Sender side transmission rules for the Internet.

AuthorNarechania, Tejas N.

Table of Contents I. Introduction II. Background A. The Original Antidiscrimination Regime B. From Computer II to Information Service III. Present Options A. Sender Side Transmission Rules B. Changed Circumstances C. Proceeding by Adjudication IV. Conclusion I. Introduction

Since 1966, the Federal Communications Commission has, one way or another, protected businesses that deliver services over the nation's communications infrastructure. But in January 2014, the U.S. Court of Appeals for the D.C. Circuit struck down the FCC's net neutrality rules contained in its 2010 Open Internet Order. (1) FCC Chairman Tom Wheeler has since indicated that he will take up the D.C. Circuit's invitation to implement rules that, consistent with historic practice, "will meet the court's test for preventing improper blocking of and discrimination among Internet traffic." (2)

Chairman Wheeler's statement invites an obvious question: presuming that the FCC wants its rules to survive judicial scrutiny, what is the most prudent legal course? While the Commission has a variety of legal options, we focus here on two solutions that are almost certain to survive legal challenge, while not taking any position on the merits of possible alternatives.

We propose a novel option that relies on a partial return to the powers delegated to the FCC by Title II of the Communications Act. (3) In particular, we suggest that the Commission take seriously the asymmetric framework suggested by the D.C. Circuit based on the premise that two distinct transmissions comprise a single broadband transaction. Consider a common usage of a broadband connection: first, the subscriber--the consumer--calls an application, service, or other content provider using the carrier facilities for which she has purchased access. Second, the content provider sends a response to the consumer, which necessarily traverses the broadband carrier's facilities to reach the original consumer. This two-stage process is the framework adopted by the D.C. Circuit; as the court emphasized, it may be "logical to conclude that [a broadband provider] may be a common carrier with regard to some activities but not others." (4)

The FCC may therefore decide, as a matter of first impression, that response transactions are subject to common carrier rules against discrimination and blocking. Indeed, as we explain below, none of the arguments that the information service designation applies to a broadband connection's call service can be said to apply to the response transaction. Cabining the reach of the Commission's Cable Modem Order, which designated the call transaction an information service, (5) to only the first stage of the two-stage framework would restore the Commission's authority to enforce network neutrality rules over broadband-delivered content. In addition, because such sender-side regulation focuses on incoming traffic, it also provides a useful framework for addressing interconnection disputes between broadband carriers and content providers.

Alternatively, the FCC could simply examine whether changed circumstances have undermined its decade-old decision (6) to reclassify broadband transmissions from telecommunications services to information services. Our examination of the Commission's analysis shows that the factual premises underlying its 2002 conclusion are now largely obsolete. That decision relied on the outdated premise that broadband subscriptions were akin to dial-up services including AOL, all of which offered a bundle of services including email access, branded web browsers, newsgroups, chat rooms, and other Internet-based services. Today, the relevance of these bundled services is highly diminished, as broadband subscribers overwhelmingly rely on third-party services and products such as Gmail, Firefox, Google Groups, Facebook, Twitter, and Instagram. (7)

Thus, the FCC has at least two available paths. The first is predominantly legal: by adopting the two-stage framework articulated by the D.C. Circuit in Verizon, the Commission need only decide whether sender-side transmissions fit more comfortably within the statutory definition of a telecommunications service or an information service. The second path is predominantly factual: Is the Commission still swayed by its analysis, now well over a decade old, analogizing broadband subscription services to dialup Internet access? Regardless of the path the Commission chooses, it will reach a similar destination. Either course allows the Commission to develop a regime that resembles its approach in the 1980s and 1990s--a period notable for the exponential growth of the telecommunications and Internet industries.

  1. Background

    For nearly fifty years, the FCC has enforced a regime whose basic purpose has been to foster the growth of network application providers and protect them from the owners of network facilities. (8) The most recent iteration of that regime, which attempted to enforce a form of basic network neutrality norms, was contained within the Commission's Open Internet Order, (9) but in fact the history of that effort stretches back into the 1960s.

    1. The Original Antidiscrimination Regime

      The relevant history of the net neutrality regime begins with the FCC's Computer Inquiries that began in 1966. (10) Context is important here. The late 1960s marked the beginning of a historic shift at the Commission and the White House away from support for a regulated monopoly and toward the encouragement of competitive markets--especially in new markets. (11) This shift was driven both by the FCC and the Office of Telecommunications Policy in the White House; its long-term effects were nothing short of monumental. (12)

      The project began with selected segments of the communications industry, primarily long-distance telephony, satellite services, attachments, and what was then called "network data processing" (now known as Internet services). (13) In each of these areas, the FCC developed a new regulatory initiative with two overarching goals. (14)

      First, given the long history of regulation resulting in barriers to entry, the FCC attempted to avoid overregulation of new markets to encourage competition. (15) Second, the Commission recognized that any new entrant in these markets would necessarily depend on monopoly carriers, and would therefore be exceptionably vulnerable to anticompetitive behavior. (16) Hence, the project's second goal was to prevent the carriers from undermining these new entrants. (17) These two goals underlay the Commission's Carterfone decision and the subsequent liberalization of network attachments, the various MCI and Execunet decisions, (18) which opened to competition the long-distance telephony market, the "Open Skies" policy for satellites, (19) and, most relevant to our purposes, the Computer Inquiries. (20) The combined effect of these policies was to create a communications economy that relied on common carriage services as the foundation for other markets, and eventually, entire industries. Indeed, the entire Internet economy may be understood as an unexpected byproduct of the policies pursued in the Computer Inquiries. (21)

      This philosophy of opening markets on top of the network drove the FCC's First Computer Inquiry. The 1966 Notice of Inquiry' that began the FCC's first foray into this space sought "information, views, and recommendations" regarding the vast "number of regulatory and policy questions" that had come to the fore through the "the growing convergence of computers and communications." (22) In the Notice, the Commission sought to determine "under what circumstances data processing, computer information, and message switching services ... should be subject to the provisions of the Communications Act." (23)

      While the technologies of this era were different, the basic architecture of the regulatory problem is familiar. Companies, such as Electronic Data Systems (founded by entrepreneur Ross Perot), located at the "ends" of the telephone network, were offering computer services that ran "over" AT&T's wires. (24) Conceptually, firms such as EDS occupied a position similar to Netflix or Wikipedia today, while the role of AT&T is now played by such carriers as Comcast, Verizon, and AT&T. (25)

      As noted, the FCC was motivated by an interest in avoiding overregulation in the new data processing market and protecting that nascent industry from the monopoly carrier. The First Computer Inquiry achieved the first goal by exempting data processing services from common carrier regulation. (26) The FCC accomplished its second goal with the Inquiry's "maximum separation" rule, which required an incumbent carrier to form an entirely separate corporate entity if it wished to offer data processing or computer networking services. (27) The FCC believed that if AT&T was allowed to freely enter the market for network services, it could give itself unfair advantages to quickly eliminate competitors. (28) The Commission feared that the Bell companies would "favor their own data processing activities by discriminatory services, cross subsidization, [and] improper pricing," and therefore required that any carrier seeking to provide both transmission and processing capabilities segregate its offerings into "separate corporate entities]." (29)

      To address cases where the distinction between data "transmission" and "processing" was less clear, the FCC defined a category of "hybrid" services (30) that were regulated according to the regime that governed the "primary thrust" of the offering: Where transmission predominated, the service would be subject to regulation under the Communications Act; where data processing predominated, only the maximum separation rule applied. (31) Importantly, the Commission deferred further guidance on the distinction within hybrid services. (32) Instead, the FCC offered to conduct "ad hoc evaluations ... to determine whether a particular package offering was...

To continue reading

Request your trial

VLEX uses login cookies to provide you with a better browsing experience. If you click on 'Accept' or continue browsing this site we consider that you accept our cookie policy. ACCEPT