This document analyzes the legal and policy issues surrounding wireless advertising messaging (WAM). It discusses how WAM grew to an epidemic level in Japan and Europe due to a lack of regulation. While not yet a major problem in the US, WAM is expected to grow significantly. The document examines efforts by the FTC, FCC, states, and wireless industry to regulate WAM through legislation, guidelines, and self-regulation. It concludes that the most effective solution will likely involve a combination of advertising association guidelines, industry self-regulation, and targeted federal laws and oversight.
Fcc open internet proceeding michael horneyMichael Horney
1) The document is a letter from Michael J. Horney, a 23-year-old economics graduate, to the FCC regarding its open internet proceeding.
2) Horney argues that a free market approach to broadband regulation best allows consumer preferences to be expressed, citing examples of innovation and investment under less regulated models.
3) He contends there is no evidence of market failure in broadband and that further regulation could stifle innovation, investment, and consumer choice, pointing to negative outcomes from more regulated approaches in other countries.
T-Mobile US is focused on capitalizing on growing demand for LTE/4G technology by 2021. Its branded postpaid and prepaid segments have significantly outperformed competitors over the last three years due to initiatives like the Un-carrier strategy. T-Mobile has also invested heavily in expanding and enhancing its LTE network, covering over 305 million people in the US as of 2015 with plans to continue significant investment through 2016-2017 to further improve coverage and network quality.
ADV 126 Media Planning & Buying - T-MobileKelly Hsu
This document provides a situation analysis and media plan for T-Mobile US Inc. It discusses T-Mobile's history and background, current market position as the 4th largest wireless carrier, customer satisfaction rankings, and competitive pricing strategies. A SWOT analysis identifies strengths in customer service, pricing, and contract flexibility, as well as weaknesses in coverage, small market share, and lack of iPhone distribution initially. Opportunities include the MetroPCS merger, un-carrier strategies, and increasing subscribers. Threats are larger competitors like Verizon and AT&T, communication apps, and landline providers. The target audience is primarily ages 25-45.
Bjmc i, dcm, unit-iv, media regulation and censorshipRai University
This document discusses media regulation and censorship in India. It covers several key points:
1) India has implemented a Conditional Access System (CAS) which encrypts television channels, requiring subscribers to have a set-top box to decrypt channels they have paid for.
2) CAS aims to give consumers more choice over which channels they pay for, increase transparency in the subscription system, and ensure broadcasters and operators are accurately compensated.
3) However, some argue CAS could negatively impact consumers by requiring them to purchase set-top boxes, and broadcasters if it reduces their subscriber bases.
4) The document examines debates around balancing media freedoms with reasonable restrictions, and ensuring access to information is not
Contact Center Compliance Webinar 10 26 11 Direct From The Ftc And FccRyan Thurman
The document summarizes a compliance webinar that discussed recent presentations from the FTC and FCC on contact center regulations. It provides an agenda that includes updates on FTC and FCC enforcement actions against illegal robocalls and do not call violations. The webinar also featured speakers from the FTC, FCC, and ATA discussing issues like broadband access, job growth in contact centers, spectrum allocation, and pending rulings on liability and pre-recorded calls.
COMMISSIONER THOMAS J. ROSCH FEDERAL TRADE COMMISSION-FTC, USA
J. Thomas Rosch was sworn in as a Commissioner of the Federal Trade Commission January
5, 2006, to a term that expires in September 2012.
Rosch joined the FTC from the San Francisco office of Latham & Watkins, where he was the
former managing partner and most recently a partner, working in the firm‟s antitrust and trade
practices group. Rosch served as chair of the American Bar Association‟s Antitrust Section in
1990, and he has chaired the California Bar Association‟s Antitrust Section. He served as the
FTC‟s Bureau of Consumer Protection director from 1973 to 1975, and in 1989 was a member
of the Special Committee to Study the Role of the FTC.
Nationally regarded for his antitrust and trade regulation law expertise and as a Fellow of the
American College of Trial Lawyers for more than 20 years, he has been lead counsel in more than 100 federal
and state court antitrust cases and has more than 40 years experience before the Bar. In 2003, Rosch was
honored as Antitrust Lawyer of the Year by the California State Bar Antitrust Section. He obtained his LLB from
Harvard University in 1965 and was a Knox Fellow at Cambridge in 1962.
Rosch is married with two children and four grandchildren.
Fcc open internet proceeding michael horneyMichael Horney
1) The document is a letter from Michael J. Horney, a 23-year-old economics graduate, to the FCC regarding its open internet proceeding.
2) Horney argues that a free market approach to broadband regulation best allows consumer preferences to be expressed, citing examples of innovation and investment under less regulated models.
3) He contends there is no evidence of market failure in broadband and that further regulation could stifle innovation, investment, and consumer choice, pointing to negative outcomes from more regulated approaches in other countries.
T-Mobile US is focused on capitalizing on growing demand for LTE/4G technology by 2021. Its branded postpaid and prepaid segments have significantly outperformed competitors over the last three years due to initiatives like the Un-carrier strategy. T-Mobile has also invested heavily in expanding and enhancing its LTE network, covering over 305 million people in the US as of 2015 with plans to continue significant investment through 2016-2017 to further improve coverage and network quality.
ADV 126 Media Planning & Buying - T-MobileKelly Hsu
This document provides a situation analysis and media plan for T-Mobile US Inc. It discusses T-Mobile's history and background, current market position as the 4th largest wireless carrier, customer satisfaction rankings, and competitive pricing strategies. A SWOT analysis identifies strengths in customer service, pricing, and contract flexibility, as well as weaknesses in coverage, small market share, and lack of iPhone distribution initially. Opportunities include the MetroPCS merger, un-carrier strategies, and increasing subscribers. Threats are larger competitors like Verizon and AT&T, communication apps, and landline providers. The target audience is primarily ages 25-45.
Bjmc i, dcm, unit-iv, media regulation and censorshipRai University
This document discusses media regulation and censorship in India. It covers several key points:
1) India has implemented a Conditional Access System (CAS) which encrypts television channels, requiring subscribers to have a set-top box to decrypt channels they have paid for.
2) CAS aims to give consumers more choice over which channels they pay for, increase transparency in the subscription system, and ensure broadcasters and operators are accurately compensated.
3) However, some argue CAS could negatively impact consumers by requiring them to purchase set-top boxes, and broadcasters if it reduces their subscriber bases.
4) The document examines debates around balancing media freedoms with reasonable restrictions, and ensuring access to information is not
Contact Center Compliance Webinar 10 26 11 Direct From The Ftc And FccRyan Thurman
The document summarizes a compliance webinar that discussed recent presentations from the FTC and FCC on contact center regulations. It provides an agenda that includes updates on FTC and FCC enforcement actions against illegal robocalls and do not call violations. The webinar also featured speakers from the FTC, FCC, and ATA discussing issues like broadband access, job growth in contact centers, spectrum allocation, and pending rulings on liability and pre-recorded calls.
COMMISSIONER THOMAS J. ROSCH FEDERAL TRADE COMMISSION-FTC, USA
J. Thomas Rosch was sworn in as a Commissioner of the Federal Trade Commission January
5, 2006, to a term that expires in September 2012.
Rosch joined the FTC from the San Francisco office of Latham & Watkins, where he was the
former managing partner and most recently a partner, working in the firm‟s antitrust and trade
practices group. Rosch served as chair of the American Bar Association‟s Antitrust Section in
1990, and he has chaired the California Bar Association‟s Antitrust Section. He served as the
FTC‟s Bureau of Consumer Protection director from 1973 to 1975, and in 1989 was a member
of the Special Committee to Study the Role of the FTC.
Nationally regarded for his antitrust and trade regulation law expertise and as a Fellow of the
American College of Trial Lawyers for more than 20 years, he has been lead counsel in more than 100 federal
and state court antitrust cases and has more than 40 years experience before the Bar. In 2003, Rosch was
honored as Antitrust Lawyer of the Year by the California State Bar Antitrust Section. He obtained his LLB from
Harvard University in 1965 and was a Knox Fellow at Cambridge in 1962.
Rosch is married with two children and four grandchildren.
Ben Worthy, UCL: The impact of the Freedom of Information ActLGIU
The document analyzes the impact of the Freedom of Information Act (FOI) on local government in England based on interviews with local authorities and analysis of FOI data and media coverage. It finds that FOI has increased transparency but not significantly changed how local governments work. FOI requests are increasing each year but mostly for niche issues of private interest. FOI is used alongside other mechanisms to increase accountability but has not substantially improved public understanding or participation in local government decision-making. The future of FOI likely involves more online publication of spending data but it is unclear if it will engage more of the public on a large scale.
The document discusses issues with Section 301 of the 1996 Telecommunications Act regarding cable reform. It argues that while the Act aimed to increase competition, it has instead allowed consolidation resulting in limited choices and high prices for consumers. Specifically, Section 301's broad categorization of equipment costs and assumption that installation charges would not vary significantly have not accounted for technological changes and local monopolies. The document proposes amendments to Section 301, such as more specific equipment categorization based on type and usage, and holding companies accountable if providing faulty equipment or limited service choices due to local monopolies. The goal is to update the law for current market realities and benefit consumers.
Comcast threatened to block Netflix if a fee was not paid by Level 3, a partner in Netflix's online streaming. This raised concerns about net neutrality and allowing internet providers to control access. The FCC wants to regulate broadband to prevent discrimination, but was rebuked by a court. The FCC may allow different service levels but forbid blocking content. There are ethical issues around who controls internet access and preventing monopolies to ensure a free and open internet. Limited FCC oversight may be needed to enforce net neutrality and fair competition.
The global wireless data market grew rapidly in 2009, with global mobile data revenues reaching $220 billion. While most regions experienced declines in service revenues due to the recession, countries like the US, China, India, and Japan saw little slowdown. The number of mobile subscriptions surpassed 4.6 billion globally. India continues to be the fastest growing market, adding over 177 million subscribers in 2009 compared to China's 106 million.
This document provides an overview of the telecommunications industry from 1997-2002, including: massive investments totaling $880 billion that led to overcapacity; the bursting of the dot-com bubble in 2000 that wiped out $2 trillion in market value; and the bankruptcies and job losses that resulted from the telecom bust. It also summarizes key segments of the industry like local exchange, long distance, wireless, and enterprise markets during this period. The document is used to provide context for the challenges facing Telezoo.com.
The document discusses the debate around net neutrality. It explores the perspectives of internet service providers (ISPs) who want to charge content providers fees for priority bandwidth, versus net neutrality advocates who believe this would negatively impact consumers and competition. The author also shares their free market views, arguing that more competition among ISPs and letting private companies address bandwidth and piracy issues is preferable to government regulation.
This document discusses alternatives to government-run broadband networks and analyzes why municipal broadband projects often fail. It argues that private sector companies operating in a competitive environment can more efficiently meet customer needs and respond to market changes. Rather than investing taxpayer money in government broadband operations, local governments should make private sector broadband expansion more attractive by reducing fees and regulations like franchise fees and pole attachment costs that were established during the monopoly era. The emergence of Google Fiber is pushing some cities to reform these types of policies to attract broadband investment from all providers, not just Google.
AT&T is a major telecommunications company that provides services to consumers and businesses in the US and internationally. Its services include phone, wireless, internet, TV, security, and equipment. As of 2010, AT&T had 24 million consumer phone and 14 million broadband customers in the US. It also owns Cingular Wireless, the second largest carrier with 95 million subscribers. In 2011, AT&T planned to acquire T-Mobile USA for $39 billion to expand its wireless business further.
Community Broadband Snapshot Report™ How to Navigate, Mitigate or Eliminate t...Ed Dodds
This document provides an analysis of state restrictions on public broadband networks in the United States. It discusses the challenges these restrictions pose and the importance of high-speed internet access. 21 states have laws that act as barriers to public broadband initiatives, ranging from procedural requirements to outright bans. The document examines potential strategies for navigating, mitigating or eliminating the impacts of these state laws, from lobbying the federal government to changing state legislation. It also highlights the economic and social benefits of public broadband networks based on evidence from existing initiatives. The overall aim is to inform efforts to roll back restrictive state laws and allow communities to expand broadband access.
The document discusses the topic of net neutrality and analyzes arguments for and against it. It begins by defining net neutrality as the principle that internet service providers should allow equal access to all legal online content without favoring some sources over others. The document then examines debates around whether net neutrality regulations in the US successfully create a truly equal internet or if they are an "illusion." It also explores the importance of net neutrality for minority communities and small businesses. Finally, the document outlines current US policies, including net neutrality rules passed by the FCC, and concludes that net neutrality needs to be protected to maintain equality and prevent large corporations from gaining control over internet access.
Parks Associates Market Snapshot Disney Apple TVElizabeth Parks
This Market Snapshot by International research firm Parks Associates highlights the impact of the entry of Disney+ and Apple TV+ in OTT market, including insights into the factors driving their growth. Data presented in this Market Snapshot were drawn primarily from an online survey of 10,000 consumers fielded between March 8th and April 3rd to heads of broadband households, after the COVID-19 crisis had begun in the United States.
The document analyzes AOL's issues after its merger with Time Warner and its efforts to transform from an "ice-age" internet service provider. It discusses the unsuccessful merger between AOL and Time Warner in 2000 due to clashing cultures and strategies. It also explores AOL's current strategy of broadening its product line beyond internet services to include content, advertising, and applications. The document recommends that AOL partner with a media company like Hulu to increase brand awareness and subscribers as it transitions from an ISP to a digital media company.
This document summarizes a study on communications access and usage among low-income populations in Trinidad and Tobago. The study found that mobile phones have become the primary form of communication, with ownership rates among the poor being half of national levels. It also found that mobile penetration exceeds fixed line penetration among the poor. Mobile phones are primarily used for voice calls, averaging over 3 calls per day. Barriers to communications access and future adoption are also examined.
The Supreme Court approved online sales taxes and a dangerous email bill advanced in California. The Supreme Court ruled states can collect sales tax from online retailers without a physical presence. A bill in California seeks to greatly expand the state's commercial email law and impose liability, though it was amended due to opposition. The European Union passed measures that could require platforms to pay for links to content and use automatic filtering, raising censorship concerns.
The document discusses the role and influence of mass media in society. It covers various topics such as freedom of the press, censorship, different types of media like newspapers, television, and the internet. It also discusses how media companies and politicians can influence public opinion through bias, spin doctoring of stories, and the selective reporting of information and events.
The document discusses the history of net neutrality in the United States. It describes how (1) the issue first emerged in 2002; (2) supporters argued the open internet must be preserved while opponents said regulation was unnecessary; and (3) the policy debate continued through the 2000s with various laws and court rulings affecting the FCC's ability to enforce net neutrality principles.
Access to telephony for low-income groups is largely based on different strategies of mobile telephony usage. The main goal of this research project is to explore the strategies employed by the poor in Latin America and the Caribbean to access and use mobile telephony services, as well as to identify the major market and regulatory
barriers for increased penetration and usage. More generally, it seeks to contribute to the discussion on how access to mobile telephony contributes to improving the livelihoods of the poor –what we call mobile opportunities.
Our results show that mobile telephony is highly valued by the poor as a tool for strengthening social ties and for increased personal security, and that it is beginning to prove useful for enhancing business and employment opportunities. Overall, the survey results suggest that the acquisition of mobile phones by the poor has an economic
impact reflected mainly in improved social capital variables such as the strengthening of trust networks and better coordination of informal job markets. These findings reveal the continued need to develop innovative business models that extend the market frontier for mobile telephony. They
also highlight the urgent need to rethink public policies that are premised on the mobile phone as a luxury good. Clearly, for the poor, mobile telephony has long been the most cost-effective and accessible alternative.
Shared Services Canada's $398 million contract with Bell Canada to consolidate the federal government's 63 email systems into a single system has faced significant delays, disappointing SSC. The project was supposed to start transitioning departments in March 2014 but has yet to begin. SSC blames Bell for missing deadlines but will not provide specifics. The delay raises concerns about potential lack of transparency and outsourcing expertise currently existing within the public service. There are also questions about how the private sector will handle sensitive government information and whether the needs of Canadians are being prioritized over corporate profits.
This upload is an article in InterMEDIA, July 2019 (www.iicom.org) by Russell Southwood, Balancing Act and Steve Song. It looks at the crisis in African telecoms and internet regulation and suggest a number of different approaches that might help overcome current barriers to wider access.
Presentation by Monique Singh illustrating and delving into the transitions AOL had to take in order to stay relevant in the Internet universe as new technologies and the economy changed.
Universal service a new definition james alleman, paul rappoport, aniruddha...ACORN-REDECOM
The concept of “universal service obligation” (USO) has been around for decades; however, its definition continues to
change. The notion that the last mile of fixed line access should be subsidized has spread around the world, despite well
reasoned arguments and empirical evidence that the policy is and was a failure. It created artificial competition. Now the
concept is becoming bifurcated. Should wireless and/or broadband services be included in the definition of universal
services?
This paper is in two parts: What should constitute USO definitions and how, if at all, it should be implemented. Many
consumers are “cutting-the-cord” and moving directly to alternative services. In this ubiquitous communications
environment the whole set of possible communications methods should be considered when defining “universal
connectivity.” Second, no one service or technology should be relied on to support subsidies.
The second part of the paper addresses the policy question: How should this connectivity be achieved?
A week is a long time in computer ethicsUltraUploader
Over the course of a week, numerous news articles reported on various ethical issues arising from the use of technology. Issues discussed included intellectual property theft through peer-to-peer file sharing and concerns over globalization. Other topics included the growing problems of identity theft, computer viruses and hacking, junk mail and spam, censorship and surveillance. The week demonstrated the many challenges posed by technology and how each issue often has countervailing perspectives around issues like freedom of expression, prevention versus cure of computer misuse, and information access versus information control.
Ben Worthy, UCL: The impact of the Freedom of Information ActLGIU
The document analyzes the impact of the Freedom of Information Act (FOI) on local government in England based on interviews with local authorities and analysis of FOI data and media coverage. It finds that FOI has increased transparency but not significantly changed how local governments work. FOI requests are increasing each year but mostly for niche issues of private interest. FOI is used alongside other mechanisms to increase accountability but has not substantially improved public understanding or participation in local government decision-making. The future of FOI likely involves more online publication of spending data but it is unclear if it will engage more of the public on a large scale.
The document discusses issues with Section 301 of the 1996 Telecommunications Act regarding cable reform. It argues that while the Act aimed to increase competition, it has instead allowed consolidation resulting in limited choices and high prices for consumers. Specifically, Section 301's broad categorization of equipment costs and assumption that installation charges would not vary significantly have not accounted for technological changes and local monopolies. The document proposes amendments to Section 301, such as more specific equipment categorization based on type and usage, and holding companies accountable if providing faulty equipment or limited service choices due to local monopolies. The goal is to update the law for current market realities and benefit consumers.
Comcast threatened to block Netflix if a fee was not paid by Level 3, a partner in Netflix's online streaming. This raised concerns about net neutrality and allowing internet providers to control access. The FCC wants to regulate broadband to prevent discrimination, but was rebuked by a court. The FCC may allow different service levels but forbid blocking content. There are ethical issues around who controls internet access and preventing monopolies to ensure a free and open internet. Limited FCC oversight may be needed to enforce net neutrality and fair competition.
The global wireless data market grew rapidly in 2009, with global mobile data revenues reaching $220 billion. While most regions experienced declines in service revenues due to the recession, countries like the US, China, India, and Japan saw little slowdown. The number of mobile subscriptions surpassed 4.6 billion globally. India continues to be the fastest growing market, adding over 177 million subscribers in 2009 compared to China's 106 million.
This document provides an overview of the telecommunications industry from 1997-2002, including: massive investments totaling $880 billion that led to overcapacity; the bursting of the dot-com bubble in 2000 that wiped out $2 trillion in market value; and the bankruptcies and job losses that resulted from the telecom bust. It also summarizes key segments of the industry like local exchange, long distance, wireless, and enterprise markets during this period. The document is used to provide context for the challenges facing Telezoo.com.
The document discusses the debate around net neutrality. It explores the perspectives of internet service providers (ISPs) who want to charge content providers fees for priority bandwidth, versus net neutrality advocates who believe this would negatively impact consumers and competition. The author also shares their free market views, arguing that more competition among ISPs and letting private companies address bandwidth and piracy issues is preferable to government regulation.
This document discusses alternatives to government-run broadband networks and analyzes why municipal broadband projects often fail. It argues that private sector companies operating in a competitive environment can more efficiently meet customer needs and respond to market changes. Rather than investing taxpayer money in government broadband operations, local governments should make private sector broadband expansion more attractive by reducing fees and regulations like franchise fees and pole attachment costs that were established during the monopoly era. The emergence of Google Fiber is pushing some cities to reform these types of policies to attract broadband investment from all providers, not just Google.
AT&T is a major telecommunications company that provides services to consumers and businesses in the US and internationally. Its services include phone, wireless, internet, TV, security, and equipment. As of 2010, AT&T had 24 million consumer phone and 14 million broadband customers in the US. It also owns Cingular Wireless, the second largest carrier with 95 million subscribers. In 2011, AT&T planned to acquire T-Mobile USA for $39 billion to expand its wireless business further.
Community Broadband Snapshot Report™ How to Navigate, Mitigate or Eliminate t...Ed Dodds
This document provides an analysis of state restrictions on public broadband networks in the United States. It discusses the challenges these restrictions pose and the importance of high-speed internet access. 21 states have laws that act as barriers to public broadband initiatives, ranging from procedural requirements to outright bans. The document examines potential strategies for navigating, mitigating or eliminating the impacts of these state laws, from lobbying the federal government to changing state legislation. It also highlights the economic and social benefits of public broadband networks based on evidence from existing initiatives. The overall aim is to inform efforts to roll back restrictive state laws and allow communities to expand broadband access.
The document discusses the topic of net neutrality and analyzes arguments for and against it. It begins by defining net neutrality as the principle that internet service providers should allow equal access to all legal online content without favoring some sources over others. The document then examines debates around whether net neutrality regulations in the US successfully create a truly equal internet or if they are an "illusion." It also explores the importance of net neutrality for minority communities and small businesses. Finally, the document outlines current US policies, including net neutrality rules passed by the FCC, and concludes that net neutrality needs to be protected to maintain equality and prevent large corporations from gaining control over internet access.
Parks Associates Market Snapshot Disney Apple TVElizabeth Parks
This Market Snapshot by International research firm Parks Associates highlights the impact of the entry of Disney+ and Apple TV+ in OTT market, including insights into the factors driving their growth. Data presented in this Market Snapshot were drawn primarily from an online survey of 10,000 consumers fielded between March 8th and April 3rd to heads of broadband households, after the COVID-19 crisis had begun in the United States.
The document analyzes AOL's issues after its merger with Time Warner and its efforts to transform from an "ice-age" internet service provider. It discusses the unsuccessful merger between AOL and Time Warner in 2000 due to clashing cultures and strategies. It also explores AOL's current strategy of broadening its product line beyond internet services to include content, advertising, and applications. The document recommends that AOL partner with a media company like Hulu to increase brand awareness and subscribers as it transitions from an ISP to a digital media company.
This document summarizes a study on communications access and usage among low-income populations in Trinidad and Tobago. The study found that mobile phones have become the primary form of communication, with ownership rates among the poor being half of national levels. It also found that mobile penetration exceeds fixed line penetration among the poor. Mobile phones are primarily used for voice calls, averaging over 3 calls per day. Barriers to communications access and future adoption are also examined.
The Supreme Court approved online sales taxes and a dangerous email bill advanced in California. The Supreme Court ruled states can collect sales tax from online retailers without a physical presence. A bill in California seeks to greatly expand the state's commercial email law and impose liability, though it was amended due to opposition. The European Union passed measures that could require platforms to pay for links to content and use automatic filtering, raising censorship concerns.
The document discusses the role and influence of mass media in society. It covers various topics such as freedom of the press, censorship, different types of media like newspapers, television, and the internet. It also discusses how media companies and politicians can influence public opinion through bias, spin doctoring of stories, and the selective reporting of information and events.
The document discusses the history of net neutrality in the United States. It describes how (1) the issue first emerged in 2002; (2) supporters argued the open internet must be preserved while opponents said regulation was unnecessary; and (3) the policy debate continued through the 2000s with various laws and court rulings affecting the FCC's ability to enforce net neutrality principles.
Access to telephony for low-income groups is largely based on different strategies of mobile telephony usage. The main goal of this research project is to explore the strategies employed by the poor in Latin America and the Caribbean to access and use mobile telephony services, as well as to identify the major market and regulatory
barriers for increased penetration and usage. More generally, it seeks to contribute to the discussion on how access to mobile telephony contributes to improving the livelihoods of the poor –what we call mobile opportunities.
Our results show that mobile telephony is highly valued by the poor as a tool for strengthening social ties and for increased personal security, and that it is beginning to prove useful for enhancing business and employment opportunities. Overall, the survey results suggest that the acquisition of mobile phones by the poor has an economic
impact reflected mainly in improved social capital variables such as the strengthening of trust networks and better coordination of informal job markets. These findings reveal the continued need to develop innovative business models that extend the market frontier for mobile telephony. They
also highlight the urgent need to rethink public policies that are premised on the mobile phone as a luxury good. Clearly, for the poor, mobile telephony has long been the most cost-effective and accessible alternative.
Shared Services Canada's $398 million contract with Bell Canada to consolidate the federal government's 63 email systems into a single system has faced significant delays, disappointing SSC. The project was supposed to start transitioning departments in March 2014 but has yet to begin. SSC blames Bell for missing deadlines but will not provide specifics. The delay raises concerns about potential lack of transparency and outsourcing expertise currently existing within the public service. There are also questions about how the private sector will handle sensitive government information and whether the needs of Canadians are being prioritized over corporate profits.
This upload is an article in InterMEDIA, July 2019 (www.iicom.org) by Russell Southwood, Balancing Act and Steve Song. It looks at the crisis in African telecoms and internet regulation and suggest a number of different approaches that might help overcome current barriers to wider access.
Presentation by Monique Singh illustrating and delving into the transitions AOL had to take in order to stay relevant in the Internet universe as new technologies and the economy changed.
Universal service a new definition james alleman, paul rappoport, aniruddha...ACORN-REDECOM
The concept of “universal service obligation” (USO) has been around for decades; however, its definition continues to
change. The notion that the last mile of fixed line access should be subsidized has spread around the world, despite well
reasoned arguments and empirical evidence that the policy is and was a failure. It created artificial competition. Now the
concept is becoming bifurcated. Should wireless and/or broadband services be included in the definition of universal
services?
This paper is in two parts: What should constitute USO definitions and how, if at all, it should be implemented. Many
consumers are “cutting-the-cord” and moving directly to alternative services. In this ubiquitous communications
environment the whole set of possible communications methods should be considered when defining “universal
connectivity.” Second, no one service or technology should be relied on to support subsidies.
The second part of the paper addresses the policy question: How should this connectivity be achieved?
A week is a long time in computer ethicsUltraUploader
Over the course of a week, numerous news articles reported on various ethical issues arising from the use of technology. Issues discussed included intellectual property theft through peer-to-peer file sharing and concerns over globalization. Other topics included the growing problems of identity theft, computer viruses and hacking, junk mail and spam, censorship and surveillance. The week demonstrated the many challenges posed by technology and how each issue often has countervailing perspectives around issues like freedom of expression, prevention versus cure of computer misuse, and information access versus information control.
This document discusses the issue of net neutrality and the debate around internet service providers prioritizing internet traffic through "fast lanes". It notes that ISPs began charging companies fees to avoid network congestion, affecting the delivery of content. In response, the FCC established Open Internet rules in 2015 banning paid prioritization and requiring equal treatment of all internet traffic. The document proposes that websites could participate in a coordinated day of slowing servers to display messages urging users to contact lawmakers about net neutrality and ending fast lanes. The goal would be to generate enough complaints to pressure legislators into addressing the issue.
The Threat of Counterfeit Devices: Complicity vs VigilanceWaqas Tariq
Challenges that arise as a result of high mobile phone penetration in developing countries such as counterfeiting and increasing product complexity, have largely been tackled from the supply side. This study explores this issue from the demand side by investigating the relationship between socio-demographic characteristics and levels of Intellectual property vigilance as well as brand and quality awareness among urban mobile technology consumers in Botswana. Implications for both corporate and public policy are discussed at the end of this paper.
Have you ever received an e-mail from someone telling you about something you do not want to hear? Well, that is internet spam, and has taken over the personal and business world over the past decade. Spam is a big issue in the US and has cost businesses and people millions of dollars to combat. Please reference my upload describing the effects of Spam on society and also how society plans to deal with this threat.
Rarely does a week go by without the announcement of another major data breach that has put thousands, or even millions of consumers at risk of fraud. From malicious use of compromised credit and debit cards, to increased identity theft risk to drained bank accounts, the threats are real and impact millions of consumers. . A key challenge for the incoming 114th Congress will be to implement long-needed reforms that will protect American consumers personal data from malicious use by criminal hackers.
The document discusses several possible futures for communications technology and broadband infrastructure. It describes a future with ubiquitous wireless connectivity and high-speed fiber networks. It also discusses the convergence of devices, with single intelligent devices that handle multiple functions. Regulatory approaches and the role of government oversight are debated, as well as different business models like "net neutrality" or prioritized traffic.
CASE STUDY -1 BA 633 Information Systems Inf.docxhallettfaustina
CASE STUDY -1
BA 633: Information Systems Infrastructure.
Prof: Fred Rose.
NET NEUTRALITY
Anvesh Veldandi
Student no: 558046.
1. This case focuses on the Net Neutrality debate in the United States. Do some Internet research on international
views of Net Neutrality and summarize how views of this issue differ within and across other countries.
Network neutrality has been a contentious issue in the United States for several years, but is increasingly debated
elsewhere, with the EU, several European countries, and the Japanese government all examining the issue.
Net neutrality does not have a single, unanimously accepted definition even within, let alone across, countries.
Nevertheless, proponents of net neutrality generally believe that a structure in which the Internet’s intelligence lies
primarily at the edges of the network, with the edges connected by relatively “dumb pipes” is responsible for the
Internet’s diversity and innovation. They fear that without some regulation broadband providers may discriminate in
favor of their own or sponsored applications, or might degrade traffic to sites that do not pay for better quality of
service tiers.
Net neutrality debates in the U.S. have focused primarily on regulations regarding how broadband providers could
price and manage traffic on their networks. The debate in Europe, has generally focused instead on the role
unbundling mandatory network sharing can play in keeping networks neutral. Unbundling
proponents argue that if the infrastructure provider does not offer retail services or is only one of many retailers
offering service over its infrastructure it will have less incentive to discriminate in favor of or against particular
content. Unbundling opponents typically do not discuss it in the context of net neutrality, but note that it can reduce
incentives to invest in the underlying infrastructure. This paper first examines the net neutrality debate in countries
other than United States. It explores net neutrality in the U.K., France, Denmark, the Netherlands,
Germany, Sweden, South Korea, and Japan. Because net neutrality is another type of mandatory network sharing
and because unbundling is a key component of the EU’s general response to net neutrality, the second part of the
paper uses a new dataset to test empirically the effects of unbundling on investment in fiber-to-the-home.
The net neutrality debate began in other countries much later than it began in the U.S. Most European countries
embrace the general idea of net neutrality. While they address the issue differently, most have so far stated that
unbundling combined with rules governing firms with significant market power, rather than specific n ...
The document discusses the history and ongoing debate around net neutrality. It outlines the key issues, including concerns about discrimination of internet content by broadband providers and arguments from both supporters and opponents of net neutrality regulations. While Democrats and consumer groups have pushed for net neutrality rules, Republicans and internet providers have opposed additional regulation. The FCC has struggled to implement policies ensuring an open internet within the law.
THIS IS AN ARTICLE PLEASE GIVE ANSWERS FOR THE QUESTIONS (THE PROBLE.pdfinfo824691
THIS IS AN ARTICLE PLEASE GIVE ANSWERS FOR THE QUESTIONS (THE
PROBLEM)
Closing Case Network Neutrality Wars
The explosive growth of streaming video and mobile technologies is creating bandwidth
problems over the Internet. The Internet was designed to transmit content such as e-mails and
Web pages. However, media items being transmitted across the Internet today, such as high-
definition movies, are vastly larger in size. To compound this problem, there are (in early 2015)
over 180 million smartphone users in the United States, many of whom use the Internet to stream
video content to their phones. The Internet bandwidth issue is as much about economics as it is
about technology. Currently, consumers can send 1-kilobyte e-mails or watch the latest 30-
gigabyte movie on their large-screen televisions for the same monthly broadband fee. Unlike the
system used for power and water bills where higher usage results in higher fees, monthly
broadband fees are not tied to consumer usage. A study from Juniper Networks
(www.juniper.net) highlights this “revenue-per-bit” problem. The report predicts that Internet
revenue for carriers such as AT&T (www.att.com) and Comcast (www.comcast.com) will grow
by 5 percent per year through 2020. At the same time, Internet traffic will increase by 27 percent
annually, meaning that carriers will have to increase their bandwidth investment by 20 percent
per year just to keep up with demand. Under this model, the carrier’s business models will face
pressures, because their total necessary investment will exceed revenue growth. Few industry
analysts expect carriers to stop investing in new capacity. Nevertheless, analysts agree that a
financial crunch is coming. As Internet traffic soars, analysts expect revenue per megabit to
decrease. These figures translate into a far lower return on investment (ROI). Although carriers
can find ways to increase their capacity, it will be difficult for them to reap any revenue benefits
from doing so. The heart of the problem is that, even if the technology is equal to the task of
transmitting huge amounts of data, no one is sure how to pay for these technologies. One
proposed solution is to eliminate network neutrality. (A POSSIBLE SOLUTION)Network
neutrality is an operating model under which Internet service providers (ISPs) must allow
customers equal access to content and applications, regardless of the source or nature of the
content. That is, Internet backbone carriers must treat all Web traffic equally, not charging
different rates by user, content, site, platform, or application. Telecommunications and cable
companies want to replace network neutrality with an arrangement in which they can charge
differentiated prices based on the amount of bandwidth consumed by the content that is being
delivered over the Internet. These companies believe that differentiated pricing is the most
equitable method by which they can finance the necessary investments in their network
infrastructures. .
This document discusses the threat of OTT bypass fraud to mobile operator revenues from voice calls. It explains that OTT bypass fraud works by intercepting mobile-to-mobile calls and redirecting them to terminate over data networks and OTT applications like WhatsApp and Viber, bypassing the mobile operator's voice network and preventing them from collecting termination fees. The fraud benefits wholesale carriers by lowering termination costs but severely damages mobile operators and governments who lose voice revenues. The fraud also degrades call quality and consumes users' data without their knowledge.
The document discusses trends in mobile messaging for 2008 and beyond. It predicts that over 2.3 trillion messages will be sent in 2008, with mobile messaging revenue growing to $60.2 billion. Challenges are also discussed, such as the high costs of SMS in North America opening the door for alternatives like Google Talk. Various uses of SMS are outlined, such as farmers receiving weather updates and gas stations sending price alerts to customers.
The document discusses issues with Canada's Do Not Call list including:
1) Out-of-country telemarketers are accessing the list and making unwanted calls to Canadians despite being beyond the CRTC's regulatory reach.
2) The CRTC dismisses the vast majority of complaints as invalid without investigation, and oversight of complaints against major companies raises a conflict of interest issue.
3) Despite thousands of complaints each month, the CRTC has yet to levy any fines and instead issues warnings, calling into question the effectiveness of enforcement.
The document discusses the impact of over-the-top (OTT) applications on mobile network operators. It notes that while OTT applications have increased data usage and initially benefited operators, they have also shifted revenues away from operators to OTT providers. Operators still bear the infrastructure investment costs but are losing voice and messaging revenues as users switch to OTT applications like WhatsApp and Skype. This trend will continue as more users adopt smartphones and OTT applications, putting pressure on operator revenues and business models. Regulators face challenges in addressing this issue.
Today’s popularity of the short messages services (SMS) has created a propitious environment for spamming to thrive. Spams are unsolicited advertising, adult-themed or inappropriate content, premium fraud, smishing and malware. They are a constant reminder of the need for an effective spam filter. However, SMS limitations of 160-charcaters and 140-bytes size as well as its being rippled with slangs, emoticons and abbreviations further inhibits effective training of models to aid accurate classification. The study proposes Genetic Algorithm Trained Bayesian Network solution that seeks to normalize noisy feats, expand text via use of lexicographic and semantic dictionaries that uses word sense disambiguation technique to train the underlying learning heuristics. And in turn, effectively help to classify SMS in spam and legitimate classes. Hybrid model comprises of text preprocessing, feature selection as well as training and classification section. Study uses a hybrid Genetic Algorithm trained Bayesian model for which the GA is used for feature selection; while, the Bayesian algorithm is used as classifier.
The document provides a situation analysis and recommendations for Bell Canada's consumer relations strategy regarding the Canadian Radio-telecommunications Commission's ruling allowing internet service providers to implement usage-based billing. It summarizes criticisms of the ruling, public outcry against it, and a software glitch by Bell that overcharged some customers. The analysis identifies Bell's key publics and recommends objectives, increasing communication, addressing the software issue, monitoring social media, utilizing polls, assessing competitors, and holding community meetings to improve consumer relations.
Strategic Management Case
T-Mobile US
03/26/2017
Mba-599
Introduction
T-Mobile US, Inc. (NASDAQ: TMUS) is Based in Bellevue, Washington. T-Mobile US is the third largest provider of wireless voice, messaging and data communications services in the United States. T-Mobile US was named after T-Mobile Germany. T-Mobile US offers its services through its subsidiaries such as GoSmart Mobile. T-Mobile US operates two flagship brands, T-Mobile and MetroPCS. T-Mobile acquired MetroPCS in a reverse takeover in 2013. T-Mobile offers post-paid plans and MetroPCS offers pre-paid plans. Deutsche Telekom is the majority shareholder of T-Mobile US, owning 65% of the company. Deutsche Telekom is a German based company. T-Mobile US sells mobile phones, tablets, and wireless internet. T-Mobile US offers unlimited wireless voice, messaging, and data communications. T-Mobile also offers WIFI calling when overseas or if network is out of reach. This technology allows customers to turn a WIFI connection to their own towers. The company offers its services through its advanced 4G LTE network to 71.5 million customers as of 2016. T-Mobile is capable of reaching 308 million in their homes and workplace. The company also offers global plans. T-Mobile US customers can use their services in Canada and Mexico at no extra charge. Customers can also use their phones in Europe using Deutsche Telekom’s network. Customers can also use their cellular devices in Puerto Rico and the U.S Virgin Islands. T-mobile has about 55 million post-paid customers which make up about 77% of its customers. MetroPCS has about 16 million pre-paid customers. T-Mobile also sells service wholesale, including to Google's Project Fi- program, adding another 373,000 customers in the quarter. Between T-Mobile and MetroPCS, T-Mobile US operates about 8000 stores. Most of the stores are authorized vendors and the rest are company owned. According to Fortune.com, Approximately 230 million people live within 10 miles of T-Mobile's (tmus, +1.66%) roughly 3,600 current stores. The company reaches 98% of Americans. T-Mobile US has about 50000 employees. The CEO of the company is John Ledger. He is known to be an outspoken leader and does not fit the mold of a typical CEO. According to CNNMoney.com, Consumer Reports named T-Mobile the number one American wireless carrier and in 2017, T-Mobile was ranked number one in Customer Service Satisfaction by Nielsen.
T-Mobile US started as VoiceStream Wireless PCS which was a subsidiary of Western Wireless Corporation. VoiceStream Wireless was purchased by Deutsche Telekom in 2001 for $35 billion and renamed T-Mobile USA, Inc. Deutsche Telekom completed the acquisition of VoiceStream Wireless Inc. for $35 billion and Southern US regional GSM network operator Powertel, Inc for $24 billion. In 2013, T-Mobile US, Inc. was formed through the business combination between T-Mobile USA and MetroPCS Communications, Inc. The business combination was accounted for a.
Caller identification remains a key issue in the wireless industry as robocallers and spammers
increasingly target subscribers by hiding behind a veil of anonymity, leading to the industry and
FCC taking action and protecting mobile users by establishing a Robocall Strike Force. Cequint, a
Transaction Network Services company, conducted a survey* among adult Android and iOS
mobile phone users in the US to document how significant this issue is and identify areas of focus
for the Strike Force.
The first SMS message was sent in 1992 in the UK from a computer to a mobile phone. By 1995, customers were only sending an average of 0.4 messages per month. Today over 18.5 billion texts are sent monthly globally, having increased by 250% each year. Texting has become a global standard for communication across demographics. Police have started using texts to catch criminals, with messages being used as evidence in court, though some see this as an invasion of privacy. There is debate around the benefits and interpretation of texts in investigations and legal cases.
The document summarizes research on mobile messaging behaviors comparing WhatsApp to traditional SMS. It discusses:
1) Interviews with 9 WhatsApp users found that while cost significantly impacts app usage, social influence was a main reason for migrating to mobile messaging apps. WhatsApp offers a sense of community and immediacy over SMS.
2) A survey showed that WhatsApp benefits like cost, community and immediacy influenced adoption, but SMS was considered more private and reliable.
3) Neither WhatsApp nor SMS are substitutes for each other - they have differing strengths for different contexts and purposes. More research is needed on managing mobile notifications.
Similar to Wireless advertising messaging legal analysis & public policy issues, a review (20)
Asia Renal Care (ARC) plans to enter the Taiwanese dialysis market by opening 3 clinics in the first year and expanding to 7 clinics by the end of the second year. ARC will differentiate itself by providing the highest quality dialysis care through well-trained staff, state-of-the-art facilities and equipment, and a focus on customer service. ARC's strategy is to partner with local hospitals and doctors to gain patient referrals, contract with insurance companies for coverage, and utilize a balanced scorecard approach to achieve its aggressive growth and quality goals in Taiwan.
Zipcar is a car sharing company that allows urban residents to access vehicles without the hassles of ownership like insurance, gas, and parking. Zipcar grew successfully in Boston and expanded to other cities. Key to its success was developing convenient technology, building a strong brand and sense of community, and partnering with universities for parking and promotions. While Zipcar's strategy has worked well, some mistakes were made in fundraising and executive hiring that slowed early growth potential. Continued focus on its mission and strategic goals through a balanced scorecard approach will help Zipcar maximize long term success.
Wireless information management, a reviewAndrew Olsen
This document summarizes a review article about wireless information management. It begins by discussing the growing use of wireless systems in businesses and the challenges that arise in managing information from different wireless devices. It then examines popular wireless systems like BlackBerry and Bluetooth devices. Next, it outlines trends in wireless devices and networks such as the rise of 3G, WiFi, and Bluetooth. It also discusses challenges in securing wireless information and dealing with different standards. Finally, it stresses the importance of information managers preparing strategies to ensure the security, integrity and reliability of corporate information managed through wireless technologies.
Balanced Score Card Congressional District OfficeAndrew Olsen
The document discusses implementing a Balanced Scorecard (BSC) system for a congressional district office. It provides an overview of the office and its services, then discusses how a BSC translates an organization's mission and strategy into performance measures across four perspectives: financial, customer, internal processes, and learning and growth. It proposes a BSC for the Brooklyn district office, with objectives and measures across each perspective, aimed at better serving constituents in both Brooklyn and Staten Island. The BSC framework is intended to help balance priorities between the two areas and drive strategic decision making.
Nike has a long history dating back to 1962 and is now a dominant player in the athletic shoe and apparel market, controlling around 40% of the market. The document outlines Nike's target market as those aged 25 on average but focusing more on teens, and discusses Nike's various pricing strategies. It also summarizes Nike's extensive global supply chain and $1 billion annual marketing budget focused on unique online promotions.
Friedman vs Carroll Corporate Social Responsibility & OutsourcingAndrew Olsen
The document discusses and critiques Milton Friedman's view that the sole social responsibility of business is to increase profits for shareholders. It argues that Friedman fails to consider how business decisions can impact other stakeholders like employees, communities, and customers. Outsourcing labor solely to cut costs ignores these impacts and can damage productivity, reputation, and relationships over time. While increasing profits is important, the document advocates for a balanced view of corporate social responsibility that considers all stakeholders.
The document compares fast food restaurants, family restaurants, and Nucci's Italian Restaurant across several metrics. Fast food restaurants emphasize speed, standardization, and low costs. Tasks require little skill and decisions. Family restaurants also emphasize teamwork but some roles like chefs and bartenders require greater technical skills and non-routine tasks. Customer service, food and atmosphere quality are extremely important to Nucci's Italian Restaurant.
Wireless advertising messaging legal analysis & public policy issues, a review
1. Andrew Olsen
Wireless Advertising Messaging:
Legal Analysis & Public Policy Issues
By Ross D. Petty
A Review :
University of Maryland University College
2. 2
Abstract
Wireless marketing is fairly new, but it is expected to top $8 billion by 2005. A majority of wireless
marketing is done by SMS and there were roughly 1 billion text messages exchanged by U.S. consumers in
December. Wireless advertising messaging (WAM) is not a major problem in the U.S. now, but it grew to
epidemic proportion in Japan and Europe. The U.S. is trying to take the necessary steps to avoid the same
problem that plagued Japan and Europe. The FTC and FCC have been working to limit the affect of WAM,
but the laws and regulations are unclear. The states have been the most vigilant against fighting
spam/WAM issues despite jurisdictional and constitutional concerns. Federal legislation has also been
proposed that deals with spam and privacy issues, but now it also includes language that would deal with
WAM. No legislation has yet passed and it would most certain face a First Amendment suit, but passage of
this legislation appears to be promising. The Wireless Advertising Association (WAA) has established
guidelines and others are also following suit in order to deal with this WAM issue. In addition, the wireless
industry is taking necessary steps to prevent spam from affecting its customers. There are still a lot of
issues that need to dealt with, but it will probably have to include a combination of advertising association
guidelines, industry self-regulations, and federal oversight and/or regulations.
Introduction
The wireless market is not a new one and is one that will continue to grow. According to the
Cellular Telecommunications & Internet Association (CTIA) there are over 137 million wireless subscribers
in the United States (www.wow-com.com). What is new, however, is wireless marketing. The development
of wireless marketing is still at an experimental stage, but it is gaining ground. Wireless marketing is
expected to top $8 billion by 2005 (Swartz, 2003), but it is still only emerging in the U.S. At this point, the
majority of advertisements and alerts that are being sent is Short Message Service (SMS) text messaging.
3. 3
Text messaging has just recently begun to catch on widely in the United States over the past
couple of years, since wireless providers just recently agreed on an industry wide standard, but it is growing
dramatically in popularity. Roughly 1 billion text messages were exchanged by U.S. consumers in
December, which was up four times from the year before (Swartz, 2003). Wireless customers now pay
anywhere between $3 and $20 per month for the SMS text-messaging feature, but that is where the
problem surrounding wireless advertising develops.
WAM: The Problem
WAM or wireless spam is defined as push messaging related to the user’s location that is sent
without standard or confirmed opt-in and just like e-mail spam, it wastes time and resources, but it also
provokes the recipient even more because it could cost them valuable plan minutes. Since wireless
customers are paying to view wireless advertising messaging (WAM), they do not want to be spending their
money viewing junk advertising. Text messages can cost anywhere from 2 to 10 cents to receive, if it is not
included in the cost of the customer’s cellphone plan (Swartz, 2003). It could also cause enough
congestion to their wireless device that it could lead a network to crash. Privacy concerns are another
important issue because of WAM. Wireless consumers number one concern is privacy and most feel that
WAM poses a direct threat to their privacy. Many wireless customers are interested in services like voice
portals, SMS, and so forth, but it diminishes once advertisements are thrown into the mix (Luna, 2001).
WAM poses a major threat to the nascent wireless industry. Abuse of WAM could potentially
cause irreparable harm, expense to the customer, and undermine the value of an important communication
line between customers and advertisers. Spam whether wireless or email is something customers hate
and will not contribute to the growth of the industry.
However, WAM still has not become a major problem in the U.S. as it has been in Europe and
Japan because text messaging and other wireless features has been a popular feature of wireless devices
4. 4
for years there. According to NTT Docomo, Japan's largest wireless carrier, 17% of its 38 million iMode
subscribers receive up to five pieces of spam a day, which is down from 30% in 2001 (Blakeley, 2003).
Figures are similar in the EU, but thanks to new anti-spam laws, customer education and filtering efforts,
the number of wireless spam have been reduced significantly.
It is estimated that the total market for wireless advertising in the U.S. was about $23 million in
2000, but is expected to grow to roughly $4 billion by 2005 (Jarvis, 2001). As traffic over wireless networks
continues to grow, WAM will also grow. Currently it is difficult to separate WAM from the other forms of
spam when trying to determine how to fight this growing problem more so because the difference between
computers and wireless devices are disappearing. Since there have been very few laws that have
specifically dealt with WAM, it has been very difficult to determine if current laws would apply to
advertisement sent to wireless devices via an e-mail address. The fact is that WAM is going to become a
considerable problem unless the U.S. is able to get some control over this issue.
WAM Legal Analysis & Public Policy Issues Summary:
This article examines the complex issues involved in balancing privacy rights and the unfettered
flow of information as applied to the regulation of unwanted text messages (WAM) sent to wireless devices
such as newer types of cellular telephones, pagers and personal data assistants (PDAs). The advent of
the wireless Web and related technical advances has pushed spam and other privacy issues onto the
agendas of service providers and vendors, as well as regulators. It starts off by giving an extensive
background on WAM and what role it has played in Japan and Europe and what the U.S. should expect. In
Japan it has been estimated that between 900 million and 1 billion text messages are sent on an average
day, and an injunction was recently granted when a firm sent 900,000 unsolicited text messages in a single
hour. Because of significant cost advantages in communicating to consumers through spam and WAM the
US market is projected to grow exponentially, raising the stakes on these policy issues.
5. 5
There are various forms of regulations, federal, state, and self that are currently in place and this
article examines what effect they have when dealing with WAM. The determination is that the U.S. does
not have current laws that anticipate all forms of WAM, but some believe that current state and federal laws
and regulations may work when dealing with WAM. Federal law already prohibits junk faxes and prohibits
telemarketers from making unsolicited calls to cell phones in order to protect consumers from paying for
ads they probably have no interest in receiving. Some already feel that these laws already cover SMS
messaging, but the issue has not been tested enough in the courts to know for sure. This is where the
constitutionality of current and future laws and regulations becomes a contentious issue.
FTC/FCC & WAM:
In April of this year the Federal Trade Commission (FTC) had a three-day summit on spam and
according to FTC Commissioner Orson Swindle, "If you think spam is bad on your computer, wait until it
gets on your phone” (Swartz, 2003). The FTC has estimated that over 70% of spam is fraudulent,
misleading or deceptive (Pruitt, 2003) and so there have been several bills affecting privacy and spam have
been introduced in Congress. Congress is trying to give the FTC more power to catch and punish
spammers. So far, however, the FTC has rejected calls to fight email spam. They have cited limited time
and resources and decided to maintain their current level of enforcement, while working with the public to
explore solutions to the deluge of spam (Guerra, 2003). Out of these discussions, there has been a push
for the FTC to evaluate the legality and constitutionality of a consumer opt-out site for spam or a “do not
email” list, as it did with telemarketing. The FTC intends to have more workshops and hearings dealing
with spam and WAM.
Even the Federal Communications Commission (FCC) has stated that the legal status of cellphone
spam is murky. The Telephone Consumer Protection Act (TCPA) of 1991covers unsolicited cell-phone
traffic, but the FCC recommends that wireless customers ask their providers how they deal with text
6. 6
message spam under their plan (Holton, 2003). Ultimately, what the FCC is trying to determine is whether
wireless data, such as spam, is a telecommunications service, protected under the TCPA, or whether it is
an information service, which would not be regulated by the FCC. According to the FCC, spam would fall
under the TCPA only if it was sent to a wireless telephone number, not an e-mail or Internet address, but
what they have not reached is what happens when spam is sent to an Internet address (Weaver, 2003).
What they are still dealing with is this gray area and what to do with it.
State Regulations:
Even with commerce clause issues, state legislatures have continued to pass anti-spam legislation.
There are currently at least 30 states that have passed or are currently considering legislation that would
impose legal restrictions on spam. Several, including California, Colorado and Tennessee, would require
that senders of unsolicited commercial e-mail place "ADV" in the subject line of the e-mail. There are a few
states that allow lawsuits against spammers that violate posted state policies. Other states, including
Connecticut, Delaware, Hawaii, Idaho, Iowa, Illinois, Maryland, Nebraska, Nevada, North Carolina,
Oklahoma, Virginia, Washington and West Virginia, have passed or are currently considering similar
legislation (http://www.spamlaws.com/state/index.html). However, it is the validity of the state laws banning
or limiting unsolicited commercial e-mail is currently in question. More specifically, it is the constitutionality
and jurisdictional issue of these state laws that are questioned. In addition, the debate is there whether or
not current state laws and regulations cover WAM.
New York passed an amendment to its do-not-call law that includes email and it is the first state to
do so, and because email is sent via wireless and wireline networks, the law applies to wireless spam as
well, (Goldman, 2001). California has followed suit and has one of the strictest spam regulations in the
country. Current California legislation, SB12, would require an opt-in system for e-mail and it would
become a misdemeanor to transmit unsolicited commercial email advertisements within the state or to any
7. 7
California resident's email address (Norr, 2003). Many other states are also looking to continue to tighten
their spam regulations and laws, however; again the question is how far can the state go to regulate
spam/WAM?
Federal Regulations:
Even though WAM is in its infancy in the U.S., legislation has been introduced that may help deter
the problem of unwanted spam. Lawmakers have been working with the CTIA to include wireless in broad-
reaching anti-spam bills. Congress has been trying to pass anti-spam legislation since 1997, but it has
either been continually stalled or abandoned in committee (Sampath & Miller, 2003). Currently, there are a
number of privacy-related and anti-spam bills that have been introduced before Congress and several of
them are particularly relevant to wireless privacy and spam.
The most pertinent bill that would specifically deal with the WAM issue is H.R. 122, which is
currently pending in the Subcommittee on Telecommunications and the Internet. The Wireless Telephone
Spam Protection Act would make it unlawful for any person to use any covered mobile telephone
messaging system to transmit an unsolicited advertisement. It would also prohibit the FCC from exempting
from certain telephone regulatory requirements any call that violates such prohibition. This has been
introduced every year since 2001, previously as H.R. 113, but legislation against wireless spam appears to
be promising. The House Commerce Committee has taken up anti-spam legislation this year that would
include language to combat wireless spam.
A second bill that would deal with wireless spam is H.R. 2214, the Reduction in Distribution of
Spam Act of 2003, which had a hearing in the Subcommittee on Crime, Terrorism, and Homeland Security
this past July. This bill would go a long way to address the existing spam problem, while also trying to cut
off development of future spam problems, like wireless spam (Weaver, 2003).
8. 8
Several other pieces of legislation: H. R. 4678, H.R.71, H.R.1933, H. R. 2515, S. 877, S.1231,
and S.1293 have been proposed to either address privacy concerns, penalize fraudulent spam, or create a
system to secure mobile phone owners’ permission before a company could market services to them.
These pieces of legislation could be very important because they could address wireless users’ privacy and
spam concerns while also providing guidance to advertisers.
Any federal anti-spam law will have to survive a First Amendment challenge. The government
cannot regulate commercial speech unless it shows that the law is narrowly tailored to address a matter of
substantial government interest. There will be a lot of work in the various committees in Congress in order
to determine if lawmakers will be able to craft and enact an anti-spam law that will sustain a constitutional
challenge. In addition, a lot of spam comes from outside the U.S. and would not fall under the jurisdiction
of U.S. law.
Industry Regulations:
Members of the major advertising associations, such as the Mobile Marketing Association (MMA),
previously the Wireless Advertising Association (WAA), Wireless Advertising Industry Association (WAIA)
and the Interactive Advertising Bureau (IAB) all agree that spam posses a major problem to the industry.
However, how it should be dealt with vary among the members. Most prefer self-regulation to government
regulation, which is why the WAA established guidelines that dealt with difficult and critical issues of privacy
and spam and offered well-needed guidance. Furthermore, the WAIA and the IAB have launched efforts to
define standards and best practices for delivering ads to cellular phones and handheld devices. They feel
more comfortable letting the customers tell us what they want and do not want and responding with their
dollars (Goldman, 2001). However, that has yet to prove successful and there is no guarantee that
members will adhere to these guidelines let alone the many nonmembers.
9. 9
AOL, Microsoft, and Yahoo are already working together to fight spam. The wireless industry is
also fighting to protect their customers from unwanted advertising and are taking steps to avoid the influx of
WAM. They realize that subscribers will change operators if they do not address this problem. Most
wireless carriers also prefer self-regulation along with rigorous opt-in requirements, which has been
advocated by the CTIA. In addition, wireless carriers are treating their networks like private property and
plan to kill off bulk text messages at gateways before they hit customer in-boxes. (“News briefs,” 2003). If
wireless carriers can operate and maintain their networks as their own private entities, they can set a new
standard of integrity that makes the wireless Internet that much better than the wired (Wickham, 2003).
The wireless industry is continuing to work with legislatures and other groups so to best protect their
consumers from this growing problem.
Conclusions:
There is still no definitive answer about what to do when it comes to wireless spam. State
legislation along with effective federal legislation may have some effect. However, besides for
constitutionality and interstate commerce issues of such state and federal legislation, the law can only
regulate the means of transmission and not the content itself. In addition, some feel that legislation is
unnecessary because the industry already is heavily regulated and the market will take care of wireless
spam. Many in the wireless and advertising industry are very wary of government regulation and would
prefer self-regulations. National legislation would raise difficult issues about defining spam and they do not
want the government defining what or what not spam is. More so government regulations will affect those
that abide by laws and those are legitimate organizations, which are more apt to listen to and protect their
customers anyway.
No matter how hard the federal government tries, they will not be able to stop spam, but they could
make it more difficult. However, a solution could be a combination of comprehensive federal laws that
10. 10
include regulatory action, fines, and private lawsuits along with spam filtering. Basically, the combination
of advertising association guidelines, industry self-regulations, and proper federal oversight and/or
regulations, could prove to be the most effective tool in curbing spam and controlling WAM before it
becomes a problem. In addition, it could also help shift the costs of spam/WAM back to the marketers,
while allowing legitimate marketers to operate in their and the consumers’ best interests.
11. 11
References:
http://frwebgate.access.gpo.gov/cgi-in/getdoc.cgi?dbname=108_cong_bills&docid=f:h122ih.txt.pdf
http://frwebgate.access.gpo.gov/cgi-bin/getdoc.cgi?dbname=108_cong_bills&docid=f:h2214ih.txt.pdf
http://frwebgate.access.gpo.gov/cgi-bin/getdoc.cgi?dbname=108_cong_bills&docid=f:h2515ih.txt.pdf
http://frwebgate.access.gpo.gov/cgi-bin/getdoc.cgi?dbname=108_cong_bills&docid=f:s877rs.txt.pdf
http://thomas.loc.gov/
http://www.spamlaws.com/state/index.html
http://www.wow-com.com/pdf/hr4678_intro_stearns.pdf
Baines, Stewart. (2000, August). “When push comes to shove.” Communications International, pg. 9.
Retrieved September 19, 2003 from MdUSA ABI/Inform on the World Wide Web:
http://www.umuc.edu/library/.
Blakeley, Kiri. (2003, June 9). “Et Tu, AT&T Wireless?” Forbes, Volume 171, Issue 12, pg. 60. Retrieved
September 17, 2003 from MdUSA ABI/Inform on the World Wide Web:
http://www.umuc.edu/library/.
Goldman, Chris. (2001, July 1). “Do not spam me!” Wireless Review, Volume 18, Issue 13, pg. 8.
Retrieved September 21, 2003 from MdUSA ABI/Inform on the World Wide Web:
http://www.umuc.edu/library/.
12. 12
Guerra, John L. (2003, March). “Regulatory Watch: CTIA Pushes FCC on LNP Issues.” Billing World
and OSS Today. Retrieved September 29, 2003 from MdUSA database LexisNexis on the World
Wide Web: http://www.umuc.edu/library/.
Holton, Avery. (2003, August 11). “When spam hits your cell phone.” Time, Volume 162, Issue 6, pg. 65.
Retrieved September 25, 2003 from MdUSA database ABI/Inform on the World Wide Web:
http://www.umuc.edu/library/.
Jarvis, Steve. (2001, March 26). “FCC policy short-circuits wireless bids.” Marketing News, Volume 35,
Issue 7, pg. 4. Retrieved September 21, 2003 from MdUSA database ABI/Inform on the World
Wide Web: http://www.umuc.edu/library/.
Karpinski, Richard. (2000, April 24). “Regulation finds its way to wireless advertising.” B to B, Volume 85,
Issue 4, pg. 13. Retrieved September 27, 2003 from MdUSA database ABI/Inform on the World
Wide Web: http://www.umuc.edu/library/.
Luna, Lynnette. (2001, July 30). “Dueling Pricing Strategies.” Telephony, Volume 241, Issue 5, pg 7.
Retrieved September 19, 2003 from MdUSA ABI/Inform on the World Wide Web:
http://www.umuc.edu/library/.
Maher, Brendan. (2001, January). “Finding content with wireless advertising.” Target Marketing, Volume
24, Issue 1, pg. 42. Retrieved September 21, 2003 from MdUSA database ABI/Inform on the World
Wide Web: http://www.umuc.edu/library/.
“News briefs.” (2003, May 05). Network World, Section: Front News, pg. 6. Retrieved September 24, 2003
from MdUSA database LexisNexis on the World Wide Web: http://www.umuc.edu/library/.
13. 13
Norr, Henry. (2003, February 24). “Bill seeks to stem spam.” The San Francisco Chronicle, pg. E1.
Retrieved September 28, 2003 from MdUSA database LexisNexis on the World Wide Web:
http://www.umuc.edu/library/.
Pruitt, Scarlet. (2003, September 26). “Stop buying from spammers, Net industry says.” IDG News
Service. Retrieved September 23, 2003 from Network World on the World Wide Web:
http://www.nwfusion.com/news/2003/0926stopbuyin.html.
Sampath, Elizabeth D. & Miller, Jennifer L. (2003, March 31). “Congress Vacillates as Others Act to Can
Spam.” The Legal Intelligencer, Volume 228, No. 61, pg. 5. Retrieved September 28, 2003 from
MdUSA database LexisNexis on the World Wide Web: http://www.umuc.edu/library/.
Secker, Matthew. (2001, October). “Small slice of the advertising pie for mobile operators.”
Telecommunications (International Edition), Volume 35, Issue. 10, pg. 8. Retrieved September 23,
2003 from MdUSA database ABI/Inform on the World Wide Web: http://www.umuc.edu/library/.
Swartz, Jon. (2003, June 16). “Spam tussle spreads to cellphones.” USA TODAY, pg. 1A. Retrieved
September 23, 2003 from MdUSA database LexisNexis on the World Wide Web:
http://www.umuc.edu/library/.
Wickham, Rhonda. (2003, June 1). “Opting Out Of Spam.” Wireless Week, Volume 9, Issue 12.
Retrieved September 28, 2003 from MdUSA database Business Source Premier on the World
Wide Web: http://www.umuc.edu/library/.
Weaver, Heather Forsgren. (2003, July 14). “House anti-spam bill to include wireless.” RCR Wireless
News, Volume 22, Issue 28. Retrieved September 25, 2003 from MdUSA database Business
Source Premier on the World Wide Web: http://www.umuc.edu/library/
14. 14
Weaver, Heather Forsgren. (2003, May 5). “Text-messaging spam filter may be illegal.” RCR Wireless
News, pg. 4. Retrieved September 27, 2003 from MdUSA database LexisNexis on the World Wide
Web: http://www.umuc.edu/library/.