Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Law

Technology-Based? Cost Factoring In U.S. Environmental Standards, Jamison E. Colburn Nov 2017

Technology-Based? Cost Factoring In U.S. Environmental Standards, Jamison E. Colburn

Michigan Journal of Environmental & Administrative Law

Environmental controls in the United States are often said to be “technology-based” because the polluter’s duties are determined by the available technology for controlling that pollution rather than by the social costs and benefits of doing so. Indeed, this is much of what distinguishes U.S. environmental law post-1970 from that which preceded it. But technology-based standards have in fact weighed the costs of controlling pollution in unique, often obscure ways, yielding an analysis that defies standardization and basic notions of transparency. Often lumped under an umbrella heading called “feasibility” analysis and justified on the grounds that it avoids many of …


Uber, Lyft, And Regulating The Sharing Economy, Brett Harris Oct 2017

Uber, Lyft, And Regulating The Sharing Economy, Brett Harris

Seattle University Law Review

The “sharing economy” goes by many names such as the “gig economy,” the “1099 economy,” and the “on-demand economy,” all of which describe the economic system that uses online platforms to connect workers and sellers with clients and consumers, primarily through smartphone applications. Many of the sharing economy companies are also called the “tech disruptors.” They earned this title because they have changed the way that people do business. But in changing the way that people do business, they have also created unique regulatory challenges for governments across the country. The news is rife with stories about when these regulations …


Cybersecurity Stovepiping, David Thaw Jan 2017

Cybersecurity Stovepiping, David Thaw

Articles

Most readers of this Article probably have encountered – and been frustrated by – password complexity requirements. Such requirements have become a mainstream part of contemporary culture: "the more complex your password is, the more secure you are, right?" So the cybersecurity experts tell us… and policymakers have accepted this "expertise" and even adopted such requirements into law and regulation.

This Article asks two questions. First, do complex passwords actually achieve the goals many experts claim? Does using the password "Tr0ub4dor&3" or the passphrase "correcthorsebatterystaple" actually protect your account? Second, if not, then why did such requirements become so widespread? …