Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Law

Breadcrumbs: Privacy As A Privilege, Prachi Bhardwaj Dec 2017

Breadcrumbs: Privacy As A Privilege, Prachi Bhardwaj

Capstones

Breadcrumbs: Privacy as a Privilege Abstract

By: Prachi Bhardwaj

In 2017, the world saw more data breaches than in any year prior. The count was more than the all-time high record in 2016, which was 40 percent more than the year before that.

That’s because consumer data is incredibly valuable today. In the last three decades, data storage has gone from being stored physically to being stored almost entirely digitally, which means consumer data is more accessible and applicable to business strategies. As a result, companies are gathering data in ways previously unknown to the average consumer, and hackers are …


The Sky Is Not Falling: An Analysis Of The National Strategy For Trusted Identities In Cyberspace And The Proposed Identity Ecosystem, Aaron L. Jackson Aug 2017

The Sky Is Not Falling: An Analysis Of The National Strategy For Trusted Identities In Cyberspace And The Proposed Identity Ecosystem, Aaron L. Jackson

Oklahoma Journal of Law and Technology

No abstract provided.


New Threats To Vehicle Safety: How Cybersecurity Policy Will Shape The Future Of Autonomous Vehicles, Caleb Kennedy Apr 2017

New Threats To Vehicle Safety: How Cybersecurity Policy Will Shape The Future Of Autonomous Vehicles, Caleb Kennedy

Michigan Telecommunications & Technology Law Review

This note assesses the threat that hacking and related cybersecurity issues will pose to autonomous vehicles. Given the sweeping safety benefits autonomous vehicles will potentially bring to society, protecting against hacking and cyber-threats must be one of the top priorities for industry and public safety officials if autonomous vehicles are to gain widespread acceptance in the market. It proposes a framework for how these concerns should be addressed and how we can mitigate the risks. It addresses both proactive and reactive measures that can be taken by manufacturers, how to incentivize these measures, and the role cyber-insurance can play in …


Distributed Governance, Carla L. Reyes, Nizan Geslevich Packin, Bejamin Edwards Jan 2017

Distributed Governance, Carla L. Reyes, Nizan Geslevich Packin, Bejamin Edwards

Faculty Journal Articles and Book Chapters

Distributed ledger technology enables disruption of traditional business organizations by introducing new business entities without the directors and officers of traditional corporate entities. Although these emerging entities offer intriguing possibilities, distributed entities may suffer significant collective action problems and expose investors to catastrophic regulatory and governance risks. Our essay examines key considerations for stakeholders and argues that distributed entities must be carefully structured to function effectively.

This essay breaks new ground by critically examining distributed entities. We argue that a distributed model is most appropriate when DLT solves a unique corporate governance problem. We caution against ignoring the lessons painstakingly …


Health Information Equity, Craig Konnoth Jan 2017

Health Information Equity, Craig Konnoth

Publications

In the last few years, numerous Americans’ health information has been collected and used for follow-on, secondary research. This research studies correlations between medical conditions, genetic or behavioral profiles, and treatments, to customize medical care to specific individuals. Recent federal legislation and regulations make it easier to collect and use the data of the low-income, unwell, and elderly for this purpose. This would impose disproportionate security and autonomy burdens on these individuals. Those who are well-off and pay out of pocket could effectively exempt their data from the publicly available information pot. This presents a problem which modern research ethics …