Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Law

New Threats To Vehicle Safety: How Cybersecurity Policy Will Shape The Future Of Autonomous Vehicles, Caleb Kennedy Apr 2017

New Threats To Vehicle Safety: How Cybersecurity Policy Will Shape The Future Of Autonomous Vehicles, Caleb Kennedy

Michigan Telecommunications & Technology Law Review

This note assesses the threat that hacking and related cybersecurity issues will pose to autonomous vehicles. Given the sweeping safety benefits autonomous vehicles will potentially bring to society, protecting against hacking and cyber-threats must be one of the top priorities for industry and public safety officials if autonomous vehicles are to gain widespread acceptance in the market. It proposes a framework for how these concerns should be addressed and how we can mitigate the risks. It addresses both proactive and reactive measures that can be taken by manufacturers, how to incentivize these measures, and the role cyber-insurance can play in …


Jailbreak!: What Happens When Autonomous Vehicle Owners Hack Into Their Own Cars, Michael Sinanian Apr 2017

Jailbreak!: What Happens When Autonomous Vehicle Owners Hack Into Their Own Cars, Michael Sinanian

Michigan Telecommunications & Technology Law Review

Autonomous and connected vehicles (ACVs) are a transformational force for humanity. It is highly likely that some owners of ACVs will circumvent their vehicle software to expose unauthorized functionality, known as “jailbreaking”. This would trigger copyright liability, the extent of which would be dependent upon the copyright system’s various rulemaking processes and common law interpretations. This note explores the world of software “jailbreaking”, with its roots in smartphone unlocking, and extrapolates that to ACVs. Some compelling (and at times dangerous) scenarios are contemplated, and recommendations are made for consumers, technologists, manufacturers, and policy makers.


Civil Liberty Or National Security: The Battle Over Iphone Encryption, Karen Lowell Mar 2017

Civil Liberty Or National Security: The Battle Over Iphone Encryption, Karen Lowell

Georgia State University Law Review

On June 5, 2013, Edward Snowden released what would be the first of many documents exposing the vast breadth of electronic surveillance the Federal Bureau of Investigation (FBI) and the National Security Agency (NSA) had been conducting on millions of United States citizens. Although the federal agencies had legal authority under the Foreign Intelligence Surveillance Act (FISA) to collect metadata from companies such as Verizon, many Americans considered this data collection to be a massive invasion of privacy.

Equipped with the knowledge of sweeping domestic surveillance programs, citizens and technology firms fighting for strong privacy and security protection, have started …


Is Wifi Worth It: The Hidden Dangers Of Public Wifi, Ellie Shahin Jan 2017

Is Wifi Worth It: The Hidden Dangers Of Public Wifi, Ellie Shahin

Catholic University Journal of Law and Technology

No abstract provided.


Distributed Governance, Carla L. Reyes, Nizan Geslevich Packin, Bejamin Edwards Jan 2017

Distributed Governance, Carla L. Reyes, Nizan Geslevich Packin, Bejamin Edwards

Faculty Journal Articles and Book Chapters

Distributed ledger technology enables disruption of traditional business organizations by introducing new business entities without the directors and officers of traditional corporate entities. Although these emerging entities offer intriguing possibilities, distributed entities may suffer significant collective action problems and expose investors to catastrophic regulatory and governance risks. Our essay examines key considerations for stakeholders and argues that distributed entities must be carefully structured to function effectively.

This essay breaks new ground by critically examining distributed entities. We argue that a distributed model is most appropriate when DLT solves a unique corporate governance problem. We caution against ignoring the lessons painstakingly …