Private Networks, Public Speech: Constitutional Speech Dimensions of Access to Private Networks

(c) 1994 by Prof. Allen S. Hammond, IV, New York Law School 1

Draft Document
Do Not Cite or Quote Without Author's Express Permission


Introduction:

I. Networks and Closed User Groups Defined

  1. General Characteristics

  2. Network Lexicon

    1. Public Switched Networks

    2. Virtual Private Networks

    3. Private Networks

    4. Hybrid Networks

    5. Video Distribution Networks

  3. Merger and Metamorphosis: Video and Telephony into Broadband Networks

II. Current Scope of Network and User Group Access and Speech Restrictions

  1. Limitations on Access

    1. Subscriber/User Access to Third Party Users and Networks

      1. Employer Restrictions on Outgoing Calls

      2. Third Party Access to Private Network or VPN Facilities

      3. Restriction on Membership in Closed User Groups

  2. Content Controls

III. The Constitutional Dimension

  1. Network as Business Asset or Tool

    1. Employer/Employee Relationships

      1. Public Employer/Employee

      2. Private Employer/Employee

    2. Closed User Groups and Members (Actual and Potential)

  2. Network as Product or Service: Relationships Between Network Owners and Users

    1. Network Owner/Provider and Subscriber/Users (Common Carriage)

    2. Network Owner/Information Provider and Consumer/Subscribers

      1. Telecommunications

      2. Computer Networks: Closed User Groups

      3. Broadcasting and Cable

    3. Broadcasting

    4. Cable Television

IV. Regulation of Access and Speech in the Age of Convergence, Some Preliminary Observations...

  1. Network as Asset

    1. Private Firms and Closed User Groups

    2. Public Firms

  2. Network as Product

    1. Convergence and the Evolution of Speech Regulation in Traditional Media

  3. An Alternative Fix

    1. Maximizing Access

      1. Choice of Technologies

      2. Access via Market Regulation

  4. Incentives Regarding Control and Liability for Speech

    1. Tort Liability

    2. Subscriber Protection via the Theory of Unconscionability

  5. Interconnection and Distributed Intelligence


Introduction:

The current multiple network environment -- broadcast, cable television, telephone and computer networks -- in the United States is undergoing significant change. Network functions and the information they carry are merging as converging fiber optic, telephone and computer technologies allow the integration of video, voice and data information. 2 This integration has created opportunities for expanded access and speech activities in the workplace, the marketplace and the home.

Regulatory distinctions between video distribution and public switched networks are disintegrating as the government increasingly allows inter-industry competition in the nation's video distribution, long distance and local telephone markets.3 Meanwhile network video, voice --and services are increasingly provided by private as opposed to public networks. The movement from public to private networks can be seen in two recent developments. For instance, in video distribution, the emergence of cable television represents a shift from "public/free" over the air broadcast television to "private/subscriber" driven cable television services. In telephony, public common carriers have begun to lose market share as large corporations and other sophisticated users demand more specialized services that private carriers are able to provide more efficiently. This is because private carriers have no obligation to serve the less profitable segments of the public. Thus network technology applications which facilitated broad public access to information and/or interactive speech are giving way to specialized private networks which may limit access based on market demand and profit maximization.

The shift in market reality has been mirrored by a shift in government policy regarding future networks. For example, the government is increasingly relying on private market driven investment to fund the building of the future broadband electronic super-highway. The Clinton administration has made clear that they have resolved the question of who will build the electronic highways in favor of private industry. 4

Administration reliance on private sector investment and privatization of network infrastructure is a pragmatic policy developed in a time of decreasing public revenues. However, sole reliance on pro competition policies will not adequately protect the individual and group speech and related activities potentially fostered by broadband intelligent networks or existing telecommunications networks. In the process of managing market entry and firm competition, current US competition policies run the risk of ceding creation and control of speech activities to private firms. This is particularly true to the extent the First Amendment is read as a negative bar to government action rather than an affirmative protection for speech activities.

Pro-competitive privatization policies do not directly address the need for preserving and expanding access and electronic speech activities as an appropriate pro-social goal of American democracy because they possess no incentive structure to assure broad public access to the network . Under such policies, the provision of access [and subsequent speech "rights"] is a function of market demand for access and services which is in turn a function of the economic distribution of wealth and the network provider's perception of a market's desirability. Lack of wealth or lack of perceived desirability results in decisions to eschew deployment of infrastructure or the provision of services. The net result of such decisions in a broadband interactive network context is to deny access and speech opportunities.

The universal access and service debate addresses public policy concerns about how society may blunt the negative impact of pro-competitive network development policies on the economically disadvantaged. However, even this debate fails to address the impact of the provider's perceptions and assumptions about a potential market's or a potential user's desirability.

Because pro-competitive policies do not address the above mentioned concerns, reliance on such policies creates a significant risk of losing opportunities for electronic speech and its related activities which might accrue to significant portions of American society . Consequently the definition, preservation and expansion of electronic speech and its related activities must be elevated to a priority policy goal and incorporated within the broader policy framework of the government's network infrastructure policies.

At least one state has recognized the importance of elevating electronic speech policies to co-equal status with pro-competition policies. New York has recently published a document developed by the Governor's Telecommunications Exchange. The document, entitled "Connecting to the Future," identifies numerous policies which it is suggested the state pursue in acquiring the economic benefits of an advanced telecommunications infrastructure. Among the key recommendations is reliance on a competitive market to ensure greater consumer choice and higher quality service. However, unlike the federal government's NII report, the New York report acknowledges that the state retains an obligation to ensure a free flow of information and ideas accessible to all. 5

As the movement from public to private provision of network services occurs, one of the critical questions for First Amendment theorists and scholars concerned with mass media and telecommunications is what access and speech rights will network owners and users have after the convergence and privatizing of the mass media and telecommunications networks? 6

The growing reliance on network services provided by private as opposed to public common carriers, poses potential dangers to access and broad based speech opportunities. Privatizing the delivery of network services can lead to the concentration of control over access and content in the hands of private network owners. Because of the historic tendency to equate speech rights with ownership of the means of transmission, privatizing the merging of technology, network function and information streams could transfer control over access and speech activities from the current shared public/private constitutional arrangement to a private/contractual arrangements. 7

Inherent in the status of ownership, is an underlying bundle of property rights which include control over who may have access to the network owners' facilities and/or services. These rights are often referred to as rights to create, publish and/or distribute information. While the degree of control over access varies with the type of owner, ultimately, as long as ownership includes the right to decide access, some segment of potential users are likely to be excluded for a variety of oft-times unrelated reasons ranging from particular pricing or service configurations, to equipment requirements, information format, capacity needs, or discrimination based on economic or normative value considerations regarding identity of speaker or content of speech. This is so because private network providers may opt to act as publishers or distributors of information instead of carriers.

Such a result could be detrimental to the potential speech and access opportunities of existing and future network users of video, voice and data network information services. 8 Private owners may not be motivated by public interest considerations of access and inclusion. Instead, where a private corporation is using an internal network, its major motivation to provide access and speech to their employees is utilitarian. A private network owner's major motivation to serve a particular individual or group of customers depends (in the most ideal sense) upon the desirability of that individual or market as a customer base and their ability to pay. Because these decisions about who to serve, what is said and to whom are private, there is arguably less opportunity to rest the justification for access and speech rights upon constitutional grounds given the alleged absence of state action. 9

For instance, government regulation of broadcasting has not been deemed sufficient justification for finding that the editorial decisions of broadcasters constitute state action. 10 Recently, several circuit courts have held that decisions by regulated telephone companies to deny access or billing services to information providers of indecent communication do not constitute state action. 11 The weight of precedent would tend to support a conclusion that actions to deny access or speech conducted by regulated cable operators and telephone companies are constitutionally permissible although they would be constitutionally proscribed if conducted by the government. 12

Under such circumstances it is reasonable to ask, will privatizing the merged multi-function, multi-media networks result in speech rights only for network owners and those they employ or decide to serve? Who will serve people who own no network or are not selected as desirable markets ? In an era of privatized carriage in the provision of network services, what ability will the government have to assure access and speech rights for the non-facilities based public?

This article begins the process of answering these questions. It defines private networks and closed user groups in relation to public networks and examines the current practices by which the owners of networks limit the access and speech activities of employees as well as potential and actual customers and subscribers on their networks. It then identifies and addresses some of the potential constitutional questions raised by such practices. In the process it identifies the current boundaries of the network access and speech continuum in the United States and addresses how these boundaries may change in light of evolving technology and government policy. 13

The article concludes that a pragmatic balance must be struck between the speech rights of network owner providers and network users. In the area of employee access and speech rights, a three-way balance must be struck between the network owners' legitimate business needs; the employees' access, speech and privacy rights; and public policy concerns including the public's right to know. Ultimately, employee speech rights should not turn on whether they are employed by public or private firms. Rather, at minimum, employee speech "rights should encompass concerns regarding wages and working conditions, as well as safety and product quality issues about which the public may have interest. 14

In the broader area of network access and service provision, the article concludes that current government efforts to rely on network privatization to assure the development and deployment of network infrastructure and services are problematic . This reliance, when combined with legislative and judicial decisions expanding network provider control over access and speech activities, may result in the loss of significant access and speech opportunities for network users and subscribers.

The government should acknowledge and protect the access and speech rights of network providers. There are a host of legitimate reasons why a network owner would deny access or speech to potential network users. However, the government also must act to ensure access and speech rights for potential public and private network users, whether they are subscribers or employees.

In addition, the government should use pro-active policies to discourage censorship by network owners. Network owners should have the right to speak but not the sole right to speak. Network owners should have obligations and incentives to be as inclusive and accessible as possible in what they carry and who they serve.

One way to accomplish these goals is to remove some of the liability network owners face for the speech of network users and subscribers. Network owners should be free to select the extent to which they will exercise editorial control without government requirement. Absent the assertion of editorial control by the network provider, responsibility and liability for speech should reside with the speaker.

Another way to encourage access and broad speech is to require interconnection among public an private networks. This gives all network users more potential access to a broader array of services and information as well as to each other. As a result, the infrastructure does not serve to fragment or balkanize the national polity or its discourse. Instead, it can be used as a positive tool for achieving an inclusive national and international dialogue.

Finally, incentives to insure universal access and services are needed. These incentives would include subsidies targeted to those subscribers who might not otherwise acquire access or needed services. They would also include active use of the anti-trust laws and structural safeguard policies such as open network architecture.

Chapter I: Networks and Closed User Groups Defined

In their most basic manifestation, networks are collections of interconnected users.15 They can be defined in terms numerous characteristics, including: a.) technology [spectrum, wire, fiber]; b.) information [video, voice, data]; c.) ownership [ private or public ]; d.) control of content [editor, hybrid, common carrier]; and e.) control of network access and/or functionality. This article will discuss them primarily in terms of ownership of facilities, control of network access and/or functionality, and , ultimately, control of content. In the process, it will acknowledge the various characteristics as they apply in addressing the impact of owner control on the user subscriber and third parties.

The commercial common carrier network owners own the network facilities and retain control of all levels of network functionality.16 There are no predetermined limits on who may or may not join the network. All who timely pay the subscription fee [tariff rate for the particular class and volume of service] may gain access and enjoy usage.17 Because the network is available to virtually all potential users,18 it may be defined as being "open."19 These networks are the long distance, regional and local public switched networks.

In contrast to the public switched networks, virtual private networks (VPNs), offer their customers access to reserved private line capacity on the public switched telephone network (PSTN) .20 VPN is essentially a long-distance service in the USA. In the case of VPNs, the user manages network applications while the carrier manages all other levels of network functionality. 21 It is anticipated that by 1997, VPN services will account for 17 per cent of the domestic service revenues of the three biggest US long-distance carriers -- AT&T, MCI and Sprint. 22

In the case of private networks, all telecommunications facilities are owned by an entity other than a government certified commercial common carrier, or, the user leases dedicated lines from certified carriers but maintains control over both ends of the communications channel. In the case of the latter, the user typically owns facilities on its premises [local area networks or private branch exchanges i.e. "intra-building private networks"] and leases from carriers anything that crosses public rights of way. For example, the company may lease a dedicated T-1 between two privately owned private branch exchanges (PBXs) . Network usage is confined to the owner and its affiliates and is not usually shared or aggregated on a commercial basis. 23

A private network may be open or closed. However, most closed user group networks are based on privately owned or dedicated facilities. Thus most closed user group networks are private.24 Closed user groups are large volume users which tend to communicate with each other "intensely." They combine to form alternative network associations for much of their communications needs. Associations' networks may have specialized performance attributes related to group needs.basis. 25

A large number of U.S. users have now opted for hybrid networks combining leased lines between particular locations , with VPNs. Users prefer to use private networks for sensitive business information (in the form of encrypted data) because these are considered more secure and upon occasion, cheaper than VPNs.

The preceding definitions are admittedly limited to switched telecommunications networks in some way related to the public switched networks. In contrast, video distribution networks include traditional broadcasting and cable television networks, which are non switched -- essentially one way distribution media which are not usually interactive.

However, it is argued that cable networks and local telephone networks likely will evolve into the switched broadband interactive networks of the near future.26 Should this be true, the resulting networks could span the gamut from private networks, virtual private networks, hybrid networks to public (common carrier) networks, and they could incorporate a potential range of access options from non-discriminatory access, 27 mandated leased and/or tariffed access,28 free access,29 to private access by negotiated contract or ownership. Speech options could range from owner control of a portion of available capacity with unrestricted user speech on the remaining portion, to owner control of all capacity and ultimately all speech allowed on the network. This spectrum of alternative access and speech relationships is in essence the amalgam of access and speech relationships currently residing on cable (mandated leased or free access) and telecommunications (non discriminatory and negotiated contract access) networks.

In this context, litigation challenging the must carry rules of the Cable Competition and Consumer Protection Act of 1992 and the telco-cable cross-ownership prohibition of the Cable Communication Policy Act of 1984, as well as several e-mail and electronic bulletin board service cases percolating through the judicial system, may establish much of the scope of access and speech rights network owner providers and users will have. 30

Chapter II: The Current Scope of Network and User Group Access and Speech Restrictions

There are at least four levels at which a network owner or closed user group may control access and/or speech activities on their facilities. Control may be exercised over actual speech or communication (content), over access to the network as configured by the owner (network access), over the ability to reconfigure network functionality (network software intelligence), and over the ability to set equipment standards for network provisioning and interfacing with the network (equipment standards and network protocols). Current government policies affect the exercise of access and speech at each of the first three levels.

Legal sanction of the exercise of control varies depending upon the manner in which the network is used. Where the network is merely one of many tools or assets used by a firm to conduct its business, the "network owner" enjoys wide latitude over each of the four levels. Where the network and its related functions and services are the product the private or public firm sells to customers, the network owner's ability to control access has been subject to greater government restraint, depending on architecture, market power and traditional rights accorded networks having similar technologies and functions.

Employers may be subscribers to the public switched networks, virtual private network subscribers, owners of their own networks or a collection or association of users forming a closed user group. They may be private or public firms. In any event, because of the utility of long distance and electronic mail (e-mail), as well as the growth in availability of 800 and 900 services, employers often find it necessary to block access to certain networks and phone services to limit corporate expenses. Call blocking, for instance, is used to limit employee access to the above mentioned services.31 In the process, employees are denied access to the networks over which such services are provided and the information providers residing at the other end of the line. Federal and municipal government call blocking restrictions on access to dial-a-porn and long distance calls are well known examples.32 Employers also engage in call monitoring as a means of policing their restrictions on network usage. 33

Employers' justifications for engaging in these practices include the need to manage or reduce costs or fraud involved in unauthorized 900 number and e-mail calls which have cost companies hundreds of thousands of dollars. In addition some companies use computers to monitor customer services employees' performance, such as keystrokes per minute, time between phone calls, length of breaks and number of errors. 34

There are potential dangers inherent in call blocking and monitoring which raise significant public policy issues. Call blocking has been argued to implicate first amendment concerns because the employer's limitations on access to the network and hence those an employee might contact constitute limitations on potential speech activities in which the employee might otherwise engage. Call monitoring is said to raise issues of worker privacy as the employee's expectation of privacy is infringed by periodic monitoring. 35 Call blocking and monitoring activities raise nettlesome problems for the public's "right to know" as well. For, these practices may also be used to detect whistle blowers [footnote moved to end of sentence and combined with another note] instead of individuals calling dial-a-porn providers and other unauthorized users.36

Some observers argue that employer/network owner control of access or usage of the corporate telephone or network affects employee's constitutional speech and/or privacy rights. 37 Such arguments have met with only limited success to date. The speech activities upon which the articulation of "new" employee rights are based nevertheless occur within the traditional confines of the work place, conducted over technologies which are owned and/or paid for by the employer. Even though e-mail and intelligent network technologies provide new opportunities for speech activities, the articulation of these activities as rights squarely pits them against the heretofore established and legally recognized property rights of the employer/network owner.

Firms also attempt to limit third party access to their networks to protect against toll fraud.38 Computerized telephone equipment such as voice mail, often help companies conduct business with greater efficiency and lower cost. However, they also often provide access to electronic thieves who steal thousands of dollars of long-distance telephone service. Unauthorized entry can be accomplished by calling a company's toll-free 800 number or a voice mailbox and using a computer with an automatic dialer to break the security code and gain access to the company's telephone system and outgoing lines.39 Electronic bulletin boards are sometimes used to exchange generic passwords which provide access company to maintenance ports; exchange programming instructions for various systems; or procure programming manuals for voice systems enabling unauthorized parties to gain operational control, including the ability to unblock restrictions on international dialing and turn off on-site call accounting equipment.40 According to some experts, computer hacking, may cost U.S. companies between $ 2.2 billion and $ 4 billion nationally.41

In a less arcane realm, e-mail, voice-mail and telephony systems may be used by union organizers, law enforcement authorities, friends or family members to communicate with employees. However, efforts of union organizers to make use of the employer owned telecommunications systems and/or networks to communicate with employees under section 7 of the National Labor Relations Act (NLRA),42 may prove unsuccessful. As a practical matter, recent precedent supports the employer's right to bar union access absent a showing that the union possesses no other reasonable means of communicating its organizational message to employees.43

Some firms joint venture to develop jointly owned networks (JONs). JONs can increase the efficiency and competitiveness of their owners. 44 In the process, JONs can adversely affect the relative market position of non-owners by creating new barriers to market entry and exit which are often controlled by the JON owners. 45 JON owners can raise barriers to network (and often, market) access for competitors by establishing, maintaining, and changing the network's pricing structure as well as applications, standards, protocols, and internal control procedures. 46 For instance, it is alleged that owners of major airline reservation systems have acted in anti-competitive ways by using their systems to minimize the bookings of competing non-owners. 47

Public and private firms also use call monitoring to manage employee communications to the firm's customers. Telemarketing and travel reservations services are two common examples. 48 There are also numerous content/subject matter restrictions. Computer networks such as Prodigy have asserted some control over bulletin board content in response to various user protests regarding speech on controversial subjects. 49 Some other bulletin board providers have no policy regarding what may or may not be said over their facilities. For them, the communicator of the information bears the ultimate responsibility for the content. Their position has met with judicial approval in one instance. 50

Aside from firm business oriented restrictions on access and in house, on-line speech, there are the traditional limits on audience or subscriber access and speech in the realm of broadcasting, and the evolving limits in cable television and plain old telephone service (POTS). The First Amendment protects the exercise of speech and editorial control over programming decisions and transmissions by broadcast licensees from the assertion of access and speech rights by viewers and other programmers. 51 It protects the exercise of speech and editorial discretion by cable television operators, 52 but portions of the subscribing public and other programmers are afforded access and speech opportunities as well. 53 The First Amendment also has been held to protect subscriber and programmer access to telephone networks even where the voice communication is indecent. 54

However, recent decisions in the area of telephony and cable may be harbingers of a revision of access and speech rights afforded network owners and subscribers. The First Amendment has been held to accord local exchange network operators the right to engage in video communication to their service area subscribers. 55 And, telephone common carriers are viewed by at least one Supreme Court Justice and two circuit courts as private speakers possessing the right to refuse carriage or billing services to subscribers seeking carriage of indecent programming the carrier deems undesirable. 56 The potential impact of these decisions is that common carriers which have heretofore been prohibited from exercising editorial control over the content of speech may do so either as constitutionally protected speakers, 57 or, under the guise of a refusal to transact business. 58

By comparison, in a somewhat analogous case regarding the regulation of indecent programming on cable television access and leased access channels, the D.C. Circuit did not adopt the Second and Ninth Circuits' private actor analysis as it was applied to telephony. It declined to view the cable operator as a private actor in the context of regulating indecency on access channels on cable television. 59 The D.C. Circuit noted that unlike the government compelled offering of leased and public access channels in cable, the billing services provided by telephone companies were voluntary and therefore private. 60 The state action/private action distinction relied upon by the Circuit Court in Alliance, could have a profound effect on future regulation of customer access to the networks of forborne carriers. 61 They, like the local telephone companies' offering of billing services, offer their common carrier communications services on a voluntary basis. Thus, per the Alliance for Media analysis, they would free to engage in discriminatory provision of services. 62

More important however, the dial-a-porn precedents have potential seriously negative implications for network user access to common carrier telephone networks. Read broadly, these precedents allow telephone common carriers to deny carriage to speakers for private business reasons or because the carriers are able to classify the requested service as "non common carriage" despite that fact that denial of such service precludes viable access to the network.

When these precedents are combined with the recent holding that local telephone companies possesses constitutional speech rights, the constitutional construct of the content neutral common carrier is severely undermined. In the worst case scenario, telephone companies would be free to deny access and speech rights to others via the constitutional exercise of editorial control over their networks or by business fiat.

Chapter III: The Constitutional Dimension

The above review, leads to the conclusion that network owner providers limit access and speech activities of employees, user/members and third parties to accomplish numerous tasks including: protection of property, assets, costs and market share, as well as to achieve competition advantage, limit or constrain dissemination of proprietary information, manage the communication of information and/or discourage the procurement or transmission of sometimes illicit information.

Under such circumstances when may we say that a user-member or a potential outside communicator is impermissibly constrained from gaining access or engaging in speech? Is it possible to distinguish between legitimate business needs and impermissible constraints on speech activities? At first blush, based on the prior discussion, one could suggest that permissible firm needs include all of those previously listed above .63 By the same token, others might argue that impermissible firm needs include many of the same goals articulated as legitimate. 64

One possible way to answer this dilemma is to examine the manner in which the law has addressed and apportioned access and speech rights in the varying relationships between network owner/providers and closed user groups on the one hand and network users and third parties on the other. A critical distinction in the manner in which such rights are apportioned is the relative status of the network. Where the network is an asset established primarily for the internal use of the corporation or closed user group, the employees, closed user members and third party communicators have very limited access and speech rights. Where the network is the product or service offered by the corporation or closed user group, subscribers and viewers have been accorded greater access and speech rights based on constitutional, economic and other public policy principles. But, in the latter area, the law is in substantial flux.

As mentioned above, employers may be network owner/providers, closed user groups or simply network subscribers. The nature of their status as public or private institutions, however, has a significant affect on the scope and expectations which an employee may have regarding constitutional protection of their arguable rights of access to company facilities and ability to speak on those facilities.

Recently there have been a spate of law suits filed by employees alleging that their constitutional rights have been violated when employers monitored their conversations over email or telephone networks.65 None of the suits appear to have been judicially resolved to date, 66 but there are some indications of the extent of protection afforded employee speech. For instance, most experts agree that while the Federal Electronic Communications Privacy Act of 1986 protects the privacy of electronic messages sent through public networks to which individuals or companies subscribe, it does not apply to internal E-mail. 67 Thus, to the extent that employees enjoy speech rights on company e-mail facilities, those rights are limited to communication over public e-mail systems. Employers retain the right to restrict access to, and monitor internal e-mail.

The courts have held that a public employee has First Amendment constitutional protection for speech about "matters" of public concern. 68 In cases where the employee is acting as a "whistle blower," public policy and legislation in an increasing number of jurisdictions supports a public employee's right to speak. 69 It is clear that employees do not enjoy an unfettered right of speech, however. For instance, current cases allow the employer to deny such speech where it may disrupt the work place. 70

Under the National Labor Relations Act, an employee has statutory protection for speech concerning work related activities. 71 There are also "whistle blower" statutes in many states which protect employee speech about company wrongdoing. 72 Otherwise, under the "work at will" doctrine, the employee ostensibly has no recognized speech rights in the face of legitimate company interests , aside from unionization related issues . 73 The scope of an employee's statutory license to use company e-mail and/or telecommunications facilities to realize their work related speech right is not established, however. 74

Where firms or users associate via network facilities which they have acquired, they may exercise control over member and non member network access and speech. 75

While the scope of a closed User Groups' [Private Network's] liability for actionable speech is unsettled, it seems intuitively appropriate that its liability track that of bulletin board sysops such as Compuserve and Prodigy. 76 The more extensive its control over the communication of content, the more extensive the liability for that content ought to be. At the same time, the more extensive the control of content, the less extensive individual user speech rights will be on that network.

The largest category of relationships between network owners and consumers exists in the provision of network transmission capacity and network related services. Telecommunications network owners may provide transmission between two or more points at varying speeds with a variety of ways to manipulate the various types of transported information. Services range from the provision of transmission capability for private networks, to virtual private and hybrid networks, 800 and 900 number services, billing, to plain old telephone service (POTS). The provision of network transmission, switching, billing and intelligence based services may be accomplished pursuant to regulated tariff, by contract or by a combination of the two.

As competition has increased, regulators have tended to afford network owner providers greater flexibility in providing services under contract. 77 Even where services are not provided pursuant to contract, network owner providers have been granted greater flexibility in providing many services under tariff. 78 Where the services are offered on a common carrier or quasi-common carrier basis, the network provider has tended to limit network access based on the type and class of service, network integrity, security and capacity.

Aside from government mandated responsibilities to foreclose opportunities for harassing, indecent or obscene speech to reach protected subscribers, carriers have tended to eschew control of information content thereby foregoing liability for customer communication. This practice has been sanctioned by federal and many state regulatory bodies. Also, carriers have traditionally sought to limit their liability for loss or damage to customer communications. 79 Until now, these efforts have been successful. 80

However, a recent court decision has held that telecommunications network owners have electronic video speech rights as extensive as cable video distribution network providers. 81 If the case is upheld on appeal, and if the telecommunications network providers exercise their speech and editorial rights by limiting the access and speech of users, attempts to limit speech related liabilities may, and increasingly should prove less successful. 82

For instance, in a related area, bulletin board/e-mail providers have the ability to control access and screen speech content on their systems. 83 While some do not actively seek to control access or more importantly, content, others do. As a result, while one provider has been successful in avoiding liability for libelous statements made by one of its users, it is not clear that others will fare as well. 84 Moreover, the decision to control content places the service provider in a difficult position when it either fails to prohibit offensive speech quickly or prosecutes other speech in a seemingly biased manner. 85

The need for interconnection and the economies of scale inherent in provision of local telephone service led in significant part to the creation of government sanctioned telephone monopolies. Government then sought to assure the public access to the monopoly provider by requiring that the provider not discriminate between customers on the basis of facilities or the price paid for the services provided. 86

As a further means of assuring non-discrimination, the telephone company was not allowed any control over the content of information it transmitted. More recently, however, telephone companies have been allowed to deny billing and collection services to dial-a-porn providers deemed undesirable by the carriers. 87 Also, government requirements that long distance common carriers may not engage in the provision of information services and local common carriers may not provide electronic video services within their local markets have been overturned. According to a recent district court opinion, local telcos now have video electronic speech rights. 88 Should the decision be upheld on appeal, there is still a question of how this newly articulated speech right will merge with the telco owner's property right vis a vis control of access and content. 89 Many potential competitors and customers of local carriers possessing essential facilities have voiced concern over the potential for unfair competition. 90

In the area of switched, interactive telecommunications, the diverse set of relationships addressed above is expanding even farther as interactive video distribution capabilities come on line and user access to network functionalities increase via manipulation of network intelligence. 91 It is here that the greatest potential for increased access and electronic speech is to be found. 92

As fiber optic, computer and switched telephony technologies merge, so do the heretofore separate network functions and information streams of telephony, broadcasting, cable and print. 93 As this occurs, there is a potential danger that the network owner as the transmission provider and as a potential speaker, may experience a conflict of interest between the provision of network related services to users who, like the network owner, are also information providers. Newspaper publishers, cablecasters and broadcasters have raised this potential for conflict of interest as a reason for continuing the prohibition against local telephone companies' entry into the information and video distribution markets. 94 While these arguments have found sympathetic ears in Congress, they have proved less persuasive before the FCC and at least one district court. 95

Similar complaints have been raised in other instances where access to transmission and owner speech merge. These instances concern the exercise of access and content control by bulletin board service providers, and, the provision of access and speech related services by cable television media. 96

According to a number of legal commenters, individual subscribers to commercial or private computer bulletin board services have no access rights. Access is garnered by contract, and control of access and ultimately speech resides, in the first instance, with the service provider or the system operator (sysop). While there is very little information on the criteria employed for denying initial access, revocation of access is the ultimate sanction employed by sysops to discipline miscreant member users. 97 There are options short of denial of access which are also employed.

At base, the rationale for sysop control of access is ownership of the system facilities. With regard to sysop content control, the recent Cubby v. Compuserve decision provide s some indication of the considerations militating against sysop exercise of content control.98 The greater the discernible control which the sysop exercises over access and content, the greater its potential liability to users and third parties for damage caused by the information's content.

In Cubby, Compuserve, an on-line-information service provider, was sued, unsuccessfully, for the alleged libel of a third party competitor of a bulletin board provided on the service provider's system. In determining that Compuserve was not liable for the alleged libel, the court established by implication that heightened control of the communicated content would have resulted in liability. 99 In another libel action ultimately settled out of court, Prodigy, another sysop, was sued for an alleged libel of a third party by a Prodigy subscriber. 100 Unlike Compuserve and many other sysops, however, Prodigy distinguishes itself based on the extent of control it exercises over transmitted content. 101 As a consequence, there was speculation that Prodigy might not have easily extricated itself from liability. 102

Historically, market entry and technological considerations have affected the apportionment of access and speech rights between media owner-providers and the public. While, as a practical matter, electronic speech has been protected under the constitution regardless of whether it is in a print, 103 voice, 104 or video 105 format, traditional media owners in each industry have been accorded different First Amendment rights vis a vis users based on differing assessments of the ease of economic and technological entry into each market.

The initial scarcity of broadcast frequencies relative to public demand for access resulted in the requirement that the broadcast licensee share its frequency with the public. 106 With FCC engineered deregulation of broadcasting, the fairness doctrine, community ascertainment regulations, and programming guidelines were abolished or seriously compromised. 107 Subsequent to deregulation and the abolition of the fairness doctrine, the scope of access sharing was ultimately limited to candidates for political office. 108 Even before the fairness doctrine was "abolished," its potential power to require access had been significantly limited by judicial decisions. 109

The current scope of government exercised content control over the broadcast licensee extends to the prohibition of speech which is libelous, indecent or obscene. 110 Users have a right to diverse information but no right to speak as individuals or information providers owner permission.

According to at least one legal scholar, government regulation of access to cable channels is justified because franchises are scarce due to the physical limits inherent in the use of public rights of way. 111 The physical scarcity is further exacerbated by the economies of scale inherent in the provision of cable service. 112 For these reasons, the cable franchisee is required to share his/her channels of communication with the public and other information providers. Concerns about the continued availability of local news and public affairs programming as well as economic market and anti-competitive constraints alleged to have been imposed by cable firms have been used to justify limits on the control cable franchisees may exercise over broadcaster access to the cable networks. 113 The leased access, must carry and public access channels are an attempt by Congress to assure third party access to cable networks. 114 According to some scholars, the leased access rules have proved only moderately successful. And, due to recent litigation, the must carry requirements are under a potential constitutional cloud. 115

The cable franchisee's control of communicated content is constrained by legal sanctions which may be imposed for libelous, indecent or obscene speech. 116 In part due to the necessity to avoid government imposed sanctions, cable franchisees are compelled to exert editorial control over matter provided by third party information providers which may be deemed indecent or obscene. 117

IV. Regulatory Shifts in the Age of Convergence and Privatization: Some Preliminary Answers...

Where the network is the private asset of the firm, employee and third party efforts to assert first amendment rights of access or speech over internal communications systems will be limited. 118 In the case of employees of private firms, the National Labor Relations Act may allow them to negotiate for speech rights provided the rights are exercised for the protest or discussion of working conditions. 119 All arguments for fairness and ethics aside, beyond the narrow entitlement of the NLRA, employees of private firms enjoy little real access or speech rights to corporate network assets. Ultimately, the company network owner may limit and/or control access and speech. 120

Employees of public [government] firms are similarly limited. The First Amendment has been interpreted to afford such employees the right to speak on matters of public interest. 121 They, like their private brethren also receive some protection from a variety of state "whistle blower" statutes. Aside from these protections, however, public employees have no rights of access or speech to internal communications systems. At least one commenter has forcefully argued that private and public employees should in enjoy the same scope of speech rights encompassing comment on work and product quality related matters. 122

Access to the networks of closed user groups is also limited. 123 Here, a showing that the network asset is being used to unlawfully restrain competition, 124 the user group may exercise control over access and/or speech on virtually all aspects of the network. However, the exercise of control over access and speech carries a certain level of responsibility for actionable speech violations. The precise level of responsibility has yet to be measured, however, and may ultimately depend on the technology and the circumstances of each case. 125

While the traditional regulatory apportionment of network provider and user access and speech remains virtually intact in the broadcasting, it is under challenge in cable and telephony. Congress's decision to impose must carry requirements on cable franchisees has been upheld for the moment. 126 It is now on appeal to the Supreme Court. 127 The statute authorizing franchising authorities to require cable operators to provide public, educational and government (PEG) access channels, 128 and requiring cable operators to provide leased access channels 129 were held to be constitutionally permissible. 130

Congress's prohibition against local telco ownership of cable facilities in its service area and provision of video programming has been challenged and overturned in one district court. It too, is on appeal. Meanwhile, the cross-ownership ban is being challenged in other district courts as well. 131 The challenges to the must carry, PEG and leased access provisions as well as the telephone-cable cross ownership ban are significant because they provide several of the judicial pillars upon which regulation of the future electronic broadband networks will be built. This follows because the cases address the regulation of access and speech in cable and telephone the two industries from which much of the broadband infrastructure is likely to emerge. 132 Thus, judicial pronouncements on the relative rights of network owners to provide information over their networks and to determine who may have access and speak over their facilities other than themselves, are critical to the evolution of speech rights on the new and evolving infrastructure.

A decision overturning the must carry rules is possible. Congress may have rested a significant portion of the justification for must carry on its desire to assure the continued broadcaster provision of local news and public affairs programming. 133 And, evidence of economic harm may, upon closer analysis and examination of prior history, prove insufficient to establish a sufficient threat to the government's interest in the retention of viable broadcast stations.cy opinion.

Indeed, in its subsequent effort to justify the must carry rules, the FCC did not even advance an economic harm argument. A fact which the court noted, deeming that argument "foreclosed by Quincy Cable TV." Further, the district court was required to apply a different standard to assess the advisability of removing the restrictions as the parties recommended. The Circuit Court did not reach the First Amendment issue, however. In the subsequent remand by the Circuit Court of Appeals, the District Court reluctantly removed the restriction.

From 1988 to 1992, the RBOCs also sought relief from the cross-ownership ban through a variety of bills proposing to allow telephone company entry into the video transmission and provision market. See, H.R. 1504, 103rd Cong., 1st Sess. (1993) S. 1200, 102nd Cong. 1st Sess. (1991) H.R. 2546, 102nd Cong., 1st Sess. (1991) (companion legislation to H.R. 2546) 2. 2800, 101st Cong., 2nd Sess. (1990) S. 1068 101st Sess. (1989) H.R. 2437 101st Cong., 1st Sess. (1989) (companion legislation to S. 1068). However, telco provision of video programming, which was seen as an alternative to re-regulation of cable television rates and practices, was not adopted by Congress despite significant support from the then sitting president. Instead, the cable industry was substantially re-regulated. In 1993, S. 1504, a new bill which proposes to remove the cross ownership restriction, has been introduced. Yet, in all the legislation which has addressed the issue of telco ownership of video distribution facilities, and, despite efforts by telephone companies to raise the constitutional speech issue before the FCC and the MFJ court, to date, there are only two references to First Amendment speech issues in previously unsuccessful legislation. See, H.R. Rep. No. 934, 98th Cong., 2nd Sess. (1984), reprinted in 1984 U.S.C.C.A.N. 4655, 4668, citing Associated Press v. U.S. 326 U.S. 1, 20 (1945), explaining the relationship between the telephone-cable cross-ownership prohibition and the First Amendment goal of diversity of ownership and viewpoint. Also see, S. 1200, Communication Competition and Infrastructure Modernization Act of(1991), Title I, Section 101 (14), which states:

The issue was addressed a second time when congress determined that its codification of the FCC's telephone-cable television cross-ownership rules was constitutional.

Finally, the issue was addressed in the context of FCC deliberations concerning its telephone company-cable television cross-ownership restriction. Collectively, in these proceedings, the government has set forth its rationale for why it's decision to continue the imposition of the restriction on local telephone company provision of video programming is constitutional.

The government's argument is essentially as follows. The telephone-cable television cross-ownership ban is justified by the First Amendment interest "in the widest possible dissemination of information from diverse and antagonistic sources." Through their control of access to their local transmission and switching monopolies, the telephone companies could reduce or eliminate competition in electronic publishing thereby reducing diversity. Therefore, the removal of the ban would threaten the First Amendment interest in diversity.

The ban does not violate the First Amendment rights of local telephone companies for several reasons. First, the ban is an anti-trust prohibition similar to those which other media companies are also subject. Second, common carriers are treated differently for purposes of the First Amendment. Third, the ban is a, content neutral restriction which incidentally affects speech. It is narrowly tailored to meet the substantial government interests in preventing anti-competitive abuses by telephone carriers possessing monopoly power and maintaining a competitive environment for broadband communications.yf services made available and the manner in which they are priced by the merged firms would affect who would have access to network functionalities. If the post telco-cable merger economics follow the same trends as prior periods of merger in related media industries such as broadcasting, debt service demands will ultimately force the merged firms to cut costs, serve more lucrative markets and raise prices. 134 In such an event, some market segments may receive less service while other segments pay more. Such developments would certainly affect the cost of access. They may preclude significant segments of the market from having meaningful access. And they will affect the speech activities of those who acquire access and limit the speech opportunities of those who do not acquire access.

Some scholars have argued that the nation's constitutional laws be changed to reflect the growth of speech related activity engendered by the convergence of computer, network switching and fiber optic technologies. For instance, at least one eminent constitutional scholar has argued for an amendment to the First Amendment to protect speech activities conducted over computers. 135

Other scholars have argued that the First Amendment in its current form, may be interpreted to protect access and speech activities conducted over computer augmented broadband interactive switched networks. 136

Short of constitutional solutions, however, the government retains other regulatory tools for assuring "universal" access and relatively unfettered speech for network owners and users. These include use of: the antitrust laws, speech and tort liability, structural network parameters favoring distributed intelligence and switched interactive network technologies, and a universal service requirement to assure access and speech in the face of the above mentioned market failures. These regulatory choices affect the exercise of access and editorial control at the content, network configuration and equipment levels. The same levels at which network owners exert control.

For instance, given the extensive cost of deploying fiber optics to the home, federal and state regulators could allow private industry to continue to build network information delivery systems composed of one way, compressed channel technology (cable and video dial tone) rather than switched, two-way, interactive technology (ISDN/broadband). While this approach may be favored by portions of the industry, there is a significant danger that such a solution would postpone the advent of switched interactive multi-media communications. More important, however, it replicates the current regulatory difficulties which accrue when the government cedes control over distinct, clearly discernible transmission paths to network owners and then imposes liability for speech.

Where the network owner exercises control over the network via access or content control to deter or forestall competition, the government can invoke the antitrust laws. It may also seek to deter such activity through the use of its and structural safeguards policies. Enhanced service providers and information providers who find their access to the network or their communication over the network constrained by the network owner, may be able to establish that an antitrust violation has occurred. If an information provider can successfully establish that the network provider either possess and seeks to maintain monopoly power, 137 or owns essential facilities, 138 or is attempting to monopolize a market segment, the network provider's activity may be prohibited.

Newspaper publishers, cable programmers and broadcasters which would comprise a significant portion of the potential information providers on a telecommunications carrier provided broadband network, have alleged that the local telephone companies will in fact engage in anti-competitive activities if they are allowed to vertically integrate into the market for providing information services. For instance, broadcasters and cable operators oppose limited local telephone company entry into the video distribution services market via FCC's video dial tone proposal absent significant structural safeguards. 139

It is anticipated that some portion of the future broadband network infrastructure may be composed of essential facilities. If so, an antitrust violation will arise where such facilities are: 1.) extremely difficult if not impracticable for competitors to duplicate 2.) owned by one or a group of firms and 3.) not made available to competitors of the network facilities owner without an appropriate business justification or apparent efficiency, especially where the network owner is also an information provider. 140

The FCC's structural safeguards policy was developed to address the concern that the RBOCs would use cross subsidies and accounting standards to compete unfairly in the competitive provision of enhanced and/or information services. In telecommunications, the term "structural safeguards" refers to the separation of a vertically integrated firm into corporate segments based upon whether they provided basic network services or enhanced services. 141 Enhanced services include data processing services as well as videotext, audiotext, database retrieval and other computer and communications technologies applications. The goal of open networks architecture policies 142 of which 'structural separations policy" was a part, was to prevent the ability of the RBOCs to underwrite their provision of competitive enhanced and information services with monies garnered from their basic network monopoly. After a significant number of administrative hearings and judicial proceedings, there is still no agreement on how structural safeguards ought to be employed. 143

As privatization continues, the lessons learned in the Compuserve case as well as other recent cases regarding publisher liability should give would be private network editors pause. Where a network owner exercises control over access and content, they may not be able to avoid liability for that content when it is harmful to the public. 144 Similarly, network owners may be held liable for negligent or careless manipulation and control of subscriber/user information where such action results in injury to the user or to third parties. 145

Certainly, the libel, obscenity and indecency laws will remain making control of content a cause for liability. Thus, even where network owners seek to eschew all content regulation, they are likely to be no more successful than telephone common carriers and cable operators who by statute must exert some control over obscene or indecent subscriber speech. Ultimately, however, self preservation and protection of the bottom line may motivate firm efforts to curb libelous speech or avoid control of subscriber speech. But, forgoing editorial control over some content would remove a downside cost of doing business which may be preferable to the cost of maintaining the monitoring of subscriber and programmer speech and the potential liability which the exercise of editorial control brings.

There is another way in which network owner control of speech may be tempered by government sanction, the imposition of tort liability. The exercise of control over access and content necessarily invites expectations that the network owner, in the exercise of its editorial discretion, has reviewed and sanctioned all information which it transmits. Moreover, should the network owner lose or damage customer information in storage, manipulation or transmission, or, negligently preclude the transmission of customer information entrusted to its care, it is reasonable to require that the owner compensate the customer to the extent of its legally recognized tort damages. A recent case in Illinois has so held based on state law. 146

The removal of government sanctioned protections from carrier tort liability would encourage some network owners to eschew private carriage for the protection which public common carriage still affords. Tort liability would attach whenever the private carrier negligently handled subscriber information. Private carrier and closed user group attempts to exempt themselves from such liability via exculpatory contract clauses or tariff language would be deemed unconscionable and unenforceable as a matter of law where it could be established that the subscriber does not possess equal bargaining power.

At least one commenter has noted that in an era of deregulation, the reasons for continuing to limit the tort liability of non-dominant telecommunications common carriers cease to be applicable. 147 At least three reasons have been used by the courts to justify the continuation of exculpation clauses limiting common carrier liability. First, federal and state regulators may be held to possess the regulatory authority to establish such limits. Second, such limits, judgments paid by monopoly carriers would be passed on to subscribers having no alternative service providers. Third, limited liability provisions preserve national uniformity in the provision of services and avoid discrimination between like situated by geographically dispersed subscribers.

Today, however, such reasons retain little credibility. First, the Communications Act of 1934, does not authorize federal regulators to preempt state law tort remedies then existing at common law or by statute. Rather, such remedies as the act provides are in addition to existing state remedies. 148 In addition, courts have not automatically granted primary jurisdiction over state tort liability claims to regulatory agencies but often have found such claims to be within the purview of the courts. 149

Second, in an era of convergence and expanding competition at all market levels in the telecommunications and ultimately, multi-media marketplace, many subscribers will have alternative sources of service. Finally, a growing portion of the telecommunications infrastructure is owned by a disparate number of private owners serving distinct "high-end user" sub-markets rather than the larger local or national markets of various subscribers. Under such circumstances, national uniformity appears to be less a function of government action and more a function of the relative market power of the service provider, the purchaser and market demand. For these reasons, government sanctioned carrier initiated limitations on tort liability should be abolished except where a carrier elects to serve all classes of customers via public switched multi-media networks.

A decision to remove the tort liability limitation except when applied to carriers serving the majority of all classes of users via a public switched multi-media network or providing significant interconnection between public switched networks, would serve as a financial incentive for some carriers to maintain service to a broad subscriber base, or to expand their service offerings to include other consumer groups or, at the very least, assure sufficient compatible interconnection.

Where the non-dominant network provider or providers resort to contracts or tariffs as the vehicle for the offering of services to subscribers, there may be instances in which the doctrine of contract unconscionability may be invoked. If the network owner, as provider of scarce network resources, leveraged its economic position by employing form contract language to limit its tort liability, it's attempt to enforce such restrictions might be denied by the courts on the grounds of unconscionability. 150 Moreover, as one public service commission has observed, given the increasing complexity of tariffs it would be "...unconscionable" to assume that any telephone subscriber had consented either by implication or expressly to broad liability waivers." 151

Other than the use of these strategies, the government may pro-actively encourage access and speech by creating regulatory policies and tax incentives which favor the building of open, switched, interconnected networks incorporating distributed intelligence. For instance, the government has initiated regulatory proceedings aimed at equalizing user interconnection to the local monopoly public switched network architecture and increasing network service offerings by enhancing network flexibility through distributed network intelligence. These proceedings have yet to be conclude. 152 A resolution which favors distributed intelligence and shared user/network control over network functionalities would maximize speaker control over the process by which information is communicated.

Networks incorporating distributed intelligence and shared control, whether public or private, could provide the opportunity to engage in broadband multi-media interactive speech to large numbers of users. 153 They arguably would also provide a preferable alternative to multi-ëchannel, uni-directional distribution systems in which network architecture and functionality preclude two-way, broadband interactive communications.

When combined with the regulatory strategies outlined above, selection of a switched network architecture would also ensure that neither network owners or users forfeit meaningful access or speech rights. For, in a switched broadband interactive network environment, the capacity for carriage of information is substantial and the notion of scarcity upon which the constitutional regulation of antecedent technologies is based, should become a less viable justification for limiting access and speech rights. 154

Each of the above mentioned policies affects the incentive structure under which carriers would exercise control of access and speech on their networks. The proposed policies do not preclude network owner exercise of control over access and speech. They merely remove liability protections enjoyed by public common carriers, expand technical opportunities for user access and speech, and continue pre-existing economic regulation. As such, they should be adopted as regulatory policy regardless of whether constitutional law is changed.


Note 1: Associate Professor, New York Law School and Director, Communications Media Center, New York Law School. The author thanks the Administration and the Board of Trustees of New York Law School for a summer grant which supported this research. Thanks are also due to the library staff of New York Law School, especially Camille Brousard, and to Anjali Singhal, my research assistant for their excellent assistance. Finally, a sincere note of appreciation is extended to Professors Michael Botein and Eli Noam who reviewed earlier drafts of the article, and to my wife, Linda who provided valuable editing and significant encouragement. Back.

Note 2: The convergence phenomena arguably began with the merger of telephone network switching and computer technology. It has continued with the evolution of network transmission technologies from copper and coaxial cable to fiber optic cable along with channel/signal compression and the evolution of signaling system seven (SS-7) technology. Its most recent manifestation is the merger of fiber, telephone and computer technologies into broadband communications networks. Back.

Note 3: The speed with which various industry firms seek to joint venture or combine to enter new markets underscores this fact. See, Alan Deutschman and Joyce E. Davis, THE NEXT BIG INFO TECH BATTLE Fortune, November 29, 1993, Domestic Edition INFORMATION TECHNOLOGY SECTION; Pg. 39; EDITORIAL, POLICING THE INFORMATION HIGHWAY, Chicago Tribune, November 26, 1993, Friday North Sports Final Edition, Pg. 30; ZONE: N; John Huey, Andrew Kupfer, Jane Furth and John Wyatt, WHAT THAT MERGER MEANS FOR YOU, Fortune, November 15, 1993, Domestic Edition INFORMATION TECHNOLOGY SECTION, Pg. 82; Jolie Solomon, Daniel Pedersen, Rich Thomas, Carolyn Friday, Peter Katel, Sherry Keene-Osborn, Charles Fleming, Vern E. Smith, Marc Levinson, Michael Meyer and Annetta Miller, Big Brother's Holding Company, Newsweek October 25, 1993 , UNITED STATES EDITION BUSINESS; Pg. 38; and JOHN GREENWALD, John F. Dickerson, Thomas McCarroll, and Jeffrey Ressner WIRED!; Bell Atlantic's bid for cable giant TCI is the biggest media deal in history; it's also a peek at the future Time October 25, 1993, U.S. Edition BUSINESS; Pg. 50; The Economist October 16, 1993 Special; Pg. 21 MULTIMEDIA; The tangled webs they weave; and Sandra Sugawara and Paul Farhi, Merger to Create a Media Giant; $ 26 Billion Bell Atlantic-TCI Deal Is a Vision of TV's Future, The Washington Post October 14, 1993, Thursday, Final Edition, FIRST SECTION; PAGE A1. Back.

Note 4: The Clinton administration's report entitled, National Information Infrastructure: Agenda for Action (Report) identifies other policy and actions goals as well. There are four principal policy goals and five major action areas. The first of the four principal policy goals are: is reliance on private sector investment. The other three principal policy goals are: support for universal service; promotion of technical innovation and new applications; and promotion of a seamless user driven NII. These goals are to be accomplished via reformation of government regulatory policies concerning: information security and network reliability; improved spectrum management; protection of intellectual property rights; increased domestic and international inter governmental coordination;and enhanced access to government information concomitant with improvement of the procurement process. See, Information Infrastructure Task Force, The National Information Infrastructure: Agenda for Action, September 15, 1993, at pp. 1-2, 4-16. See generally, JOHN HOLLIMAN, Vice President Gore Press Conference on Info Highways, Transcript # 267-1 of Live Report, CNN News SHOW, 1:00 pm ET, December 21, 1993 18:30 Eastern Time; Ronald Brown, Secretary Brown on Three Goals for Our New National Information Infrastructure, Telecommunications Policy Briefing - Roll Call, Nov. 15, 1993 - Special Section; and Brooks Boliek, U.S. data superhighway project short on concrete; But Gore vows action on new infrastructure, The Hollywood Reporter, Thursday, September 16, 1993. Back.

Note 5: See, Connecting to the Future: Greater Access, Services, and Competition in Telecommunications, Report of the New York's Telecommunications Exchange, December 1993, at xii, and 18-21, 28-29. Back.

Note 6: As fiber optic distribution and switching technology is introduced, the distribution functions and information streams of broadcasting, cable and telephony are merging. As they merge, the access, speech and related activities which received varying degrees of constitutional protection when conducted over the antecedent technologies will come to reside on the merged network(s). However, because the apportionment of these constitutionally recognized rights was made in the specific context of antecedent technologies and relationships, the fate of such rights in an advanced, intelligent, broadband network context is unsettled. See, generally, Joshua Quittner, Online To A Revolution: The Amazing - and some Say Ominous - New World of TV, Telephone and Computer Is Heading Your Way, Newsday, July 18, 1993, Sunday, NASSAU AND SUFFOLK EDITION, News SECTION Pg. 4, Other Edition: City Pg. 50; and ELECTRONIC MEDIA REGULATION AND THE FIRST AMENDMENT: FUTURE PERSPECTIVE, DATA CHANNELS (INCL COMPUTER DIGEST); No. 3, Vol. 19; February 3, 1992. This uncertainty is exacerbated by the growing number of private networks. Some scholars have begun to address this question. See, EDGE, December 2, 1991, SECTION: No. 175, Vol. 6 Special Report: Universal Telephone Service; Ready For The 21st Century? 1991 Annual Review Of The Institute For Information Studies. A Joint Program Of Northern Telecom And The Aspen Institute. Back.

Note 7: Several scholars have criticized the current state/ private dichotomy established by the Supreme Court in light of the continuing trend toward privatization in American life. See Rodney A. Smolla, 31 Wm and Mary L. Rev. 321 (1990). (Arguing that since restraints on human thought and action are the same whether applied by public or private entities, protection of constitutional freedoms should be maintained in the private as well as the public sector.); Clyde Summers, The Privatization of Personal Freedoms and the Enrichment of Democracy: Some Lessons from Labor Law, 1986 Univ. Ill. L. Rev. 689 (1989). (Arguing that as more public functions are performed by private entities there is a critical need to protect constitutional rights heretofore protected from government control in the public sphere from private control in the private sphere.) Back.

Note 8: Users may be divided into two major groups composed of those who own network facilities ( facilities based users) and those who do not own facilities ( non-facilities based users ) . The vast majority of users are non-facilities based. These individuals, firms or groups purchase access to some of the networks (telephone) over which they may interact. They are most often semi-passive recipients of information transmitted one way over other networks (broadcasting and cable). The communications needs of these users vary substantially, are evolving at different speeds and in multiple directions. For instance, many businesses already have significant needs for high speed, high capacity broadband communication networks. See, Dertouzos, Communications, Computers and Networks, 265 Scientific American 62, 64, September 1991; Gore, Infrastructure for the Global Village, 265 Scientific American 150, 152; Dertouzos, Building the information Marketplace, 94 Technology Review 28, 31-32, January 1991; Guilder, supra note _____, at ____. By comparison, the general public has not yet generated needs sufficient to precipitate demands for greater network speeds and capacities. Customer-users include residential as well as business customers. Back.

Note 9: Generally, absent a showing of an independent nexus of involvement by the state, neither the chartering, funding, licensing, regulating or tax exemption of a corporation by the government constitutes state action. See Cohen v. Illinois Institute of Technology, 524 F. 2d 818 (7th Cir. 1975) cert. denied 425 U.S. 943 (1976) and Sament v. Hahnemann Medical College and Hospital of Philadelphia, 413 F. Supp. 434 (E.D. Pa. 1976) Affirmed mem. 547 F. @d 1164 (3rd Cir. 1977) (charter); Aasum v, Good Samaritan Hospital, 542 F. 2d 792 (9th Cir. 1976), Manning v. Greensville Memorial Hospital, 470 F. Supp. 662, (C.D. Va. 1979) and Trageser v. Libbie Rehabilitation Center, 590 F. 2d 87 (4th Cir. 1978), cert. denied 442 U.S. 947 (1979) (funding); Moose Lodge No. 107 v. Innis, 407 U.S. 163 (1972) (licensing); Jackson v. Metropolitan Edison, 419 U.S. 345 (1974) (regulation); and Weis v. Syracuse University, 552 F. Supp. 675 (N.D.N.Y. 1982), Narango v. Alverno College 487 F. Supp. 635 (D.C. Wisc.1980) and Stewart v. New York University, 430 F. Supp. 1305 (S.D.N.Y. 1976).

Where the private entity exercises powers traditionally reserved to the state, state action may be found. See Nixon v. Condon, 286 U.S. 73 (1932) (election), Marsh v. Alabama 326 U.S. 501 (1946) (company town), and Evans v. Newton, 382 U.S. 296 (1966) (municipal park). Back.

Note 10: See CBS, Inc. v. DNC, 412 U.S. 94 (1973). Back.

Note 11: Sable Communications of California, Inc. v. FCC, 492 U.S. 115 (1989), concurring opinion of Justice Scalia; Dial Info. Servs. Corp. of N.Y. v. Thornburg, 938 F. 2d 1291 (2nd Cir. 1991); and Carlin Communication Inc., v. Mountain States Telephone & Tel. Co., 827 F. 2d 1291 (9th Cir. 1987); and Information Providers Coalition for the Defense of the First Amendment v. FCC et al. , 928 F. 2d 866 (9th Cir. 1991) (Information Providers). Back.

Note 12: Recently, however, statutorily required efforts by cable operators to limit or ban indecent programming on leased and/or public access channels have been deemed to constitute state action. See Alliance at note _______ [Cite to Chapter 2 discussion and notes concerning government regulation of indecent communication on cable and telephone.] Back.

Note 13: At present, the network access/speech continuum is bounded at one end by public switched telecommunications networks (PSTN) providing a variety of services to the public on a common carriage non-discriminatory basis. At the other end of the continuum is the privately network (PN) functioning solely as a business tool providing services exclusively to the owner(s). In between public telecommunications switched and private networks are the cable television (CATV), broadcast (B/CAST) and virtual private networks (VPN). The continuum can be represented as illustrated below.

Until recently, the continuum, when read from left to right represented the network owner's decreasing regulatory responsibility to provide access to a set of diverse subscribers on a non discriminatory basis, and simultaneously tracked the increase in control which the network owner may exercise over access and speech on its network. With the advent of recent court decisions regarding cable television-telephone cross ownership and dial-a-porn, (see footnotes __ through __ infra), the continuum will become shorter. It may be that the pure public switched common carrier may cease to be a category. Certainly the former common carriers will have greater flexibility to provide services on a non-common carrier basis. The new network owners at the left hand end of the continuum will have the option to provide common carriage, private carriage and/or engage in speech themselves. Thus the continuum might look more like the representation below.

Back.

Note 14: See generally Estlund, What Workers Want? Employee Interests, Public Interests, and Freedom of Expression, 140 U. Pa. L. Rev. 921 at 925, 935-936, and 960-964. Arguing that the general public has an equal interest in the product quality and safety concerns of public and private employees. And, that public employees have work place concerns similar to those of their private employee counterparts and ought to enjoy the same protections for work place related expression and association. Back.

Note 15: For the purposes of the paper, networks are defined as collections of interconnected users. National Telecommunications and Information Administration, NTIA Infrastructure Report: Telecommunications in the Age of Information, October 1991, at 13-20, 92. The type of transmission and the receive/send machinery employed varies. These points may or may not be capable of engaging in interactive communication. This definition acknowledges that cable and broadcast television systems may be deemed to be networks just as the public switched inter-exchange and local exchange systems constitute networks. This definition also facilitates the exploration of the broader array of access solutions presently employed and likely to be employed in the regulation of future networks.

The paper assumes that interconnection between networks and/or potential users of networks can and does take place. It does not address directly the need for common languages, protocols and conventions, speeds, as well as procedures of machine interaction, all of which are critical technical issues involved in network interconnection. For an excellent lay explanation of network interconnection and nomenclature, see, Dertouzos, Communications, Computers and Networks; and Cerf, Networks, 265 Scientific American 62 and 72, respectively, September, 1991. These issues are addressed, if at all, solely from the perspective of the network facilities, pricing and service configurations which the network owner(s) may choose in providing services and the impact such choices may have on the potential user class. It is recognized that these choices in significant measure will determine the eligible class of users.

Finally, the range of services that a network owner may provide are assumed to include inter alia, transmission, switching and routing, storage and/or manipulation of user information, access to 3rd party and/or network provider information, and enhanced services. A network provider need not provide all of the functions listed above, or be limited solely to those listed. Back.

Note 16: A network's functionality is the combination of the various hardware and software defined functions the network performs. A network's functionality is determined by its hardware and software architecture and by the network standards or documents which specify network protocols. Network protocols allow hardware of various manufacture to communicate with one another. Peter Fetterrolf, Connectivity: The Sum of Its Parts, Byte, State of the Art Section Interoperability, Vol 16, No. 11, p. 197. Back.

Note 17: A tariff is a published set of rates charged and conditions under which various classes of service are offered by common and private carriers Back.

Note 18: The notion of network and service availability is subsumed within the definition of universal service. Universal Service was a government and industry policy which encouraged AT&T [then a monopoly] to make telephones and service available to the American public at reasonable rates. Subsidies of less profitable [or unprofitable] provision of service to rural and poorer areas were built into the business and long distance charges. David Coursey, Battle of the Bandwidth, Infoworld, January 14, 1991, Perspectives, p. 34. The traditional goal of universal service was to assure that "all but the poorest Americans could afford to make and receive telephone calls, even if they lived in remote, expensive to serve areas." Special Report: Universal Telephone Service; Ready for the 21st Century?, Forward, Edge, December 2, 1991, No. 175, Vol. 6. As such, universal service operated as a kind of equality in access and likeness in service offerings. In the current era of increased competition and privatization, however, universal service may no longer mean likeness (or comparability) of service or equality in technical access. Id. Back.

Note 19: The term "open" as used here to describe essentially, non discriminatory access to communicate on the network as configured by the owner, should not be confused with the Federal Communications Commission's "open network architecture" policy. In theory the open network architecture policy is an attempt to provide enhanced service providers such as voice messaging, on line data and bulletin board service providers the same access to the local telephone companies' transmission and features as the telephone company or its subsidiaries. See Dawn Bushaus, Enhanced Services -- ONA and AIN on a Collision Course, Communications week, Computer Networking Section, p 32L, June 17 ,1991. Back.

Note 20: See generally, VPNs set to challenge private networks and PSTN during nineties, _____, April 15, 1992; Mark Luczak, Tapping the Hidden Savings in Virtual Networks; Hybrid Networks, Telecommunication, Vol. 25, No. 3, p. 45, March 1991; and Robert Violino, A Network of Their Own, Information week, January 14, 1991. Back.

Note 21: See discussion in note 13 infra. Back.

Note 22: VPNs set to challenge private networks and PSTN during nineties, FinTech Telecom Markets, ENERGY SECTION, April 15, 1992 Back.

Note 23: The networks typically are created to meet the needs of their respective users for transmission of high speed data, information processing, voice traffic and/or security. Consequently, they serve closed sets of users with relatively cohesive sets of needs, as well as eligibility, procurement and financing criteria. There are some firms which sell their excess network transmission capacity commercially. Back.

Note 24: This definition doesn't include closed networks established without the use of private or dedicated facilities. Back.

Note 25: Closed user group networks may be local, regional, national or international in scope. Examples of closed user group networks include those owned by: ad agencies, media firms, printers, insurance agencies, hospitals, record rooms, police, automobile manufacturers, parts suppliers, dealers, financiers and computer networks. User groups' networks may be closed for numerous reasons including: specialized equipment, specialized features, transmission speeds, security, service pricing or speech related restrictions. Back.

Note 26: See, Alan Deutschman and Joyce E. Davis, THE NEXT BIG INFO TECH BATTLE, Fortune, November 29, 1993, Domestic Edition INFORMATION TECHNOLOGY Section, Pg. 39; MULTIMEDIA: The tangled webs they weave The Economist, October 16, 1993 Special SECTION, Pg. 21; and Sandra Sugawara, Paul Farhi, Merger to Create a Media Giant; $ 26 Billion Bell Atlantic-TCI Deal Is a Vision of TV's Future The Washington Post, October 14, 1993, Thursday, Final Edition, FIRST SECTION; PAGE A1. Back.

Note 27: Non-discriminatory access in the common carrier context connotes holding out ones self to provide like services to like situated customers at equitable rates. Back.

Note 28: This access option is similar to the common carrier model except that the network provider has not held itself out voluntarily to provide access to the network but is compelled to do so by law. The cable television leased access provisions are the best current example of this form of mandated access. Back.

Note 29: The public, educational and governmental access channels which are required under cable franchises as well as the must carry channels set aside for broadcasters which are required by federal law are an excellent example of this type of "negotiated" or mandated access. Back.

Note 30: cite to portion of article where discussion takes place. Back.

Note 31: Carl Warren, Abuse of company facilities for E-mail must be curbed Network World March 30, 1992 SECTION: TOP NEWS; E-MAIL; Pg. 25. Back.

Note 32: For instance, many New York city agencies have configured their phones to prevent city workers from dialing long distance and calling specialty phone services such as dial-a-porn and sports information lines. See, Jennifer Preston, It's OK, As Long as It's A Local Call Newsday, Thursday, October 26,1989, CITY EDITION News SECTION, Pg. 5. Back.

Note 33: Ronald E. Roel, Advances in The Campaign For Workers' Rights; Laws, Court Rulings Offer Protection In Areas Where Bill of Rights Doesn't, Newsday January 10, 1988, Sunday, NASSAU AND SUFFOLK EDITION BUSINESS, Pg. 84; also see, PLAN TO MONITOR CALLS MADE BY CIVIL SERVANTS ATTACKED, Los Angeles Times, March 10, 1985, Sunday, Home Edition, SECTION: Part 1; Page 11; Column 1; National Desk. Back.

Note 34: Ronald E. Roel, Advances in The Campaign For Workers' Rights; Laws, Court Rulings Offer Protection In Areas Where Bill of Rights Doesn't, Newsday January 10, 1988, Sunday, NASSAU AND SUFFOLK EDITION BUSINESS; Pg. 84 City Pg. 92 Back.

Note 35: Ronald E. Roel, Advances in The Campaign For Workers' Rights; Laws, Court Rulings Offer Protection In Areas Where Bill of Rights Doesn't, Newsday January 10, 1988, Sunday, NASSAU AND SUFFOLK EDITION BUSINESS; Pg. 84 City Pg. 92 . An examination of employee privacy rights is beyond the scope of this article. Back.

Note 36: See, PLAN TO MONITOR CALLS MADE BY CIVIL SERVANTS ATTACKED, Los Angeles Times, March 10, 1985, Sunday, Home Edition SECTION: Part 1; Page 11; Column 1; National Desk. "The limited rights granted to government workers under the under the U.S. Constitution are reinforced for federal workers through the Whistle-blower Protection Act of 1989." The laws protecting corporate employees, are inconsistent at the state level. See, Tom Devine, A Whistle-blower's Checklist, Chemical Engineering, November, 1991, You and Your Job Section, Vol. 98, No. 11, pg. 207. Back.

Note 37: Carol Wolinsky and James Sylvester, Privacy in the telecommunications age; Association for Computing Machinery, SECTION: Vol. 35 ; No. 2 ; Pg. 23 February, 1992. Back.

Note 38: SUSAN E. KINSMAN;Toll fraud on rise, SNET says; SNET warns businesses to guard against toll fraud , The Hartford Courant, July 29, 1992, A Edition SECTION: BUSINESS; Pg. B1. "To frustrate casual hackers, net managers are adding password protection to private branch exchanges, voice mail systems, automated attendants and the remote administrative ports used to manage them. They are thwarting the pros by blocking calls to certain locations and taking corrective action when call monitoring indicates they've fallen victim to hackers." See, Annabel Dodd, When going the extra mile is not enough; Despite extra steps taken to protect voice systems, hacker are still getting through., Network World, April 12, 1993, FEATURES; Network Security; Pg. 49. Back.

Note 39: SUSAN E. KINSMAN;Toll fraud on rise, SNET says; SNET warns businesses to guard against toll fraud , The Hartford Courant, July 29, 1992, A Edition SECTION: BUSINESS; Pg. B1 Back.

Note 40: Annabel Dodd, When going the extra mile is not enough; Despite extra steps taken to protect voice systems, hacker are still getting through, Network World, April 12, 1993, FEATURES; Network Security; Pg. 49. Back.

Note 41: SUSAN E. KINSMAN;Toll fraud on rise, SNET says; SNET warns businesses to guard against toll fraud , The Hartford Courant, July 29, 1992, A Edition SECTION: BUSINESS; Pg. B1 Back.

Note 42: U.S.C. sections 7, as amended, 29 U.S.C.A. section 157. Back.

Note 43: For instance, absent a showing by union organizers that: (1) they possess no other reasonable alternative means of communication to reach non-union employees, or (2) that the employer is discriminating against the union's access to facilities it otherwise makes available, the courts are unlikely to afford the organizers access to an employer's private e-mail or telecommunications facilities. The Supreme Court has held that reasonable alternative means of communication (RAMC) do not exist when the location of the employer's premises and the employee's living quarters place the employees beyond the reach of the union's reasonable efforts to communicate with them. Reasonable alternative means of communications include publicity, mail, letters, and person to person communication at employees' homes, by phone, or on the streets. See Lechmere, Inc. v. NLRB 112 S. Ct. 841, 848 (1992); Sears, Roebuck & Co. v. San Diego County District Council of Carpenters, 436 U.S. 180, 205 (1978); and NLRB v. Babcock & Wilcox Co., 351 U.S. 105 (1956). See Michael L. Stevens, The Conflict Between Union Access and Private Property Rights: Lechmere, Inc. v. NLRB and the Question of Accommodation, 41 Emory L. J. 1317 (Fall 1992). (Arguing that the Supreme Court's "reasonable alternative means of communication" standard first announced in Babcock and later affirmed in Lechmere is the appropriate standard.)

Newspaper advertisements were explicitly rejected as a "RAMC" by the Lechmere Court. The NLRB has held that media advertisements are not considered a RAMC due to their costly, impersonal nature. And, absent access to the phone numbers of target employees, telephones do not constitute a reasonable alternative. See Peter J. Ford, The NLRB, Jean Country, and Access to Private Property: A Reasonable Alternative to Alternative Means of Communication Under Fairmont Hotel, 13 Geo. Mason U.L. Rev. 683 (1991). (Arguing that the Jean Country decision strikes a more appropriate balance between employer property rights and employee access to information under section 7 of the NLRA, and citing all NLRB access cases through the 1991 publication date of the article) and their holdings.) Back.

Note 44: James I. Cash Jr; Benn R. Konsynski, IS Redraws Competitive Boundaries , Harvard Business Review, March 1985 / April 1985, PAGE: Pg. 134. Companies may participate in JONs on three levels. They may enter and receive information (content and access to the network as configured), they may participate in the development of software and network maintenance (network intelligence), and they may manage the network and control its configuration and provisioning (network management and control) At the first level, the JONs participant only has access to the network through restricted protocols and usually acts solely as an information entry-receipt node. The JONs system simply provides standard messages. For example, an independent travel agency may use one of the major airline reservation systems without possessing additional in-house processing capability. The majority of current JONs participants are operating at this entry level. Id.

Companies participating at the second level control the development and maintenance of the software used by the other JONs participants. Usually, these JONs developers have absorbed the cost of software development and maintenance in order to gain exclusive control over decisions on access, price, application design and the network. In the airline reservation systems, American and United Airlines are second level participants. They are primarily responsible for developing their SABRE and APOLLO systems, respectively.

Participants at level three serve as the utility. They usually own or manage all the network facilities as well as the computer processing resources. The Bell operating companies, The Source, and CompuServe are examples of such participants. Id. Back.

Note 45: James I. Cash Jr; Benn R. Konsynski, IS Redraws Competitive Boundaries , Harvard Business Review, March 1985 / April 1985, PAGE: Pg. 134. Back.

Note 46: This is an area that is receiving increasing scrutiny as telephone network users push for access to the network's functionalities and intelligence for purposes of reconfiguration. Back.

Note 47: See, Dunstan McNichol, Former NWA Exec Says Computer Monopoly Is Killing Airlines, States News Service; and John Helliwell, Networks provide a critical competitive edge for airlines: reservation-system leaders reap diverse benefits Networks Provide a Critical Competitive Edge for Airlines, PC Week January 19, 1988, Vol. 5; No. 3; Pg. C1. While the actual use and impact of the networks is still debated, it is clear that in the airline, travel, hotel and vacation/leisure businesses, the use of joint owned networks has often lead to a significant competitive edge in the market. See, Salvatore Salamone, Airline reservation network flies into new age of LANs, ; Software front end, QIK RES, speeds terminal termination at American Airlines, Network World, November 26, 1990, FEATURES; Pg. 34; and John Helliwell, Networks Provide A Critical Competitive Edge for Airlines, PC Week January 19, 1988, Vol. 5; No. 3; Pg. C1. Back.

Note 48: See, Carol Wolinsky and James Sylvester, Privacy in the telecommunications age; Association for Computing Machinery, SECTION: Vol. 35 ; No. 2 ; Pg. 23 February, 1992. Back.

Note 49: Prodigy Services Co., an information services company owned jointly by Sears, Roebuck and Co. and International Business Machines Corp., has been involved in a number of controversies regarding speech over it facilities. It eliminated controversial bulletin board files such as "Health Spa" which precipitated a bitter argument between religious fundamentalists and gays because of discussions of gay sexuality. It also terminated the memberships of subscribers protesting Prodigy's increase in e-mail prices to Prodigy advertisers. See W. JOHN MOORE, Taming Cyberspace, The National Journal March 28, 1992, LEGAL AFFAIRS; Vol. 24, No. 13; Pg. 745.

Prodigy maintains that its subscribers have no first amendment rights on its bulletin board services, nevertheless it does not want to be held responsible for the content of communications it allows to run absent an express endorsement or failure to disavow. For instance, Prodigy was uncomfortable with taking responsibility for bulletin board statements that the Holocaust never occurred. Id. Back.

Note 50: See, Cubby v. CompuServe Information Service, at note ____, infra. The court held that CompuServe was not responsible for allegedly libelous statements made in a bulletin board called Rumormonger, that was carried on CompuServe's system. Liability was not forthcoming because CompuServe did not exercise editorial control over the bulletin board's content. Id at ___. Also see, W. JOHN MOORE, Taming Cyberspace, The National Journal March 28, 1992, LEGAL AFFAIRS; Vol. 24, No. 13; Pg. 745; and FELICITY BARRINGER, THE NATION: Electronic Bulletin Boards Need Editing. No They Don't, The New York Times, March 11, 1990, Sunday, Late Edition - Final, Section 4; Page 4, Column 1; Week in Review Desk. Back.

Note 51: See CBS v. Democratic National Committee, 412 U.S. 94 (1973) (broadcasters could not be compelled to accept editorial advertisements covering controversial issues); and Syracuse Peace Council, 2 FCC Rcd. 5043, reconsideration denied 3 FCC Rcd. 2035, affirmed, Syracuse Peace Council v. FCC, 867 F.2d 654. Back.

Note 52: Leathers v Medlock, 499 U.S. ---,--- (1991); Los Angeles v. Preferred Communications, Inc. 476 U.S. 494 (1986). However, the courts have not definitively decided whether cable operators possess absolute editorial and speech rights. See, A-798, Turner Broadcasting System, Inc. v. FCC, U.S. Law Week, Daily Edition, May 5, 1993, In Chambers Opinion of Chief Justice Rehnquist, Circuit Justice. (Request for injunction against enforcement of must carry section of Cable Act of 1992 legislation denied.) Back.

Note 53: Broadcaster access to cable television channels has been upheld in Turner Broadcasting v. FCC, while public access to cable channels via public government and educational access channels and programmer access to cable leased access channels has been recently upheld in Daniels. Back.

Note 54: Sable Communications of California, Inc. v. FCC. Back.

Note 55: Chesapeake and Potomac Telephone of Virginia et al. v. U. S. 830 F. Supp. 909, 1993 U.S. Dist. Lexis 11822 (1993). Also see Edmund Andrews, Ruling Frees Phone Concerns to Offer Cable Programming, New York Times, August 25, 1993, A1, Col. 2; cont.'d on D5, Col. 1. Announcing the decision of the U.S. District Court decision overturning the telephone-cable television cross-ownership ban. Also see, 47 U.S.C. @ 533 (b), The Cable Communications Policy Act of 1984, prohibiting local telephone companies from providing video programming to potential viewers in their service area directly or indirectly through an entity owned by the telephone company or under its common control. Back.

Note 56: Sable Communications of California, Inc. v. FCC, 492 U.S. 115 (1989), concurring opinion of Justice Scalia; Dial Info. Servs. Corp. of N.Y. v. Thornburg, 938 F. 2d 1291 (2nd Cir. 1991); and Carlin Communication Inc., v. Mountain States Telephone & Tel. Co., 827 F. 2d 1291 (9th Cir. 1987); and Information Providers Coalition for the Defense of the First Amendment v. FCC et al. , 928 F. 2d 866 (9th Cir. 1991) (Information Providers).

In each of the Circuit Court cases, the issues concerned messages for which the telephone companies collected fees on behalf of the information provider. The information providers were allowed to provide messages which the telephone companies did not provide billing services for. However, the difficulties associated with collections absent the assistance of the phone companies rendered the information providers' businesses marginal at best. The carriers' provision of billing services was voluntary rather than required by law.

In Information Providers, the Court inter alia considered petitioners' assertion that FCC regulations requiring that an individual wishing to receive "dial-a-porn" messages notify the carrier in writing, constituted a prior restraint. The Court concluded that no prior restraint was involved because there was no government action to enjoin speech, require advanced governmental approval for speech, censor or license speech. Instead, the court found that only the telephone companies are involved. And, as they are private actors, they are constitutionally free to ban dial-a-porn from their networks and/or refuse to make available billing services to dial-a-porn information providers. 922 F. 2d at 877. Similar conclusions were reached in the other cases. See, Carlin, 827 F. 2d at 1293, 1295, 1297 n10; and Dial Info., 938 F. 2d 1543. Back.

Note 57: Chesapeake and Potomac Telephone of Virginia et al. v. U. S. 830 F. Supp. 909, 1993 U.S. Dist. Lexis 11822 (1993). Back.

Note 58: Professor Jerome Barron has taken justifiable issue with the Circuit Court opinions. He argues that the courts, in upholding the decisions of telephone common carriers to refuse carriage or the provision of billing services to dial-a-porn providers, have allowed the telephone common carriers an unjustified measure of editorial control over the content of speech transmitted over their facilities. Barron, The Telco, The Common Carrier Model and the First Amendment -- The "Dial-A-Porn" Precedent, 19 Rutgers Computer & Tech. L.J. 371, (notes 39 through 65 and accompanying text) (1993). Back.

Note 59: Alliance for Media et al. v. FCC, 10 F. 3d 812 (1993). In Alliance, the Court considered among other issues, the constitutionality of FCC regulations requiring in some situations that cable operators: (1) prohibit or segregate any programming on their leased access channels which they reasonably believes to be indecent; and (2) prohibit obscene or indecent programming as well as programming soliciting unlawful conduct. In response to the government's argument that cable operators operating under the regulations are not state actors, the court concluded that the statute significantly encourages the operators to ban indecent speech. Consequently, operator action is state action. Id at *31.

The Circuit Court reached its conclusion upon applying the state action test set forth in Reitman v. Mulkey, 387 U.S. 369 (1967) to Section 10 of the Cable Competition and Consumer Protection Act of 1992. Per Reitman, the immediate objective, historical context and ultimate effect of the cable statute were examined. The Circuit Court found that: (a) the statute's immediate objective was to suppress indecent information by limiting its transmission via access channels; (b) the context of the statute evidenced an effort by the government to strip cable operators of editorial power over the content of information on leased and public access channels and then enlist the cable operator in identifying and then prohibiting only indecent material; and - the ultimate effect of the statute was to encourage a number of cable operators to ban indecent programming from leased and access channels altogether. Id at *23-*31. Based on these findings, the Circuit Court concluded that the statute's encouragement of total denial of indecent speech by cable operators constituted state action. Id at *31.

The court went on to find the total ban unconstitutional because it was not the least restrictive means for achieving the government's goal of regulating access to indecent programming by children. Id at *33-35. Back.

Note 60: Id at *24-*27 and accompanying notes. Back.

Note 61: Foreborne carriers have the right to serve discrete segments of the market without filing tariffs if they so chose. See In the Matter of Tariff Filing Requirements for Nondominant Common Carriers, 8 FCC Rcd 6752; August 18, 1993; In the Matter of Policy and Rules Concerning Rates for Dominant Carriers, Part 1 of 3, 4 FCC Rcd 2873, April 17, 1989; and MCI TELECOMMUNICATIONS CORPORATION, Petitioner v. FEDERAL COMMUNICATIONS COMMISSION et al., 765 F.2d 1186; July 9, 1985. Back.

Note 62: Under a narrow reading of the applicable precedent, they would arguably be are constitutionally free to ban dial-a-porn from their networks by refusing to offer billing services to dial-a-porn information providers. See D.C. Circuit Court analysis of Dial Info. Servs. Corp. of N.Y. v. Thornburg, 938 F. 2d 1291 (2nd Cir. 1991); and Carlin Communication Inc., v. Mountain States Telephone & Tel. Co., 827 F. 2d 1291 (9th Cir. 1987); and Information Providers Coalition for the Defense of the First Amendment v. FCC et al. , 928 F. 2d 866 (9th Cir. 1991); in Alliance for Media et al. v. FCC, 10 F. 3d 812 (1993). Back.

Note 63: While the Electronic Communications Privacy Act protects users of E-Mail and bulletin boards against the intentional monitoring of their messages by third parties, employers seeking to protect company information and assets can monitor employee messages on internal e-mail systems. JULIE BENNETT, Firms' rights protected by electronic mail laws, Crain's New York Business, October 8, 1990, TAKEOUT, Telecommunications; Pg. 28. The Electronic Communications Privacy Act of 1986, also allows employers to read employee e-mail messages situated on company computer systems that permit third party access, provided the employee gives permission. ROSALIND RESNICK, The Outer Limits, The National Law Journal, September 16, 1991, Pg. 1 Back.

Note 64: Some commenters take the position that any monitoring of E-Mail or searching through personal employee files is ethically wrong regardless of the law. See GLENN RIFKIN, Do Employees Have a Right to Electronic Privacy? The New York Times, Section 3; Page 8; Column 1; Financial Desk December 8, 1991, Sunday, Late Edition - Final. Aside from questions of ethics, other commenters have argued that the use of monitoring is demoralizing to employees and therefore counter productive. Glenn Rifkin, The ethics gap; Despite growing attention, many IS managers say, 'It's not my job,' Computerworld, October 14, 1991 EXECUTIVE REPORT; IS Ethics; Pg. 83. Back.

Note 65: See, Linda Wilson, ADDRESSING E-MAIL RIGHTS, Information Week, SUPPLEMENT ENTERPRISE COMPUTING; Pg. 54, February 15, 1993; ELECTRONIC MAIL RAISES ISSUES ABOUT PRIVACY, EXPERTS SAY., BNA Daily Labor Report, November 17, 1992 CURRENT DEVELOPMENTS SECTION; More E-mail legal actions, COMPUTER FRAUD & SECURITY BULLETIN, February, 1992; GLENN RIFKIN, Do Employees Have a Right to Electronic Privacy? The New York Times, Section 3; Page 8; Column 1; Financial Desk December 8, 1991, Sunday, Late Edition - Final; Alice Kahn, Careful - The boss might be reading your electronic mail, San Francisco Chronicle, November 20, 1991, Metro Edition Variety; Pg. 3E; JULIE BENNETT, Firms' rights protected by electronic mail laws, Crain's New York Business, October 8, 1990, TAKEOUT; Telecommunications; Pg. 28; and ROSALIND RESNICK, The Outer Limits, The National Law Journal, September 16, 1991, Pg. 1. Back.

Note 66: Victoria Slind-Flor, What is E-Mail Exactly? The National Law Journal, November 25, 1991, p. 3. Back.

Note 67: The Electronic Communications Privacy Act (ECPA) protects all electronic communications systems, including purely internal E-mail systems and public systems from outside intruders. It also protects the privacy of certain messages sent over public electronic mail systems like Compuserve and MCI Mail in much the same manner as telephone calls over public telephone systems are protected. See, Electronic Media Regulation and the First Amendment: Future Perspective, Data Channels (incl Computer Digest); No. 3, Vol. 19; February 3, 1992. See, generally, Linda Wilson, ADDRESSING E-MAIL RIGHTS, Information Week, SUPPLEMENT ENTERPRISE COMPUTING; Pg. 54, February 15, 1993; and Glenn Rifkin, The ethics gap; Despite growing attention, many IS managers say, 'It's not my job' Computerworld, October 14, 1991 EXECUTIVE REPORT; IS Ethics; Pg. 83. The Electronic Communications Privacy Act (ECPA) of 1986, for example, states that electronic mail messages on company computer systems that also permit access from outside can be read by the employer -- but only if the receiver or sender gives permission. See, ROSALIND RESNICK, The Outer Limits, The National Law Journal, September 16, 1991, Pg. 1. WE NEED STATUTORY CITATIONS HERE!!! Also, to the extent that state constitutions afford an employee a right of privacy or speech, they may not be precluded by the ECPA. For instance, a recent attempt to argue federal preemption failed in California. See Victoria Slind-Flor, What is E-Mail Exactly? The National Law Journal, November 25, 1991, p. 3 discussing Alana Shores v. Epson America Inc., SWC112749 and Flanagan v. Epson America, BC007036. Back.

Note 68: Rankin v. McPherson, 483 U.S. 378 (1987). (Public employees may not be fired for making statements about matters of public concern.) See, generally, Cynthia Estlund, What Do Workers Want? Employee Interests, Public Interests, and Freedom of Expression Under the National Labor Relations Act, 140 U. Pa. Rev. 921, 923-924, (January, 1992). However, the question of whether employees can make such statements over the company's e-mail and/or telephone systems has not been addressed to date. Back.

Note 69: See, Estlund, at 924, n8. Also see, Matthew W. Finkin et al., Legal Protection for the Individual Employee 284-286 (1989). Back.

Note 70: Whether a public employee's speech concerns a matter of public interest is determined by the content, form and context of the statement, gleaned from the entire record before the court. See Connick v. Meyers, 461 U.S. 138, 147-148 (1983). Also see 76 Calif. L. Rev. 1109. Even when a public employee's speech addresses a matter of public concern, an employer can restrict the speech in question if the employer perceives that the speech will disrupt the workplace. 61 S. Cal. L. Rev. 3. Back.

Note 71: These include section 7 concerted activities for the purposes of mutual aid, such as union organizing, and striking to improve working conditions. They arguably also include protests and advocacy which predate cognizable collective efforts to organize. See, Estlund, at 924, n8; and Charles Morris, NLRB Protection in the Non-Union Workplace: A Glimpse at a General Theory of Section 7 Conduct, 137 U. Pa. L. Rev. 1673, 1677 (1989). Back.

Note 72: See, Estlund at 924. Also see, Matthew W. Finkin et al., Legal Protection for the Individual Employee 284-286 (1989). Back.

Note 73: One expert has argued that despite the fact that free speech is a constitutional right outside of the workplace, speech can be regulated in the workplace so long as there are legitimate business reasons for doing so. Also, there should be a clear corporate policy enunciated which sets forth the reasons for the restrictions. See ELECTRONIC MAIL RAISES ISSUES ABOUT PRIVACY, EXPERTS SAY., BNA Daily Labor Report, November 17, 1992 CURRENT DEVELOPMENTS SECTION.

The arguable absence of legally sanctioned speech rights has not deterred those who view employee speech as a right. See, Glenn Rifkin, The ethics gap; Despite growing attention, many IS managers say, 'It's not my job' Computerworld, October 14, 1991 EXECUTIVE REPORT; IS Ethics; Pg. 83.

To date businesses have not authored many guidelines for internal corporate E-mail networks. There are, however, as many as 200 state statutes covering e-mail related issues. See ELECTRONIC MAIL RAISES ISSUES ABOUT PRIVACY, EXPERTS SAY., BNA Daily Labor Report, November 17, 1992 CURRENT DEVELOPMENTS SECTION. Back.

Note 74: Similarly, at least one scholar argues that employers are free to invade employee privacy on e-mail as well. Steven B. Winters, Do Not Fold, Spindle or Mutilate: An Examination of Workplace Privacy in Electronic Mail, 1 S. Cal. Interdisciplinary L.J. 85 (1992). Back.

Note 75: [Also cite to IONS controls in earlier footnote.] Other forms of control are used as well. For instance, on the internet, an amalgam of research oriented networks moving towards commercialization, group users sometimes "...gang up on abuses [by a particular user] in a form of citizens' arrests [sic] in which abusers are asked to stop disrespectful behavior." J.A. Savage and Gary H. Anthes, Internet Privatization Adrift, Computerworld, November 26, 1990, p.1. According to the Chair of the Internet Activities board, this form of censure has been effective and no one has been forced off the network. Id. Efforts to police university run systems are less benign and sometimes less successful. [Cite Stanford Free Speech controversy.] Back.

Note 76: A sysop may be held responsible for libelous information residing on its bulletin board systems. If they know the statement to be false, or should have known, or they fail to delete libelous information once notified by the injured party, they may be sued for publication of libel. Because Compuserve exercised no editorial control over information on one of its bulletin board services, it avoided potential liability for libel. See Cubby, Inc. et al. v. Compuserve, et al., 776 F. Supp. 135 (1991). Also see William Jackson, Compuserve Picked its Fight in Libel Case, Business First-Columbus, November 18, 1991, Vol. 8, No. 11, Sec. 1, p. 4; and Brock N. Meeks, As BBSes Mature, Liability Becomes an Issue, InfoWorld, January 22, 1990, p. S14. Also see Alice Kahn, Careful - The boss might be reading your electronic mail, Star Tribune November 20, 1991, Metro Edition Variety; Pg. 3E; and Geoffrey Stone, The First Amendment Is Safe at Prodigy, N.Y. Times, Dec. 16, 1990, at 3-13. Back.

Note 77: MEMORANDUM OPINION AND ORDER In the Matter of AT&T Communications, Contract Tariff F.C.C. No.[s] 2[-13]; and AT&T Communications, Contract Tariff F.C.C. No. 15, et al., 1994 FCC LEXIS 242, RELEASE-NUMBER: FCC 93-537 January 19, 1994. (Affirming the FCC decision to allow AT&T to offer business services under contract tariffs.) The Commission has permitted AT&T to offer services under tariff via individually negotiated contracts provided the contract tariffs are made generally available to similarly situated customers under substantially similar circumstances. See Competition in the Interstate Inter-exchange Marketplace, CC Docket No. 90-132, Report and Order, 6 FCC Rcd 5880, 5896-97, reconsidered in part, Memorandum Opinion and Order, 6 FCC Rcd 7569 (1991), further recon., Memorandum Opinion and Order, 7 FCC Rcd 2677 (1992) (Inter-exchange Order). Back.

Note 78: In the Matter of Tariff Filing Requirements for Non-dominant Common Carriers, 8 FCC Rcd 6752, August 16, 1993. While the FCC has substantially deregulated the telecommunications industry, it cannot compel carriers to eschew the filing of tariffs if they so desire. MCI TELECOMMUNICATIONS CORPORATION, Petitioner v. FEDERAL COMMUNICATIONS COMMISSION et al., 765 F.2d 1186, (July 9, 1985). The Commission has approached the line of absolute deregulation by allowing non-dominant carriers to file tariffs on one day's notice under the rationale that they do not possess sufficient market power to set rates for competitive service offerings. Id. Prior to the Commission's initial foray into deregulation, carriers were required to file tariffs as much as 180 days in advance of their proposed effective date to allow Commission and public review of the proposed offerings. Back.

Note 79: See Phillip S. Cross, Utility Liability Waivers: New Rules for New Technologies, 129 Public Utilities Fortnightly 34, No. 12, (1992) and James Brook, Contractual Disclaimer and Limitation of Liability Under the Law of New York, 49 Brooklyn L. Rev. 1, 22 (1982). Also see generally Liability of Telegraph or Telephone Company for Transmitting or Permitting Transmission of Libelous or Slanderous Messages, 91 ALR3rd 1015 (1993). Telephone companies retain the right to refuse service where a subscriber uses obscene or profane speech. See Allan L. Schwartz, Right of Telephone Company to Refuse, or Discontinue, Service Because of Use of Improper Language, 32 ALR3rd 1041 (1993). Back.

Note 80: Carriers are often successful in limiting their liability for provision of service. M.R.C.S., Inc. v. MCI, 1987 WL 12813 (E.D.La.) (claims against carrier for poor quality transmission is limited to the terms of the tariff.). Also see James Brook, Contractual Disclaimer and Limitation of Liability Under the Law of New York, 49 Brooklyn L. Rev. 1, 22 (1982). However, there are numerous instances in which the courts have refused to allow exculpatory language in carrier tariffs to limit carriers' liability. See In Re Illinois Bell Switching Station Litigation, 1993 WL 323120 (Sup. Crt. Ill.) (1993), (Carrier's exculpatory tariff language limiting liability for consequential damages is not controlling in the face of willful violation of a state statute and regulations requiring utility to provide adequate and efficient, just and reasonable facilities.); Source Assoc. Inc., v. MCI, 1989 WL 134580 (1989) (tariff does not limit liability for willful misconduct); D. Clarico, et al. v. Southwestern Bell Telephone Co. 725 S.W. 2d 304 (1986) (reasonableness of public utility's tariff limitation becomes an issue of fact where utility can but does not timely remedy customer's problem resulting in a loss which exceeds tariff limitation on liability.); Lahke et al., v. Cincinnati Bell, Inc. 439 N.E. 2d 928 (1981) (Carrier's exculpatory tariff language is not controlling in the face of violation of a state statute requiring utility to provide necessary and adequate facilities.). Back.

Note 81: See Chesapeake and Potomac Telephone Co. of Virginia et al., v. U.S. et al., 830 F. Supp. 909 (1993), holding that telco-cable cross-ownership regulation which prohibited telephone companies from providing video programming to subscribers in the telephone companies' service areas contravenes the First Amendment Back.

Note 82: There are numerous instances in which the courts have refused to allow exculpatory language in carrier tariffs to limit carriers' liability. See In Re Illinois Bell Switching Station Litigation, 1993 WL 323120 (Sup. Crt. Ill.) (1993), (Carrier's exculpatory tariff language limiting liability for consequential damages is not controlling in the face of wilful violation of a state statute and regulations requiring utility to provide adequate and efficient, just and reasonable facilities.); Source Assoc. Inc., v. MCI, 1989 WL 134580 (1989) (tariff does not limit liability for willful misconduct); D. Clarico, et al. v. Southwestern Bell Telephone Co. 725 S.W. 2d 304 (1986) (reasonableness of public utility's tariff limitation becomes an issue of fact where utility can but does not timely remedy customer's problem resulting in a loss which exceeds tariff limitation on liability.); Lahke et al., v. Cincinnati Bell, Inc. 439 N.E. 2d 928 (1981) (Carrier's exculpatory tariff language is not controlling in the face of violation of a state statute requiring utility to provide necessary and adequate facilities.).There are also a growing number of cases extending tort liability to providers of goods and services generated via the use of computer and information technologies. See generally Barry B. Sookman, The Liability of Information Providers in Negligence, 5 Computer Law & Practice 141 (1989). Back.

Note 83: "...sysops have the right to run their systems any way they see fit. They have no common carrier' obligations, as do the telephone companies, to transmit everyone's messages." Brock N. Meeks, As BBSes Mature, Liability Becomes an Issue, InfoWorld, January 22, 1990, p. S14. According to some, a sysop is a publisher with the corresponding right to edit or shape the bulletin board's message traffic as they see fit. Id. Back.

Note 84: A sysop might be held responsible for libelous information residing on its bulletin board systems. If they know the statement to be false, or should have known, or they fail to delete libelous information once notified by the injured party, they may be sued for publication of libel. Brock N. Meeks, As BBSes Mature, Liability Becomes an Issue, InfoWorld, January 22, 1990, p. S14. Because Compuserve exercised no editorial control over information on one of its bulletin board services, it avoided potential liability for libel. See, Cubby, Inc. et al. v. Compuserve, et al., 776 F. Supp. 135 (1991). Also see William Jackson, Compuserve Picked its Fight in Libel Case, Business First-Columbus, November 18, 1991, Vol. 8, No. 11, Sec. 1, p. 4. Back.

Note 85: See, Stuart Silverstein, Prodigy Services' Fee Set Up Under Probe, L.A. Times, April 16, 1991, at D1; Geoffrey Stone, The First Amendment Is Safe at Prodigy, N.Y. Times, Dec. 16, 1990, at 3-13. Back.

Note 86: Warren G. Lavey, The Public Policies that Changed the Telephone Industry Into Regulated Monopolies: Lesson from Around 1915, 39 Fed. Com. L. J. 171 (1989). Back.

Note 87: Cite to footnote containing Carlin v. Mountain States & Information Providers. Back.

Note 88: See, Chesapeake and Potomac Telephone Company of Virginia and Bell Atlantic Video Services Company v. United States, et al. in earlier footnotes. Back.

Note 89: See, Edmund Andrews, Ruling Frees Phone Concerns to Offer Cable Programming, New York Times, August 25, 1993, A1, Col. 2; cont.'d on D5, Col. 1. Announcing the decision of the U.S. District Court decision overturning the telephone-cable television cross-ownership ban at 47 U.S.C. @ 533 (b), The Cable Communications Policy Act of 1984. Also see, 47 U.S.C. @ 533 (b), The Cable Communications Policy Act of 1984, prohibiting local telephone companies from providing video programming to potential viewers in its service area directly or indirectly through an entity owned by the telephone company or under its common control. Waivers have been granted under statue and FCC rule. See, FCC Upholds GTE Cerritos Waiver, Grants Another, Broadcasting Magazine, vol. 116, no. 18, p. 136 (May 1, 1989). This change in policy has been opposed by broadcasters, cable operators, and newspaper publishers. More recently, the House of Representatives has begun consideration of H.R. 3636 which would allow the telephone companies to provide video programming to subscribers in the telephone companies' service area. See H.R. 3636, National Communications and Information Infrastructure Act of 1993, sections 201, 651-657. Also see Kate Gerwig, The Beef of the Bills, Communications week, December 20, 1993, Public Networking Update, p. 5; House Lawmakers Seek End to Telephone, Cable Monopolies, Report on AT&T, December 6, 1993, No. 24, Vol. 11; Markey Introduces Telecommunications Infrastructure Bill, Common Carrier Week, November 29, 1993, No. 47, Vol. 10.

The Senate has also begun consideration of a bill introduced by Senator Hollings, which inter alia would also allow telco entry into the video programming market in the telco's service area. Cable operators have lobbied against the time table to telco entry in this bill. See Edmund L. Andrews, A Communications Free-For-All, The New York Times, Friday, February 4, 1994, Section D, p. 1, Col. 3. Back.

Note 90: The National Cable Television Association has gone so far as to intervene on the government's side in its efforts to deny the entry of the Regulated Bell Operating Companies (RBOCs) into the video programming markets existing in the RBOC's service areas. See Edmund L. Andrews, A Communications Free-For-All, The New York Times, Friday, February 4, 1994, Section D, p. 1, Col. 3; Communications Daily, February 11, 1993, Vol. 13, No. 28, p. 8. Newspaper publishers were previously similarly opposed to RBOC entry into the provision of information services. See John Aloysius Farrell, Newspapers Roll Out Lobbyists in Electronic Information Fight, Chicago Tribune, October 27, 1991, Business Section, p. 5, Zone C. More recently, some publishers have favored telco entry into the video programming market based on safeguards included within H.R. 3636. Safeguards would include: telco use of separate video subsidiary with separate accounting, books, customer lists and physical location; establishment of a video platform with 75% of its capacity available to all; and entry by overbuild rather than acquisition except under limited waiver circumstances. See H.R. 3636 sections 201, and 651-657. Also see Kate Gerwig, The Beef of the Bills, Communications week, December 20, 1993, Public Networking Update, p. 5; House Lawmakers Seek End to Telephone, Cable Monopolies, Report on AT&T, December 6, 1993, No. 24, Vol. 11; Markey Introduces Telecommunications Infrastructure Bill, Common Carrier Week, November 29, 1993, No. 47, Vol. 10. Back.

Note 91: Cite to notes and discussion of intelligent network proceedings. In a similar vein, the Regulated Bell Operating Companies are currently seeking modification of proposed legislation that would require them to unbundle their switching and transmission services to allow potential competitors to interconnect at lower cost. See Edmund L. Andrews, A Communications Free-For-All, The New York Times, Friday, February 4, 1994, Section D, p. 1, Col. 3. Back.

Note 92: Cite to subsequent discussion of 1st amendment impact of switched intelligent networks. Back.

Note 93: See Allen S. Hammond, IV, Regulating Broadband Communications Networks, 9 Yale J. on Reg. 181, 183-191, (1992). Back.

Note 94: Id at 196-198 and accompanying notes. Back.

Note 95: See Chesapeake and Potomac Telephone Co. of Virginia et al., v. U.S. et al., 830 F. Supp. 909 (1993). Back.

Note 96: Regarding restrictions on access to on line data systems, see Stuart Silverstein, Prodigy Services Fee Set Up Under Probe, L.A. Times, Apr. 16, 1991, at D2; Michael Schuyler, Systems Librarian and Automation Review: Rights of Computer On Line Service Users, Small Computers in Libraries, Dec. 1990, at 41; Geoffrey Moore, The First Amendment is Safe at Prodigy, N.Y. Times, Dec. 16, 1990, at 3-13.

With regard to discriminatory provision of leased access to cable television, see Donna N. Lampert, Cable Television: Does Leased Access Mean Least Access?, In Cable Television Leased Access: A Report of the Annenberg Washington Program in Communications Policy Studies, 10-12, 15-16 (Northwest U. ed., 1991); Henry Gilgof, Report Card on Cablevision: Mixed Signals: Programs Praised, Fees Criticized, Newsday, Sept. 10, 1990, at 2; Chuck Stogel, Amid Cable TV Tangle, Is Viewer Being Served, Sporting News, Aug., 27, 1990, at 45. The more recent leased access provisions have been upheld as constitutional. See, MOST PROVISIONS OF 1992 CABLE ACT SURVIVE FIRST AMENDMENT CHALLENGE, BNA Antitrust and Trade Regulation Report, September 23, 1993, NEWS & COMMENT SECTION, Vol. 65, No. 1632; Pg. 387. Back.

Note 97: It may be that due to the relative newness of these services and the necessity to have access to the appropriate telephony and computer equipment, access is controlled by economic and market demand factors. Back.

Note 98: Cubby, Inc. et al. v. Compuserve, et al., 776 F. Supp. 135 (1991). Back.

Note 99: Compuserve was deemed a distributor rather than a publisher based on several factors. Based on its determination that Compuserve was a distributor, the court held that Compuserve would have had to have knowledge or reason to know that the remarks of the Journalism Forum were allegedly defamatory. See Cubby, Inc. et al. v. Compuserve, et al., 776 F. Supp. 135 (1991). Back.

Note 100: Medphone Corp., a small New Jersey company sued Peter DeNigris, a 41-year-old Long Island, N.Y., elections forms processor and amateur stock investor, in federal court in New Jersey. Medphone alleged that DeNigris' comments on Money Talk, a bulletin board service operated by Prodigy, helped cause an almost 50% decline in the company's stock in the summer of 1992. Medphone also alleged that DeNigris engaged in libel and securities fraud. AMY HARMON, NEW LEGAL FRONTIER: CYBERSPACE; MILLIONS OF AMERICANS SWAP INFORMATION -- AND BARBS -- ON COMPUTER BULLETIN BOARDS. BUT THE LAWS GOVERNING FREE SPEECH ARE MAKING AN ABRUPT ENTRY INTO THIS SPACELESS, TIMELESS WORLD. L.A. Times, Mar. 19, 1993, Friday, Home Edition Part A; Page 1; Column 1; National Desk. Back.

Note 101: Prodigy is not named as a defendant in the Medphone suit. However, its insistence on screening all electronic messages on its system has led some to argue it is a publisher andtherefore should have some liability for libelous statements made over its facilities. AMY HARMON, NEW LEGAL FRONTIER: CYBERSPACE; MILLIONS OF AMERICANS SWAP INFORMATION -- AND BARBS -- ON COMPUTER BULLETIN BOARDS. BUT THE LAWS GOVERNING FREE SPEECH ARE MAKING AN ABRUPT ENTRY INTO THIS SPACELESS, TIMELESS WORLD. L.A. Times, Mar. 19, 1993, Friday, Home Edition Part A; Page 1; Column 1; National Desk.

The $40 million suit filed against was settled for $1.00 in late November 1993. Fred Volgelstein, Computer Libel Suit Settled, But the Issue Isn't, Newsday, Dec. 28, 1993, p.7; Kurt Eichenwald, Medphone Blames Messenger for its Stock Price Troubles, N.Y. Times, Dec. 28, 1993, section D, p.8. Back.

Note 102: AMY HARMON, NEW LEGAL FRONTIER: CYBERSPACE; MILLIONS OF AMERICANS SWAP INFORMATION -- AND BARBS -- ON COMPUTER BULLETIN BOARDS. BUT THE LAWS GOVERNING FREE SPEECH ARE MAKING AN ABRUPT ENTRY INTO THIS SPACELESS, TIMELESS WORLD. L.A. Times, Mar. 19, 1993, Friday, Home Edition Part A; Page 1; Column 1; National Desk. Back.

Note 103: Miami Herald Publishing Co., v. Tornillo, 418 U.S. 241 (1974). Back.

Note 104: Sable Communications of California v. FCC, 492 U.S. 115 (1989). Back.

Note 105: Leathers v. Medlock, 499 U.S. 439 (1991) (cable) and Red Lion Broadcasting, v. FCC 395 U.S. 367 (1969) (broadcasting). Back.

Note 106: See Metro Broadcasting v. FCC, 497 U.S. 547 (1990); and Red Lion Broadcasting v. FCC 395 U.S. 367 (1969). In Red Lion, the Supreme Court recognized broadcasters as having a qualified constitutional speech right. However, broadcasters' editorial speech rights were held secondary to the rights of listeners and viewers to receive diverse information and ideas. The Court stated in relevant part:

Note 107: See CBS v. Democratic National Committee, 412 U.S. 94 (1973) (broadcasters could not be compelled to accept editorial advertisements covering controversial issues); and Syracuse Peace Council v. FCC 867 F. 2d 654 (1985). Back.

Note 108: Broadcasters may not be compelled to accept editorial advertisements for broadcast when they are already adhering to an obligation to present controversial issues of public importance fairly. They retain the right to decide what controversial "issues are to be discussed and by whom, and when." See, Columbia Broadcasting System, Inc. v. Democratic National Committee. 412 U.S. 94, (1973).

Most recently, the Federal Communications Commission was upheld when it abolished the Fairness Doctrine because it "chilled" broadcasters' exercise of their editorial discretion, caused a reduction in the coverage of controversial issues, and hence deserved the First Amendment interests of the public. See, Syracuse Peace Council, 2 FCC Rcd. 5043, reconsideration denied 3 FCC Rcd. 2035, affirmed, Syracuse Peace Council v. FCC, 867 F.2d 654.

The Commission rested a significant part of its rationale for advocating the repeal of the Fairness Doctrine on technological grounds: "We believe that the dramatic changes in the electronic media, together with the unacceptable chilling effect resulting from the implementation of such regulations as the Fairness Doctrine, form a compelling and convincing basis on which to reconsider First Amendment principles developed for another market." Id. Back.

Note 109: CBS v. Democratic National Committee, 412 U.S. 94 (1973) (broadcasters could not be compelled to accept editorial advertisements covering controversial issues). Back.

Note 110: Action for Children's Television v. FCC, 932 F. 2d 1504 (1991), cert. denied 112 S. Ct. 1282 (1992); and FCC v. Pacifica Foundation, 438 U.S. 726 (1978). Back.

Note 111: See Michael Meyerson, The First Amendment and the Cable Operator: An Unprotected Shield Against Public Access Requirements, 4 Comment 1, (1981). Back.

Note 112: See Berkshire Cablevision of Rhode Island, Inc. v. Burke, 571 F. Supp. 976 (1983), vacated as moot, 773 F.2d 382 (1st Cir. 1985) (holding that mandatory cable channel access rules are constitutional based on theory of economic scarcity.) CF Preferred Communications v City of Los Angeles, 754 F.2d 1396 (9th Cir. 1985), aff'd 476 U.S. 488 (1986) (requiring cable operator to set aside mandatory and leased access channels diminishes the operator's freedom of expression.) Back.

Note 113: must carry. Back.

Note 114: See, the Cable Communications Policy Act of 1984, 47 U.S.C. sections 531 (public, educational and governmental access channels), and 532 (leased access channels). Back.

Note 115: Cable operators engage in constitutionally protected speech activities. See, Leathers v Medlock, 499 U.S. ---,--- (1991); and Los Angeles v. Preferred Communications, Inc. 476 U.S. 494 (1986). However, the courts have not definitively decided whether cable operators are more akin to newspaper publishers or broadcasters. Consequently, the constitutional status of cable operator speech is still unsettled. See, Turner Broadcasting System, Inc. v. FCC, U.S. Law Week, Daily Edition, May 5, 1993, In Chambers Opinion of Chief Justice Rehnquist, Circuit Justice. (Request for injunction against enforcement of must carry section of Cable Act of 1992 legislation denied.) Moreover, the recent and FCC promulgation of rate regulations for cable service coupled with the multi-tiered access requirements render cable more akin to common carriage telephony than the Congress or the courts have been willing to acknowledge. Back.

Note 116: Alliance for Media et al. v. FCC, 10 F. 3d 812 (1993). Back.

Note 117: Id. Back.

Note 118: See, Electronic Media Regulation and the First Amendment: Future Perspective, Data Channels (incl Computer Digest); No. 3, Vol. 19; February 3, 1992. See, generally, Linda Wilson, ADDRESSING E-MAIL RIGHTS, Information Week, SUPPLEMENT ENTERPRISE COMPUTING; Pg. 54, February 15, 1993; and Glenn Rifkin, The ethics gap; Despite growing attention, many IS managers say, 'It's not my job' Computerworld, October 14, 1991 EXECUTIVE REPORT; IS Ethics; Pg. 83. Back.

Note 119: Rankin v. McPherson, 483 U.S. 378 (1987). (Public employees may not be fired for making statements about matters of public concern.) See, generally, Cynthia Estlund, What Do Workers Want? Employee Interests, Public Interests, and Freedom of Expression Under the National Labor Relations Act, 140 U. Pa. Rev.921, 923-924, (January, 1992). However, the question of whether employees can make such statements over the company's e-mail and/or telephone systems has not been addressed to date. Back.

Note 120: The monitoring of employee E-mail is justified as a legitimate method of protecting business assets and prerogatives. The monitoring of employee e-mail is growing, and many CIOs agree that E-mail is part of the business property and, therefore, employers have a legal right to see what it is being used for. Some business executives argue that "If the corporation owns the equipment and pays for the network, that asset belongs to the company, and they have a right to look and see if people are using it for purposes other than running the business."

"Other commenters argue that monitoring e-mail of searching through electronic files is flat out wrong...It's inconceivable to think of a circumstance where you should look at anybody else's electronic mail,...Asking who owns the E-mail or the phone call is the wrong question. A better question is, 'What kind of environment do people work most happily and efficiently in?' Others, including labor unions, have pointed out that employee monitoring can be demoralizing and counterproductive." See, Glenn Rifkin, Do Employees Have A Right of Electronic Privacy? The N.Y. Times, Section 3, p. 8, Col. 1, Dec. 8, 1991. Back.

Note 121: A government employee cannot be fired for non-disruptive exercise of her First Amendment right to speak on matters of public concern. Connick v. Meyers, 461 U.S. 138 (1983). Provided, however, that the employer does not possess an interest in "effective and efficient fulfillment of its responsibilities to the public [which] outweigh the employee's interest in speaking." Id at 150-151 Back.

Note 122: Cynthia Estlund, What Do Workers Want? Employee Interests, Public Interests, and Freedom of Expression Under the National Labor Relations Act, 140 U. Pa. Rev. 921, 923-924, (January, 1992). Back.

Note 123: While arguments for absolute access to the networks of closed user groups seem inappropriate, it is reasonable to require access where the network is an essential facility or is used for anti-competitive purposes. Similarly, it is reasonable to require some appropriate level of access where a compelling public interest in the information to be provided. Back.

Note 124: Cite to text and notes. Back.

Note 125: See generally, Henry H. Perrit, Jr. The Congress, The Courts and Computer Based Communications Networks: Answering Questions About Access and Content Control, Introduction, 38 Vill.L. Rev. 319 (1993). Back.

Note 126: Sections 4 and 5 of the Act require cable systems of a certain size to carry, upon broadcaster request, the signals of certain licensed commercial and non-commercial broadcast stations in the cable operator's market. Prior to enacting the must carry rules as part of the Cable Communications and Consumer Protection Act of 1992, Congress determined that cable operators often enjoy monopoly status as the only multi-channel provider in their respective markets. Congress also determined that the horizontal concentration of cable outlets (outlets owned and operated by multiple system owners or MSOs) and the vertical integration of distribution and programming functions in MSOs combined with monopoly status to create a "cable bottleneck." It was believed that in many cases, this bottleneck precluded broadcasters and programmers unaffiliated with the cable caster from acquiring needed access to cable channels and created opportunities for cable operators to discriminate against broadcasters in order to garner a larger share of advertising revenues available in their market.

Several cable operators among others, challenged the rules alleging that the provisions violate cable operators' first amendment rights to freedom of speech. First, the provisions inhibit cable operators' editorial discretion to determine what video programming messages to provide and what programming not to provide. Turner Broadcasting Systems, Inc. et al. V. Federal Communications Commission, et al., 1993 U.S. Lexis 4339, *10-*11. Second, the provisions force cable operators to devote a portion of their finite channel capacity to one class of speaker-competitors (broadcasters) regardless of what the cable operator may chose to transmit. Id.

The district court panel ruled 2-1 that the provisions are constitutional. According to the court, the provisions are "essentially economic regulation designed to create competitive balance in the video industry as a whole, and to redress the effects of cable operators' anti-competitive practices." Id, at *19-*20.

The Congress, in particular the Senate had reached the same conclusions. It viewed the signal carriage provisions as "economic regulations" intended to promote competition between broadcast and cable distribution systems and enhance viewpoint diversity available to cabled and non-cabled homes.

According to the Senate, Congress enacted the regulations to ensure that cable operators do not exercise their control over their distribution facilities in a manner which discriminated against broadcasters. Senate Report, 138 Cong. Rec. 1133. The Senate also stated that the signal carriage provisions are "not at all based on the content of those signals, but instead...counterbalance cable systems' commercial or economic incentive to exclude...[broadcast signals]. Senate Report No. 102-92, 138 Cong. Rec. 1133, 1189 (1992). Back.

Note 127: Note this decision may be handed down by mid to late April. We should recognize that this section of the article may be changed at that time. Back.

Note 128: Section 7(b)(4)(B) allows franchising authorities to require cable systems to provide public, educational and governmental access channels. Back.

Note 129: Section 9 requires cable operators to make a portion of their channel capacity available for leased access by unaffiliated programmers. Back.

Note 130: Several cable operators among others, challenged the constitutionality of the PEG and leased access provisions. They alleged that the provisions violate cable operators' first amendment rights to freedom of speech in two ways. First, the provisions inhibit cable operators' editorial discretion to determine what video programming messages to provide and what programming not to provide. Second, the provisions force cable operators to devote a portion of their finite channel capacity to other speaker-competitors regardless of what the cable operator may chose to transmit. Daniels Cablevision, 1993 U.S. Dist. Lexis12806, *5-*6.

Applying intermediate scrutiny analysis, the district court found that the provisions are content neutral and serve significant government interests. The leased access provisions were found to enhance the government's interest in market diversity by precluding the cable operator from favoring its affiliated programmers over non affiliated programmers. Id at *13-15. PEG channels were deemed to enhance market diversity by enabling less popular speakers to reach audiences they might not otherwise reach. Id.

The court also found that the access provisions are narrowly tailored to accomplish the government's goals and burden no greater amount of cable operator speech than necessary. The court relied on the fact that PEG channel usage was negotiable between the franchiser and franchisee and that leased channels were assigned on a proportional basis with an absolute limit on the number of channels which a cable operator could be required to provide. Id. The court also viewed the provisions as essentially content neutral. For, while other classes of speakers (non-affiliated commercial programmers as well as residents, educational institutions and governments of the service area), are afforded access, no particular form of programming or viewpoint has historically been associated with such speakers. Id. Back.

Note 131: Challenges have recently been filed in Michigan, Illinois and ___________. Back.

Note 132:Cable television and regional telephone companies have recently proposed numerous mergers. Although many turned out to be short lived in the initial stages, many regulators and industry analysts expect this merger of industries and technologies to result in the provision of interactive, broadband, multimedia services. See, Alan Deutschman and Joyce E. Davis, THE NEXT BIG INFO TECH BATTLE, Fortune, Nov. 29, 1993, p. 39; EDITORIAL, POLICING THE INFORMATION HIGHWAY, Chicago Tribune, Nov. 26, 1993, NORTH SPORTS FINAL EDITION; p. 30, ZONE: N; John Huey, Andrew Kupfer, Jane Furth and John Wyatt , WHAT THAT MERGER MEANS FOR YOU , Fortune November 15, 1993, Domestic Edition p. 82; Jolie Solomon, Daniel Pedersen, Rich Thomas, Carolyn Friday, Peter Katel, Sherry Keene-Osborn, Charles Fleming, Vern E. Smith, Marc Levinson, Michael Meyer and Annetta Miller , Big Brother's Holding Company Newsweek, Oct. 25, 1993, p. 38; JOHN GREENWALD, John F. Dickerson, Thomas McCarroll, and Jeffrey Ressner, WIRED!; Bell Atlantic's bid for cable giant TCI is the biggest media deal in history; it's also a peek at the future, Time, Oct. 25, 1993, p. 50: and Sandra Sugawara and Paul Farhi, Merger to Create a Media Giant; $ 26 Billion Bell Atlantic-TCI Deal Is a Vision of TV's Future , The Washington Post, Oct. 14, 1993 SECTION 1, p. A1. Back.

Note 133: The court in Turner concluded that to the extent the First Amendment is implicated at all by the must carry rules, it is a mere by-product of the fact that cable operators transmit video signals having no other function than the communication of information. As such, the must carry provisions are, in the court's mind, "unrelated to the content of any of the messages the cable operators, broadcasters and programmers have in contemplation to deliver." Id.

And, to the extent that congress may nevertheless be said to have authored content related provisions, the relationship between the provisions and content is negligible, and is based at most on an assumption that broadcasters have as much to say of interest or value as cable operators and diversity is better served by having both available to the public on cable facilities. Id, at *31.

Not surprisingly, the Congress, in particular the Senate stated that the signal carriage provisions are "not at all based on the content of the broadcast signals, but instead ...counterbalance cable systems' commercial or economic incentive to exclude...[broadcast signals]. Senate Report No. 102-92, 138 Cong. Rec. 1133, 1189 (1992). The Senate made only an oblique acknowledgment of the possible relevance of the First Amendment to cable operator speech rights, stating that: "[t]he First Amendment supports government regulations intended to promote diversity of voices, even if some incidental loss of editorial discretion results. Id.

Judge Stephen Williams' dissent took considerable exception to the majority's ruling. Conceding that the problem of cable bottlenecks is real, he questioned the constitutional wisdom of electing must carry regulation rather than modified common carrier regulation consistent with the leased channel rules. Id at *79-*81. According to Judge Williams, under must carry, one group (broadcasters) are selected over another (cable operators) based upon the content of their speech (local broadcaster originated news and public affairs programming). Id at *80-*81. Under leased access, all groups seeking access are provided same on a non-discriminatory basis pursuant to their meeting "neutral criteria" for determining access eligibility. Actions which thwart non-discriminatory access would be subject to the anti-trust laws. Id.

For the dissent, strict scrutiny, is triggered by the rules' impact. First, the must carry rules mandate speech which the cable operators would not otherwise make. Id at *85-*86. They prohibit cable operators from programming a portion of their channels as they might otherwise have done. And second, they do so in a manner which directly burdens the cable operators' exercise of editorial control and speech. Id at *85-*87. As a consequence of the cable operators' loss of control over their channels of transmission, they suffer a direct, palpable, diminution of speech. For the dissent, the must carry rules impose a burden "... on one set of speakers for the direct and explicit advantage of a limited class of their competitors -- a class whose programming must, as a matter of law, include news and public affairs programming, content of a type specified by the government." Id at 91.

He concluded that while the government's interest in diversity was sufficiently compelling, its means of achieving its goal was not sufficiently narrowly tailored to accomplish the government's purpose. First, there is insufficient proof that requiring carriage of broadcasters will increase diversity. Id at *94. Second, there are less burdensome alternatives such as the leased access channel provision, which would accomplish Congress' purpose. Id at *95-*96. Back.

Note 134: ANDREA ADELSON THE MEDIA BUSINESS Radio Station Consolidation Threatens Small Operators, The New York Times April 19, 1993, Monday, Late Edition - Final Section D Page 1 Col. 1 EDMUND L. ANDREWS, THE MEDIA BUSINESS Plan to Ease Rule on Buying Radio Stations, The New York Times, February 27, 1992, Thursday, Late Edition - Final Section D Page 1 Column 3 1985: A year like no other for the fifth estate Changes in the broadcasting industry, Broadcasting, December 30, 1985 Vol. 109 Pg. 38. Back.

Note 135: Speaking at a recent conference on computers, freedom and privacy in San Francisco, Laurence H. Tribe, a professor of constitutional law at Harvard Law School, called for an amendment to the U.S. Constitution that would protect privacy, speech and other constitutional rights made possible in part, but now threatened by, computer technology.

The Tribe Amendment reads, in full:

"This Constitution's protections for the freedoms of speech, press, petition and assembly, and its protection against unreasonable searches and seizures and the deprivation of life, liberty or property without due process of law, shall be construed as fully applicable without regard to the technological method or medium through which information content is generated, stored, altered, transmitted or controlled." In Professor Tribe's view, the current constitutional amendments do not protect the rights of computer users adequately. See, ROSALIND RESNICK, The Outer Limits, The National Law Journal, September 16, 1991, Pg. 1 Back.

Note 136: hammond, perrit, ....... Back.

Note 137: U.S. v. Grinnell Corp., 384- U.S. 563, 570-571 (1966). Back.

Note 138: Otter Tail. Back.

Note 139: See, Harry, A. Jessell, Video dial tone advances at FCC: commissioners propose to establish regulatory framework for telcos to deliver TV services Broadcasting Publications 1991 October 28, 1991 SECTION: Vol. 121 No. 18 Pg. 26 and, CABLE ATTACKS VDT, RURAL EXEMPTION EXTENSION, Television Digest, OCTOBER 19, 1992, THIS WEEK'S NEWS Vol. 32, NO. 42 Pg. 1. Also see, Quello's Concerns: BELL ATLANTIC SAYS TELCOS IN CABLE WILL IMPROVE VIDEO DELIVERY SERVICE Communications Daily, Wednesday, February 1, 1989, Pg. 2 and Charles Mason, Who are the real monopolists? Telcos, NCTA trade charges Telephone companies, National Cable Television Association, Telephony, Vol. 215 No. 26 Pg. 10 December 26, 1988.

Newspaper publishers opposed judicial removal of the prohibition to telco entry into the information services market by supporting introduction of legislation to restrict telco entry. See, Reaction to Court Decision RHCs ASSAIL COOPER BILL ON MFJ AS ANTI-COMPETITIVE Communications Daily, Wednesday, October 9, 1991, Vol. 11, No. 196 Pg. 1. Efforts by legislators and the local telephone industry to have telco entry into the video distribution market become the legislative fix for recent anti-competitive activity by cable operators, was unsuccessful. See, US Congress set to re-examine ban on cable-telephony cross-ownership, FinTech Telecom Markets, January 24, 1991.

Prior activity by cable operators, a group of vertically integrated network owner/information providers, lends substantial credence to those concerns. See, Quello's Concerns: BELL ATLANTIC SAYS TELCOS IN CABLE WILL IMPROVE VIDEO DELIVERY SERVICE Communications Daily, Wednesday, February 1, 1989, Pg. 2. Also see, Charles Mason, Who are the real monopolists? Telcos, NCTA trade charges Telephone companies, National Cable Television Association, Telephony, Vol. 215 No. 26 Pg. 10 December 26, 1988.

Moreover, previous and current anti-competitive activities of local telephone carriers has been cited as well.

Aside from the significant cost of litigation, the difficulty in establishing the relevant market at a time of fluctuating market boundaries is substantial. Back.

Note 140: See, 38 Vill. L. Rev. 571, 575, 584-585. Citing City of Anaheim v. Southern California Edison Co., 955 F.2d 1373, 1380 (9th Cir. 1992) and MCI Communications Corp. v. AT&T, 708 F.2D 1081, 1123-33, (7th Cir. 1983). Back.

Note 141: The FCC defined enhanced services as services "which employ computer processing applications that act on the format, content, code, protocol or similar aspect of the subscriber's transmitted information provide the subscriber additional, different, or restructured information or involve subscriber interaction with stored information." 47 C.F.R. @ 64.702(a) (1990). Back.

Note 142: At least one court was highly skeptical of the ONA plan's efficacy whether in its Computer II form or its subsequent Computer III form. See U.S. v. Western Electric et al., 673 F. Supp. 525 (1987). Ironically, the same mechanisms of the ONA plans which Judge Harold Greene found so ineffective in 1987, are the very mechanisms the FCC proposes to implement under its post California v. FCC, modified Computer III regulations. Back.

Note 143: In the Computer III decision, the FCC reversed its previous requirement that the RBOCs could provide enhanced services only through a structurally separate subsidiary corporation. See Second Computer Inquiry, 77 F.C.C.2d 384, recon., 84 F.C.C.2d 50 (1980), clarified on further recon., 88 F.C.C.2d 512 (1981), aff'd sub nom. Computer and Communications Indus. Assn v. FCC, 693 F.2d 198 (D.C. Cir. 1982), cert. denied, 461 U.S. 938 (1983) BOC Separation Order, 95 F.C.C.2d 1117 (1983), aff'd sub nom. Illinois Bell Tel. Co. v. FCC, 740 F.2d 465 (7th Cir. 1984), recon. denied, 49 Fed. Reg. 26,056 (June 26, 1984), aff'd sub nom. North American Telecommunications Assn v. FCC, 772 F.2d 1282 (7th Cir. 1985).

The FCC determined that it would be sufficient for the RBOCs to provide enhanced services as integrated entities and offer their "unbundled" basic network functions to other enhanced service providers on a tariffed, nondiscriminatory basis. See, Computer III, 104 F.C.C.2d at 964-65, 1063-66. See Filing and Review of Open Network Architecture Plans, 4 FCC Rcd. 1 (1988), recon., 5 FCC Rcd. 3084, amended plans conditionally approved, 5 FCC Rcd. 3103 (1990). The FCC concluded that requirement to unbundle the network functions, combined with accounting and other non-structural safeguards would obviate the need to rely on the separate subsidiary requirement to prevent the RBOCs from engaging in access discrimination and anti-competitive cross-subsidization which would favor their enhanced service operations. Computer III, 104 F.C.C.2d at 1007-12, 2 FCC Rcd. at 3039.

The U.S. Court of Appeals for the Ninth Circuit vacated and remanded the FCC's Computer Ill rulings. The Ninth Circuit held that the FCC had not provided sufficient support in the record for its conclusion that structural separation was no longer needed to prevent RBOC attempts at cross subsidization and that accounting safeguards alone would be sufficient. California v. FCC, 905 F.2d at 1238-39. The court concluded instead that the FCC's proposed policy to allow the telephone companies into the enhanced services market on a vertically integrated basis would increase the BOCs' incentives to engage in anti-competitive activity to maintain or increase their market share for enhanced services. Id. Also see, PUBLIC SERVICE COMMISSION PAPER ATTACKS COMPUTER III RULING, Worldwide Videotex Tele-Service News No. 7, July, 1993 Vol. 5.

In the FCC's Computer III proceedings subsequent to the court decision, the comments were predictable. "The Bell regional holding companies (RHC) endorsed, and enhanced service providers (ESP) opposed, the FCC's hopes to slightly modify its accounting and non-discrimination rules." See BOC WEEK, RHCS, ESPS, STATES FORM FAMILIAR LINES IN COMPUTER III REMAND, March 18, 1991 SECTION: No. 11, Vol. 8. Subsequent to the court's decision, the FCC quickly reinstated its ONA requirements including its waiver of the structural safeguards. It required that the RBOCs implement their plans to offer unbundled services regardless of its ultimate decision on structural separation. See Computer III Remand Proceedings, 5 FCC Rcd. 7719 (1990) and 6 FCC Rcd. 174, (1990). Pending the ultimate decision, the RBOCs were allowed to continue offering enhanced services (previously approved by the FCC, as fully integrated companies.

The decision was not well received in some quarters. For instance, in response to the FCC's decision, the District of Columbia Pubic Service Commission, took issue with the FCC's justifications for removing the separate subsidiary requirement. The DCPSC argued that "it is clear that a separate subsidiary structure for the provision of new (competitive) services by the RBOCs ("Regional Bell Operating Companies" or Telcos) does not inhibit the introduction of new services, does not impede competition in certain markets and does not cause consumer disruptions." See, Robert J. Butler, In the Aftermath of California v. FCC: Computer III Remand Proceedings Pose Difficult Policy Choices For the Enhanced Services Industry The Computer Lawyer May, 1991 TELECOMMUNICATIONS Vol. 8, No. 5 Pg. 24. (Quoting the District of Columbia PSC). Back.

Note 144: For instance, Soldier of Fortune Magazine was recently held liable for an advertisement it published which the court interpreted as inter alia soliciting contract killing jobs. See, Ronald Smothers, Soldier of Fortune Magazine Held Liable for Killer's ad, New York Times, Wednesday August 19, 1992, Late Edition, Section A, page 18, Column 5. Also see discussion of Compuserve and Prodigy in footnotes ____ - ____, infra. Back.

Note 145: "...Providers of goods and services created using computer and information technologies face increasingly greater exposure to liability when things go awry." See Barry Sookman, "The Liability of Information Providers in Negligence," in Computer Law & Practice, Volume 5, pp. 141-146. Back.

Note 146: Cite to Hinsdale case in earlier footnote. Back.

Note 147: Christy Cornell Kunin, Unilateral Tariff Exculpation in the Era of Competitive Telecommunications, 41 Cath. L. Rev. 907 (1992). Back.

Note 148: 47 USC section 414 (1988). Back.

Note 149: Kunin @ 914-915, and 926. Back.

Note 150: It has been aptly observed that "... the law, by protecting freedom to contract does nothing to prevent freedom of contract from becoming a one-sided privilege. Society, by proclaiming freedom of contract, guarantees that it will not interfere with the exercise of power by contract. Freedom of contract enable enterprises to legislate by contract and, what is even more important, to legislate in a substantially authoritarian manner without using the appearance of authoritarian forms." See Kessler, Contracts of Adhesion-Some Thoughts About Freedom of Contract, 43 Colum. L. Rev. 629, 640-641 (1943), cited in Summers and Hillman, Contract and Related Obligation: Theory, Doctrine and Practice, chpt. 5., p. 585 (1987). Back.

Note 151: Re Equicom Communications, Inc., 109 Pur 4th 540 (1990), cited in Phillip S. Cross, Utility Liability Waivers: New Rules for New Technologies, 129 Pub. Util. Fort. 34, No. 12 (1992). Back.

Note 152: One of the current policy goals in telecommunications regulations is to shift current local exchange telecommunications network architecture away from a reliance on centralized network switching systems with limited flexibility to accommodate the creation of new services. The intent is to build networks in which the software "intelligence" is distributed throughout the network and often created and controlled by users rather than switch vendors and telecommunications providers. This shift in network paradigms is the essence of the movement from current telecommunications networks to advanced intelligent networks (AIN).

Ultimately, the anticipated benefit of AIN is to permit telecommunications and enhanced service providers as well as their respective customers, to enhance existing services or create new ones to meet the customers" individual needs. Steven Titch, The Pathway to Freedom Local Exchange Carriers, Advanced Intelligent Networks, Telephony, Vol. 220, No. 15, p. 30, April 15, 1991.

There is significant disagreement over the speed and manner of AIN deployment, as well as the manner in which carriers and users may gain access to future AINs. Perhaps the former Chief of the Federal Communications Commission's Common Carrier Bureau summarized the dispute best:

While the Regulated Bell Operating Companies (RBOCs) and Enhanced service providers (ESPs) view AIN as a means to effectively respond to consumer demand, consumers and regulators may see AIN as a means of enhancing consumer control over the network and the information flowing over it. This conflict of interests and goals is currently being played out in the Federal Communications Commission's Intelligent Network and Open Network Architecture proceedings. Back.

Note 153: There is significant uncertainty regarding how the public may ultimately react to and use the broadband multi-media capabilities which may be provided by the electronic superhighway. Nevertheless there is also substantial concern that, left to the vagaries of discernible short market demand, industry will not provide an infrastructure capable of extending broadband, multi-media interactive capabilities and services to most if not all network users. Back.

Note 154: There are several arguments which have arisen with regard to the viability of scarcity as a justification for future regulation of communication and telecommunication media. Some argue that choice of the appropriate technology can enhance opportunities for innovation and obviate the need for regulatory responses to access concerns raised by the existence of scarce transmission capacity. "We need to develop an information network architecture that supports the "garage shop" creative talents in terms of access to the network, and the best way to do this is opt for a switched, rather than a channel, architecture." Switched systems, whereby information is routed to a given address on demand, reduce the amount of bandwidth required to the home -- thus allowing copper wire to be perfectly adequate for the last 1,000 feet. Channel architectures, in which all channels are fed to the set top decoder, require greater bandwidth and will always result in channel scarcity." Comments of Mitch Kapor, Chairman, Electronic Frontier Foundation, in Rockley L. Miller, Digital World, Multimedia & Videodisc Monitor July, 1993 No. 7, Vol. 11.

For different reasons, one noted commenter argues that spectrum scarcity as well as the current inability to build fiber to the home is a political rather than a technical or economic problem due to poor regulatory policy choices. See GEORGE GILDER'S TELECOSM "The New Rule of Wireless," Forbes, March 29, 1993, ASAP Section Pg. 96.

One possible combination of the two above observations on scarcity is evident in the recent observations of Professor Edwin Baker. He emphasizes what Kapor implies and Gilder states explicitly, that government choices regarding structural regulation can create transmission scarcity. Baker goes on to note that the scarcity is then managed by use of other structural regulation which seeks to manage the impact of the scarcity consistent with first amendment values. See C. Edwin Baker, Merging Phone and Cable, presented at the CITI Conference on Cable Television and the First Amendment, February 21, 1994, citing C. Edwin Baker, Human Liberty and Freedom of Speech, 1989. Back.


Columbia University Working Papers Server Project