Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 71

Full-Text Articles in Law

Regtech And Predictive Lawmaking: Closing The Reglag Between Prospective Regulated Activity And Regulation, John W. Bagby, Nizan G. Packin Apr 2021

Regtech And Predictive Lawmaking: Closing The Reglag Between Prospective Regulated Activity And Regulation, John W. Bagby, Nizan G. Packin

Michigan Business & Entrepreneurial Law Review

Regulation chronically suffers significant delay starting at the detectable initiation of a “regulable activity” and culminating at effective regulatory response. Regulator reaction is impeded by various obstacles: (i) confusion in optimal level, form and choice of regulatory agency, (ii) political resistance to creating new regulatory agencies, (iii) lack of statutory authorization to address particular novel problems, (iv) jurisdictional competition among regulators, (v) Congressional disinclination to regulate given political conditions, and (vi) a lack of expertise, both substantive and procedural, to deploy successful counter-measures. Delay is rooted in several stubborn institutions, including libertarian ideals permeating both the U.S. legal system and …


When Critical Race Theory Enters The Law & Technology Frame, Jessica M. Eaglin Jan 2021

When Critical Race Theory Enters The Law & Technology Frame, Jessica M. Eaglin

Michigan Journal of Race and Law

Michigan Technology Law Review is proud to partner with our peers to publish this essay by Professor Jessica Eaglin on the intertwining social construction of race, law and technology. This piece highlights how the approach to use technology as precise tools for criminal administration or objective solutions to societal issues often fails to consider how laws and technologies are created in our racialized society. If we do not consider how race and technology are co-productive, we will fail to reach substantive justice and instead reinforce existing racial hierarchies legitimated by laws.


How Reporters Can Evaluate Automated Driving Announcements, Bryant Walker Smith Jan 2020

How Reporters Can Evaluate Automated Driving Announcements, Bryant Walker Smith

Journal of Law and Mobility

This article identifies a series of specific questions that reporters can ask about claims made by developers of automated motor vehicles (“AVs”). Its immediate intent is to facilitate more critical, credible, and ultimately constructive reporting on progress toward automated driving. In turn, reporting of this kind advances three additional goals. First, it encourages AV developers to qualify and support their public claims. Second, it appropriately manages public expectations about these vehicles. Third, it fosters more technical accuracy and technological circumspection in legal and policy scholarship.


Reinvigorating The Human Right To Technology, Haochen Sun Jan 2020

Reinvigorating The Human Right To Technology, Haochen Sun

Michigan Journal of International Law

The right to technology is a forgotten human right. Dating back to 1948, the right was established by the Universal Declaration of Human Rights (“UDHR”) in response to the massive destruction wrought by technologically advanced weapons in the Second World War. This human right embodies one of the most profound lessons the framers of the UDHR learned from this war: Technology must benefit humanity rather than harm it.

It has been more than seventy years since the adoption of the UDHR, and technology has advanced at a rapid pace and become more important than ever in our daily lives. Yet …


Digital Colonialism: The 21st Century Scramble For Africa Through The Extraction And Control Of User Data And The Limitations Of Data Protection Laws, Danielle Coleman May 2019

Digital Colonialism: The 21st Century Scramble For Africa Through The Extraction And Control Of User Data And The Limitations Of Data Protection Laws, Danielle Coleman

Michigan Journal of Race and Law

As Western technology companies increasingly rely on user data globally, extensive data protection laws and regulations emerged to ensure ethical use of that data. These same protections, however, do not exist uniformly in the resource-rich, infrastructure-poor African countries, where Western tech seeks to establish its presence. These conditions provide an ideal landscape for digital colonialism.

Digital colonialism refers to a modern-day “Scramble for Africa” where largescale tech companies extract, analyze, and own user data for profit and market influence with nominal benefit to the data source. Under the guise of altruism, large scale tech companies can use their power and …


Carpenter's Legacy: Limiting The Scope Of The Electronic Private Search Doctrine, Sarah A. Mezera Jan 2019

Carpenter's Legacy: Limiting The Scope Of The Electronic Private Search Doctrine, Sarah A. Mezera

Michigan Law Review

One of the most significant challenges confronting courts and legal scholars in the twenty-first century is the application of Fourth Amendment doctrine to new technology. The circuit split over the application of the private search doctrine to electronic devices exemplifies how courts struggle to apply old doctrines to new circumstances. Some courts take the position that the old doctrine should apply consistently in the new context. Other courts have changed the scope of the old doctrine in order to account for the change in circumstances. The Supreme Court took the latter position in Carpenter v. United States and held that …


The Commodification Of Cryptocurrency, Neil Tiwari Jan 2018

The Commodification Of Cryptocurrency, Neil Tiwari

Michigan Law Review

Cryptocurrencies are digital tokens built on blockchain technology. This allows for a product that is fully decentralized, with no need for a third-party intermediary like a government or financial institution. Cryptocurrency creators use initial coin offerings (ICOs) to raise capital to build their tokens. Cryptocurrency ICOs are problematic because they do not fit neatly within either of two traditional categories—securities or commodities. Each of these categories has their own regulatory agency: the SEC for securities and the CFTC for commodities. At first blush, ICOs seem to be a sale of securities subject to regulation by the SEC, but this is …


Technology-Based? Cost Factoring In U.S. Environmental Standards, Jamison E. Colburn Nov 2017

Technology-Based? Cost Factoring In U.S. Environmental Standards, Jamison E. Colburn

Michigan Journal of Environmental & Administrative Law

Environmental controls in the United States are often said to be “technology-based” because the polluter’s duties are determined by the available technology for controlling that pollution rather than by the social costs and benefits of doing so. Indeed, this is much of what distinguishes U.S. environmental law post-1970 from that which preceded it. But technology-based standards have in fact weighed the costs of controlling pollution in unique, often obscure ways, yielding an analysis that defies standardization and basic notions of transparency. Often lumped under an umbrella heading called “feasibility” analysis and justified on the grounds that it avoids many of …


Tightening The Ooda Loop: Police Militarization, Race, And Algorithmic Surveillance, Jeffrey L. Vagle Oct 2016

Tightening The Ooda Loop: Police Militarization, Race, And Algorithmic Surveillance, Jeffrey L. Vagle

Michigan Journal of Race and Law

This Article examines how military automated surveillance and intelligence systems and techniques, when used by civilian police departments to enhance predictive policing programs, have reinforced racial bias in policing. I will focus on two facets of this problem. First, I investigate the role played by advanced military technologies and methods within civilian police departments. These approaches have enabled a new focus on deterrence and crime prevention by creating a system of structural surveillance where decision support relies increasingly upon algorithms and automated data analysis tools and automates de facto penalization and containment based on race. Second, I will explore these …


Privacy Almighty? The Cjeu's Judgment In Google Spain Sl V. Aepd, David J. Stute Dec 2015

Privacy Almighty? The Cjeu's Judgment In Google Spain Sl V. Aepd, David J. Stute

Michigan Journal of International Law

The Internet has matured into an unprecedented repository of data, retrievable through myriad unique “links,” or Uniform Resource Locators. Yet, this wealth of information only became broadly accessible through the invention and continual development of algorithm-based search engines. Keyword searches empowered search-engine users to find—and sometimes stumble upon—information with great ease. Indeed, search-engine indices arguably have become the most comprehensive catalogues of information the world has ever seen. This wealth of accessible information poses challenges to traditional notions of privacy: aspects of our private and public lives, which previously would have rarely left the vicinities of our immediate social or …


Loopholes For Circumventing The Constitution: Unrestrained Bulk Surveillance On Americans By Collecting Network Traffic Abroad, Axel Arnbak, Sharon Goldberg Jun 2015

Loopholes For Circumventing The Constitution: Unrestrained Bulk Surveillance On Americans By Collecting Network Traffic Abroad, Axel Arnbak, Sharon Goldberg

Michigan Telecommunications & Technology Law Review

This Article reveals interdependent legal and technical loopholes that the US intelligence community could use to circumvent constitutional and statutory safeguards for Americans. These loopholes involve the collection of Internet traffic on foreign territory, and leave Americans as unprotected as foreigners by current United States (US) surveillance laws. This Article will also describe how modern Internet protocols can be manipulated to deliberately divert American’s traffic abroad, where traffic can then be collected under a more permissive legal regime (Executive Order 12333) that is overseen solely by the executive branch of the US government. Although the media has reported on some …


Voluntary Disclosure Of Information As A Proposed Standard For The Fourth Amendment's Third-Party Doctrine, Margaret E. Twomey Jun 2015

Voluntary Disclosure Of Information As A Proposed Standard For The Fourth Amendment's Third-Party Doctrine, Margaret E. Twomey

Michigan Telecommunications & Technology Law Review

The third-party doctrine is a long-standing tenant of Fourth Amendment law that allows law enforcement officers to utilize information that was released to a third party without the probable cause required for a traditional search warrant. This has allowed law enforcement agents to use confidential informants, undercover agents, and access bank records of suspected criminals. However, in a digital age where exponentially more information is shared with Internet Service Providers, e-mail hosts, and social media “friends,” the traditional thirdparty doctrine ideas allow law enforcement officers access to a cache of personal information and data with a standard below probable cause. …


Sexting Prosecutions: Minors As A Protected Class From Child Pornography Charges, Sarah Thompson Oct 2014

Sexting Prosecutions: Minors As A Protected Class From Child Pornography Charges, Sarah Thompson

University of Michigan Journal of Law Reform Caveat

"Firt love is only a little foolishness and a lot of curiosity." -- George Bernard Shaw Teenagers will explore their sexuality; this is no new phenomenon. However, the ways that teens are exploring their curiosity is changing with technology. This trend has serious repercussions for teens, society, and the law. ‘Sexting’—defined as the act of sending sexually explicit photographs or messages via cell phone—is one recently-developed means of sexual exploration. The practice overlaps with the production, distribution, and possession of child pornography that is banned by both state and federal law. Due to the overlap, minors have been prosecuted under …


Holding Up And Holding Out, Colleen V. Chien Jan 2014

Holding Up And Holding Out, Colleen V. Chien

Michigan Telecommunications & Technology Law Review

Patent “hold-up” and patent “hold-out” present important, alternative theories for what ails the patent system. Patent “hold-up” occurs when a patent owner sues a company when it is most vulnerable—after it has implemented a technology—and is able wrest a settlement because it is too late for the company to change course. Patent “hold-out” is the practice of companies routinely ignoring patents and resisting patent owner demands because the odds of getting caught are small. Hold-up has arguably predicted the current patent crises, and the ex ante assertion of technology patents whether in the smartphone war, standards, or patent “troll” context. …


District Courts Versus The Usitc: Considering Exclusionary Relief For F/Rand-Encumbered Standard-Essential Patents, Helen H. Ji Jan 2014

District Courts Versus The Usitc: Considering Exclusionary Relief For F/Rand-Encumbered Standard-Essential Patents, Helen H. Ji

Michigan Telecommunications & Technology Law Review

Technological standards allow manufacturers and consumers to rely upon these agreed-upon basic systems to facilitate sales and further invention. However, where these standards involved patented technology, the process of standard-setting raises many concerns at the intersection of antitrust and patent law. As patent holders advocate for their patents to become part of technological standards, how should courts police this activity to prevent patent holdup and other anti-competitive practices? This Note explores the differing approaches to remedies employed by the United States International Trade Commission and the United States District Courts where standard-essential patents are infringed. This Note further proposes that …


Technology, Ethics, And Access To Justice: Should An Alogrithm Be Deciding Your Case?, Anjanette H. Raymond, Scott J. Shackelford Jan 2014

Technology, Ethics, And Access To Justice: Should An Alogrithm Be Deciding Your Case?, Anjanette H. Raymond, Scott J. Shackelford

Michigan Journal of International Law

At a time of U.S. budget cuts, popularly known as the “sequester,” court systems across the nation are facing financial shortfalls. Small claims courts are no exception. Among the worst hit states is California, which is suffering staffing cutbacks that result in long delays prompting consideration of the old maxim, “justice delayed is justice denied.” Similar problems, albeit on a larger scale, are evident in other nations including India where the Law Commission has argued that the millions of pending cases combined with the lagging uptake of technological best practices has impeded judicial productivity, leading to “disappointment and dissatisfaction among …


Wireless Localism: Beyond The Shroud Of Objectivity In Federal Spectrum Administration, Olivier Sylvain Dec 2013

Wireless Localism: Beyond The Shroud Of Objectivity In Federal Spectrum Administration, Olivier Sylvain

Michigan Telecommunications & Technology Law Review

Recent innovations in mobile wireless technology have instigated a debate between two camps of legal scholars about federal administration of the electromagnetic spectrum. The first camp argues that the Federal Communications Commission (“FCC”) should define spectrum use rights more clearly and give spectrum licensees broad property rights in frequencies. The second camp argues that, rather than award exclusive licenses to the highest bidder, the FCC ought to open much, if not most, of the spectrum to unlicensed use by smartphones and tablets equipped with the newest spectrum administration technology. First, this Article shows that both of these camps comprise a …


Power To The People: Why We Need Full Federal Preemption Of Electrical Transmission Regulation, Max Hensley Jun 2013

Power To The People: Why We Need Full Federal Preemption Of Electrical Transmission Regulation, Max Hensley

University of Michigan Journal of Law Reform

State and federal governments have made significant investments in the development and installation of renewable energy technology. However, further increases in renewable power use have been stymied by the continued mismatch between the national interest in connecting consumers with utility-scale wind and solar installations and state and local control over the siting of electrical transmission lines. Because renewable power potential is often located far from consumers, transmission lines must cross multiple jurisdictions whose local interests have tended to prevent or significantly delay development. This Note analyzes that disconnect, reviews academic and legislative proposals to overcome it, and proposes a way …


Geographically Restricted Streaming Content And Evasion Of Geolocation: The Applicability Of The Copyright Anticircumvention Rules, Jerusha Burnett Jan 2013

Geographically Restricted Streaming Content And Evasion Of Geolocation: The Applicability Of The Copyright Anticircumvention Rules, Jerusha Burnett

Michigan Telecommunications & Technology Law Review

A number of methods currently exist or are being developed to determine where Internet users are located geographically when they access a particular webpage. Yet regardless of the precautions taken by website operators to limit the locations from which they allow access, it is likely that users will find ways to gain access to restricted content. Should the evasion of geolocation constitute circumvention of access controls so that § 1201 of the Digital Millennium Copyright Act ("DMCA") applies? Because location data can properly be considered personally identifiable information ("PII"), this Note argues that § 1201 should not apply absent a …


Does The Constitution Protect Abortions Based On Fetal Anomaly?: Examining The Potential For Disability-Selective Abortion Bans In The Age Of Prenatal Whole Genome Sequencing, Greer Donley Jan 2013

Does The Constitution Protect Abortions Based On Fetal Anomaly?: Examining The Potential For Disability-Selective Abortion Bans In The Age Of Prenatal Whole Genome Sequencing, Greer Donley

Michigan Journal of Gender & Law

This Note examines whether the state or federal government has the power to enact a law that prevents women from obtaining abortions based on their fetus’s genetic abnormality. Such a ban has already been enacted in North Dakota and introduced in Indiana and Missouri. I argue below that this law presents a novel state intrusion on a woman’s right to obtain a pre-viability abortion. Moreover, these pieces of legislation contain an outdated understanding of prenatal genetic testing—-the landscape of which is quickly evolving as a result of a new technology: prenatal whole genome sequencing. This Note argues that the incorporation …


Rulemaking Vs. Democracy: Judging And Nudging Public Participation That Counts , Cynthia R. Farina, Mary Newhart, Josiah Heidt, Cornell Erulemaking Initiative Sep 2012

Rulemaking Vs. Democracy: Judging And Nudging Public Participation That Counts , Cynthia R. Farina, Mary Newhart, Josiah Heidt, Cornell Erulemaking Initiative

Michigan Journal of Environmental & Administrative Law

This Article considers how open government “magical thinking” around technology has infused efforts to increase public participation in rulemaking. We propose a framework for assessing the value of technology-enabled rulemaking participation and offer specific principles of participation-system design, which are based on conceptual work and practical experience in the Regulation Room project at Cornell University. An underlying assumption of open government enthusiasts is that more public participation will lead to better government policymaking: If we use technology to give people easier opportunities to participate in public policymaking, they will use these opportunities to participate effectively. However, experience thus far with …


Student Intellectual Property Issues On The Entrepreneurial Campus, Bryce C. Pilz Jan 2012

Student Intellectual Property Issues On The Entrepreneurial Campus, Bryce C. Pilz

Michigan Business & Entrepreneurial Law Review

This article examines issues that are more frequently arising for universities concerning intellectual property in student inventions. It seeks to identify the issue, explain the underlying law, identify actual and proposed solutions to these issues, and explain the legal ramifications of these potential solutions.


Energy Subsidies, Market Distortion, And A Free Market Alternative, Hans Biebl Jan 2012

Energy Subsidies, Market Distortion, And A Free Market Alternative, Hans Biebl

University of Michigan Journal of Law Reform Caveat

Gas and coal are cheap. They are cheap because the U.S. government subsidizes their production. The result is that the marketplace does not recognize the true cost of fossil fuels. Without the subsidies, Americans—for the first time in nearly a hundred years—would experience the cost of unsubsidized fossil fuels. In a newly competitive marketplace, renewable sources of energy would be in a better position to compete. Without gas and coal subsidies, clean energy producers, who have not been able to compete with the low price of fossil fuels, might be more willing to invest in “clean, renewable, and more energy …


"Like" Your President: A Case For Online Voting, Jeremy Garson Jan 2012

"Like" Your President: A Case For Online Voting, Jeremy Garson

University of Michigan Journal of Law Reform Caveat

In the wake of Hurricane Sandy, New Jersey allowed displaced residents to vote in the 2012 elections by email. The option to vote online has been available to military members stationed overseas since 2009. New Jersey’s decision to open online voting to civilians raises the question of why this shift didn’t take place sooner. Assuming New Jersey’s system holds up under post-election scrutiny, why not utilize it to the fullest extent possible? Online voter registration is already permitted by eleven states, including the liberal, infrastructure-rich, population-heavy California and the conservative, sparsely populated Alaska. Extending the registration system to voting itself …


High-Frequency Trading: Should Regulators Do More, Matt Prewitt Jan 2012

High-Frequency Trading: Should Regulators Do More, Matt Prewitt

Michigan Telecommunications & Technology Law Review

High-Frequency Trading ("HFT") is a diverse set of algorithmic trading strategies characterized by fast order execution. Its importance in international markets has increased vastly in recent years. From a regulatory perspective, HFT presents difficult and partially unresolved questions. The difficulties stem partly from the fact that HFT encompasses a wide range of trading strategies, and partly from a dearth of unambiguous empirical findings about HFT's effects on markets. Yet certain important conclusions are broadly accepted. HFT can increase systemic risk by causing or exacerbating events like the "Flash Crash" of May 6, 2010. HFT can also enable market manipulators to …


No Cause Of Action: Video Surveillance In New York City, Olivia J. Greer Jan 2012

No Cause Of Action: Video Surveillance In New York City, Olivia J. Greer

Michigan Telecommunications & Technology Law Review

In 2010, New York City Police Commissioner Raymond Kelly announced a new network of video surveillance in the City. The new network would be able to prevent future terrorist attacks by identifying suspicious behavior before catastrophic events could take place. Kelly told reporters, "If we're looking for a person in a red jacket, we can call up all the red jackets filmed in the last 30 days," and "[w]e're beginning to use software that can identify suspicious objects or behaviors." Gothamist later made a witticism of Kelly's statement, remarking, "Note to terrorists: red jackets are not a good look for …


Enhancing Public Access To Online Rulemaking Information, Cary Coglianese Jan 2012

Enhancing Public Access To Online Rulemaking Information, Cary Coglianese

Michigan Journal of Environmental & Administrative Law

One of the most significant powers exercised by federal agencies is their power to make rules. Given the importance of agency rulemaking, the process by which agencies develop rules has long been subject to procedural requirements aiming to advance democratic values of openness and public participation. With the advent of the digital age, government agencies have engaged in increasing efforts to make rulemaking information available online as well as to elicit public participation via electronic means of communication. How successful are these efforts? How might they be improved? In this article, I investigate agencies’ efforts to make rulemaking information available …


Limiting The Affirmative Defense In The Digital Workplace , Daniel B. Garrie Jan 2012

Limiting The Affirmative Defense In The Digital Workplace , Daniel B. Garrie

Michigan Journal of Gender & Law

From 2009 to 2011, there were more than 30,000 sexual harassment claims filed in the United States. The ubiquitous availability of digital technology devices has facilitated many instances of sexual harassment. Such sexual harassment occurs through unprovoked and offensive e-mails, messages posted on electronic bulletin boards, and other means available on the Internet. To date, courts remain silent on this issue. Should this type of sexual harassment be treated differently from physical sexual harassment? The surprising answer is yes. This Article suggests a new judicial framework for addressing sexual harassment perpetrated through digital communications. This framework accounts for the real-world …


A Global Panopticon - The Changing Role Of International Organizations In The Information Age, Jennifer Shkabatur Oct 2011

A Global Panopticon - The Changing Role Of International Organizations In The Information Age, Jennifer Shkabatur

Michigan Journal of International Law

The outbreaks of Severe Acute Respiratory Syndrome (SARS) in 2002-2003 and Swine Flu (H1N1) in 2009 captured a great deal of global attention. The swift spread of these diseases wreaked havoc, generated public hysteria, disrupted global trade and travel, and inflicted severe economic losses to countries, corporations, and individuals. Although affected states were required to report to the World Health Organization (WHO) events that may have constituted a public health emergency, many failed to do so. The WHO and the rest of the international community were therefore desperate for accurate, up-to-date information as to the nature of the pandemics, their …


Creating A Plug-In Electric Vehicle Industry Cluster In Michigan: Prospects And Policy Options, Thomas P. Lyon, Russell A. Baruffi Jr. Jan 2011

Creating A Plug-In Electric Vehicle Industry Cluster In Michigan: Prospects And Policy Options, Thomas P. Lyon, Russell A. Baruffi Jr.

Michigan Telecommunications & Technology Law Review

This Article seeks to examine how policy can be used strategically to foster the development of a plug-in electric vehicle ("PEV") industry cluster in Michigan. The tendency for certain industries to localize in particular regions has captured the interest of much economic research and policy discussion in recent years. The trend toward the clustering of new industries has stayed strong despite the acceleration of globalization. Attention to clusters has proven to be an enduring theme in economic development circles for nearly thirty years. Clusters generate synergies that make industrial activity greater than the sum of contributions by individual players. In …