Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

University of Michigan Law School

Technology

Discipline
Publication Year
Publication
Publication Type

Articles 1 - 30 of 44

Full-Text Articles in Entire DC Network

The Promise And Limits Of Lawfulness: Inequality, Law, And The Techlash, Salomé Viljoen Sep 2021

The Promise And Limits Of Lawfulness: Inequality, Law, And The Techlash, Salomé Viljoen

Articles

In response to widespread skepticism about the recent rise of “tech ethics”, many critics have called for legal reform instead. In contrast with the “ethics response”, critics consider the “lawfulness response” more capable of disciplining the excesses of the technology industry. In fact, both are simultaneously vulnerable to industry capture and capable of advancing a more democratic egalitarian agenda for the information economy. Both ethics and law offer a terrain of contestation, rather than a predetermined set of commitments by which to achieve more democratic and egalitarian technological production. In advancing this argument, the essay focuses on two misunderstandings common …


Regtech And Predictive Lawmaking: Closing The Reglag Between Prospective Regulated Activity And Regulation, John W. Bagby, Nizan G. Packin Apr 2021

Regtech And Predictive Lawmaking: Closing The Reglag Between Prospective Regulated Activity And Regulation, John W. Bagby, Nizan G. Packin

Michigan Business & Entrepreneurial Law Review

Regulation chronically suffers significant delay starting at the detectable initiation of a “regulable activity” and culminating at effective regulatory response. Regulator reaction is impeded by various obstacles: (i) confusion in optimal level, form and choice of regulatory agency, (ii) political resistance to creating new regulatory agencies, (iii) lack of statutory authorization to address particular novel problems, (iv) jurisdictional competition among regulators, (v) Congressional disinclination to regulate given political conditions, and (vi) a lack of expertise, both substantive and procedural, to deploy successful counter-measures. Delay is rooted in several stubborn institutions, including libertarian ideals permeating both the U.S. legal system and …


Designing Legal Experiences, Maximilian A. Bulinski, J.J. Prescott Feb 2021

Designing Legal Experiences, Maximilian A. Bulinski, J.J. Prescott

Book Chapters

Technological advancements are improving how courts operate by changing the way they handle proceedings and interact with litigants. Court Innovations is a socially minded software startup that enables citizens, law enforcement, and courts to resolve legal matters through Matterhorn, an online communication and dispute resolution platform. Matterhorn was conceived at the University of Michigan Law School and successfully piloted in two Michigan district courts beginning in 2014. The platform now operates in over 40 courts and in at least eight states, and it has facilitated the resolution of more than 40,000 cases to date. These numbers will continue to grow …


Clearing Opacity Through Machine Learning, W. Nicholson Price Ii, Arti K. Rai Jan 2021

Clearing Opacity Through Machine Learning, W. Nicholson Price Ii, Arti K. Rai

Articles

Artificial intelligence and machine learning represent powerful tools in many fields, ranging from criminal justice to human biology to climate change. Part of the power of these tools arises from their ability to make predictions and glean useful information about complex real-world systems without the need to understand the workings of those systems.


When Critical Race Theory Enters The Law & Technology Frame, Jessica M. Eaglin Jan 2021

When Critical Race Theory Enters The Law & Technology Frame, Jessica M. Eaglin

Michigan Journal of Race and Law

Michigan Technology Law Review is proud to partner with our peers to publish this essay by Professor Jessica Eaglin on the intertwining social construction of race, law and technology. This piece highlights how the approach to use technology as precise tools for criminal administration or objective solutions to societal issues often fails to consider how laws and technologies are created in our racialized society. If we do not consider how race and technology are co-productive, we will fail to reach substantive justice and instead reinforce existing racial hierarchies legitimated by laws.


Are Litigation Outcome Disparities Inevitable? Courts, Technology, And The Future Of Impartiality., Avital Mentovich, J.J. Prescott, Orna Rabinovich-Einy Jan 2020

Are Litigation Outcome Disparities Inevitable? Courts, Technology, And The Future Of Impartiality., Avital Mentovich, J.J. Prescott, Orna Rabinovich-Einy

Articles

This article explores the ability of technology—specifically, online judicial procedures—to eliminate systematic group-level litigation outcome disparities (i.e., disparities correlated with the visible identity markers of litigants). Our judicial system has long operated under the assumption that it can only be “impartial enough.” After all, judges, like all human beings, harbor implicit biases that are often sizable, unconscious, and triggered automatically, and research indicates that strategies to curb implicit biases in human decision making may be ineffective, especially in the face of the resource and caseload constraints of modern-day adjudication. The recent emergence of online court proceedings, however, offers new hope …


Location Tracking And Digital Data: Can Carpenter Build A Stable Privacy Doctrine?, Evan H. Caminker Jun 2019

Location Tracking And Digital Data: Can Carpenter Build A Stable Privacy Doctrine?, Evan H. Caminker

Articles

In Carpenter v United States, the Supreme Court struggled to modernize twentieth-century search and seizure precedents for the “Cyber Age.” Twice previously this decade the Court had tweaked Fourth Amendment doctrine to keep pace with advancing technology, requiring a search warrant before the government can either peruse the contents of a cell phone seized incident to arrest or use a GPS tracker to follow a car’s long-term movements.


Targeting Poverty In The Courts: Improving The Measurement Of Ability To Pay, Meghan M. O'Neil, Jj Prescott Mar 2019

Targeting Poverty In The Courts: Improving The Measurement Of Ability To Pay, Meghan M. O'Neil, Jj Prescott

Law & Economics Working Papers

Ability-to-pay determinations are essential when governments use money-based alternative sanctions, like fines, to enforce laws. One longstanding difficulty in the U.S. has been the extreme lack of guidance on how courts are to determine a litigant’s ability to pay. The result has been a seat-of-the-pants approach that is inefficient and inaccurate, and, as a consequence, very socially costly. Fortunately, online platform technology presents a promising avenue for reform. In particular, platform technology offers the potential to increase litigant access, reduce costs, and ensure consistent and fair treatment—all of which should lead to more accurate sanctions. We use interviews, surveys, and …


Carpenter's Legacy: Limiting The Scope Of The Electronic Private Search Doctrine, Sarah A. Mezera Jan 2019

Carpenter's Legacy: Limiting The Scope Of The Electronic Private Search Doctrine, Sarah A. Mezera

Michigan Law Review

One of the most significant challenges confronting courts and legal scholars in the twenty-first century is the application of Fourth Amendment doctrine to new technology. The circuit split over the application of the private search doctrine to electronic devices exemplifies how courts struggle to apply old doctrines to new circumstances. Some courts take the position that the old doctrine should apply consistently in the new context. Other courts have changed the scope of the old doctrine in order to account for the change in circumstances. The Supreme Court took the latter position in Carpenter v. United States and held that …


Platform Procedure: Using Technology To Facilitate (Efficient) Civil Settlement., J.J. Prescott, Alexander Sanchez Jan 2019

Platform Procedure: Using Technology To Facilitate (Efficient) Civil Settlement., J.J. Prescott, Alexander Sanchez

Book Chapters

In this chapter, we explore the ability of courts to enhance the role of substantive law in case outcomes by reducing party litigation costs. When it becomes less costly for parties to engage actively in dispute resolution, the shadow of substantive law should, in theory, become more pronounced and case outcomes should change (and hopefully become more accurate/efficient on average). To empirically investigate this hypothesis, we examine the consequences of a large state court’s implementation of court-assisted online dispute resolution (ODR) tools for its small claims docket. A central goal of this technology is to reduce litigation costs of all …


Fourth Amendment Constraints On The Technological Monitoring Of Convicted Sex Offenders, Ben A. Mcjunkin, J. J. Prescott Jul 2018

Fourth Amendment Constraints On The Technological Monitoring Of Convicted Sex Offenders, Ben A. Mcjunkin, J. J. Prescott

Articles

More than forty U.S. states currently track at least some of their convicted sex offenders using GPS devices. Many offenders will be monitored for life. The burdens and expense of living indefinitely under constant technological monitoring have been well documented, but most commentators have assumed that these burdens were of no constitutional moment because states have characterized such surveillance as ‘‘civil’’ in character—and courts have seemed to agree. In 2015, however, the Supreme Court decided in Grady v. North Carolina that attaching a GPS monitoring device to a person was a Fourth Amendment search, notwithstanding the ostensibly civil character of …


The Commodification Of Cryptocurrency, Neil Tiwari Jan 2018

The Commodification Of Cryptocurrency, Neil Tiwari

Michigan Law Review

Cryptocurrencies are digital tokens built on blockchain technology. This allows for a product that is fully decentralized, with no need for a third-party intermediary like a government or financial institution. Cryptocurrency creators use initial coin offerings (ICOs) to raise capital to build their tokens. Cryptocurrency ICOs are problematic because they do not fit neatly within either of two traditional categories—securities or commodities. Each of these categories has their own regulatory agency: the SEC for securities and the CFTC for commodities. At first blush, ICOs seem to be a sale of securities subject to regulation by the SEC, but this is …


Improving Access To Justice In State Courts With Platform Technology, J. J. Prescott Nov 2017

Improving Access To Justice In State Courts With Platform Technology, J. J. Prescott

Articles

Access to justice often equates to access to state courts, and for millions of Americans, using state courts to resolve their disputes—often with the government—is a real challenge. Reforms are regularly proposed in the hopes of improving the situation (e.g., better legal aid), but until recently a significant part of the problem has been structural. Using state courts today for all but the simplest of legal transactions entails at the very least traveling to a courthouse and meeting with a decision maker in person and in a one-on-one setting. Even minimally effective access, therefore, requires time, transportation, and very often …


Factors In Fairness And Emotion In Online Case Resolution Systems, Youyang Hou, Cliff Lampe, Maximilian Bulinski, J. J. Prescott May 2017

Factors In Fairness And Emotion In Online Case Resolution Systems, Youyang Hou, Cliff Lampe, Maximilian Bulinski, J. J. Prescott

Articles

Courts are increasingly adopting online information and communication technology, creating a need to consider the potential consequences of these tools for the justice system. Using survey responses from 209 litigants who had recently used an online case resolution system, we investigate factors that influenced litigants’ experiences of fairness and emotional feelings toward court officials. Our results show that ease of using the online case resolution system, the outcome of the case, and a litigant’s perceptions of procedural justice are positively associated both with whether the litigant views the process as fair and whether the litigant ultimately feels positive emotions toward …


Tightening The Ooda Loop: Police Militarization, Race, And Algorithmic Surveillance, Jeffrey L. Vagle Oct 2016

Tightening The Ooda Loop: Police Militarization, Race, And Algorithmic Surveillance, Jeffrey L. Vagle

Michigan Journal of Race and Law

This Article examines how military automated surveillance and intelligence systems and techniques, when used by civilian police departments to enhance predictive policing programs, have reinforced racial bias in policing. I will focus on two facets of this problem. First, I investigate the role played by advanced military technologies and methods within civilian police departments. These approaches have enabled a new focus on deterrence and crime prevention by creating a system of structural surveillance where decision support relies increasingly upon algorithms and automated data analysis tools and automates de facto penalization and containment based on race. Second, I will explore these …


Voluntary Disclosure Of Information As A Proposed Standard For The Fourth Amendment's Third-Party Doctrine, Margaret E. Twomey Jun 2015

Voluntary Disclosure Of Information As A Proposed Standard For The Fourth Amendment's Third-Party Doctrine, Margaret E. Twomey

Michigan Telecommunications & Technology Law Review

The third-party doctrine is a long-standing tenant of Fourth Amendment law that allows law enforcement officers to utilize information that was released to a third party without the probable cause required for a traditional search warrant. This has allowed law enforcement agents to use confidential informants, undercover agents, and access bank records of suspected criminals. However, in a digital age where exponentially more information is shared with Internet Service Providers, e-mail hosts, and social media “friends,” the traditional thirdparty doctrine ideas allow law enforcement officers access to a cache of personal information and data with a standard below probable cause. …


Sexting Prosecutions: Minors As A Protected Class From Child Pornography Charges, Sarah Thompson Oct 2014

Sexting Prosecutions: Minors As A Protected Class From Child Pornography Charges, Sarah Thompson

University of Michigan Journal of Law Reform Caveat

"Firt love is only a little foolishness and a lot of curiosity." -- George Bernard Shaw Teenagers will explore their sexuality; this is no new phenomenon. However, the ways that teens are exploring their curiosity is changing with technology. This trend has serious repercussions for teens, society, and the law. ‘Sexting’—defined as the act of sending sexually explicit photographs or messages via cell phone—is one recently-developed means of sexual exploration. The practice overlaps with the production, distribution, and possession of child pornography that is banned by both state and federal law. Due to the overlap, minors have been prosecuted under …


Technology, Ethics, And Access To Justice: Should An Alogrithm Be Deciding Your Case?, Anjanette H. Raymond, Scott J. Shackelford Jan 2014

Technology, Ethics, And Access To Justice: Should An Alogrithm Be Deciding Your Case?, Anjanette H. Raymond, Scott J. Shackelford

Michigan Journal of International Law

At a time of U.S. budget cuts, popularly known as the “sequester,” court systems across the nation are facing financial shortfalls. Small claims courts are no exception. Among the worst hit states is California, which is suffering staffing cutbacks that result in long delays prompting consideration of the old maxim, “justice delayed is justice denied.” Similar problems, albeit on a larger scale, are evident in other nations including India where the Law Commission has argued that the millions of pending cases combined with the lagging uptake of technological best practices has impeded judicial productivity, leading to “disappointment and dissatisfaction among …


A Victimless Sex Crime: The Case For Decriminalizing Consensual Teen Sexting, Joanna R. Lampe Jan 2013

A Victimless Sex Crime: The Case For Decriminalizing Consensual Teen Sexting, Joanna R. Lampe

University of Michigan Journal of Law Reform

As teenagers' access to cellular phones and the internet has increased over the past two decades, so has their ability to harm themselves and others through misuse of new technology. One risky behavior that has become common among teenagers is "sexting"--the digital sharing of sexually suggestive images. To combat the dangers of teen sexting, many states have criminalized the act. Criminalization does not resolve the issue of teen sexting, however, and in many cases it may cause additional harm. This Note reviews existing state laws related to teen sexting, and critiques these laws on constitutional and policy grounds. It then …


Exploring The First Amendment Rights Of Teens In Relationship To Sexting And Censorship, Julia Halloran Mclaughlin Feb 2012

Exploring The First Amendment Rights Of Teens In Relationship To Sexting And Censorship, Julia Halloran Mclaughlin

University of Michigan Journal of Law Reform

This Article explores child pornography law in relation to teen sexting conduct. Recently, some teens who engaged in teen sexting have been convicted under child pornography laws and have been required to register as sexual predators. The criminalization of teens for developmentally typical behavior, mimicking the conduct of adults, can result in grave harm to most teens. Furthermore, the application of child pornography laws to teen sexting conduct demonstrates the constitutional overbreadth of the current definition of child pornography. Photographs have an emblematic role in society-capturing and celebrating youth. Moreover, the creation of teen sexting images accompanies a teen's developmental …


No Cause Of Action: Video Surveillance In New York City, Olivia J. Greer Jan 2012

No Cause Of Action: Video Surveillance In New York City, Olivia J. Greer

Michigan Telecommunications & Technology Law Review

In 2010, New York City Police Commissioner Raymond Kelly announced a new network of video surveillance in the City. The new network would be able to prevent future terrorist attacks by identifying suspicious behavior before catastrophic events could take place. Kelly told reporters, "If we're looking for a person in a red jacket, we can call up all the red jackets filmed in the last 30 days," and "[w]e're beginning to use software that can identify suspicious objects or behaviors." Gothamist later made a witticism of Kelly's statement, remarking, "Note to terrorists: red jackets are not a good look for …


Privacy 3.0-The Principle Of Proportionality, Andrew B. Serwin Jul 2009

Privacy 3.0-The Principle Of Proportionality, Andrew B. Serwin

University of Michigan Journal of Law Reform

Individual concern over privacy has existed as long as humans have said or done things they do not wish others to know about. In their groundbreaking law review article The Right to Privacy, Warren and Brandeis posited that the common law should protect an individual's right to privacy under a right formulated as the right to be let alone-Privacy 1.0. As technology advanced and societal values also changed, a belief surfaced that the Warren and Brandeis formulation did not provide sufficient structure for the development of privacy laws. As such, a second theoretical construct of privacy, Privacy 2.0 as …


Justice, And Only Justice, You Shall Pursue: Network Neutrality, The First Amendment And John Rawls's Theory Of Justice, Amit M. Schejter, Moran Yemini Jan 2007

Justice, And Only Justice, You Shall Pursue: Network Neutrality, The First Amendment And John Rawls's Theory Of Justice, Amit M. Schejter, Moran Yemini

Michigan Telecommunications & Technology Law Review

As broadband becomes the public's technology of choice to access the Internet, it is also emerging as the battlefield upon which the struggle for control of the Internet is being fought. Operators who provide physical access to the service claim the right to discriminate among the content providers who use the infrastructure in which the operators have invested. In contrast, content providers warn that exercising such a policy would "undermine the principles that have made the Internet such a success."[...] For academic observers, analysis of this issue has thus far been confined to the areas of property law, innovation, and …


Biometrics: Weighing Convenience And National Security Against Your Privacy, Lauren D. Adkins Jan 2007

Biometrics: Weighing Convenience And National Security Against Your Privacy, Lauren D. Adkins

Michigan Telecommunications & Technology Law Review

The biometric identifier relies on an individual's unique biological information such as a hand, iris, fingerprint, facial or voice print. When used for verification purposes, a "one-to-one" match is generated in under one second. Biometric technology can substantially improve national security by identifying and verifying individuals in a number of different contexts, providing security in ways that exceed current identification technology and limiting access to areas where security breaches are especially high, such as airport tarmacs and critical infrastructure facilities. At the same time, a legitimate public concern exists concerning the misuse of biometric technology to invade or violate personal …


21st Century Copyright Law In The Digital Domain Symposium Transcript, Symposium Panelists Oct 2006

21st Century Copyright Law In The Digital Domain Symposium Transcript, Symposium Panelists

Michigan Telecommunications & Technology Law Review

21st Century Copyright Law in the Digital Domain Symposium held at Universtiy of Michigan Law School Friday, March 24, 2006


Sexual Harassment: Limiting The Affirmative Defense In The Digital Workplace, Donald P. Harris, Daniel B. Garrie, Matthew J. Armstrong Oct 2005

Sexual Harassment: Limiting The Affirmative Defense In The Digital Workplace, Donald P. Harris, Daniel B. Garrie, Matthew J. Armstrong

University of Michigan Journal of Law Reform

Digital communications sexual harassment is on the rise. Such harassment occurs through sexually offensive and unwarranted e-mails, placing harassing messages on electronic bulletin boards, and other forms of harassment that occur through the Internet. To date, courts have remained silent on the issue of sexual harassment by digital communications. Should this type of harassment be treated any differently than harassment that occurs in the physical space? The somewhat surprising answer is yes.

This Article advocates applying a new judicial framework for addressing digital communications sexual harassment. This new framework accounts for the real-world technology in the digital workplace and the …


The Fourth Amendment And New Technologies: Constitutional Myths And The Case For Caution, Orin S. Kerr Mar 2004

The Fourth Amendment And New Technologies: Constitutional Myths And The Case For Caution, Orin S. Kerr

Michigan Law Review

To one who values federalism, federal preemption of state law may significantly threaten the autonomy and core regulatory authority of The Supreme Court recently considered whether a1mmg an infrared thermal imaging device at a suspect's home can violate the Fourth Amendment. Kyllo v. United States announced a new and comprehensive rule: the government's warrantless use of senseenhancing technology that is "not in general use" violates the Fourth Amendment when it yields "details of the home that would previously have been unknowable without physical intrusion." Justice Scalia's majority opinion acknowledged that the Court's rule was not needed to resolve the case …


A World Without Privacy: Why Property Does Not Define The Limits Of The Right Against Unreasonable Searches And Seizures, Sherry F. Colb Mar 2004

A World Without Privacy: Why Property Does Not Define The Limits Of The Right Against Unreasonable Searches And Seizures, Sherry F. Colb

Michigan Law Review

Imagine for a moment that it is the year 2020. An American company has developed a mind-reading device, called the "brain wave recorder" ("BWR"). The BWR is a highly sensitive instrument that detects electrical impulses from any brain within ten feet of the machine. Though previously thought impossible, the BWR can discern the following information about the target individual: (1) whether he or she is happy, sad, anxious, depressed, or irritable; (2) whether he or she is even slightly sexually aroused; (3) whether he or she is taking any medication (and if so, what the medication is); (4) if a …


Katz Is Dead. Long Live Katz, Peter P. Swire Mar 2004

Katz Is Dead. Long Live Katz, Peter P. Swire

Michigan Law Review

Katz v. United States is the king of Supreme Court surveillance cases. Written in 1967, it struck down the earlier regime of property rules, declaring that "the Fourth Amendment protects people, not places." The concurrence by Justice Harlan announced the new regime - court-issued warrants are required where there is an infringement on a person's "reasonable expectation of privacy." Together with the companion case Berger v. New York, Katz has stood for a grand conception of the Fourth Amendment as a bulwark against wiretaps and other emerging forms of surveillance. Professor Orin Kerr, in his excellent article, shows that …


Technology, Privacy, And The Courts: A Reply To Colb And Swire, Orin S. Kerr Mar 2004

Technology, Privacy, And The Courts: A Reply To Colb And Swire, Orin S. Kerr

Michigan Law Review

I thank Sherry Colb and Peter Swire for devoting their time and considerable talents to responding to my article, The Fourth Amendment and New Technologies: Constitutional Myths and the Case for Caution. I will conclude with a few comments.