skip to main content
research-article

User and ISP Rights of Device Attachment and Device Management

Published:01 December 2013Publication History
Skip Abstract Section

Abstract

Internet research often assumes users may connect devices without consent by their service providers. However, in many networks the service provider only allows use of devices obtained directly from the provider. We review how United States communications law addresses the rights of users to connect devices of their choice. We explicate a set of user and service provider rights. We propose legal requirements for attachment and management of devices. We illustrate how these proposed regulations would affect the services currently offered on telephone, cable, satellite, video networks, and cellular networks, as well as on the Internet.

References

  1. FCC. 1968. FCC 68-661, Carterfone Order.Google ScholarGoogle Scholar
  2. FCC. 1975. Part 68 Connection of terminal equipment to the telephone network. Code of Federal Regulations, Title 47, Chapter 1, Part 68. http://ecfr.gpoaccess.gov.Google ScholarGoogle Scholar
  3. FCC. 2002. FCC 02-77, Cable modem service order. http://hraunfoss.fcc.gov/edocs_public/attachmatch/FCC-02-77A1.pdf.Google ScholarGoogle Scholar
  4. FCC. 2005a. FCC 05-150, Internet over Wireline Facility Order. http://hraunfoss.fcc.gov/edocs_public/attachmatch/FCC-05-150A1.pdf.Google ScholarGoogle Scholar
  5. FCC. 2005b. FCC 05-151, Internet policy statement. http://hraunfoss.fcc.gov/edocs_public/attachmatch/FCC-05-151A1.pdf.Google ScholarGoogle Scholar
  6. FCC. 2007. FCC 07-132, AWS service order.Google ScholarGoogle Scholar
  7. FCC. 2009. FCC 09-93, Open Internet NPRM. (October). http://hraunfoss.fcc.gov/edocs_public/attachmatch/FCC-09-93A1.pdf.Google ScholarGoogle Scholar
  8. FCC. 2010a. DA-10-1667, Further inquiry into two under-developed issues in the open Internet proceeding. (September). http://hraunfoss.fcc.gov/edocs_public/attachmatch/DA-10-1667A1.pdf.Google ScholarGoogle Scholar
  9. FCC. 2010b. FCC 10-201, Open Internet order. (December). http://hraunfoss.fcc.gov/edocs_public/attachmatch/FCC-10-201A1.pdf.Google ScholarGoogle Scholar
  10. FCC. 2010c. FCC 10-60, Allvid notice of inquiry. (April).Google ScholarGoogle Scholar
  11. François Bar and Christian Sandvig. 2000. Rules from truth: Communication policy after convergence. In Proceedings of the 28th Telecommunications Policy Research Conference.Google ScholarGoogle Scholar
  12. Robert W. Hahn and Robert E. Litan. 2007. The myth of network neutrality and what we should do about it. Intern. J. Commun. 1, 595--606.Google ScholarGoogle Scholar
  13. Scott Jordan. 2007. A layered network approach to net neutrality. Intern. J. Commun. 1, 427--460.Google ScholarGoogle Scholar
  14. Scott Jordan. 2009. Implications of Internet architecture upon net neutrality. ACM Trans. Internet Technol. 9, 2, 1--28. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Scott Jordan. 2011. Traffic management and net neutrality in wireless networks. IEEE Trans. Netw. Service Manag. 8, 297--309.Google ScholarGoogle ScholarCross RefCross Ref
  16. Scott Jordan and Arijit Ghosh. 2010. A framework for classification of traffic management practices as reasonable or unreasonable. ACM Trans. Internet Technol. 10, 1--23. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Scott Jordan and Gwen Shaffer. 2010. Comments of Scott Jordan and Gwen Shaffer before the Federal Communications Commission in the matter of further inquiry into two under-developed issues in the open Internet proceeding. GN Docket No. 09-191 and WC Docket No. 07-52. (October).Google ScholarGoogle Scholar
  18. Scott Jordan and Gwen Shaffer. 2011. A proposed device attachment statute for converged networks. J. Inform. Policy 1, 394--424.Google ScholarGoogle ScholarCross RefCross Ref
  19. Scott Jordan and Gwen Shaffer. 2012. Should users be entitled to use and control the devices of their choice on networks? In Proceedings of the IEEE/IFIP Network Operations and Management Symposium (NOMS).Google ScholarGoogle ScholarCross RefCross Ref
  20. Lawrence Lessig. 2001. The Internet under siege. Foreign Policy 127, 56--65.Google ScholarGoogle ScholarCross RefCross Ref
  21. Lawrence B. Solum and Minn Chung. 2003. The layers principle: Internet architecture and the law. U. San Diego Public Law Research Paper No. 55. http://ssrn.com/abstract=416263.Google ScholarGoogle Scholar
  22. U.S. Congress. 1996. S.652.PP, Telecomunications Act of 1996, 104th Congress, Public Law 104--104. http://thomas.loc.gov/cgi-bin/bdquery/z?d104:s.00652.Google ScholarGoogle Scholar
  23. Kevin D. Werbach. 2002. A layered model for Internet policy. J. Telecomm. High Technol. Law 1, 37--67. http://ssrn.com/abstract=648581.Google ScholarGoogle Scholar
  24. Richard S. Whitt. 2004. A horizontal leap forward: Formulating a new communications public policy framework based on the network layers model. Fed. Commun. Law J. 56, 587--672.Google ScholarGoogle Scholar
  25. Tim Wu. 2007. Wireless Carterfone. Intern. J. Commun. 1, 389--426.Google ScholarGoogle Scholar

Index Terms

  1. User and ISP Rights of Device Attachment and Device Management

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image ACM Transactions on Internet Technology
        ACM Transactions on Internet Technology  Volume 13, Issue 2
        December 2013
        70 pages
        ISSN:1533-5399
        EISSN:1557-6051
        DOI:10.1145/2542214
        • Editor:
        • Munindar P. Singh
        Issue’s Table of Contents

        Copyright © 2013 ACM

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 1 December 2013
        • Accepted: 1 June 2013
        • Revised: 1 May 2013
        • Received: 1 August 2012
        Published in toit Volume 13, Issue 2

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Research
        • Refereed
      • Article Metrics

        • Downloads (Last 12 months)3
        • Downloads (Last 6 weeks)0

        Other Metrics

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader
      About Cookies On This Site

      We use cookies to ensure that we give you the best experience on our website.

      Learn more

      Got it!