Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Cybersecurity (3)
- Internet (3)
- Liability (2)
- Access to information (1)
- Advertising (1)
-
- Angie's List (1)
- Appliances (1)
- Avvo (1)
- Consumers (1)
- Corporate governance (1)
- Corporations (1)
- Credibility (1)
- Cybersecurity Information Sharing Act (1)
- Damages (1)
- Denial of service (1)
- Due diligence (1)
- Hacking (1)
- Information (1)
- Information sharing (1)
- Internet of things (1)
- Law reform (1)
- Manufacturers (1)
- Privacy (1)
- Products liability (1)
- Regulation (1)
- Risk (1)
- Risk management (1)
- Sustainable development (1)
- Websites (1)
- Yelp (1)
Articles 1 - 4 of 4
Full-Text Articles in Law
Do We Need Help Using Yelp? Regulating Advertising On Mediated Reputation Systems, David Adam Friedman
Do We Need Help Using Yelp? Regulating Advertising On Mediated Reputation Systems, David Adam Friedman
University of Michigan Journal of Law Reform
Yelp, Angie’s List, Avvo, and similar entities enable consumers to access an incredibly useful trove of information about peer experiences with businesses and their goods and services. These “mediated reputation systems,” gatherers and disseminators of consumer peer opinions, are more trusted by consumers than traditional commercial channels. They are omnipresent, carried everywhere on mobile devices, and used by consumers ready to transact.
Though this information is valuable, a troubling conflict emerges in its presentation. Most of these reputation platforms rely heavily on advertising sales to support their business models. This reliance compels these entities to display persuasive advertising right along …
Human Rights And Cybersecurity Due Diligence: A Comparative Study, Scott J. Shackelford
Human Rights And Cybersecurity Due Diligence: A Comparative Study, Scott J. Shackelford
University of Michigan Journal of Law Reform
No company, just like no nation, is an island in cyberspace; the actions of actors from hacktivists to nation-states have the potential to impact the bottom line, along with the human rights of consumers and the public writ large. To help meet the multifaceted challenges replete in a rapidly globalizing world—and owing to the relative lack of binding international law to regulate both cybersecurity and the impact of business on human rights—companies are reconceptualizing what constitutes “due diligence.” This Article takes lessons from both the cybersecurity and human rights due diligence contexts to determine areas for cross-pollination in an effort …
Automating Threat Sharing: How Companies Can Best Ensure Liability Protection When Sharing Cyber Threat Information With Other Companies Or Organizations, Ari Schwartz, Sejal C. Shah, Matthew H. Mackenzie, Sheena Thomas, Tara Sugiyama Potashnik, Bri Law
Automating Threat Sharing: How Companies Can Best Ensure Liability Protection When Sharing Cyber Threat Information With Other Companies Or Organizations, Ari Schwartz, Sejal C. Shah, Matthew H. Mackenzie, Sheena Thomas, Tara Sugiyama Potashnik, Bri Law
University of Michigan Journal of Law Reform
This Article takes an in-depth look at the evolution of cybersecurity information sharing legislation, leading to the recent passage of the Cybersecurity Information Sharing Act (CISA) and offers insights into how automated information sharing mechanisms and associated requirements implemented pursuant to CISA can be leveraged to help ensure liability protections when engaging in cyber threat information sharing with and amongst other non-federal government entities.
Products Liability And The Internet Of (Insecure) Things: Should Manufacturers Be Liable For Damage Caused By Hacked Devices?, Alan Butler
University of Michigan Journal of Law Reform
While the application of products liability to insecure software is a frequently-discussed concept in academic literature, many commentators have been skeptical of the viability of such claims for several reasons. First, the economic loss doctrine bars recovery for productivity loss, business disruption, and other common damages caused by software defects. Second, the application of design defects principles to software is difficult given the complexity of the devices and recent tort reform trends that have limited liability. Third, the intervening cause of damage from insecure software is typically a criminal or tortious act by a third party, so principles of causation …