bills and resolutions including these words were enacted into public laws or congressional resolutions adopted by both houses: [FN10] three were enacted in the 101st Congress, four in the 102d, three in the 103d, five in the 104th, twenty-nine in the 105th, and eighteen in the first session of the 106th Congress.
This approach has obvious limitations that must be kept in mind when evaluating its results. It is crude, for it gives the Telecommunications Act of 1996 or the Children's Online Protection Act as much weight, as an initial matter, as a bill to require boxing associations to publish their ratings of boxers on the Net. It is partial, for it treats only the federal legislative branch, and not all producers of regulatory actions. And it relies on the use of specific language, and hence on self-conscious expression of the regulated matter as "the Net," which may have left out regulatory acts that had significant, intended effects on the Net, but did not refer to it in any way.
The advantage of the approach, however, is that it provides a relatively value-neutral picture of the instances in which the primary legislative arena in the United States self-consciously and expressly applied itself to the Net. It includes "irresponsible" acts--bills introduced without a hope of passing-- as well as fully negotiated legislative regulations, and is therefore a better measure of the kinds of things thought by at least some significant portion of the American public to be important enough to justify regulation--even if they could not pass, as a matter of political reality. What I am hoping to get from this exercise is a representation of the 1990s Net regulation zeitgeist. The initial crudity of treating all instances as equal is then evened out by looking at trends and clusters in these legislative actions, rather than at individual instances, as expressions of the general cultural sense of what Net regulation is about, and what it might seek to achieve.
*1208 B. Bills: 1990-96
The term "internet" first appeared in bills introduced in the 102d Congress, in 1991. Three initiatives focused on education, libraries, infrastructure development through federal investment and coordination, and access to government information. H.R. 4014 was aimed at promoting the use of technology to enhance education and research, and spoke of the Net primarily as a means of disseminating educational materials and enhancing communications among researchers. [FN11] H.R. 5759 and S. 2937 (introduced by then-Senator Gore) sought to expand focus and funding for developing high-performance, high- speed computing, and proposed a federal effort to build a technological infrastructure focused on linking schools to each other over the internet, thereby enhancing education, libraries, medicine, and productivity. [FN12] H.R. 5983 and S. 2813 sought to use the internet to facilitate public access to federal electronic information through the Government Printing Office ("GPO"). [FN13] Another initiative, H.R. 5392, proposed a program to promote electronic commerce as part of the National Institute of Standards and Technology ("NIST"). [FN14] This bill, however, did not once mention the term "internet," for its frame of reference for electronic commerce was still business-to-business EDI.
The 103d Congress continued to see the internet as part of our national investment in educational quality and equality, [FN15] and in online libraries. [FN16] Congress reintroduced bills to focus federal efforts on building an information infrastructure, [FN17] with some mention of the Net in the major precursor bill to the Telecommunications Act of 1996, [FN18] and on increasing access to government information. [FN19] It addressed electronic commerce only in the context of government acquisitions. [FN20]
*1209 Until 1995, then, the "internet" was associated with education, with libraries, and with access to government information; and the policy goals with which it was associated were the traditional policy goals for providing these public goods. In 1995-96, the 104th Congress began to look more familiar from the perspective of the late 1990s. There was much more legislative activity and a whole new slate of objectives. During this period, Congress attempted to regulate children's access to indecent materials, [FN21] internet gambling, [FN22] hate speech, [FN23] advertising practices, [FN24] consumer privacy, [FN25] and dissemination of information of concern to national security [FN26]--in particular, regulating encryption. [FN27] It began to regulate internet service providers ("ISPs"), by exempting them from liability on the condition that the ISPs would help enforce federal regulations. [FN28] Congress also continued to support the educational use of the Net, [FN29] most prominently by enacting the universal service subsidy in the *1210 Telecommunications Act of 1996, [FN30] and increasing use of the Net to provide access to government information. [FN31] Democratization and the internet community gained recognition in a joint resolution [FN32] and in a series of proposals to harness the Net to improve dissemination of federal elections information. [FN33]
C. Bills: 1997-99
There was a further explosion in internet regulation concerns in the 105th Congress. Four times as many bills that somehow referred to the Net were introduced, and six times as many such laws were passed. Bills were again introduced to deal with the issues of educational access. This concern was most clearly reflected in bills providing financial support for increasing internet access in schools [FN34] and the use of educational technology. [FN35] But there was also resistance to federal investments *1211 in school internet access [FN36] and to what would become a growing concern in other areas--the content of communications on the Net. This concern led to the first attempts to control what information minors can access over the Net, by requiring installation of filters in school and library computers as a condition of receiving universal service support. [FN37]
During the 105th Congress, efforts to enhance access to government information using the internet continued, and gradually transformed into a more general assumption that government information should be made available on the Net. [FN38] *1212 Moreover, the concept of using Net publication to enhance access to governance-related materials expanded to include information required by law to be published by non-government actors, [FN39] and for the first time was explicitly drafted to disseminate federal propaganda. [FN40] There were more explicit attempts to use the Net not only to enhance access to information generated by the government, but also directly to improve government *1213 services by using electronic information management and online access. [FN41] There were also expanded efforts to harness the Net to aid democracy--by disseminating federal elections-related information, [FN42] by facilitating participation in public debate, [FN43] and by noting the Net's importance in facilitating cultural preservation. [FN44]
The 105th Congress was also the first Congress to debate, through proposed bills, the future role of government in the development of the internet. There were dueling bills regarding investment in the "Next Generation Internet": on one side, the bills--eventually passed as law [FN45]--that funded research and development through the National Science Foundation ("NSF") and other government agencies; [FN46] on the other side, bills that resisted the extent and nature of government participation in *1214 developing the internet, [FN47] such that even the NSF and NIST would have been prohibited from spending money on the "Next Generation Internet." [FN48] The resolution of this debate favored continued government investment, [FN49] except that the drive to take the domain name system administration out of the NSF did prevail. [FN50]
The concern over Net infrastructure development also carried over into more traditional areas of infrastructure regulation. There were bills that supported the private provision of infrastructure development--through expanding satellite services to include internet service, [FN51] or permitting low power television ("LPTV") licensees to provide wireless internet access. [FN52] There were efforts to shield internet access from time- sensitive pricing by regulating its treatment by telecommunications carriers, particularly the local exchange carriers. [FN53] Future planning was expressed by an effort to add questions about internet connectivity to the Census 2000 questionnaire. [FN54] *1215 While the universal service reform passed by the 104th Congress in the Telecommunications Act of 1996 was the primary and central change in policy concerning distributive justice, there were more efforts in the 105th Congress to deal with distribution concerns. [FN55] Most interesting in this respect was a bill to permit consumers to aggregate to provide a public internet service, as does a public electric utility. [FN56]
During this period there was also a continued heavy focus on regulating "bad" or "dangerous" speech, and in particular, bills demonstrated a perception that children are particularly exposed and endangered by the Net environment. Sex, in this matter, is king. Bills were introduced to protect children from access to pornography, [FN57] as well as from exploitation for child pornography. [FN58] Congress sought to prevent children's access to pornography by new prohibitions on the distribution of smut on the Web [FN59] and by requiring ISPs to offer filtering software. [FN60] Moreover, heavy attention was paid to protecting children from sexual assault [FN61]--which for some reason was linked with computers in the minds of legislators--and therefore led to enhanced penalties for child sexual abuse if a computer was used in perpetrating it. [FN62] There were prohibitions on making available information that could facilitate illegal sexual relations *1216 with minors, [FN63] efforts to prohibit ISPs from offering internet access to convicted "sexual predators," [FN64] and efforts to persuade states to prevent state prisoners from having unsupervised internet access. [FN65] "Dangerous communications" were also addressed through the regulation of tobacco advertising and sales to children, [FN66] a proposed ban on internet or mail-order gun sales without a federal license, [FN67] and the return of internet gambling regulation. [FN68]
On a parallel track was the introduction of consumer protection bills. Some simply applied existing labeling requirements to online advertising, [FN69] evidencing a concern over internet fraud [FN70] and expressing concern over the quality of information available on the Net. [FN71] But more specifically, bills showed continued concern over online consumer privacy. [FN72] Children's consumer privacy took center stage, [FN73] while resistance *1217 to privacy regulation took the form of a preference for self-regulation or of a focus on the privacy of users of government services. [FN74] The problem of spam--unsolicited junk e-mail--also received a good bit of legislative attention. [FN75] Bridging the area of privacy concern and e-commerce was the continued focus on encryption regulation. Here, Congress played the role of counterweight to the Administration's efforts to stall the dissemination of strong encryption--to some extent relying on a privacy rationale, but also relying on a rationale of the importance of encryption to electronic commerce. [FN76]
The 105th Congress focused heavily on electronic commerce, and on the Net as an environment crucial to United States economic development--to be fostered as a matter of industrial policy and facilitated by specifically-tailored property and contract rules. To that end, there were general declarations that supported electronic commerce [FN77] and bills that sought to support electronic commerce by appointing an electronic commerce advisory committee representing its business side and occasionally seeking the representation of consumer *1218 groups. [FN78] Bills proposed tax incentives for the software and online services industries. [FN79] More generally, there emerged the internet tax freedom notion of assuring that online access services were not subject to tax, and that electronic commerce not be subject to specific taxation. [FN80] The notion of internet tax freedom was put forward as international trade policy, [FN81] and there were suggestions to expand it to a more general notion of forbearance from regulation at both the federal and state levels. [FN82] Federal procurement was also enlisted to support the growth of electronic commerce. [FN83]
In addition to the various subsidies designed specifically to aid electronic commerce, as opposed to infrastructure, bills were introduced to make the legal environment more conducive to electronic commerce. A digital signature law was introduced, [FN84] and intellectual property rights were expanded to increase the appropriability of information goods and services provided online. The Digital Millennium Copyright Act ("DMCA") was introduced, [FN85] and the development of domain *1219 name policy was linked to trademark concerns. [FN86] There was an effort to delineate clearly the liability or responsibility of ISPs, [FN87] which were treated using the same structure developed for content regulation: they were insulated from liability, but given an enforcement role in exchange. [FN88] Finally, there were more specific responses to problems like Y2K readiness [FN89] and liability. [FN90] No less interesting, though of much lesser prominence, was the first attempt to use the Net to facilitate real-world efficient markets where market failure was in the past seen as legion--specifically, a requirement that airlines publish their fares online. [FN91]
The 106th Congress has followed more or less the same pattern. There has been increasing use of Net publication as a standard approach to disseminating government information, [FN92] *1220 to providing government services, [FN93] and to permitting the public to communicate with the government. [FN94] It has been used *1221 similarly as a means for private parties to publish information they are required to make public, [FN95] or to support private parties who are making useful information available on the Web. [FN96] Congress has continued to attempt to harness the Net to enhance the election process, not only by facilitating dissemination of Federal Elections Commission reports, [FN97] but also by permitting candidates to use public funds for internet- and Web-based campaign materials [FN98] by excluding the use of internet communications by individuals from covered expenditures, [FN99] and most creatively, authorizing a study of the use of internet technology to enhance voter participation. [FN100] There also has been increased use of the Net for government propaganda and educational messages. [FN101]
*1222 Congress has continued to concern itself with infrastructure development, [FN102] including Next Generation Internet development. [FN103] There has been some sense that information technology is generally the appropriate domain of policy analysis, [FN104] some attempts to restructure the universal service system--primarily by localizing it [FN105]--and new efforts to support the development of telehealth services. [FN106] Traditional infrastruc-ture regulation after the Telecommunications Act of 1996 has been represented in the question of whether interconnection requirements should apply to cable operators insofar as they offer *1223 broadband access services. [FN107] The idea that internet service provided by electric utilities can possibly be used to allow consumers who aggregate to provide electricity also to provide internet service was also reintroduced. [FN108] Wireless communications were enlisted to provide internet access by the elimination of spectrum aggregation limits on spectrum auctioned after December 31, 1999. [FN109]
There has been more education-related legislation, [FN110] with some efforts to fund teacher computer training. [FN111] More creatively, there has been funding of prizes for students to develop educational software, conditioned on the free distribution of that software on the Net to educational institutions. [FN112]
Fear of "bad" information flows on the Net also has continued. There have been repeated efforts to condition universal service, or even the availability of general federal funds for schools and libraries, on installing filters at internet access points. [FN113] There has been a crackdown on child pornography on *1224 the Net [FN114] and efforts to curtail prisoners' communications. [FN115] There have been efforts to protect children from pornography (and violence) on the Net, by nudging the new media industry to restrain itself and facilitating industry collaboration in pursuit of such restraint. [FN116] Concerns about internet gambling, [FN117] the sale of prescription drugs over the internet, [FN118] tobacco sales, [FN119] and sales [FN120] and disposal [FN121] of firearms using the Net round out the list of dangerous communications that have elicited congressional response.
Consumer privacy, [FN122] spam, [FN123] communications privacy from government search, [FN124] and consumer protection issues [FN125] -- *1225 in particular against internet fraud [FN126]--have also continued to appear on the congressional table, as has encryption regulation. [FN127] The arrival of online brokerage has been marked by the introduction of bills to regulate or facilitate online securities transactions. [FN128]
Finally, electronic commerce has continued to occupy much of Congress's Net- related attention. There have been more *1226 statements about the need explicitly to foster electronic commerce. [FN129] There have been attempts to make the internet tax freedom concept perpetual, [FN130] to prohibit the Federal Communications Commission ("FCC") from imposing access charges on internet access services, [FN131] and to make internet tax freedom a stable part of United States foreign trade policy. [FN132] There has been a continued focus on developing the use of electronic commerce in government procurement. [FN133] There have been more efforts to study the effect of the internet on access to price and other attributes of service in real-world markets and to use *1227 the Net to facilitate efficient real-world markets. [FN134] In the arena of developing the property and contract regimes to undergird electronic commerce, there have been database protection bills, [FN135] bills concerning digital signature [FN136] and electronic contracts, [FN137] and attempts to regulate the trademark/domain name issue. [FN138] There have also been attempts to legislate Y2K litigation control. [FN139]
D. Public Laws: 1990-99
The bills enumerated above reflect the range of issues considered by congressional representatives to be sufficiently important to propose as a bill. The list of public laws actually passed over this period suggests which issues commanded an effective majority of congressional representatives who thought them sufficiently important to make them laws.
In infrastructure regulation, the Telecommunications Act of 1996's attempt to, among other things, harness telephone and cable providers to build the broadband network was obviously one of the most expansive laws. [FN140] So too were its universal service provisions and their inclusion of internet access for schools and rural healthcare providers. [FN141] The Next Generation *1228 Internet Research Act of 1998 [FN142] and other means of funding internet development [FN143] continued the government's commitment to engagement in the development of the Net--although the prohibition on the NSF from expending funds on entering into contracts regarding management of the domain name and numbering system after September 30, 1998 [FN144] suggested an ambivalence. Funding for the development of educational uses [FN145] and cultural development are also noteworthy. [FN146]
*1229 As with the bills, the public laws too began to rely heavily on the Net to disseminate public information, beginning with dissemination of the legislative materials themselves early in the 1990s, [FN147] and then continuing to rely on the Net more generally to disseminate government information, [FN148] including government *1230 propaganda and educational campaigns. [FN149] Similarly, Congress did in fact adopt the notion of using the Net as the proper location for publishing materials required by law to be made public by non-government actors. [FN150] There were also the beginnings of offering services through the Net, [FN151] whose efficacy is hinted at in, for example, funds allocated to the non-governmental Center for Missing Children, seen to be an effective user of Net publication to serve the public interest. [FN152]
The concerns about dangerous communications tended to fare well in Congress, resulting in, for example, the Communications Decency Act of 1996 ("CDA"), [FN153] the Family Online Privacy *1231 Act, [FN154] and the Child Online Protection Act ("COPA"). [FN155] There was also a study on the availability of pornography to children on the internet, [FN156] a declaration that prisoners should not have unsupervised internet access, [FN157] and a sentencing enhancement for sexual abuse of children if a computer is used to solicit the child or organize the abuse. [FN158] Along parallel lines, there were studies of internet gambling [FN159] and the availability of information on the Net regarding terrorism. [FN160]
Children also provided the binding agent that allowed at least one form of general consumer protection legislation to pass--in the form of the Children's Online Privacy Protection Act ("COPPA"). [FN161] That Act recently has been implemented in FTC regulations effective April 21, 2000. [FN162] In the consumer protection area, Congress also required a study of the appropriate regulation for online banking. [FN163]
The drive to enhance and facilitate electronic commerce was similarly effective in Congress. The Internet Tax Freedom Act was passed, [FN164] there was a declaration that the internet *1232 should be free of tariffs, [FN165] and there was funding allocated for the use of electronic commerce in government procurement. [FN166] The DMCA [FN167] and the Anticybersquatting Consumer Protection Act [FN168] were passed, and there was funding allocated for infrastructure tied to a study of the effects of domain name registration policy on trademark owners. [FN169] Finally, there were Y2K laws creating litigation exemptions [FN170] and facilitating collaboration among industry participants to resolve Y2K issues. [FN171]
The appearances of the Net in
legislation and legislative efforts can be organized usefully into three
In the first cluster, legislation attempts to harness technology to serve what are perceived to be governmental goals unrelated to the Net. These include: enhancing education by providing school access and teacher training; funding internet *1233 access in libraries; publishing government information and information required by law to be published by non-government actors; and communicating with government by opening up the process of public comment on regulations. The tax breaks, trade policy, and procurement aspects of support for electronic commerce could also be seen as falling within this category--as instances of the industrial policy of a nation steering its industrial sector to an area where the government sees the greatest welfare gains.
While these legislative efforts may, at first glance, seem to harness technology--defined independently of these efforts--to serve pre-existing governmental goals, a review of some of the actual uses suggests that the technology can alter the perceived role of government. This change in the perception of government's role can in turn affect the direction of technological development, as technology seeks to respond to facilitate the new role. When the declining cost of communication leads Congress to provide Congressional Research Service products online, [FN172] we might be observing a slight shift in the perceived role of government publication, from a means of assuring transparency of government, to a means of providing a public good: information. If we see low-cost communications being harnessed to provide significantly better real-time or near-real-time feedback mechanisms for public comment, [FN173] we might be observing a slight shift from a good-administration conception of government--with comment and publication maintained for transparency purposes--to a conception of government as implementing the product of public discourse--with publication and feedback serving a deliberative, rather than a monitoring, function.
As more public functions are performed on the Net, and are enhanced and altered by the Net, its role in people's lives is affected. The machine through which you debate political issues with your community plays a different role in your life *1234 than the machine through which you shop for Christmas presents. The social construction of the Net is affected by the extent to which it is understood and treated as a means for public participation, as a means for study and education, or as the great shopping mall in the sky. That social construction will be affected by the extent to which, and the way in which, the public uses the Net to provide traditional public goods like education, civic participation, or information about the world we share as citizens and autonomous persons.
The second cluster of legislative actions encompasses efforts aimed directly at fostering the advancement of Net infrastructure. These include primarily physical infrastructure regulation, as well as investment in research and development of the intellectual infrastructure. This is not to say that all such investments are apolitical, aimed solely at some commonly-held sense of optimal development. Competing bills seeking to fund or defund the NSF's Next Generation Internet efforts suggest debates over the role that public investment and oversight should play in infrastructure development. There are questions of just how freely the market can provide for infrastructure, both physical and intellectual. Investments in research and development indicate at least some concern that markets will not invest optimally; regulation of incumbent carriers suggests the same for the physical infrastructure market. There are disagreements over which set of regulations will best achieve infrastructural development--whether, for example, cable carriers who offer broadband data carriage must interconnect with competing ISPs or not. [FN174]
As I have explained in detail elsewhere, [FN175] the way that our infrastructure is built affects the distribution of control over content or, in other words, who gets to say what to whom, and who decides these questions. To take the example most relevant in late 1999 and early 2000: if cable broadband develops with a relatively large difference between upstream and downstream *1235 capabilities, and if its owners prohibit home consumers from using their home service to run a server [FN176] from private homes, then this system begins to resemble more of a broadcast model than what, throughout most of the 1990s, was our understanding of the widely decentralized internet model. Whether one believes that such a shift would be desirable--as a mechanism to reduce information overload--or undesirable--because it would undermine the diversity made possible by the Net--is less important, at this point, than to recognize that those are the stakes of such choices.
Moreover, the general acceptance of the assumption that infrastructure will be privately deployed and owned limits the imagination in terms of thinking of solutions for issues of control over infrastructure. Debates over universal service, for example, traditionally fall within the conceptual area of telecommunications regulation, and increasingly are focused on the most efficient method of subsidizing the purchase of telecommunications services in a private market. In the bills, however, we see a whiff of a possibility of an alternative approach in the consumer-aggregation approach to electric utilities. [FN177] The basic idea is that consumers can aggregate, either voluntarily or, more interesting and likely, through municipal government, to provide electricity publicly. As electric utilities come to be seen as potential providers of information infrastructure, [FN178] so too we see these municipal consumer aggregations become the first legislatively-empowered instances of public information infrastructure. The same model, even more simply, could suggest a series of publicly-funded municipal or otherwise local networks for high-speed access to the Net. *1236 Whether these networks are economically feasible, and why they are normatively appealing, are questions I have addressed elsewhere. [FN179] It suffices to say that the cost of setting up a wireless public system, even if only as a carrier of first or last resort for time-insensitive communications, need not be so great as to exclude a political conversation of whether it might be as justified to use the public purse for this purpose as to use public funding for maintaining a public roadway system. [FN180] Why would we want such infrastructure? For the same reasons we want public schools, libraries, or scientific labs: because the capacity to communicate--to produce, use, and receive information--is the kind of good whose distribution and structure have enormous normative consequences for our democratic culture and our capacity for personal autonomy--consequences we may not want to leave to markets to determine.
The importance of the question of whether infrastructure is privately or publicly owned (or not owned at all [FN181]) is partly dependent on our regulatory response to the question of the relationship between ownership over physical infrastructure and control over content. In the case of the broadcast spectrum, for example, "ownership" over a license provides the owner with complete control over content, subject to government regulation. In the case of cable, most of the capacity is completely controlled by the owner of the cables, with much less regulatory intervention, but some portions of the capacity cannot be controlled by the infrastructure owner at all--as with must- carry channels and access channels. In the case of telephones or telecommunications carriers, ownership over the infrastructure entails, by definition, [FN182] no control over the content. Which model will prevail at the physical layer of the digital *1237 environment will have significant consequences on the relative role of owners of that physical layer in controlling information flows on the Net.
To return to the example of cable access, if AT&T can exclude all competitors from using its system to provide internet access, [FN183] and if it can also decide to install a filter for certain kinds of information--say, because it believes a "safe" service will draw more consumers--then, vis-a-vis its subscribers, that information does not exist as long as the subscribers continue to use a cable modem. Depending on the availability of alternative facilities-based providers who are common carriers--digital subscriber lines ("DSL") being the most relevant today--who do not control the information, and depending on consumers' switching costs, the possibility that the contents of some pipelines will be controlled by their owners could give these owners significant control over the flow of information to and from homes they serve.
The third cluster of issues on Congress's legislative agenda during the 1990s directly concerns control over information. These efforts at regulation respond to radical changes that the Net has wrought on traditional structures of control over information flows. Where doors and locked bureaus could once protect privacy, data-mining and encryption now do battle over whether there will be more privacy than in the pre-Net environment, or less. Where clearly- demarcated copies of information goods--like books or records--once defined the boundaries of control that intellectual property owners had over their products, technological protection measures and licenses do battle with digital duplication and transmission to determine whether owners or users will gain more control over the information products they own, or use, respectively. Where brown paper wraps, the watchful eye of the store keeper or the parent, and government and social regulation once controlled access to "dangerous materials," kids more technologically attuned than their parents and users who seek out or provide "dangerous materials" can now produce and access these materials at lower cost, and much freer of the traditional means of social surveillance, than ever before. This third cluster is a series of laws attempting to establish the terms of control over information flows, given the shake-up of the technological parameters that *1238 defined the boundaries of control before the Net. These laws are the subject of Part III.
Pornography regulation, privacy and
encryption regulation, the DMCA, and the Anticybersquatting Bill all have
similar structures as forms of Net regulation. They all perceive a
destabilizing effect that the Net has on the pre-Net equilibrium of control
over certain kinds of information, and all intervene to settle the lack of
equilibrium by setting the parameters for a new pattern of control over the
information flows on the Net.
This Part looks at a series of such events, and outlines a pattern of regulatory impulses, responses, and effects by tracking a number of instances of Net regulation through the destabilization to which they respond, the new patterns of control the technological shift makes possible, and the actual regulatory choice made. The result of this exercise should be a plausible method for analyzing new Net regulation issues that fit this pattern, allowing a somewhat removed analysis of proposed laws whose normative implications may be quite different than those expressly engaged by their proponents.
1. Pornography and Dangerous Information
Over the course of the twentieth
century, pornography regulation in the United States has gone from a practice
of general enforcement of public morality--personified by Anthony Comstock [FN184]--to a combination of direct enforcement
of public morality against very extreme instances of morally unpopular sexual
depictions (contemporary definitions of obscenity), [FN185] and protection of children from less
extreme sexual depictions that are still morally disfavored by the majority, [FN186] which functionally segregates these
unpopular sexual depictions *1239 from the information
environment of most of the population. [FN187] In an information environment composed
of print, broadcast, telephone, and film, this settlement was satisfactory to
the moral mainstream. Mainline print is kept "clean" by market
factors, while niche printers can be physically segregated, their products
wrapped in brown paper or placed behind a curtain. [FN188] Broadcasters are tightly regulated, and
even criticism of the broadcast censorship system itself can constitutionally
be kept "clean" in its modes of expression. [FN189] Film can only be accessed in designated
theaters, where gatekeepers and ratings can keep children and honest people
out. For more conservative communities, these theaters themselves may be
segregated geographically. [FN190]
The introduction of video was very simple to assimilate into the book or magazine model--with segregation in the store, and in-home viewing sufficiently segregated from the public sphere so as to prohibit imposition of public morality regulation, and so as to be sufficiently within the control of parents. Cable and the introduction of broadcast-like phone services--the dial-a-porn services--were more difficult to assimilate. They could be accessed by anyone, from anywhere, and were thus "in the public sphere" and more troubling to those who had come to rely on the status quo to provide a more-or-less "clean" environment. They could be accessed by children from every home. Both of these media were therefore problematic for the status quo, and the solutions to the disturbance they caused were also similar. Dial-a- porn was constitutionally protected, but it was acceptable to require providers to use child-resistant mechanisms to exclude children and, presumably, unsuspecting adults. [FN191] Pornography on cable may constitutionally be subjected to the same kinds of restraints. [FN192] And, as it turned out, it may be subjected to even more restraints--*1240 to those necessary to banish the porn from the one public sphere into which an adult or child in the late 1980s and early 1990s might unsuspectingly have wandered: leased access cable channels. [FN193]
The introduction of the Net caused a much more significant disturbance than any previous technological change since the abandonment of the general acceptability of morality regulation per se. This is so for a number of reasons. The most important reason is organizational. The Net eliminated the intermediaries that, in previous technologies, were used as gatekeepers to control the dissemination of, and access to, pornographic materials. Gone were the editor, the magazine or video store owner, the broadcasters, the cable operator, or even the telephone company. Anything that anyone was willing to put online was available directly to anyone else, using facilities that saw nothing but streams of zeros and ones. This not onlyeliminated organizational control points, but also social approbation control points--the need to look someone in the eye in order to rent or buy the thing.
Second, the Net dramatically reduced producers' production and distribution costs. Anyone could put his or her fantasies online at a cost of no more than spare time, or exhibit their photographs at the cost of scanning them. To add insult to injury, it made available to mainstream users pornography that was much more "obscene" than they would normally be able to get their hands on, and created room for more outrage--an outrage fanned by the infuriating fact that many kids could actually navigate this thing better than the adults we usually think of as their "controllers."
2. Consumer Privacy
The sources of destabilization in
the area of consumer privacy are the increase in processing power and decline
in its price, and the characteristic of digital communications that they carry
information about themselves as an integral part of the communication. In the
United States, the problem of consumer privacy was first raised significantly
in the 1970s. [FN194] *1241 The practice of
businesses collecting and sharing information about the purchasing habits of
their consumers, and using this information to profile users so as better to
target them for advertising and offers, has been growing ever since. The
difference today is the amount of information available in processible form,
and how easy it is to process it. When many purchases were made in cash at
local, separate stores, collecting information was extraordinarily expensive.
Financial services companies and mail order vendors could keep records on
consumption patterns, but information about books, records, groceries, and many
other consumer goods was lost at the point of information intake. Increasing
quality of computing and networking enabled more sharing of this information.
As we moved to electronic payment systems with the rise of credit cards, there
was also a rise in the number of information intake points--any point of sale
where a credit card was used was a point of information about the purchasing
habits of an identifiable person. As computing became cheaper, checkout counter
registers could be transformed into information collection and communication
points. With the rise of the Net, every move, whether part of a purchase or
not, becomes a potential point of information collection, for every move
entails a series of information exchanges between the source of the information
and its user. All of these exchanges are in machine-readable form and they are
all eminently capable of retransmission and resale to other users of a consumer's
The result is the possibility of an online life that is more or less completely subject to surveillance by commercial companies. The destabilization comes from the fact that as a society we value privacy quite highly, and in the past could rely on the significant imperfections in the system of collection, processing, and dissemination of information about our lives to protect that privacy. In the digitally networked environment, we can, as a practical matter, be pervasively seen, and our actions can be comprehensively recorded, processed, and shared or sold among others without our being able to have any say at all. [FN195]
*1242 3. Encryption
The first destabilizing effect relevant to encryption regulation is simple: better, faster, cheaper processors. As more people have access to faster processors, it becomes more plausible for everyone to use complex encryption algorithms that require processing power to encrypt and decrypt with a key, and are increasingly difficult, not to say impossible, to decrypt without a key. [FN196] The result is that the advantage government agents have over everyone else when it comes to encrypting and decrypting messages is steadily decreasing. Whether this is a good thing or a bad thing may depend on whether the government agent you are thinking of is an anti-terrorism squad of a democracy or the Stasi. [FN197] Furthermore, the increasing surveillance possibilities discussed with respect to the destabilization in consumer privacy apply with equal, or greater, force to concerns over government surveillance in a fully digital--and hence machine-searchable--communications environment.
4. Digital Information Goods
Control over information goods is profoundly
destabilized by digitization and networking. [FN198] The basic law regulating control over
information goods is copyright law. It is a law deeply rooted in the print
environment, and it relies on the technical and economic characteristics of
print to delineate the *1243 boundaries between vendors and
buyers. Copyrights are primarily rights in the distribution medium--rights to
copy, distribute, and perform or display publicly. The major deviation from
this line is the right to make derivative works. This allows producers to
capture enough of the value they create to give them incentives, while leaving
many uses incapable of monitoring by the producer, or not subject to the
owner's exclusive rights, or both. This structure of delineating the boundaries
of control mostly around the distribution medium was easily transferred to
other distribution media that were relatively simple to control, and could not
be easily displaced by user- made copies. Celluloid, broadcast, and records or
CDs were sufficiently similar in their distribution characteristics to print to
allow for a more-or- less simple extension of the copyright framework to them.
It provided a rough and ready, but livable, solution to the tension between the
interest in giving producers incentives and the interest in maximizing public
access to the information once it is produced.
Digital network distribution is different. Copies are perfect and almost costless, and redistribution is almost costless. This threatens to render the producers' staple rights null. But copies can be encrypted, their use monitored by owners, and click-on licenses can surround each information good with technical and contractual fences much tighter and more impregnable than copyright law ever provided. [FN199] This renders users' traditional practices of access to information obsolete. The result is that, in both directions, control over information goods can no longer be based primarily on the assumption of relatively clearly defined, but porous, boundaries of the distribution medium. The issue that regulation must resolve is whether this destabilization will result in a more tightly controlled, a more freely flowing, or a more-or-less similarly controlled environment.
*1244 5. Trademarks and Domain Names
The destabilizing effect of the
Net on trademarks is a result of the radical reduction in the cost of searching
for information on the Net. In the physical business environment, searching for
products to compare, say, price and quality, is costly. Brand names and
trademarks reduce search costs by declaring location and price/quality
information in easily-accessible ways. The mass mediated information
environment works well with this role of trademarks, for it provides a
relatively costly way of communicating this self- designation of price and
quality. Such a costly method excludes many potential competitors--who would
crowd the attention of consumers with competing marks-- and permits a
relatively small number of businesses to acquire instant, human- memory-based
recognition as carrying certain attributes of the price/quality tradeoff. Hence
the emergence of the category of "famous marks" that is increasingly
receiving property-like, rather than consumer-protection-like, protection, as
in the Anti-Dilution Act of 1995. [FN200]
The Net radically reduces the transaction costs involved in obtaining multiple quotes and offers. It makes possible software-based comparison shopping, and facilitates the acquisition of price/quality tradeoff information on a purchase-by-purchase rather than vendor-by-vendor basis. It allows for the development of services like CNET, that collect information, review it, make price comparisons, and link to vendors. While this may be good news for consumers and for aggregate social welfare, it is very bad news for the owners of famous brand names. The value of their brand names--premised on the happy accident that their social-welfare-increasing investments in saving consumers search costs also made competition more difficult from non-brand name producers, and hence gave them the ability to exercise some discipline on prices and quality--was undermined. The result of this destabilization is seen in the trademark/domain name debate. [FN201] (A fascinating subplot of the destabilizing effect of the dramatic reduction in search *1245 costs on established models of market behavior is the occasional attempt in Congress to force certain participants to reveal their prices to consumers. [FN202])
B. Possible Approaches to Stabilization
1. Pornography and Dangerous Information
The primary destabilizing factor with respect to pornography or other dangerous materials was disintermediation--the elimination of intermediates as potential points to control the flow of information from producers to users. This makes possible three ideal-type outcomes to the destabilization. First, there is the possibility of extensive prohibition on the production or use of the disfavored materials, so as to capture one or both ends of the dangerous information flow that the Net enabled. This was more or less the approach of the CDA, and if the Court had taken to the Net something like its approach to television or even to cable access television, [FN203] then keeping this universally-accessible medium "clean" could have meant widespread prohibition on the production and use of dangerous materials like pornography. Reno v. ACLU [FN204] excluded that outcome as a normative choice--the justices thought the price in lost valuable communications too high. The opposite resolution would be the "anything goes" possibility. As communications occur increasingly between a willing recipient who seeks out information and a willing sender who makes it available, we could see an approach where all communication is treated as a "private" matter, outside the regulatory power of the state. What we already see, though, is what we will likely continue to see--an increasing focus on developing and legally requiring the use of various technical means of reintroducing a control point between producer and user, replacing the intermediary who once served that purpose. Whether it is a pervasively-*1246 filtered infrastructure or some other mechanism remains to be seen. The point here is to see the possibility of focusing the legal response on introducing a stabilizing institutional response at the point of destabilization, rather than at the point of production or reception of the information. The problem for policy analysis will be to try to evaluate the costs and benefits of one or another of these resolutions. This evaluation will depend on other possible ways in which information flows will or will not be controlled, given the destabilization of the patterns of control prevalent in the mass-mediated environment.
2. Consumer Privacy
The regulatory responses to the
radical increase in surveillability of consumer transactions could range along
a spectrum from doing nothing to prohibiting the collection of information. In
the former case, which is largely the American response, consumers will likely
be subject to pervasive surveillance by vendors. In the latter case,
surveillance will be limited to organizations willing to work outside the law,
and therefore will not be a pervasive fact of commercial interactions. This
will also result in the lost utility of vendors being able to anticipate the
preferences of consumers by extrapolating from profiles of past behavior.
In between, a variety of legal responses require more-or-less prominent notification and consent by consumers to the collection. Two possibilities are to require that the default option be permission to collect, or non-permission; or impose different levels of care in maintenance of the information, in keeping it updated, and in permitting consumers to update and challenge information kept about them.
At the technical level, the destabilization effect can be dampened by development of better anonymization technologies. One approach would be pervasive use of anonymizers [FN205]--services that strip a consumer's addressing and routing information from requests for information on the Web, and hence limit the capacity of vendors to collect information about visitors *1247 to their sites without expressly asking for information. This would be impossible to implement, however, without a second component: widespread use of digital cash mechanisms--payment mechanisms that, like cash, are readily available and anonymous. With or without anonymizing utilities, the pervasive availability and use of digital cash would render unnecessary many of the current information collection practices necessary for implementing existing forms of electronic payment, like credit cards.
The theoretically possible response to the destabilizing effect of strong, cheap processors on the balance of power between government agencies (or rich corporations) and non-governmental, small-scale users is to require the use of only weak encryption algorithms in consumer products. The theory is that if the public at large uses weak encryption, then the rapid rise in processing power will keep the decryptors ahead of the encryptors, much as they are in the pre-low-cost-processor world. This was the theory underlying the Clipper Chip initiative [FN206] and the United States' export restrictions on encryption technology. The alternative approach is not to regulate, in which case we will likely see widespread availability of very strong encryption. Its usefulness to electronic commerce and its embrace by users as a means to secure privacy suggest that, barring a prohibition, the market for strong encryption will drive its inclusion in popular applications intended for use in a networked environment very soon.
4. Digital Information Goods
The destabilization of patterns of control over information goods is bi- directional, in that it could lead to either much more control, or to much less control, of owners over information goods. The status quo was a contingent accommodation between the public interest in assuring incentives to producers and the public interest in assuring access to users, contingent upon the technological characteristics of available distribution media. Responses could therefore range along a wide spectrum. *1248 At one end, we could imagine very strong rights for owners to control uses of this information [FN207]-- perhaps on a theory that declining transaction costs for contracting largely eliminate the need for most access privileges. [FN208] These would be supplemented by prohibitions on circumventing technological protection measures intended to extend the owners' capacity to monitor use and exclude non-paying users, and by strict enforcement of online contracts intended to mete out use rights and carefully price-and-quality discriminate among users. [FN209] At the other end, we could imagine very strong user privileges to take advantage of the new technology to access and use information, on a theory that in a near-zero marginal cost communications environment, the "goods" -based concept of information production--itself a zero marginal cost "good"--is no longer the appropriate way to think of how information is produced. [FN210] We could, in other words, see law as shifting away from protecting business models based on sales of products, and towards business models based on relationships built around information exchange. [FN211] Or we could see various approaches in between these two. What is unlikely to happen is that we will find a settlement more or less like the preceding settlement, because the relative costs of communication, reproduction, and use around which that settlement crystallized are so fundamentally altered by the new environment.
5. Trademarks and Domain Names
The concern over trademarks in
domain names represents a destabilization of the value of trademarks as
search-cost reducing mechanisms. One response could be an attempt to *1249
transfer the value of trademarks from the high search cost bricks-and-mortar
plus mass media environment to the low search cost digitally networked
environment. The other approach would be to accept the declining importance of
trademarks, to limit legal protection to situations where competitors try to
use a mark to confuse consumers, and to abandon the notion of dilution as
protection of goodwill, which developed to protect the famous marks most useful
in the old environment. This would result in some decline in the importance and
value of famous marks, and would instead increase the importance of search
engines, rating services, and other methods of reducing search costs.
C. Regulatory Choices Made
1. Pornography and Dangerous Information
In the area of pornography, we see
two general strategies adopted to attempt to stabilize the area of public
sexual morality and children's exposure to sex. The first, identified in the
CDA and COPA, is an attempt to ban or burden the introduction of sexual
material at its source. CDA did so clumsily, and was therefore overturned with
little difficulty. COPA has attempted to do so while crossing every
"t" and dotting every "i" required by Reno v. ACLU.
Functionally, however, their response is the same, and it is the response
traditionally used in the area of broadcast. Both laws raise the costs of being
a producer of sexual materials troubling to the majority, and place on
producers the risk of error if they do make their materials available to the formally
protected audience--children. Whether the more careful version of this approach
taken in COPA will withstand First Amendment scrutiny remains to be seen. [FN212]
The other general approach is to foster and enhance the introduction of intermediaries between the end-user and the information producer. The most obvious instances of this are the repeated attempts to require libraries and schools to install filtering *1250 software [FN213] and the attempts to encourage ISPs to offer, or even implement, filtering mechanisms. [FN214]
Of the two approaches, the latter seems, at first sight, to be more specifically responsive to the destabilizing factor--disintermediation--and to be less "speech restrictive," in that it does not entail prohibiting anyone from speaking. From a formal, nonfunctional First Amendment perspective, then, it is likely to receive a more robust response. It was Lessig, however, who noted that the relatively benign nature of filters may be illusory. [FN215] For one thing, intermediaries will be reintroduced not because of any necessity created by the technology, or because the medium requires a clearly defined editor. Intermediaries will be reintroduced solely to acquire their utility as censors of morally unpalatable materials. The laws effectively require libraries to take on the role of censors of what their users can see, rather than as facilitators of access to information their users seek. [FN216] Even more importantly, the introduction of filters and the pervasive tagging of information introduce the possibility that ISPs, employers, or, for that matter, governments less constrained than the United States government, will interject themselves between producers and users of information. A specific ban, or set of restrictions, on providers of sexual materials might have much narrower consequences for the information environment as a whole and would less likely *1251 undercut the decentralized nature of the Net. It is unclear, however, that the rights-based analysis of the First Amendment would take account of the full impact of preferring pervasive filtering to direct burdens on sexual speech.
2. Consumer Privacy
Except in the case of children's
privacy under COPPA, the American response to the consumer transactional
privacy concern has generally been a do- nothing approach. Stating a preference
for self-regulation, and contrary to the European response, [FN217] both the Administration [FN218] and Congress have refrained from
regulating information collection practices. For example, Real Networks'
practice of secretly collecting information about the listening habits of users
who purchased their Real Jukebox product--including their habits of listening
on their computer's CD-ROM drive, not over the Net using Real Jukebox [FN219]--may have been bad business, [FN220] but was not necessarily illegal.
It is difficult to tell what the consequence of this regulatory response will be. One option is that consumers will adjust their behavior patterns to life in this panopticon, [FN221] and try to make sure that they do not behave in ways that they would rather not be seen behaving. Another option is that a few well-publicized campaigns and failures of producers who collect too much information, like Real Networks with Real Jukebox, or *1252 like Lotus with Lotus Marketplace, [FN222] or like Lexis with the P-TRAK database, [FN223] will in fact result in some form of industry-based self-restraint, and the development of non-regulatory mechanisms to control privacy practices, like TRUSTe. [FN224] Almost certainly, however, in the absence of regulation, the digitally networked environment will be significantly more subject to surveillance than the analog environment--because it can be, and because the constraints will only be placed to reach a level just below the threshold of consumer rebellion, but no lower. Consumers will therefore likely be exposed to information chosen by vendors who guess what a user will want to see, based on past purchases reflected in a user profile. Advertising, as well as the content of news reports themselves, will be tailored by sites that a consumer visits based on past behavior. This would in effect be a modified "Daily Me" [FN225]--something like the "Daily Me as I am Perceived by Information Vendors." From a positive perspective, one might be uncertain whether this shift is welfare enhancing--giving individuals more relevant information at lower search and collection costs--or welfare reducing--limiting the ability of individuals to expose themselves to information relevant to them at the time, as opposed to information relevant to where they would have been had their preferences and interests followed a predictable path from past observable behavior. Largely this would depend on a combination of our sense of the linearity of the progression of people's preferences, and our evaluation of the quality of the models used by information vendors to predict future preferences, *1253 even if linear and in principle predictable. From the normative perspective, such a development undermines individual autonomy because it pervasively displaces personal control over the information environment within which individuals view the world, because the perception of the world and of possible options for action are defined by others. [FN226]
In the area of encryption regulation, the cat seems to be well out of the bag. Encryption regulation within the United States has come to be seen as constitutionally suspect. [FN227] Export regulation has come to be seen as futile, [FN228] and even the Administration seems to have abandoned its central effort to prevent the spread of strong encryption. [FN229] Whether it is because of the ease of distribution, or because of the pressures from United States industry to prevent the Administration's efforts from simply shifting market share to foreign encryption producers, it seems that there is no longer any response other than to adjust law enforcement practices to a strong-encryption environment. This appears to be an instance where destabilization has gelled into a new equilibrium, technologically determined and autonomous of legal efforts to the contrary. Like talking about the weather, it is therefore difficult to draw normatively interesting conclusions from the encryption regulation debate. It does, however, suggest that there are in fact situations when technology and market forces simply defy regulation, as the techno-utopians of yesteryear foretold. [FN230]
*1254 4. Digital Information Goods
In stabilizing control over
digital information goods, the regulatory response has been fairly consistent,
and it has consistently been on the side of expanding the power of the owners
to control the use of their products. The DMCA criminalized circumvention of
technological protection measures [FN231] and the provision of any services or
products capable of circumventing technological protection measures. [FN232] This likely will lead to pervasive
installation of technological locks, which will have the effect of prohibiting
all uses not expressly permitted and enabled, because any uses-- legally
privileged or otherwise--require access through the code. This extension
dovetails with the DMCA's conditional exemption from liability for ISPs. [FN233] The DMCA includes a series of exemptions
for ISPs from contributory liability for various infringement actions, [FN234] in exchange for a requirement that ISPs
enforce copyright claims made by owners under a "notice and take
down" framework. That framework, in effect, operates as a private
temporary restraining order, pending resolution in court. [FN235] If the states also adopt the proposed
Uniform Computer Information Transactions Act ("UCITA") [FN236]--the law formerly known as UCC-2B [FN237]--which, among other things, validates
mass market licenses, *1255 [ FN238] then we will likely see the
displacement of copyright and related laws by private regulation, achieved by a
combination of contract, code, and organizational enforcement.
Whether an environment of near-perfect excludability of information goods--which are true public goods in the sense of being non-rival--is a good idea as a matter of positive analysis is as questionable as would be the efficiency of a perpetual patent right. Whether it is an environment that is normatively appealing is even more questionable. In such an environment, a relatively small number of organizations control increasing portions of our information environment, and their control extends to an increasingly fine- grained degree of how each of us uses and interacts with our information environment. [FN239] What is important to see in this context is that, in the area of digital information goods, the regulatory response seems quite systematically to choose one of the two extreme ends of the possible approaches to resolving the destabilization created by the technology. The political economy of this preference for the outcome preferred by those who see the direct effects of the laws as private benefits--the copyright owners--and not the outcome preferred by those who do not see most of the costs of this choice as private costs--users and future producers--is not particularly mysterious. [FN240] Building an institutional counterweight to this political imbalance would require courts to take on a more active role of constitutional review of intellectual property regulation. [FN241]
*1256 5. Trademarks and Domain Names
The resolution of the
destabilization of trademarks has gone in the direction of trying to maintain
the value of brand names at the expense of the efficiency of electronic
commerce. Whether this position is the (relatively) more moderate approach
taken in the Internet Corporation for Assigned Names and Numbers
("ICANN") rules, [FN242] or the more aggressive approach taken by
Congress, [FN243] the basic approach has been to do the
following three things. First, the resolution assumes that consumers will seek
out products on the Net by taking their knowledge base from the mass-mediated
environment and deciding that the way to acquire the most appropriate product
given the consumer's preferred price, quality, and terms is to seek a
recognizable brand name from the mass media environment to fit that preference,
rather than to go to a search engine or a product review site. Second, it
assumes that this reliance on an existing knowledge base will be translated
into a consumer typing into their browser a uniform resource locator
("URL") such as http:// www.brandname.com as their primary way to access
products. Third, it gives owners of trademarks the power to control the use of
the alphanumeric string that is a part of their trademark as a second level
domain name, the place represented by "brandname" in our example.
It is not clear, however, that this resolution will be effective. It assumes that browsers will continue to be as they are, that search-and-compare shopping software and review services will continue to play second fiddle to brand recognition, along with a variety of other technological and market assumptions that may or may not turn out to be true. But what is important here is to see that the regulatory effort identified an opportunity to negate the destabilizing effect, and secured it for the stakeholders prior to the destabilizing event. In this case, if consumers, rather than going to a search engine, shopping software, or review site, hunt around for http:// www.brandname.com, or http://www.brand-name.com, or http://www.brandname.net, then they continue to depend on their *1257 relatively limited ability to remember brand names, and the investments made in building name recognition to capture consumers is not lost. To make this possible, it is absolutely necessary that this way of seeking information be a viable approach to searching at least for those branded products, and for that purpose the control of brand-name owners on the second level domain space must be more or less complete. It also suggests, as we in fact see in early 2000, resistance on the part of brand name owners to an expansion of the generic top level domain ("gTLD") space. [FN244] The very strong dilution/goodwill, rather than confusion-based, protection offered in many of the cases, [FN245] the Act, and the ICANN policy is consistent with the attempt to transfer the value of brand names from the real-space, mass-mediated environment to the digital environment. This is the appropriate regulatory means to maximize the probability that this outcome will obtain in the market.
Whether it is in fact sensible--as a matter of social policy--to saddle electronic commerce with the baggage of an imperfect approach to saving search costs from the mass-mediated, real-world environment is a different question. The private stakes for those corporations who have invested in building brand recognition and plan to recoup their investments by exercising some price discipline using the value of their brand name as a search-cost saving device for consumers are obvious. The public benefits of protecting these costs by encouraging consumers not to take advantage of the reduced search costs in the electronic commerce environment are more questionable. But the methodological point is the important one for this article. This is an instance in which the policy choice was to counteract the destabilizing effect of the reduction in search costs associated with electronic commerce and the solution is in fact appropriate to provide at least the legal infrastructure necessary to permit people to engage in electronic commerce without taking advantage of its reduced *1258 search costs, relying instead on the real- world, mass media stand-in for actual comparison--brand name recognition.
D. Regulation as Stabilization Revisited
The above-described type of internet regulation cuts across many substantive legal areas, and concerns instances in which the internet has destabilized existing modes of controlling information. Some combination of technology, law, and economic organization provided, in the pre-Net environment, a certain stable pattern of control over information. Broadcasters could keep the main public medium "clean"--walls, drawers, and cash created a sphere of privacy. Moving to the digitally networked environment destabilized the particular relationships of control over information flow, and someone found this destabilization worrisome enough to try to use law to re-stabilize control.
What this Part suggests is that, when faced with such laws, we begin not with the itch but with an analysis of its causes. We should look at what it is about the digitally networked environment that destabilized the relations of control over information. Once we know the cause of the concern, we can begin to imagine fixes, and we can begin to imagine the kinds of dynamic effects that different kinds of fixes will have. Only then can we make a rational normative choice among possible responses. Only then can we assess which approach would best respond to the concern without imposing too high a cost in terms of how we use information more generally.
A review of the legislative activity
in the area of Net regulation throughout the 1990s reveals three general types
of regulatory activities. The first involves harnessing the Net to enhance
fulfillment of traditional government roles, like providing education or
facilitating democratic participation. In some cases, the utilization of the
technology may do nothing more than make more efficient that which already is.
In others, it may actually affect the nature of the government function, as one
might hope or suggest would be the case with significant enhancement of
opportunities for citizen response and input into government processes. The
second type of regulatory*1259 activity involves direct efforts
to enhance the deployment and development of the Net itself. These efforts
include investments in intellectual and physical infrastructure, and regulation
of markets that will serve this development. Again, this is a regulatory area
that may have normatively significant effects. Different approaches to
more-or-less regulation and more-or-less direct provision by the government may
have significant effects on the way the network is built and used in the
Finally, there is a set of regulatory activities that are more commonly identified with the concept "Net regulation," which have to do with regulating control over information flows. This article suggested that these areas are amenable to a common analytic approach. Using this mode of analysis may, for example, reveal the stakes of the regulation more effectively than treating the problems as separate, specific problems of regulation of pornography or copyright infringement.
The way to approach these questions of Net regulation is to ask, first and foremost, whether they are issues of "Net regulation." The way to answer this question is to analyze in what way, if at all, the perceived regulatory problem is a result of the destabilization of extant models of control over information flows in the pre-digital environment. If the regulatory problem is not affected by the fact that the activity sought to be regulated is on the Net, rather than in the real-world or mass-mediated environment, then it is not clear that any new, Net-specific regulatory solution is necessary. If, however, it is possible to identify the Net as a factor that destabilizes the structure of control over the information flows sought to be regulated, then we might indeed be facing a situation that requires a regulatory response to resolve the question of control that has been set loose from its pre-digital moorings.
The second step is to identify how the Net destabilizes the incumbent structures of control over information flows. In particular, we should seek to identify who once had control, and no longer does, or who once had no control, which they might now have, and what it is about digital network communications that caused this shift. This may be a unidirectional effect, as in the case of encryption, or a bi-directional effect, as in the case of digitized information goods. But the methodological inquiry is the same.
*1260 The third step is to identify the range of possible regulatory responses that, given the new technological context, could stabilize new patterns of control over information. Different regulatory responses could result in different patterns of control, and we must consider the various possible responses and outcomes in order to settle on a considered regulatory approach.
The fourth and final step is normative evaluation. Understanding something as a problem of Net regulation; understanding the ways in which law can re- stabilize new patterns of control over information flow; and understanding who stands to gain and who stands to lose what types of control over which kind of information given adoption of the various regulatory responses possible, set the groundwork for choosing the appropriate regulatory response. That choice, however, is irreducibly normative. And it is a choice of great moment, for it sets the legal framework for the new settlement in the digital environment of some very basic social and cultural questions. These are the questions of who gets to say what to whom, and who decides; who gets to produce culture; and how concentrated or widely distributed our social, political, and cultural conversations will be.
Together, recognition of the different layers of Net regulation and their possible interactions with each other is a necessary pre-condition to developing a coherent policy about Net regulation. We must understand that we make Net policy at all these layers--its utilization for the provision of public goods, its infrastructural development, and its effects on the structures our society uses to control the flow of information--and that the choices we make interact across clusters andwithin clusters among specific choices. If we embrace the Net as a medium enabling widely dispersed, robust public discourse, [FN246] then it makes little sense to negate that normative choice by creating new tight controls over cultural production in the form of expanded property rights to information goods. If we embrace extensive monitoring of uses of information so as to permit owners to charge for every use, then we cannot also *1261 embrace a very strong perception of privacy. [FN247] As we are bombarded with specific policy choices, we will make better policy by stepping back and understanding where the choice is situated in the map of policy choices we have already made and are likely to make, comprehending the positive implications of our choices given the technological backdrop and the change that it has created from our former environment, and explicitly assessing the normative value of these implications.
[FNa1]. Associate Professor of Law, New York
University School of Law.
[FN1]. See The White House, A Framework for Global Electronic Commerce (July 1, 1997) <http://www.ecommerce.gov/framewrk.htm>.
[FN2]. I use the term "Net" to describe, most obviously, the internet, but more generally "the digitally networked environment," whose clearest manifestation for most of us today is the internet.
[FN3]. See infra note 9 for a more detailed description of the search terms used.
[FN4]. See Cubby v. CompuServe, 776 F. Supp. 135 (S.D.N.Y. 1991); Stratton Oakmont, Inc. v. Prodigy Servs. Co., No. 31063/94, 1995 WL 323710, at *5 (N.Y. Sup. Ct. May 24, 1995); Yochai Benkler, Rules of the Road for the Information Superhighway: Electronic Communications and the Law 330-55 (1996) [hereinafter Electronic Communications].
[FN5]. See Electronic Communications, supra note 4, at 401-30.
[FN6]. See generally Michael S. Baum & Henry H. Perrit, Jr., Electronic Contracting, Publishing, and EDI Law (1991); Electronic Communications, supra note 4, at 43-147; Benjamin Wright, The Law of Electronic Commerce (1991).
[FN7]. See United States Dep't of Commerce, The National Information Infrastructure: Agenda for Action (Dec. 21, 1993) <http:// metalab.unc.edu/nii>. Item 1 on the agenda was to promote private investment, and the first action mentioned was telecommunications regulatory reform to enlist telephone and cable to the effort. See United States Dep't of Commerce, The National Information Infrastructure: Agenda for Action (Dec. 21, 1993) < http://metalab.unc.edu/nii/NII-Agenda-for-Action.html>.
[FN8]. See United States Dep't of Commerce, The Emerging Digital Economy II, ch. 1 (June 1999) <http://www.ecommerce.gov/ede/chapter1.html>.
[FN9]. I used a Lexis search on all full text bills in the 101st-106th Congresses, with the following query: "internet" or "electronic commerce" or "e-commerce" or "world wide web" or (interactive /5 computer) or "online" . I retrieved 15 bills and joint resolutions in the 101st Congress; 23 in the 102d Congress; 34 in the 103d Congress; 66 in the 104th Congress; 275 in the 105th Congress; and 348 in the first session of the 106th Congress by the end of 1999.
[FN10]. There were actually 63, but one, from the 100th Congress, was swept in by the (computer /5 interactive) phrase and referred in the same sentence to instructional computers and interactive videodiscs.
[FN11]. See H.R. 4014, 102d Cong. (1991).
[FN12]. See H.R. 5759, 102d Cong. (1992); S. 2937, 102d Cong. (1992).
[FN13]. See H.R. 5983, 102d Cong. (1992); S. 2813, 102d Cong. (1992).
[FN14]. See H.R. 5392, 102d Cong. (1992).
[FN15]. See H.R. 2728, 103d Cong. (1993); S. 1040, 103d Cong. (1993); H.R. 1804, 103d Cong. (1993) (enacted); H.R. 856, 103d Cong. (1993).
[FN16]. See S. 626, 103d Cong. (1993).
[FN17]. See H.R. 1757, 103d Cong. (1993).
[FN18]. See H.R. 3636, 103d Cong. (1993).
[FN19]. See H.R. Res. 463, 103d Cong. (1994) (requiring that legislative tracking and text be made available online over the internet); H.R. 4606, 103d Cong. (1994) (appropriating $1.5 million for a demonstration of making federal and other databases available over the internet) (enacted).
[FN20]. See S. 2207, 103d Cong. (1994); S. 2206, 103d Cong. (1994); H.R. 4263, 103d Cong. (1994); S. 1587, 103d Cong. (1993) (enacted).
[FN21]. See H.R. 3606, 104th Cong. (1996); H.R. 1978, 104th Cong. (1995) (finding its way, eventually, into the Telecommunications Act of 1996 as § 509); S. 314, 104th Cong. (1995). The notorious Exon bill, which is the lineal parent of the Communications Decency Act, did not use the term "internet," but is later swept in by this rather crude search as part of Senate Bill 652, the Senate version of the Telecommunications Act of 1996, into which the Exon bill was incorporated. See S. 652, 104th Cong. (1995) (enacted).
[FN22]. See H.R. 3526, 104th Cong. (1996); S. 1495, 104th Cong. (1995); S. 704, 104th Cong. (1995) (enacted); H.R. 497, 104th Cong. (1996) (enacted).
[FN23]. See H.R. 3781, 104th Cong. (1996).
[FN24]. See S. 2184, 104th Cong. (1996) (limiting the advertising of tobacco online); H.R. 4079, 104th Cong. (1996); H.R. 3515, 104th Cong. § 5 (1996) (applying automobile advertising rules to internet advertising).
[FN25]. See H.R. 4326, 104th Cong. (1996); H.R. 4299, 104th Cong. (1996) (regulating the disclosure of social security numbers obtained by interactive computer service); H.R. 4113, 104th Cong. (1996) (addressing the privacy of transactional information); H.R. 3685, 104th Cong. (1996).
[FN26]. See H.R. 3730, 104th Cong. (1996).
[FN27]. See S. 1726, 104th Cong. (1996) (resisting the administration's efforts to regulate encryption, in the name of aiding electronic commerce).
[FN28]. See Communications Decency Act, S. 652, 104th Cong. (1995) (enacted) (exempting ISPs from defamation liability as a publisher if the only control they exercise over the content is to provide filtering and blocking facilities).
[FN29]. See H.R. 4180, 104th Cong. (1996); H.R. 1617, 104th Cong. (1995). The increasing voluntarism focus is seen in House Resolution 521, 104th Cong. (1996), and Senate Resolution 274, 104th Cong. (1996), where the House and Senate laud private companies providing web access to schools.
[FN30]. Pub. L. 104-104, § 254, 110 Stat. 56, 71 (codified as amended at 47 U.S.C. § 254 (Supp. IV 1998)).
[FN31]. See H.R. 2127, 104th Cong. (1995); H.R. 1024, 104th Cong. (1995). A particularly odd instance of this is House Resolution 2491, 105th Cong. (1995), which, in the process of proposing to cancel the Technology Administration, requires that reports submitted to the National Technical Information Service be in a format conducive to their dissemination on the Net and the Web. See also S. 2179, 104th Cong. (1996) (disseminating information about hazardous environmental conditions via the internet); S. 2004, 104th Cong. (1996) (making health care information available on the internet); S. 1269, 104th Cong. (1995) (establishing internet access to traffic conditions).
[FN32]. See H.R. Con. Res. 185, 104th Cong. (1996); S. Con. Res. 65, 104th Cong. (1996).
[FN33]. See H.R. 3820, 104th Cong. (1996) (using the Net to enhance disclosure); H.R. Res 478, 104th Cong. (1996) (providing online public access to committee documents); H.R. 3760, 104th Cong. (1996) (using the Net to enhance disclosure); H.R. 3700, 104th Cong. (1996) (permitting interactive services to offer candidates free facilities); H.R. 3653, 104th Cong. (1996) (requiring information contained in reports to the Federal Election Commission to be available on the internet); H.R. Res. 454, 104th Cong. (1996) (making representatives' voting records available online).
[FN34]. See H.R. 2112, 105th Cong. § 2 (1997) (devoting fines for slamming to the school connection component of the universal service fund); H.R. 1153, 105th Cong. (1997) (providing tax incentives for the contribution of computers to schools); S. 1708, 105th Cong. (1997) (stating the level of universal service support to schools' and libraries' internet connections, and increasing funding for educational technology); S. 12, 105th Cong. § 402 (1997) (expressing the sense of the Senate that money should be allotted for technology in the classroom); H.R. 6, 105th Cong. § 301 (1997) (enacted).
[FN35]. See H.R. 4552, 105th Cong. (1998) (establishing grants for local educational authorities to provide teacher training); H.R. 2065, 105th Cong. (1997) (providing for training of teachers); S. 839, 105th Cong. (1997) (same).
[FN36]. See S. 2348, 105th Cong. (1998) (repealing the FCC's authority to levy universal service charges to support internet access for schools, and moving the subsidies to state authorities); H.R. 4324, 105th Cong. (1998) (repealing the FCC's authority to levy universal service charges to support internet access for schools); H.R. 4065, 105th Cong. (1998) (same effect as H.R. 4324); H.R. 4032, 105th Cong. (1998) (same effect as H.R. 4324).
[FN37]. See H.R. 4274, 105th Cong. §§ 601-02 (1998) (requiring filters to be installed by all schools and libraries receiving federal funds); S. 1708, 105th Cong. (1998) (requiring recipients of funding to have policies restricting access to inappropriate materials); H.R. 3177, 105th Cong. (1998) (requiring all schools to install filtering or blocking mechanisms that prevent access to "matter deemed to be inappropriate for minors" as a precondition to receiving universal service funds); S. 1619, 105th Cong. (1998) (conditioning universal service funds on installing filters in schools and libraries).
[FN38]. See S. 2645, 105th Cong. (1998) (designating Library of Congress as the United States station on Global Legal Information Network for global sharing of legal information); S. 2636, 105th Cong. (1998) (regarding emission rates from power generation plants); H.R. 4621, 105th Cong. (1998) (regarding after-school programs); S. 2484, 105th Cong. (1998) (addressing the best practices to avoid gun violence in schools); S. 2432, 105th Cong. (1998) (enacted) (regarding information about assistive technology devices for individuals with disabilities); H.R. 4461, 105th Cong. (1998) (same); S. 2416, 105th Cong. (1998) (regarding health plan information); S. 2407, 105th Cong. (1998) (regarding entrepreneurial opportunities available to veterans); S. 2339, 105th Cong. (1998) (regarding pension plans available for small businesses); H.R. 4275, 105th Cong. (1998) (regarding economic development); H.R. 4110, 105th Cong. (1998) (enacted) (regarding gulf war syndrome); H.R. 4073, 105th Cong. (1998) (regarding the best practices to avoid child-related gun violence); S. 2185, 105th Cong. (1998) (same); H.R. 3980, 105th Cong. (1998) (regarding gulf war syndrome research findings); S. 2124, 105th Cong. (1998) (addressing maritime information); H.R. 3899, 105th Cong. (1998) (regarding HUD listings); H.R. Res. 424, 105th Cong. (1998) (regarding information about travel of members and employees of the House); H.R. 3661, 105th Cong. (1998) (regarding gulf war syndrome information); S. 1901, 105th Cong. (1998) (providing for online access to IRS materials); H.R. 3560, 105th Cong. (1998) (regarding social security benefits); H.R. 3514, 105th Cong. (1998) (addressing reports on violence against women); H.R. 3474, 105th Cong. (1998) (regarding health effects of tobacco); H.R. 3435, 105th Cong. (1998) (addressing affordable housing strategies); S. 1712, 105th Cong. (1998) (regarding ERISA and retirement savings information); H.R. 3310, 105th Cong. (1998) (addressing small business paperwork reduction information); H.R. 3150, 105th Cong. (1998) (regarding bankruptcy-related reports); H.R. 3134, 105th Cong. (1998) (providing for online warnings of telemarketing fraud aimed at seniors); H.R. 3131, 105th Cong. (1998) (regarding all congressional research service materials); S. 1578, 105th Cong. (1998) (same); S. 1577, 105th Cong. (1998) (regarding child care safety reports); H.R. 2876, 105th Cong. (1997) (addressing information about food animal drug use and residues); H.R. 2691, 105th Cong. (1997) (regarding risk analyses of safety devices in motor vehicles); H.R. 2688, 105th Cong. (1997) (regarding information about economic development programs); H.R. 2451, 105th Cong. (1997) (regarding environmental hazards); S. 1153, 105th Cong. (1997) (regarding drug residues in food animal products); S. 1150, 105th Cong. (1997) (enacted) (same); H.R. 2095, 105th Cong. (1997) (regarding human rights abuses in China); H.R. 2015, 105th Cong. (1997) (regarding Medicare information); S. 947, 105th Cong. (1997) (regarding Medicare choice options); H.R. 1987, 105th Cong. (1997) (regarding information about college athletics programs); S. 933, 105th Cong. (1997) (addressing college athletics); S. 771, 105th Cong. (1997) (regarding spam enforcement); S. 757, 105th Cong. (1997) (regarding ERISA and retirement savings information); S. 712, 105th Cong. (1997) (addressing report on declassification of government materials); H.R. 1440, 105th Cong. (1997) (regarding Department of Education grants and scholarships); H.R. 1377, 105th Cong. (1997) (regarding ERISA and other retirement savings information); S. 599, 105th Cong. (1997) (regarding environmentally hazardous conditions); S. 527, 105th Cong. (1997) (regarding ingredients of tobacco products); S. 417, 105th Cong. (1997) (enacted) (addressing compliance with alternative fuel vehicle purchases); H.R. 443, 105th Cong. (1997) (regarding disclosure of Medicare information); H.R. 337, 105th Cong. (1997) (same); H.R. Res. 5, 105th Cong. (1997) (addressing House committee reports). But see S. 1867, 105th Cong. (1998) (imposing small business paperwork requirements); S. 1858, 105th Cong. (1998) (regarding work incentives for individuals with disabilities); S. 1792, 105th Cong. (1998) (addressing retirement savings); H.R. 2602, 105th Cong. (1997) (prohibiting advertising of military surplus sales on the internet).
[FN39]. See H.R. 4742, 105th Cong. (1998) (requiring publication of current airline fares); H.R. 4274, 105th Cong. (1998) (publishing reports required under the Labor-Management Reporting and Disclosure Act of 1959); H.R. 4250, 105th Cong. (1998) (addressing health plan information); S. 2238, 105th Cong. (1998) (requiring publication of boxing associations' ratings of boxers); S. 1889, 105th Cong. (1998) (requiring documents to be produced by tobacco companies); H.R. 2264, 105th Cong. (1997) (publishing reports required under the Labor-Management Reporting and Disclosure Act of 1959).
[FN40]. See S. 1868, 105th Cong. (1998) (establishing religious freedom web site); H.R. 2431, 105th Cong. § 103 (1997) (establishing web site to promote religious freedom worldwide) (enacted); H.R. 2232, 105th Cong. § 5 (1997) (broadcasting, with Voice of America, information about fugitives from American justice); H.R. 2095, 105th Cong. (1997) (publishing information about human rights abuses in China).
[FN41]. See S. 2571, 105th Cong. (1998) (setting up tests to improve government benefits management).
[FN42]. See H.R. 3721, 105th Cong. (1998); H.R. 3582, 105th Cong. (1998); H.R. 3581, 105th Cong. (1998); H.R. 3526, 105th Cong. (1998); H.R. 3485, 105th Cong. (1998); H.R. 3476, 105th Cong. (1998); H.R. 3399, 105th Cong. (1998); H.R. 3315, 105th Cong. (1998); H.R. 3174, 105th Cong. (1998); S. 1561, 105th Cong. (1997); H.R. 3019, 105th Cong. (1997); H.R. 2777, 105th Cong. (1997); H.R. 2573, 105th Cong. § 7 (1997) (providing access to candidate reports); S. 1190, 105th Cong. (1997); H.R. 2433, 105th Cong. (1997) (same); H.R. 2183, 105th Cong. (1997) (requiring publication of use for campaigns with mild modifications that affect the vice president, like internet publication of uses of Air Force 1 and 2 and sweeping internet publication of soft-money uses regulated or exempted from regulation); H.R. 2147, 105th Cong. (1997); H.R. 2109, 105th Cong. (1997); S. 976, 105th Cong. (1997); H.R. 2074, 105th Cong. (1997); H.R. 1780, 105th Cong. (1997) (providing information about campaigns); H.R. 965, 105th Cong. (1997) (same); H.R. 653, 105th Cong. (1997) (regarding use for campaigning); S. 25, 105th Cong. (1997).
[FN43]. See S. 1882, 105th Cong. § 303 (1998) (permitting Commission on Education of the Deaf to conduct hearings on the Net, to enhance participation and feedback); H.R. 3546, 105th Cong. (1998) (seeking to use internet forums nationwide to discuss social security).
[FN44]. See H.R. 4112, 105th Cong. § 312 (1998) (enacted); S. 1971, 105th Cong. (1998) (permanently authorizing the American Folklife Center in the Library of Congress, noting that it shares its unique collections in digital form over the Net).
[FN45]. See Next Generation Internet Research Act of 1998, Pub. L. No. 105-305, 1998 U.S.C.C.A.N. (112 Stat.) 2919.
[FN46]. See H.R. 3332, 105th Cong. (1998) (enacted). After the bill passed both houses, Senator Leahy commented that including the domain name study was putting the horse (trademarks) before the cart (efficient competition in gTLDs); see also H.R. 3616, 105th Cong. (1998) (enacted) (providing funding for Next Generation Internet in defense budget); S. 1609, 105th Cong. (1998) (Senate version of H.R. 3332); S. 1046, 105th Cong. (1998) (providing funding for Next Generation Internet in NSF budget).
[FN47]. See H.R. 1271, 105th Cong. § 6 (1997) (prohibiting use of funds to support research on Next Generation Internet).
[FN48]. See H.R. 1273, 105th Cong. § 207 (1997) (affecting the NSF); see also H.R. 1275, 105th Cong. § 307 (1997) (affecting NASA); H.R. 1274, 105th Cong. § 8 (1997) (affecting NIST). But see S. 1325, 105th Cong. (1997) (excluding Technology Administration in Commerce from Next Generation Internet); S. 1250, 105th Cong. (1997) (permitting NASA, expressly, to participate in Next Generation Internet); H.R. 1277, 105th Cong. § 7 (1997) (affecting the Department of Energy).
[FN49]. See National Defense Authorization Act, Pub. L. No. 105-261, 1998 U.S.C.C.A.N. (112 Stat.) 1920 (appropriating funds for Next Generation Internet development); National Science Foundation Act of 1998, Pub. L. No. 105-207, 1998 U.S.C.C.A.N. (112 Stat.) 869 (approving $48 million appropriation to NSF for Next Generation Internet for fiscal years 1998 and 1999); 1998 Supplemental Appropriations and Rescissions Act, Pub. L. No. 105-174, 1998 U.S.C.C.A.N. (112 Stat.) 58 (legalizing and ratifying fees collected as part of domain registration fee, and transferring them to NSF to be used for internet intellectual infrastructure, including Next Generation Internet).
[FN50]. See Act of Oct. 20, 1999, Pub. L. No 106-74, 1999 U.S.C.C.A.N. (113 Stat.) 1047; Veterans Affairs and HUD Appropriations Act, Pub. L. No. 105-276, 1998 U.S.C.C.A.N. (112 Stat.) 2461 (prohibiting NSF from expending funds on entering into contractual relations regarding management of the domain name and numbering system after Sept. 30, 1998); H.R. 4194, 105th Cong. (1998) (enacted) (restricting NSF's use of funds).
[FN51]. See S. 1328, 105th Cong. (1997); H.R. 1872, 105th Cong. (1997).
[FN52]. See H.R. 4802, 105th Cong. (1998).
[FN53]. See H.R. 4801, 105th Cong. § 6 (1998) (treating the telecommunications industry's internet traffic carried by local exchange carriers ("LECs") as interstate for purposes of reciprocal compensation); S. 86, 105th Cong. (1997) (proposing that LECs and the internet community talk about access charges rather than levy them).
[FN54]. See H.R. 4270, 105th Cong. (1998).
[FN55]. See S. 386, 105th Cong. tit. VII (1997) (addressing rural health care providers and telemedicine).
[FN56]. See H.R. 4798, 105th Cong. § 206 (1998). As part of a general restructuring of the electric power industry, House Bill 4798 permitted consumers to combine to form nonprofit municipal electricity services or other nonprofit provision mechanisms to provide services like those of electricity companies. See id. It also provided telecommunications services, including internet service, to those consumer aggregations if permitted to electricity providers.
[FN57]. See S. 2648, 105th Cong. (1998) (permitting schools to use federal funds to purchase screening software); S. 2491, 105th Cong. § 901 (1998) (seeking study of the problem and how to limit it).
[FN58]. See H.R. 3985, 105th Cong. (1998).
[FN59]. See H.R. 3783, 105th Cong. (1998) (COPA); S. 1482, 105th Cong. (1997).
[FN60]. See H.R. 3494, 105th Cong. tit. IV (1998) (providing for an enhanced penalty for transmitting obscene materials to minors); H.R. 1180, 105th Cong. (1997); H.R. 774, 105th Cong. (1997).
[FN61]. See H.R. 3494, 105th Cong. (1998) (addressing sexual abuse of minors); H.R. 2815, 105th Cong. (1997) (prohibiting use of internet to target children for sexual propositions or materials); H.R. 2791, 105th Cong. (1997) (prohibiting service providers from offering internet accounts to "sexually violent predators").
[FN62]. See H.R. 3494, 105th Cong. § 503 (1998) (providing sentencing guideline enhancement for use of a computer in sexual abuse of a minor).
[FN63]. See H.R. 4276, 105th Cong. § 130 (1998) (prohibiting making personally identifiable information about a minor under 17 available for purposes of soliciting sex that is illegal under any law); S. 1965, 105th Cong. (1998) (same).
[FN64]. See S. 1356, 105th Cong. (1997).
[FN65]. See H.R. 3729, 105th Cong. (1998).
[FN66]. See H.R. 3474, 105th Cong. (1998) (prohibiting advertising of tobacco); S. 1755, 105th Cong. (1998) (prohibiting advertising accessible from the United States); S. 1648, 105th Cong. (1998) (same); S. 1638, 105th Cong. (1998) (prohibiting advertising available in the United States and publicizing health risks on the Net); S. 1530, 105th Cong. (1997) (prohibiting advertising); S. 1415, 105th Cong. (1997) (prohibiting internet advertising unless inaccessible to minors); S. 1414, 105th Cong. (1997) (prohibiting internet advertising accessible from the United States); H.R. 2034, 105th Cong. (1997) (prohibiting sale of tobacco to children over the Net); H.R. 2017, 105th Cong. (1997) (same); H.R. 1964, 105th Cong. (1997) (addressing tobacco, alcohol, and children); H.R. 1244, 105th Cong. (1997).
[FN67]. See H.R. 4114, 105th Cong. (1998).
[FN68]. See H.R. 4350, 105th Cong. (1998); H.R. 2380, 105th Cong. (1997); S. 474, 105th Cong. (1997).
[FN69]. See H.R. 4788, 105th Cong. (1998) (specifying that usual consumer protection regulations apply to internet advertising as well); H.R. Con. Res. 318, 105th Cong. (1998) (calling upon FTC to investigate internet advertisers that falsely state their geographic location).
[FN70]. See S. 2587, 105th Cong. (1998) (focusing in particular on seniors).
[FN71]. See S. 2208, 105th Cong. (1998) (requiring evaluation of quality of health-related information available on the Net).
[FN72]. See H.R. 2368, 105th Cong. (1997) (seeking voluntary self- regulation); H.R. 1964, 105th Cong. (1997) (focusing on children); H.R. 1287, 105th Cong. (1997) (regulating disclosure of social security numbers or related personal information to third parties); H.R. 98, 105th Cong. (1997).
[FN73]. See H.R. 4667, 105th Cong. (1998) (requiring strict regulations regarding the collection of personal information from children and disclosure of policies and information to parents); S. 2326, 105th Cong. (1998) (requiring the FTC to promulgate rules for protection of privacy of children as consumers on the Net).
[FN74]. See H.R. 4632, 105th Cong. (1998) (requiring federal agencies to comply with the same consumer privacy practices as private businesses); H.R. 4470, 105th Cong. (1998) (prohibiting government agencies from disclosing or selling personal data); H.R. 1367, 105th Cong. (1997); H.R. 1331, 105th Cong. (1997) (embodying a moderate "study" version); H.R. 1330, 105th Cong. (1997).
[FN75]. See H.R. 4176, 105th Cong. (1998) (focusing on information about the sender and enforcement of service provider rules); H.R. 4124, 105th Cong. (1998) (focusing on assuring that spam is transparent as to source and enforcement of service provider rules); H.R. 3888, 105th Cong. § 201 (1998) (refraining explicitly from regulating spam); S. 1618, 105th Cong. (1998) (requiring disclosure of sender's identification and routing information and requiring "remove" option); H.R. 2368, 105th Cong. (1997) (seeking voluntary self-regulation); S. 875, 105th Cong. (1997) (prohibiting false source information, repeated messages to consumers who notify of objection, and messages in contravention of service provider policy); S. 771, 105th Cong. (1998) (requiring a label, "advertising," at top of e-mail and requiring that routing information be valid).
[FN76]. See S. 2067, 105th Cong. (1998) (establishing general freedom to use any encryption and prohibiting a mandatory key recovery system); S. 377, 105th Cong. (1997) (seeking to aid electronic commerce through strong encryption availability); S. 376, 105th Cong. (1997) (permitting use of encryption and prohibiting mandatory key escrow); H.R. 695, 105th Cong. (1997).
[FN77]. See H.R. 2991, 105th Cong. (1997) (enhancing digital signature use and electronic commerce by requiring federal agencies to adopt procedures for accepting digital signatures); H.R. 2292, 105th Cong. § 201 (1997) (forming electronic commerce advisory group, comprised of industry members, on the proper structural changes required to expand electronic filings of tax returns).
[FN78]. See H.R. 4105, 105th Cong. (1998) (achieving parity by having half- but-one of the board appointed by the congressional minority leaders, but making no provision for consumers or non-commercial information providers); H.R. 3529, 105th Cong. (1998) (same); S. 1096, 105th Cong. (1997); S. 442, 105th Cong. § 102 (1998) (including representation of consumer groups).
[FN79]. See H.R. 143, 105th Cong. (1997) (providing equality to software exporters).
[FN80]. See H.R. 4105, 105th Cong. (1998) (imposing a moratorium on internet-specific taxing); H.R. 3849, 105th Cong. (1998) (same); S. 1888, 105th Cong. (1998) (same); H.R. 3529, 105th Cong. (1998) (requiring tax parity for internet and other commerce); S. 442, 105th Cong. (1998) (imposing a moratorium on internet-specific taxing); H.R. 1054, 105th Cong. (1997) (preempting state taxes); H.R. 995, 105th Cong. (1997) (exempting internet access and other online services from tax).
[FN81]. See H.R. 3849, 105th Cong. (1998) (declaring trade policy position that internet should be free of tariffs and similar barriers).
[FN82]. See H.R. 3849, 105th Cong. § 231 (1998) (excluding internet service providers from FCC's jurisdiction); H.R. 2372, 105th Cong. (1997) (seeking to embrace minimal regulation by both federal and state authorities).
[FN83]. See S. 936, 105th Cong. § 844 (1997).
[FN84]. See S. 2107, 105th Cong. (1998) (providing for the recognition by federal agencies of electronic authentication and for a study of authentication in electronic commerce); H.R. 3472, 105th Cong. (1998) (providing for electronic authentication in banking); S. 1594, 105th Cong. (1998) (same); H.R. 2991, 105th Cong. (1997) (enhancing digital signature use and electronic commerce by requiring federal agencies to adopt procedures for accepting digital signatures); H.R. 2937, 105th Cong. (1997).
[FN85]. See Digital Millennium Copyright Act, Pub. L. 105-298, 1998 U.S.C.C.A.N. (112 Stat.) 2827; Digital Millennium Copyright Act, H.R. 2281, 105th Cong. (1998); Digital Millennium Copyright Act, S. 2037, 105th Cong. (1998).
[FN86]. See S. 1727, 105th Cong. (1998); S. 1609, 105th Cong. § 7 (1998).
[FN87]. See S. 1146, 105th Cong. (1997) (providing exemptions for activities such as carriage, linking, and searching, and imposing a requirement of cooperation in the removal of stored infringing materials).
[FN88]. See H.R. 2281, 105th Cong. §§ 201-03 (1998) (exempting ISPs from liability for copyright infringement subject to their availability to block access to information claimed by its owners to be infringing); S. 771, 105th Cong. (1997) (eliminating liability for spam, but requiring termination of use if notified of spammer in violation of law).
[FN89]. See S. 2392, 105th Cong. (1998); H.R. 4455, 105th Cong. (1998); H.R. 4427, 105th Cong. (1998); H.R. 4355, 105th Cong. (1998); H.R. 3412, 105th Cong. (1998).
[FN90]. See H.R. 4240, 105th Cong. (1998) (limiting recovery to contract damages).
[FN91]. See H.R. 4742, 105th Cong. § 5 (1998) (requiring airlines to publish current fares).
[FN92]. See S. 1955, 106th Cong. (1999); H.R. 3411, 106th Cong. (1999); H.R. 3226, 106th Cong. (1999); H.R. 3210, 106th Cong. (1999); H.R. 3206, 106th Cong. (1999); H.R. 3196, 106th Cong. (1999); S. 1835, 106th Cong. (1999) (publishing and maintaining information concerning the participation of each state in the federal intellectual property system); S. 1776, 106th Cong. (1999); S. 1772, 106th Cong. (1999); S. 1741, 106th Cong. (1999); H.R. 3073, 106th Cong. (1999); S. 1712, 106th Cong. (1999) (creating a requirement to make information available on the Net whenever publication in Federal Register is required under the Act); H.R. 3010, 106th Cong. (1999); S. 1672, 106th Cong. (1999); S. 1639, 106th Cong. (1999); S. 1626, 106th Cong. (1999); S. 1618, 106th Cong. (1999); S. 1594, 106th Cong. (1999); H.R. 2832, 106th Cong. (1999); H.R. 2645, 106th Cong. (1999); H.R. 2606, 106th Cong. (1999); S. 1422, 106th Cong. (1999); S. 1378, 106th Cong. (1999); S. 1333, 106th Cong. (1999); H.R. 2399, 106th Cong. (1999); S. 1270, 106th Cong. (1999); H.R. 2303, 106th Cong. (1999); H.R. 2300, 106th Cong. (1999); S. 1266, 106th Cong. (1999); S. 1234, 106th Cong. (1999); H.R. 2245, 106th Cong. (1999); H.R. 2188, 106th Cong. (1999); S. 1214, 106th Cong. (1999); S. 1204, 106th Cong. (1999); H.R. 2095, 106th Cong. (1999); H.R. 2046, 106th Cong. (1999); H.R. 2034, 106th Cong. (1999); H.R. 2030, 106th Cong. (1999); H.R. 1995, 106th Cong. (1999) (including internet dissemination as part of definition of "publicly report"); H.R. 1926, 106th Cong. (1999); S. 1112, 106th Cong. (1999); S. 1111, 106th Cong. (1999); H.R. 1906, 106th Cong. (1999); S. 1072, 106th Cong. (1999) (providing information about the centennial anniversary of flight); S. 1066, 106th Cong. (1999) (providing access to information about soil carbon potential); H.R. 1776, 106th Cong. (1999); S. 996, 106th Cong. (1999); H.R. 1734, 106th Cong. (1999); H.R. 1658, 106th Cong. (1999); H.R. 1655, 106th Cong. (1999); H.R. 1654, 106th Cong. (1999); S. 942, 106th Cong. (1999) (providing for use of internet-based capability to allow taxpayers to generate tax receipts); S. 941, 106th Cong. (1999); S. 910, 106th Cong. (1999) (using the internet to coordinate information about pests); H.R. 1568, 106th Cong. (1999); H.R. 1553, 106th Cong. (1999); H.R. 1551, 106th Cong. (1999); H.R. 1550, 106th Cong. (1999); S. 804, 106th Cong. (1999); S. 790, 106th Cong. (1999) (providing that a report on bottled water be posted on the internet); H.R. 1356, 106th Cong. (1999); H.R. 1342, 106th Cong. (1999); H.R. 1307, 106th Cong. (1999); S. 741, 106th Cong. (1999); S. 736, 106th Cong. (1999); S. 735, 106th Cong. (1999) (publicizing the competitive grant program for children's gun violence prevention education); H.R. 1153, 106th Cong. (1999); S. 633, 106th Cong. (1999); S. 625, 106th Cong. (1999); S. 599, 106th Cong. (1999); H.R. 1000, 106th Cong. (1999); H.R. 975, 106th Cong. (1999); S. 484, 106th Cong. (1999); S. 468, 106th Cong. (1999); H.R. 2, 106th Cong. (1999); H.R. 654, 106th Cong. (1999) (making certain information available through the Congressional Research Service website); S. 393, 106th Cong. (1999) (providing access to Congressional Research Service, lobbying disclosure reports, and gift reports); H.R. 606, 106th Cong. (1999); S. 374, 106th Cong. (1999); S. 353, 106th Cong. (1999) (allowing for copies of primary materials in class action suits to be posted on the internet); H.R. 543, 106th Cong. (1999); S. 331, 106th Cong. (1999); S. 261, 106th Cong. (1999); H.R. 417, 106th Cong. (1999); H.R. 412, 106th Cong. (1999); H.R. 409, 106th Cong. (1999); H.R. 391, 106th Cong. (1999); S. 205, 106th Cong. (1999) (providing for a study of using the internet to disseminate statistical data compiled by government); S. 59, 106th Cong. (1999); S. 22, 106th Cong. (1999); S. 21, 106th Cong. (1999); S. 9, 106th Cong. (1999); H.R. 209, 106th Cong. (1999); H.R. 202, 106th Cong. (1999); H.R. 199, 106th Cong. (1999); H.R. 10, 106th Cong. (1999).
[FN93]. See H.R. 3331, 106th Cong. (1999) (allowing recreational fishing permits to be sold over the internet); S. 1911, 106th Cong. (1999) (providing for sale of fishing permits over the internet); S. 1809, 106th Cong. (1999) (providing for use of the internet to improve support services for individuals with developmental disabilities); S. 1800, 106th Cong. (1999) (providing for a study of the feasibility of using the internet to administer the food stamp program); S. 1666, 106th Cong. (1999) (providing for certification of farmers' risk management reports); H.R. 2738, 106th Cong. (1999) (studying use of online access to facilitate participation in food stamp program); S. 1372, 106th Cong. (1999) (seeking creation of automated internet- based system for filing shippers' export declarations); H.R. 2490, 106th Cong. (1999) (regarding internet-based capability for taxpayer to generate tax receipt); S. 942, 106th Cong. (1999) (using internet-based capability to allow taxpayers to generate tax receipts).
[FN94]. See H.R. 2607, 106th Cong. (1999) (requiring a comprehensive report on commercial space transportation to include public comments collected on relevant government web sites).
[FN95]. See H.R. 3037, 106th Cong. (1999) (providing for Net publication of labor management reporting and disclosure documents); S. 1650, 106th Cong. (1999) (providing for electronic submissions of labor-management reports); H.R. 2926, 106th Cong. (1999) (providing for internet access to health plan information); H.R. 2569, 106th Cong. (1999) (providing for disclosures on the internet by electric utility companies); H.R. 1832, 106th Cong. (1999) (providing for placement of boxing ratings on the internet); H.R. 1687, 106th Cong. (1999) (providing internet access to health plan information); S. 900, 106th Cong. (providing for a study and report of advertising practices of online brokerage services); S. 753, 106th Cong. (1999) (providing for an online consumer complaint bureau for insurance); H.R. 1073, 106th Cong. (1999) (providing for electronic access to reports by municipal governments awarded federal grants for housing assistance); H.R. 448, 106th Cong. (1999); S. 305, 106th Cong. (1999) (providing for publication on the internet of boxing ratings).
[FN96]. See H.R. 905, 106th Cong. (1999); S. 254, 106th Cong. (1999) (funding National Center for Missing and Exploited Children, citing value of their web site); S. 249, 106th Cong. (1999).
[FN97]. See H.R. 3243, 106th Cong. (1999); S. 1816, 106th Cong. (1999); S. 1671, 106th Cong. (1999); H.R. 2668, 106th Cong. (1999); H.R. 2490, 106th Cong. (1999); H.R. 1922, 106th Cong. (1999); S. 1107, 106th Cong. (1999); H.R. 1818, 106th Cong. (1999); H.R. 1739, 106th Cong. (1999); S. 982, 106th Cong. (1999); H.R. 417, 106th Cong. (1999); S. 26, 106th Cong. (1999); H.R. 32, 106th Cong. (1999).
[FN98]. See H.R. 331, 106th Cong. (1999).
[FN99]. See S. 1747, 106th Cong. (1999).
[FN100]. See Digital Democracy Study Act of 1999, H.R. 3232, 106th Cong. (authorizing a study of issues relating to the incorporation of online and internet technologies in the voting process and for other purposes).
[FN101]. See H.R. 2987, 106th Cong. (1999) (providing for placement of anti- drug messages on federal department and agency web sites generally); S. 1428, 106th Cong. (1999) (providing for placement of anti-drug messages on federal web sites); S. 1364, 106th Cong. (1999) (using Net to collect and make available information about successful campaigns to promote responsible fatherhood); S. 1337, 106th Cong. (1999) (providing for a posting of anti-drug message on NASA site); H.R. 1654, 106th Cong. (1999) (same); S. 486, 106th Cong. (1999) (providing for the posting of anti-drug messages on federal department and agency websites).
[FN102]. See H.R. 2534, 106th Cong. (1999) (directing NSF to report on the establishment of high-speed large bandwidth internet access for all public schools and libraries); H.R. 2420, 106th Cong. (1999) (excluding high-speed internet access from services prohibited to incumbent local exchange carriers ("ILECs"), preempting state regulation, excluding from unbundling and resale obligations, and requiring interconnection); S. 1043, 106th Cong. (1999) (exempting internet services from FCC or state public utilities commission regulation, exempting technical standards regulation, and excluding internet services from the resale and unbundling obligations of ILECs.); H.R. 1686, 106th Cong. (1999) (excluding broadband data services from definition of "interLATA" services prohibited to incumbent local exchange carriers without special approval and requiring ILECs to submit plan for offering broadband services, then binding them to follow it but free of price controls); H.R. 1685, 106th Cong. (1999) (covering similar ground); S. 877, 106th Cong. (1999) (providing exemptions from regulation to local exchange carriers providing DSL-capable loop and broadband services).
[FN103]. See H.R. 2086, 106th Cong. (1999) (funding networking and information technology research). But see H.R. 2684, 106th Cong. (1999) (continuing the effort to remove the NSF from managing the domain name space, effective after Sept. 30, 1998).
[FN104]. See H.R. Con. Res. 182, 106th Cong. (1999).
Resolved by the House of Representatives (the Senate concurring), That in addressing issues of information technology and electronic commerce policy, the Congress must--(1) focus on a broad spectrum of issues that are essential to the evolution and strength of the American information technology industry; (2) ensure that it plays an enabling and not an inhibiting role in supporting the movement of industry and people into the Information Age; (3) incorporate a principle of minimal and predictable government regulation; and (4) refrain from acting in any capacity that would enshrine or favor specific technologies or standards.
[FN105]. See H.R. 1746, 106th Cong. (1999) (delinking funding for schools and health care providers' access to advanced telecommunications capabilities from a tax on telecommunications, providing for equivalent tax from general funds); S. 1004, 106th Cong. (1999) (same).
[FN106]. See H.R. 3420, 106th Cong. (1999); S. 980, 106th Cong. (1999); S. 770, 106th Cong. (1999); H.R. 1344, 106th Cong. (1999).
[FN107]. See H.R. 2637, 106th Cong. (1999).
[FN108]. See H.R. 2645, 106th Cong. (1999) (permitting consumers to combine to form nonprofit municipal electricity systems and, if utilities are permitted to offer internet services, extending such permission to those consumer aggregations).
[FN109]. See S. 1923, 106th Cong. (1999).
[FN110]. See S. 1876, 106th Cong. (1999) (requiring a 2001 report on the availability of high-bandwidth access in schools and its utilization); S. 1772, 106th Cong. (1999) (providing for the use of the internet to increase parental involvement in education); H.R. 3008, 106th Cong. (1999) (funding state and local efforts to acquire school library internet access); H.R. 2965, 106th Cong. (1999) (funding educational programming for the internet and for public television); H.R. 2534, 106th Cong. (1999) (directing NSF to report on best ways to develop high-speed large bandwidth internet access for all public schools and libraries); S. 1262, 106th Cong. (1999) (establishing grants to fund internet connections, other media sources, and training of media professionals for schools); S. 1188, 106th Cong. (1999) (establishing grants for teacher training); S. 1180, 106th Cong. (1999) (establishing grants to facilitate using the internet to provide technical assistance and guidance to parents, in order to help students); S. 1154, 106th Cong. (1999) (appropriating funds to develop educational internet-based programming and distance learning capabilities); H.R. 1960, 106th Cong. (1999) (funding state and local efforts to expand the use of internet technology); S. 1029, 106th Cong. (1999) (funding educational programming for the internet and for public television); H.R. 1139, 106th Cong. § 658U (1999) (providing for a study of distance education for child care providers and parents).
[FN111]. See H.R. 1786, 106th Cong. (1999) (funding teacher training); S. 491, 106th Cong. (1999); H.R. 455, 106th Cong. (1999).
[FN112]. See H.R. 1786, 106th Cong. (1999); S. 491, 106th Cong. (1999).
[FN113]. See H.R. 3037, 106th Cong. (1999) (requiring schools and libraries receiving any federal funds to install filters); S. 1545, 106th Cong. (1999); H.R. 2560, 106th Cong. (1999) (requiring schools and libraries receiving any federal funds, not only universal service, to install filters); H.R. 1501, 106th Cong. (1999); H.R. 896, 106th Cong. (1999); H.R. 543, 106th Cong. (1999); H.R. 368, 106th Cong. (1999) (emphasizing local standard setting, and not establishing federal filtering guidelines); S. 97, 106th Cong. (1999).
[FN114]. See H.R. 640, 106th Cong. (1999) (providing additional funding to the United States Cybersmuggling Center to fight internet child pornography).
[FN115]. See H.R. 1930, 106th Cong. (1999) (requiring all sites offering communication with incarcerated individuals to list information about the crime and release date of the prisoner (carriage, access, and search engines are exempt)).
[FN116]. See H.R. 2036, 106th Cong. (1999) (dealing with sex and violence in entertainment materials generally, including on the internet); H.R. 1855, 106th Cong. (1999) (permitting industry collaboration on controlling the content of entertainment products to limit sexual and violent material available to children); S.J. Res. 23, 106th Cong. (1999) (seeking a study of the effect of violent mass media and internet content on children); H.R.J. Res. 47, 106th Cong. (1999) (same).
[FN117]. See H.R. 3125, 106th Cong. (1999); H.R. Con. Res. 137, 106th Cong. (1999) (urging regulatory response to report on gambling, including internet gambling); S. 692, 106th Cong. (1999).
[FN118]. See H.R. 2763, 106th Cong. (1999).
[FN119]. See H.R. 3007, 106th Cong. (1999) (applying federal labeling requirements for cigarettes to internet advertisements); H.R. 2914, 106th Cong. (1999) (prohibiting internet sales); H.R. 2579, 106th Cong. (1999) (prohibiting cigar sales online).
[FN120]. See H.R. 1245, 106th Cong. (1999); S. 637, 106th Cong. (1999); H.R. 87, 106th Cong. (1999).
[FN121]. See H.R. 3020, 106th Cong. (1999); H.R. 1702, 106th Cong. (1999).
[FN122]. See H.R. 3321, 106th Cong. (1999) (requiring a notice of collection, the method of collection, and intention to disclose, as well as clear online opt-in or opt-out mechanisms; providing access to information collected, and notice of whether information has been sold or disclosed to another; establishing a safe harbor for compliance with industry self- regulation standards; creating a private right of action); S. 1908, 106th Cong. (1999) (requiring GAO study of commercial arrangements in schools and their effects on student privacy); H.R. 2915, 106th Cong. (1999) (prohibiting use of school funds to buy an internet service that engages in collecting information about students under 18); H.R. 1685, 106th Cong. § 301 (1999) (requiring notice of collection practices); S. 809, 106th Cong. (1999) (regulating collection of personally identifiable information and providing for FTC regulations regarding issues such as notice and the ability to opt-out); H.R. 367, 106th Cong. (1999) (restricting disclosure of social security number or linked materials); H.R. 313, 106th Cong. (1999) (prohibiting disclosure to another person without prior informed written consent).
[FN123]. See H.R. 3113, 106th Cong. (1999) (creating an FCC-maintained list where individuals may list themselves as having no desire to receive unsolicited commercial e-mail, prohibiting sending spam to listed individuals, and prohibiting any other use of list; creating a private right of action to enforce same, and civil enforcement by FCC; giving ISPs standing to create anti-spam policy and use similar means to enforce it); H.R. 3024, 106th Cong. (1999) (requiring notice, opt-out ability, correct identifying information, and no violation of ISP policy; establishing a safe harbor for ISPs for efforts to block spam); H.R. 2162, 106th Cong. (1999) (prohibiting spam in contravention of ISP's policy, and criminalizing use of the domain name of another in connection with sending an e-mail and thereby causing damage to a computer system); H.R. 1910, 106th Cong. (1999) (focusing on misleading sender information); H.R. 1685, 106th Cong. (1999) (prohibiting sending spam in violation of an ISP's policy, but no requirement that there be a policy prohibition on disguising routing information or source of spam); S. 854, 106th Cong. § 106 (1999) (permitting domain name registrars to reveal information pertaining to a customer, if they provide notice and opportunity to prevent disclosure); S. 759, 106th Cong. (1999) (prohibiting spam after recipient notifies of unwillingness to receive; prohibiting nondisclosure of source/routing; creating ISP level opt-out option, and prohibiting spamming to a domain that has collectively opted-out).
[FN124]. See S. 854, 106th Cong. (1999) (equalizing treatment of internet addressing information to dialing and signaling information for purposes of permitting government agency use of pen registers).
[FN125]. See Gramm-Leach-Bliley Act, Pub. L. No. 106-102, § 729, 1999 U.S.C.C.A.N. (113 Stat.) 1337, 1476 (providing for a study of online brokerage practices); H.R. 3007, 106th Cong. (1999) (applying federal labeling requirements for cigarettes to internet advertisements); S. 1015, 106th Cong. (1999) (addressing online securities transactions); S. 787, 106th Cong. (1999) (regulating internet-based credit card solicitations); H.R. 900, 106th Cong. (1999) (same).
[FN126]. See H.R. 1862, 106th Cong. (1999) (providing for a study of targeting of seniors for fraud, including internet fraud); S. 751, 106th Cong. (1999) (addressing telemarketing to seniors); S. 699, 106th Cong. (1999) (protecting from telemarketing fraud over internet); H.R. 612, 106th Cong. (1999).
[FN127]. See S. 854, 106th Cong. (1999) (granting freedom to use encryption, and limiting power to mandate key escrow or support it by procurement practices); S. 798, 106th Cong. (1999) (adopting several policy principles: permitting the use of encryption; preferring market-driven encryption policy; abstaining from regulation; abstaining from imposing weak encryption as a condition on participating in government procurement programs or otherwise communicating with the government); H.R. 850, 106th Cong. (1999) (granting freedom to encrypt and to sell; prohibiting mandatory key escrow).
[FN128]. See S. 1015, 106th Cong. (1999); S. 921, 106th Cong. (1999).
[FN129]. See S. 1912, 106th Cong. (1999) (creating Center of Excellence for Electronic Commerce to promote electronic commerce and to facilitate adoption by government agencies); Millennium Digital Commerce Act, H.R. 3220, 106th Cong. (1999); S. Res. 207, 106th Cong. (1999) (justifying resolution to press administration to open up Japanese telecommunications markets in terms of Japan's lag in electronic commerce); S. 1494, 106th Cong. (1999) (funding a program in the National Institutes of Standards and Technology to develop, disseminate, and foster electronic commerce technologies and know-how); H.R. 1993, 106th Cong. (1999) (directing International Trade Administration to assist small businesses in exporting and using electronic commerce); S. 921, 106th Cong. (1999) (addressing online securities transactions); S. 761, 106th Cong. (1999) (validating digital signatures and writings; providing for a study of legal barriers to development of electronic commerce).
[FN130]. See H.R. 3252, 106th Cong. (1999) (making the tax moratorium permanent; expressing the sense of Congress that the ban on e-commerce tariffs should be the permanent United States trade policy); S. 1611, 106th Cong. (1999) (making the United States moratorium permanent; expressing the sense of the Senate that the trade representative should advocate no taxes or discriminatory tax on e-commerce); S. 328, 106th Cong. (1999) (making the tax moratorium permanent) . But see S. 1433, 106th Cong. (1999) (creating a special excise tax for all mail order, catalog, and internet-based sales not subject to any state sales tax and applying that tax to a fund to defray teachers' salaries).
[FN131]. See H.R. 1291, 106th Cong. (1999).
[FN132]. See S. 1871, 106th Cong. (1999) (authorizing negotiation of a free trade agreement with Chile covering, among other issues, measures to promote electronic commerce); S. 1870, 106th Cong. (1999) (authorizing negotiation of a free trade agreement with Singapore covering, among other issues, measures to promote electronic commerce); S. 1869, 106th Cong. (1999) (authorizing negotiation of a free trade agreement with Republic of Korea covering, among other issues, measures to promote electronic commerce); H.R. Con. Res. 190, 106th Cong. (1999) (urging President to seek global consensus on permanent moratorium on tariffs for electronic commerce and on special internet-related taxes); S. Con. Res. 52, 106th Cong. (1999) (opposing "global bit tax" proposed by the United Nations Human Development Report of 1999); H.R. 2670, 106th Cong. (1999) (conditioning appropriation of United Nations dues on the United Nations and its instrumentalities not taxing internet activity).
[FN133]. See H.R. 2561, 106th Cong. (1999) (funding Electronic Commerce Resource Centers and Joint Electronic Commerce Program Office).
[FN134]. See S. 1362, 106th Cong. (1999) (providing for an airline industry study); H.R. 2200, 106th Cong. (1999) (regarding the airline industry); H.R. 1828, 106th Cong. (1999) (authorizing Secretary of Energy to compile a database of price comparisons of electricity providers); S. 1047, 106th Cong. (1999) (addressing pricing and terms information about electric suppliers); H.R. 1030, 106th Cong. (1999) (regarding the airline industry); H.R. 1000, 106th Cong. (1999) (same).
[FN135]. See H.R. 1858, 106th Cong. (1999); H.R. 354, 106th Cong. (1999).
[FN136]. See H.R. 3220, 106th Cong. (1999) (recognizing digital signature as appropriate); H.R. 1714, 106th Cong. (1999) (validating and limiting states' ability to legislate to regulate validity); H.R. 1685, 106th Cong. (1999); S. 921, 106th Cong. (1999) (concerning securities transactions); S. 761, 106th Cong. (1999).
[FN137]. See H.R. 3220, 106th Cong. (1999) (validating electronic commerce; requiring the United States, to the extent possible, to validate international electronic transactions); H.R. 1714, 106th Cong. (1999).
[FN138]. See Anticybersquatting Consumer Protection Act, S. 1948, 106th Cong. §§ 3001-3010 (1999); Trademark Cyberpiracy Prevention Act, H.R. 3028, 106th Cong. (1999); Domain Name Piracy Prevention Act of 1999, S. 1461, 106th Cong.; Trademark Cyberpiracy Prevention Act, S. 1255, 106th Cong. (1999) (a later version of the Anticybersquatting Act).
[FN139]. See S. 1138, 106th Cong. (1999); H.R. 775, 106th Cong. (1999).
[FN140]. See Telecommunications Act of 1996, Pub. L. No. 104-104, 110 Stat. 56 (codified as amended in scattered sections 15, 18, and 47 U.S.C.).
[FN141]. See Departments of Commerce, Justice, and State, the Judiciary, and Related Agencies Appropriations Act of 1998, Pub. L. No. 105-119, §§ 622- 623, 111 Stat. 2440, 2521-22 (codified as amended at 47 U.S.C. § 254 note (Supp. III 1997)) (requiring a report from the universal service board on the effect of certain definitions in telecommunications act on universal service, including internet access).
[FN142]. Pub. L. No. 105-305, 1998 U.S.C.C.A.N. (112 Stat.) 2919 (codified as amended at 15 U.S.C.A. §§ 5501 note, 5513 (West Supp. 1999)).
[FN143]. See National Science Foundation Authorization Act of 1998-- Appropriations, Pub. L. No. 105-207, 1998 U.S.C.C.A.N. (112 Stat.) 869 (codified as amended at 42 U.S.C.A. §§ 1861-1862, 6686 (West Supp. 1999)) (approving $48 million appropriation to NSF for Next Generation Internet for fiscal years 1998-99); 1998 Supplemental Appropriations and Rescissions Act, Pub. L. No. 105-174, § 8003, 1998 U.S.C.C.A.N. (112 Stat.) 58, 94 (legalizing and ratifying fees collected as part of the domain registration fee, and transferring them to NSF, to be used for internet intellectual infrastructure including Next Generation Internet); Strom Thurmond National Defense Authorization Act for Fiscal Year 1999, Pub. L. No. 105-261, § 215, 111 Stat. 1920, 1950 (1998) (appropriating funds for Next Generation Internet development).
[FN144]. See Departments of Veterans Affairs and Housing and Urban Development, and Independent Agencies Appropriations Act, Pub. L. No. 106-74, tit. III, 1999 U.S.C.C.A.N. (113 Stat.) 1047, 1090-91; Veterans Affairs and HUD Appropriations Act, Pub. L. No. 105-276, tit. III., 1998 U.S.C.C.A.N. (112 Stat.) 2461, 2505 (codified as amended in scattered sections of U.S.C.).
[FN145]. See Consolidated Appropriations Act, 2000, Pub. L. No. 106-113, App. H.R. 3424, tit. III, 2000 U.S.C.C.A.N. (113 Stat.) 1501, 1537-251 (funding the Florida Dep't of Education program for internet-based teacher recruitment); Higher Education Amendments of 1998, Pub. L. No. 105-244, 1998 U.S.C.C.A.N. (112 Stat.) 1581 (codified as amended in scattered sections of 20 U.S.C.) (providing grants for developing distance learning; requiring the maintenance of an accessible federal database of information about financial assistance for education; establishing the Web-Based Education Commission to study educational software and internet applications); Workforce Investment Act of 1998, Pub. L. No. 105-220, 1998 U.S.C.C.A.N. (112 Stat.) 936 (codified as amended in scattered sections of 29 U.S.C.) (authorizing funds for pilot projects on distance education); Departments of Labor, Health and Human Services, and Education and Related Agencies Appropriations Act, 1993, Pub. L. No. 102-394, tit. III, 106 Stat. 1792, 1819 (1992) (codified as amended at 20 U.S.C. §§ 106a, 130a, and 4363 (1994)) (funding demonstration of online access to library bibliographic databases); Excellence in Mathematics, Science, and Engineering Education Act of 1990, Pub. L. No. 101-589, § 221, 104 Stat. 2881, 2892 (repealed 1994) (funding grants for research into developing interactive linkages among schools, and technologies to enable "two- way audio and video interactive telecommunications and computer linkages designed to be used in conjunction with each other").
[FN146]. See Legislative Branch Appropriations, 1999, Pub. L. No. 105- 275, §301, 1998 U.S.C.C.A.N. (112 Stat.) 2430, 2445 (funding American Folklife Center in Library of Congress).
[FN147]. See Government Printing Office Electronic Information Access Enhancement Act of 1993, Pub. L. No. 103-40, 107 Stat. 112 (codified as amended at 44 U.S.C. §§ 101 note, 4101 note, 4103 note (1994)) (directing GPO to make Congressional Record, Federal Register, and other information available online at incremental cost of providing it).
[FN148]. See Consolidated Appropriations Act, 2000, Pub. L. No. 106-113, 1999 U.S.C.C.A.N. (113 Stat.) 1501, 1503 (requiring the Secretary of State to report on obligations incurred for assistance); Federal Financial Assistance Management Improvement Act of 1999, Pub. L. No. 106-107, § 6, 1999 U.S.C.C.A.N. (113 Stat.) 1486, 1489 (listing agencies exempted from requirements imposed on agencies running financial assistance programs published on OMB internet site); Agriculture, Rural Development, Food and Drug Administration, and Related Agencies Appropriations Act, 2000, Pub. L. No. 106-78, 1999 U.S.C.C.A.N. (113 Stat.) 1135; Centennial of Flight Commemoration Act Amendments, Pub. L. No. 106-68, 1999 U.S.C.C.A.N. (113 Stat.) 981 (codified as amended at 36 U.S.C.A. § 143 note (West Supp. 1999)) (providing information about the centennial of flight celebration); Treasury and General Government Appropriations Act, 2000, Pub. L. No. 106- 58, § 650, 1999 U.S.C.C.A.N. (113 Stat.) 430, 479 (providing information about candidates' filings with FEC and making itemized IRS receipts available online); Veterans Entrepreneurship and Small Business Development Act of 1999, Pub. L. No. 106-50, 1999 U.S.C.C.A.N. (113 Stat.) 233 (providing for Veterans Administration's information); Assistive Technology Act of 1998, Pub. L. No. 105-394, 1998 U.S.C.C.A.N. (112 Stat.) 3627 (codified as amended in scattered sections of 29 U.S.C.) (providing information about the availability of assistive technologies for individuals with disabilities); Energy Conservation Reauthorization Act of 1998, Pub. L. No. 105-388, 1998 U.S.C.C.A.N. (112 Stat.) 3477 (codified as amended in scattered sections of 42, 50, 87, 90, and 106 U.S.C.) (reporting on use of alternative fuel by federal agencies); Veterans Programs Enhancement Act of 1998, Pub. L. No. 105-368, 1998 U.S.C.C.A.N. (112 Stat.) 3315 (providing research findings about health consequences of service in the Gulf War); Omnibus Consolidated and Emergency Supplemental Appropriations Act, 1999, Pub. L. No. 105-277, 1998 U.S.C.C.A.N. (112 Stat.) 2681 (listing countries receiving aid from the United States); Commission on the Advancement of Women and Minorities in Science, Engineering, and Technology Development Act, Pub. L. No. 105-255, 1998 U.S.C.C.A.N. (112 Stat.) 1889 (codified as amended at 42 U.S.C.A. § 1885 note (West Supp. 1999)) (reporting on women and minorities in science, engineering, and technology development); Internal Revenue Service Restructuring and Reform Act of 1998, Pub. L. No. 105-206, 1998 U.S.C.C.A.N. (112 Stat.) 685 (codified as amended in scattered sections of 5, 19, 23, 26, and 31 U.S.C.); Agricultural Research, Extension, and Education Reform Act of 1998, Pub. L. No. 105-185, 1998 U.S.C.C.A.N. (112 Stat.) 523 (codified as amended in scattered sections of 7 U.S.C.) (discussing food, animals, and drugs); Departments of Commerce, Justice, and State, the Judiciary, and Related Agencies Appropriations Act, 1998, Pub. L. No. 105-119, § 209, 111 Stat. 2440, 2483 (1997) (codified as amended at 13 U.S.C.A. § 141 note (1999)) (providing Census 2000 information); Balanced Budget Act of 1997, Pub. L. No. 105-33, § 1851, 111 Stat. 251, 281 (codified as amended at 42 U.S.C. § 1395w-21 (Supp. III 1997)) (providing Medicare information); Departments of Commerce, Justice, and State, the Judiciary, and Related Agencies Appropriations Act, 1991, Pub. L. No. 101-515, 104 Stat. 2101, 2144 (1990) (codified as amended at 15 U.S.C. § 648a (1994) (funding demonstration of increasing access of small businesses to technology by developing online databases).
[FN149]. See History of the House Awareness and Preservation Act, Pub. L. No. 106-99, 1999 U.S.C.C.A.N. (113 Stat.) 1330; International Religious Freedom Act of 1998, Pub. L. No. 105-292, § 103, 1998 U.S.C.C.A.N. (112 Stat.) 2787, 2795 (codified as amended at 22 U.S.C.A. §6413 (West Supp. 1999)) (establishing religious freedom internet site); Savings are Vital to Everyone's Retirement Act of 1997, Pub. L. No. 105-92, 111 Stat. 2139 (codified as amended at 29 U.S.C. §§1146-1147 (Supp. III 1997)).
[FN150]. See Consolidated Appropriations Act, 2000, Pub. L. No. 106-113, 1999 U.S.C.C.A.N. (113 Stat.) 1501, 1503 (funding development of easily searchable labor management reports); Gramm-Leach-Bliley Financial Modernization Act, Pub. L. No. 106-102, § 322, 1999 U.S.C.C.A.N. (113 Stat.) 1338, 1426 (creating the National Association of Registered Agents and Brokers, whose office of consumer complaints should be available using a web site); Omnibus Consolidated and Emergency Supplemental Appropriations Act, 1999, Pub. L. No. 105-277, 1998 U.S.C.C.A.N. (112 Stat.) 2681 (funding creation of system for reporting under Labor-Management Reporting and Disclosure Act of 1959); Savings are Vital to Everyone's Retirement Act of 1997, Pub. L. No. 105-92, 111 Stat. 2139 (codified as amended at 29 U.S.C. §§ 1146-1147 (Supp. III 1997)) (reporting under Labor-Management Reporting and Disclosure Act of 1959).
[FN151]. See Agriculture, Rural Development, Food and Drug Administration, and Related Agencies Appropriations Act, 2000, Pub. L. No. 106- 78, 1999 U.S.C.C.A.N. (113 Stat.) 1135 (requiring online system to issue and report meat export certificates).
[FN152]. See Missing, Exploited, And Runaway Children Protection Act, Pub. L. No. 106-71, § 2, 1999 U.S.C.C.A.N. (113 Stat.) 1032, 2139.
[FN153]. Telecommunications Act of 1996, Pub. L. No. 104-104, § 509, 110 Stat. 56, 137 (codified as amended at 47 U.S.C. § 230 (Supp. III 1997)).
[FN154]. Id. (protecting ISPs from liability as publishers for providing filtering services to families).
[FN155]. Omnibus Consolidated and Emergency Supplemental Appropriations Act, 1998, Pub. L. No. 105-277, § 1301, 1998 U.S.C.C.A.N. (112 Stat.) 2681-732.
[FN156]. See Protection of Children from Sexual Predators Act of 1998, Pub. L. No. 105-314, § 901, 1998 U.S.C.C.A.N. (112 Stat.) 2974, 2991 (codified as amended at 18 U.S.C.A. §1470 note (West Supp. 1999)).
[FN157]. See id. § 802, 112 Stat. at 2990.
[FN158]. See id. § 503, 112 Stat. at 2980 (codified as amended at 18 U.S.C.A. §944 note (West Supp. 1999)).
[FN159]. See National Gambling Impact Study Commission Act, 1996, Pub. L. No. 104-169, 110 Stat. 1482 (codified as amended at 18 U.S.C. § 1955 note (Supp. IV 1998)).
[FN160]. See Technical Corrections to Title 17, Pub. L. No. 106-44, 1999 U.S.C.C.A.N. (113 Stat.) 221 (1999).
[FN161]. Children's Online Privacy Protection Act of 1998, Pub. L. No. 105-277, §§ 1301-1308, 1998 U.S.C.C.A.N. (112 Stat.) 2681, 2681-728 to 2681- 735 (codified as amended at 15 U.S.C.A §§ 6501-6506 (West Supp. 1999)) (prohibiting the collection of personal information from children without parental consent and giving parents the right to revoke consent and to obtain access to information collected about their child).
[FN162]. See FTC, Children's Online Privacy Protection Rule, 16 C.F.R. § 312 (1999).
[FN163]. See Gramm-Leach-Bliley Act, Pub. L. No. 106-102, § 729, 1999 U.S.C.C.A.N. (113 Stat.) 1337, 1476.
[FN164]. See Internet Tax Freedom Act, Pub. L. No. 105-277, §§ 1100-1104, 1998 U.S.C.C.A.N. (112 Stat.) 2681, 2681-719 to 2681-726 (codified as amended at 47 U.S.C.A. § 151 note (West Supp. 1999)) (addressing internet access and multiple or discriminatory taxes on electronic commerce).
[FN165]. See Omnibus Consolidated And Emergency Supplemental Appropriations Act, 1999, Pub. L. No. 105-277, § 1203, 1998 U.S.C.C.A.N. (112 Stat.) 2681, 2681-727 (codified as amended at 19 U.S.C.A. § 2241 note (West Supp. 1999)).
[FN166]. See Act of Oct. 25, 1999, Pub. L. No. 106-79, 1999 U.S.C.C.A.N. (113 Stat.) 1212 (earmarking funds for electronic commerce resource centers); National Defense Authorization Act for Fiscal Year 1998, Pub. L. No. 105- 85, 111 Stat. 1629 (1997) (codified as amended at 41 U.S.C.A. § 426a (West Supp. 1999)).
[FN167]. Sonny Bono Copyright Term Extension Act, Pub. L. No. 105-298, 1998 U.S.C.C.A.N. (112 Stat.) 2827 (codified as amended at 17 U.S.C.A. § 101 note (West Supp. 1999)).
[FN168]. Anticybersquatting Consumer Protection Act, Pub. L. No. 106-113, §§3001-3010, 1999 U.S.C.C.A.N. (113 Stat.) 1537, 1537-537 to 1537-544 (codified as amended at 15 U.S.C.A. § 1051 note (West Supp. 1999)).
[FN169]. See Next Generation Internet Research Act of 1998, Pub. L. No. 105-305, 1998 U.S.C.C.A.N. (112 Stat.) 2919 (codified as amended at 15 U.S.C.A. §5501 note (West Supp. 1999)) (supplementing the Next Generation Internet Research Act with a study of the effect on trademark rights of adding new generic top-level domains). Astonishingly, this addition prompted Senator Patrick Leahy's statement that at long last Congress was putting the horse before the cart--i.e., trademark policy was driving domain name policy. See 144 Cong. Rec. S12155 (daily ed. Oct. 9, 1998) (statement of Sen. Leahy).
[FN170]. See Y2K Act, Pub. L. No. 106-37, 1999 U.S.C.C.A.N. (113 Stat.) 185 (limiting Y2K litigation and establishing consumer protection from mortgage foreclosure stemming from Y2K problems).
[FN171]. See Year 2000 Information and Readiness Disclosure Act, Pub. L. No. 105-271, 1998 U.S.C.C.A.N. (112 Stat.) 2386 (codified as amended at 15 U.S.C.A. §1 note (West Supp. 1999)) (making Y2K readiness reports inadmissible as evidence in most contract claims; temporary exemption from antitrust laws for collaboration among competitors; setting up councils to work on readiness in the federal government).
[FN172]. See, e.g., H.R. 654, 106th Cong. (1999); S. 393, 106th Cong. (1999); H.R. 3131, 105th Cong. (1998); S. 1578, 105th Cong. (1998).
[FN173]. See, e.g., H.R. 2607, 106th Cong. (1999) (requiring a comprehensive report on commercial space transportation to include comments collected from the public on various relevant government web sites); H.R. 3546, 105th Cong. (1998) (seeking to use internet forums nationwide to discuss social security); S. 1882, 105th Cong. § 303 (1998) (permitting the Commission on Education of the Deaf to conduct hearings on the internet to enhance participation and feedback).
[FN174]. See, e.g., H.R. 2637, 104th Cong. (1995); see also FCC Staff Report, Broadband Today, Oct. 1999 (visited Jan. 28, 2000) <http:// www.fcc.gov/Bureaus/Cable/News_Releases/1999/nrcb9017.html>.
[FN175]. See Yochai Benkler, Communications Infrastructure Regulation and the Distribution of Control over Content, 22 Telecomm. Policy 183 (1998);Yochai Benkler, Overcoming Agoraphobia: Building the Commons of the Digitally Networked Environment, 11 Harv. J.L. & Tech. 287 (1998) [hereinafter Overcoming Agoraphobia].
[FN176]. See Peter H. Lewis, Picking the Right Data Superhighway, N.Y. Times, Nov. 11, 1999, at G1 (surveying broadband services and finding that "[t] he two leading cable data services, Time Warner's Roadrunner and AT&T Cable's @Home, forbid residential customers to run Web server computers on the network").
[FN177]. See, e.g., H.R. 4798, 105th Cong. § 206 (1998) (permitting consumers, as part of general restructuring of electric industry, to combine to form nonprofit municipal electricity services, or other nonprofit provision mechanisms, to provide services like those of electricity companies and permitting telecommunications services, including internet service, to those consumer aggregations if permitted to electricity providers); H.R. 2645, 104th Cong. § 206 (1995) (same).
[FN178]. This perception is given its official stamp in the Telecommunications Act of 1996, in which Congress attempts to create regulatory incentives for public utilities to enter the telecommunications field. See 47 U.S.C. §§ 151-161 (Supp. III 1997).
[FN179]. See Yochai Benkler, A Speaker's Corner Under the Sun, in The Commodification of Information: Political, Social, and Cultural Ramifications (Niva Elkin-Koren & Neil W. Netanel eds., forthcoming 2000).
[FN180]. See Overcoming Agoraphobia, supra note 175, at 328-30 (describing field studies conducted by David Hughes). For a series of reports on Hughes's work, see Old Colorado City Communications and the National Sciences Foundation, Progress Reports (visited Jan. 28, 2000) <http:// wireless.oldcolo.com>.
[FN181]. Such would be the case with license-free spectrum. See generally Overcoming Agoraphobia, supra note 175.
[FN182]. See Telecommunications Act of 1996, 47 U.S.C. § 153(43) (Supp. III 1997) (defining telecommunications as the "transmission, between or among points specified by the user, of information of the user's choosing, without change in the form or content of the information as sent and received").
[FN183]. See Broadband Today, supra note 174.
[FN184]. See Edward De Grazia, Girls Lean Back Everywhere: The Law of Obscenity and the Assault on Genius 3-7 (1992).
[FN185]. See Miller v. California, 413 U.S. 15 (1973).
[FN186]. See Denver Area Ed. Telecomms. Consortium, Inc. v. FCC, 518 U.S. 727 (1996); FCC v. Pacifica Found., 438 U.S. 726 (1978).
[FN187]. See Ginsberg v. New York, 390 U.S. 629, 650-71 (1968) (Douglas, J., dissenting).
[FN188]. Compare id. with Butler v. Michigan, 352 U.S. 380 (1957).
[FN189]. Compare Pacifica Found., 438 U.S. at 751-55 (reproducing a verbatim copy of the text of George Carlin's monologue in an apparent attempt to show its repulsiveness but instead making all too clear that it was social satire) with Cohen v. California, 403 U.S. 15, 25 (1971) ("[I]t is nevertheless often true that one man's vulgarity is another's lyric.").
[FN190]. See City of Renton v. Playtime Theatres, Inc., 475 U.S. 41 (1986).
[FN191]. See Sable Communications of Cal. v. FCC, 492 U.S. 115, 130-31 (1989).
[FN192]. See Denver Area, 518 U.S. at 757-79.
[FN193]. See id. at 737-53.
[FN194]. See, e.g., Secretary's Advisory Comm. on Automated Personal Data Systems, 93d Cong., Records, Computers, and the Rights of Citizens (1973); The Privacy Protection Study Comm., Personal Privacy in an Information Society 345- 91 (1977) (discussing government access to personal records).
[FN195]. See Julie E. Cohen, A Right to Read Anonymously: A Closer Look at "Copyright Management" in Cyberspace, 28 Conn. L. Rev. 981 (1996); James Boyle, Foucault in Cyberspace: Surveillance, Sovereignty, and Hard-Wired Censors (1997), available at <http:// www.wcl.american.edu/pub/faculty/boyle/foucault.htm>; Lawrence Lessig, The Architecture of Privacy (1998), available at <http:// cyber.law.harvard.edu/works/lessig/architecture_priv.pdf>; Jerry Kang, Information Privacy in Cyberspace Transactions, 50 Stan. L. Rev. 1193 (1998); Julie Cohen, Examined Lives: Informational Privacy and the Subject as Object, 52 Stan. L. Rev. (forthcoming 2000).
[FN196]. See A. Michael Froomkin, It Came From Planet Clipper: The Battle Over Cryptographic Key "Escrow" , 1996 U. Chi. Legal F. 15 (1996) (discussing the importance of cryptography, and the consequences of the availability or lack of keys).
[FN197]. See Eben Moglen, So Much for Savages: Navajo 1, Government 0 in Final Moments of Play (visited Jan. 25, 2000) <http://old.law.columbia.edu/my_ pubs/yu-encrypt.html>.
[FN198]. See Intellectual Property Rights in an Age of Electronics and Information: Joint Hearing before the Subcomm. on Patents, Copyrights, and Trademarks and the House Judiciary Comm. Subcomm. on Courts, 99th Cong. (1986); Pamela Samuelson, Some New Kinds of Authorship Made Possible By Computers and Some Intellectual Property Questions They Raise, 53 U. Pitt. L. Rev. 685 (1992); Electronic Communications, supra note 4, at 663-80.
[FN199]. See Niva Elkin-Koren, Copyright Policy and the Limits of Freedom of Contract, 12 Berkeley Tech. L.J. 93 (1997); Julie E. Cohen, Copyright and the Jurisprudence of Self-Help, 13 Berkeley Tech. L.J. 1089 (1998); Yochai
Benkler, Free as the Air to Common Use: First Amendment Constraints on Enclosure of the Public Domain, 74 N.Y.U. L. Rev. 354 (1999); Mark A. Lemley, Beyond Preemption: The Law and Policy of Intellectual Property Licensing, 87 Cal. L. Rev. 111 (1999); Pamela Samuelson, Intellectual Property and the Digital Economy: Why the Anti-Circumvention Regulations Need to be Revised, 14 Berkeley Tech. L.J. 519 (1999).
[FN200]. 15 U.S.C. § 1125(c) (Supp. IV 1998).
[FN201]. See Electronic Communications, supra note 4, § 33A.2 (Supp. 1997); Jessica Litman, Electronic Commerce and Free Speech 19-26 (manuscript presented at Telecommunications Research Conference 1999) (visited Jan. 25, 2000) < http://www.law.wayne.edu/litman/papers/freespeech.pdf>.
[FN202]. See H.R. 2200, 106th Cong. (1999) (discussing airlines); H.R. 1030, 106th Cong. (1999); H.R. 1000, 106th Cong. (1999); H.R. 4742, 105th Cong. § 5 (1998); see also H.R. 1828, 106th Cong. § 119C(c) (1999) (authorizing Secretary of Energy to compile database of rates, terms and conditions of offered electricity services); S. 1047, 106th Cong. (1999) (discussing electric suppliers).
[FN203]. See Denver Area Ed. Telecomm. Consortium, Inc. v. FCC, 518 U.S. 727, 737-53 (1996).
[FN204]. 521 U.S. 844, 874-79 (1997).
[FN205]. See A. Michael Froomkin, Flood Control on the Information Ocean: Living With Anonymity, Digital Cash, and Distributed Databases, 15 U. Pitt J.L. & Com. 395 (1996), for the most influential, and inevitably aging, description of the relevant technologies.
[FN206]. See generally Froomkin, supra note 196.
[FN207]. See ProCD, Inc. v. Zeidenberg, 86 F.3d 1447, 1452 (7th Cir. 1996); Frank H. Easterbrook, Cyberspace Versus Property Law?, 4 Tex. Rev. L. & Pol'y 103 (1999).
[FN208]. See Robert P. Merges, The End of Friction? Property Rights and Contract in the "Newtonian" World of On-Line Commerce, 12 Berkeley Tech. L.J. 115 (1997).
[FN209]. See William W. Fisher III, Property and Contract on the Internet, 73 Chi.-Kent L. Rev. 1203 (1998).
[FN210]. See John Perry Barlow, The Economy of Ideas, Wired 2.03 (1993) and Esther Dyson, Intellectual Value, Wired 3.07 (1995), for versions of this position that were popularly expressed.
[FN211]. See Yochai Benkler, Intellectual Property and the Organization of Information Production (Oct. 1999) <http://www.law.nyu.edu/benklery/Ipec.PDF>.
[FN212]. See ACLU v. Reno, No. CIV.A.98-5591, 1998 WL 813423, at *5 (E.D. Pa. Nov. 23, 1998) (referring to the Nov. 19, 1998 restraining order).
[FN213]. See H.R. 3037, 106th Cong. (1999) (affecting schools and libraries receiving any federal funds); S. 1545, 106th Cong. (1999); H.R. 2560, 106th Cong. (1999) (affecting schools and libraries receiving any federal funds, not only universal service); H.R. 1501, 106th Cong. § 1402 (1999); H.R. 896, 106th Cong., (1999); H.R. 543, 106th Cong. (1999); S. 97, 106th Cong. (1999); H.R. 368, 106th Cong. (1999) (emphasizing local standard setting, instead of federal filtering guidelines); H.R. 4274, 105th Cong. § 601 (1998) (requiring filters be installed by all schools and libraries receiving federal funds); S. 1708, 105th Cong. (1998) (requiring recipients of funding to have policies restricting access to inappropriate materials); H.R. 3177, 105th Cong. § 2(a) (1998) (requiring all schools to install filtering or blocking mechanisms that prevent access to "material inappropriate for minors" as precondition to receiving universal service funds); S. 1619, 105th Cong. (1998) (conditioning universal service funds on installing filters in schools and libraries).
[FN214]. See Telecommunications Act of 1996, Pub. L. No. 104-104, § 509, 110 Stat. 56, 137-39 (codified as amended at 47 U.S.C. § 230 (Supp. III 1997)).
[FN215]. See Lawrence Lessig, Code and Other Laws of Cyberspace 176-82 (1999).
[FN216]. See Elisabeth Werby, The Cyber-Library: Legal and Policy Issues Facing Public Libraries in the High-Tech Era (visited Feb. 29, 2000), available at <http://www.ncac.org/cyberlibrary.html>.
[FN217]. See European Union Directive 95/46, 1995 O.J. (L 281/31) 213-38 (concerning the protection of individuals with regard to the processing of personal data and on the free movement of such data).
[FN218]. See United States, Privacy and Electronic Commerce (June 1998) < http://www.doc.gov/ecommerce/privacy.htm>.
[FN219]. See Sara Robinson, CD Software Said to Gather Data on Users, N.Y. Times, Nov. 1, 1999, at C1.
[FN220]. See Sara Robinson, RealNetworks to Stop Collecting User Data, N.Y. Times, Nov. 2, 1999, at C2.
[FN221]. A panopticon is a design for a penal institution, devised by Jeremy Bentham, where each cell is always within view of a guard post, but the guard is not viewable from the cell. This means that each inmate can always be observed, but can never know when he is being observed. The assumption is that the prisoner will always behave as though observed, cutting on the costs of actual monitoring to assure compliance with required prison conduct. It is a concept borrowed by Michel Foucault to describe the effects on social behavior of a social environment in which everyone watches everyone else.
[FN222]. See Mary J. Culnan, The Lessons of the Lotus MarketPlace: Implications for Consumer Privacy in the 1990's (1991) <http:// www.cpsr.org/ftp/cpsr/conferences/cfp91/papers/culnan>.
[FN223]. See Lexis-Nexis: The P-TRAK Service (visited Jan. 26, 2000) < http://www.epic.org/privacy/ssn/>.
[FN224]. See The TRUSTe Program: How it Protects Your Privacy (visited Jan. 26, 2000) <http://www.truste.org/users/users_how.html>. This site states:
A cornerstone of our program is the TRUSTe "trustmark," an online branded seal that takes users directly to your privacy statement. The trustmark is awarded only to sites that adhere to our established privacy principles and agree to comply with ongoing TRUSTe oversight and our resolution process. Our privacy principles embody the core elements of fair information practices approved by the U.S. Department of Commerce, Federal Trade Commission, and prominent industry-represented organizations and associations.
[FN225]. See Nichals Negroponte, Being Digital 153 (1995).
[FN226]. See Benkler, supra note 199; see also Yochai Benkler, Siren Songs and Amish Children, Autonomy, Information, and Law (unpublished manuscript, on file with author).
[FN227]. See Bernstein v. United States, 176 F.3d 1132 (9th Cir. 1999), withdrawn, en banc reh'g granted, 192 F.3d 1308 (9th Cir. 1999).
[FN228]. For an archive of the debate, see EPIC, Recent Crypto News and Documents (last modified Nov. 24, 1999) <http://www.epic.org/crypto/>.
[FN229]. See United States Dep't of Commerce, Commerce Announces Streamlined Encryption Export Regulations (last modified Jan. 14, 2000) <http:// 126.96.36.199/public.nsf/docs/60D6B47456BB389F852568640078B6C0>.
[FN230]. See John Perry Barlow, A Cyberspace Independence Declaration (Feb. 9, 1996)<http://www.eff.org/pub/Misc/Publications/John_Perry&uscore; Barlow/barlow_0296.declaration>.
[FN231]. See 17 U.S.C. § 1201(a) (Supp. IV 1998).
[FN232]. See id. § 1201(b).
[FN233]. See id. § 512.
[FN234]. See id. § 512(c)-(d). These provisions are highly controversial extensions of contemporary copyright law--like the notion that linking or searching are suspect under copyright law.
[FN235]. The notice and take down structure frees an ISP of contributory liability if it has no knowledge of infringement. If it is notified of infringing materials, it must take them down if it stores them, or block access to them to enforce the claim, unless it receives a court order to the contrary. See id.
[FN236]. For the most recent version, see National Conference of Commissioners on Uniform State Law Laws ("NCCUSL"), Drafts of Uniform and Model Acts (last modified Feb. 24, 2000) <http://www.law.upenn.edu/bll/ulc/ulc_ frame.htm>.
[FN237]. For last draft before the ALI abandoned the project, see NCCUSL, Uniform Commercial Code Article 2B: Computer Information Transactions (Feb. 1, 1999) <http://www.law.upenn.edu/bll/ulc/ucc2b/2b299.htm>. For the joint statement, which removed the article from the UCC and left it in the uniform laws only, see NCCUSL, NCCUSL to Promulgate Freestanding Uniform Computer Information Transactions Act: ALI and NCCUSL Announce that Legal Rules for Computer Information Will Not Be Part of UCC (Apr. 7, 1999) <http:// www.nccusl.org/pressrel/2brel.html>.
[FN238]. Whether these would be valid otherwise is controversial. See Mark A. Lemley, Intellectual Property and Shrinkwrap Licenses, 68 S. Cal. L. Rev. 1239, 1248-53 (1995), which reviewed the general reluctance of courts to enforce shrinkwrap licenses before 1996. This position has been under pressure since the decision of the Seventh Circuit to enforce such licenses in ProCD, Inc. v. Zeidenberg, 86 F.3d 1447 (7th Cir. 1996).
[FN239]. See Benkler, supra note 199, at 394-412; see also Yochai Benkler, The Free Republic Problem: Markets in Information Goods vs. The Marketplace of Ideas (visited Feb. 24, 2000) <http:// webserver.law.yale.edu/censor/benkler.htm>.
[FN240]. See Yochai Benkler, Constitutional Bounds of Database Protection: The Role of Judicial Review in the Definition of Private Rights in Information, 15 Berkeley Tech. L.J. (forthcoming Apr. 2000).
[FN241]. See id. See generally Benkler, supra note 199.
[FN242]. See ICANN, Uniform Domain Name Dispute Resolution Policy (As Approved by ICANN on October 24, 1999) (last modified Jan. 3, 2000) <http:// www.icann.org/udrp/udrp-policy-24oct99.htm>.
[FN243]. See Anticybersquatting Consumer Protection Act, Pub. L. No. 106- 113, § 3001, 1999 U.S.C.C.A.N. (113 Stat.) 1501.
[FN244]. The point is that if the object of trademark protection is to maintain the utility of brand names to capture consumers, then a proliferation of gTLDs will both limit the utility of the hunt-and-peck approach to e- commerce, and will increase opportunities for non-confusing, possibly non- infringing uses of an alphanumeric string similar to a trademark as a second level domain name. This would limit the utility of a trademark to exclude unknown competitors.
[FN245]. See, e.g., Panavision Int'l, L.P. v. Toeppen, 945 F. Supp. 1296, 1303 (C.D. Cal. 1996), aff'd, 141 F.3d 1316 (9th Cir. 1998).
[FN246]. See, e.g., Reno v. ACLU, 521 U.S. 844 (1997). "Through the use of Web pages, mail exploders, and newsgroups, the same individual can become a pamphleteer. As the District Court found, 'the content on the internet is as diverse as human thought." ' Id. at 870 (quoting ACLU v. Reno, 929 F. Supp. 824, 842 (E.D. Pa. 1996)).
[FN247]. See, e.g., sources cited supra note 195.