Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Science and Technology Law (5)
- Internet Law (4)
- Communications Law (3)
- Privacy Law (3)
- Evidence (2)
-
- First Amendment (2)
- Fourth Amendment (2)
- National Security Law (2)
- Supreme Court of the United States (2)
- Antitrust and Trade Regulation (1)
- Computer Law (1)
- Energy and Utilities Law (1)
- Intellectual Property Law (1)
- Law Enforcement and Corrections (1)
- Natural Law (1)
- Public Law and Legal Theory (1)
- State and Local Government Law (1)
- Transnational Law (1)
Articles 1 - 9 of 9
Full-Text Articles in Entire DC Network
Voluntary Disclosure Of Information As A Proposed Standard For The Fourth Amendment's Third-Party Doctrine, Margaret E. Twomey
Voluntary Disclosure Of Information As A Proposed Standard For The Fourth Amendment's Third-Party Doctrine, Margaret E. Twomey
Michigan Telecommunications & Technology Law Review
The third-party doctrine is a long-standing tenant of Fourth Amendment law that allows law enforcement officers to utilize information that was released to a third party without the probable cause required for a traditional search warrant. This has allowed law enforcement agents to use confidential informants, undercover agents, and access bank records of suspected criminals. However, in a digital age where exponentially more information is shared with Internet Service Providers, e-mail hosts, and social media “friends,” the traditional thirdparty doctrine ideas allow law enforcement officers access to a cache of personal information and data with a standard below probable cause. …
No Cause Of Action: Video Surveillance In New York City, Olivia J. Greer
No Cause Of Action: Video Surveillance In New York City, Olivia J. Greer
Michigan Telecommunications & Technology Law Review
In 2010, New York City Police Commissioner Raymond Kelly announced a new network of video surveillance in the City. The new network would be able to prevent future terrorist attacks by identifying suspicious behavior before catastrophic events could take place. Kelly told reporters, "If we're looking for a person in a red jacket, we can call up all the red jackets filmed in the last 30 days," and "[w]e're beginning to use software that can identify suspicious objects or behaviors." Gothamist later made a witticism of Kelly's statement, remarking, "Note to terrorists: red jackets are not a good look for …
Justice, And Only Justice, You Shall Pursue: Network Neutrality, The First Amendment And John Rawls's Theory Of Justice, Amit M. Schejter, Moran Yemini
Justice, And Only Justice, You Shall Pursue: Network Neutrality, The First Amendment And John Rawls's Theory Of Justice, Amit M. Schejter, Moran Yemini
Michigan Telecommunications & Technology Law Review
As broadband becomes the public's technology of choice to access the Internet, it is also emerging as the battlefield upon which the struggle for control of the Internet is being fought. Operators who provide physical access to the service claim the right to discriminate among the content providers who use the infrastructure in which the operators have invested. In contrast, content providers warn that exercising such a policy would "undermine the principles that have made the Internet such a success."[...] For academic observers, analysis of this issue has thus far been confined to the areas of property law, innovation, and …
Biometrics: Weighing Convenience And National Security Against Your Privacy, Lauren D. Adkins
Biometrics: Weighing Convenience And National Security Against Your Privacy, Lauren D. Adkins
Michigan Telecommunications & Technology Law Review
The biometric identifier relies on an individual's unique biological information such as a hand, iris, fingerprint, facial or voice print. When used for verification purposes, a "one-to-one" match is generated in under one second. Biometric technology can substantially improve national security by identifying and verifying individuals in a number of different contexts, providing security in ways that exceed current identification technology and limiting access to areas where security breaches are especially high, such as airport tarmacs and critical infrastructure facilities. At the same time, a legitimate public concern exists concerning the misuse of biometric technology to invade or violate personal …
21st Century Copyright Law In The Digital Domain Symposium Transcript, Symposium Panelists
21st Century Copyright Law In The Digital Domain Symposium Transcript, Symposium Panelists
Michigan Telecommunications & Technology Law Review
21st Century Copyright Law in the Digital Domain Symposium held at Universtiy of Michigan Law School Friday, March 24, 2006
Life Sciences, Technology, And The Law - Symosium Transcript - March 7, 2003, Philip R. Reilly, David H. Kaye, Jonathan J. Koehler, Richard O. Lempert
Life Sciences, Technology, And The Law - Symosium Transcript - March 7, 2003, Philip R. Reilly, David H. Kaye, Jonathan J. Koehler, Richard O. Lempert
Michigan Telecommunications & Technology Law Review
Life sciences, Technology, and the Law Symposium held at the University of Michigan Law School Friday, March 7, 2003
Regulating Speech Across Borders: Technology Vs. Values, Matthew Fagin
Regulating Speech Across Borders: Technology Vs. Values, Matthew Fagin
Michigan Telecommunications & Technology Law Review
The disfavored status within international law of unilateral state-based regulations that target extraterritorial actors arises from the inherent challenges such actions represent to state sovereignty. In the context of the Internet, the complexity of choice-of-law analysis is heightened: regulations imposed by one state have the potential to effectively block communications to citizens of all states and undermine the conflicting regulatory aims of neighboring states. Early legal commentators built upon this cascading chilling effect of state-based regulation to proclaim both the futility and illegitimacy of state-based action in the online environment. Subsequent scholars have demonstrated the commensurability of state-based online regulation …
Computer Searches And Seizures: Some Unresolved Issues, Susan W. Brenner, Barbara A. Frederiksen
Computer Searches And Seizures: Some Unresolved Issues, Susan W. Brenner, Barbara A. Frederiksen
Michigan Telecommunications & Technology Law Review
The goal of this article is to illustrate the issues that arise in the context of computer search and seizures by examining several areas in which the application of Fourth Amendment concepts to computer searches and/or seizures can be problematic. In order to illustrate this point, the article will build on a hypothetical. The hypothetical situation assumes law enforcement officers have lawfully obtained a warrant to search for and seize evidence concerning the commission of one or more crimes. It will also be assumed that computer technology played some role in the commission of these crimes, so computer equipment and …
Telecommunications In Transition: Unbundling, Reintegration, And Competition, David J. Teece
Telecommunications In Transition: Unbundling, Reintegration, And Competition, David J. Teece
Michigan Telecommunications & Technology Law Review
The world economy is experiencing a technological revolution, fueled by rapid advances in microelectronics, optics, and computer science, that in the 1990s and beyond will dramatically change the way people everywhere communicate, learn, and access information and entertainment. This technological revolution has been underway for about a decade. The emergence of a fully-interactive communications network, sometimes referred to as the "Information Superhighway," is now upon us. This highway, made possible by fiber optics and the convergence of several different technologies, is capable of delivering a plethora of new interactive entertainment, informational, and instructional services that are powerful and user-friendly. The …