Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 13 of 13

Full-Text Articles in Law

A Unifying Approach To Nexus Under The Dormant Commerce Clause, Adam B. Thimmesch Mar 2018

A Unifying Approach To Nexus Under The Dormant Commerce Clause, Adam B. Thimmesch

Michigan Law Review Online

The Supreme Court has long debated the existence and scope of its power to restrict state regulation under the so-called negative or dormant Commerce Clause. The Court took a broad view of that power in the late 1800s, but it has refined and restricted its role over time. One area where the Court has continued to wield considerable power, however, has been in the context of state taxes. Specifically, the Court has continued to restrict states' power to compel out-of-state vendors to collect their sales and use taxes based on a physical-presence "nexus" rule. That rule dates back to the …


Voluntary Disclosure Of Information As A Proposed Standard For The Fourth Amendment's Third-Party Doctrine, Margaret E. Twomey Jun 2015

Voluntary Disclosure Of Information As A Proposed Standard For The Fourth Amendment's Third-Party Doctrine, Margaret E. Twomey

Michigan Telecommunications & Technology Law Review

The third-party doctrine is a long-standing tenant of Fourth Amendment law that allows law enforcement officers to utilize information that was released to a third party without the probable cause required for a traditional search warrant. This has allowed law enforcement agents to use confidential informants, undercover agents, and access bank records of suspected criminals. However, in a digital age where exponentially more information is shared with Internet Service Providers, e-mail hosts, and social media “friends,” the traditional thirdparty doctrine ideas allow law enforcement officers access to a cache of personal information and data with a standard below probable cause. …


Tollbooths And Newsstands On The Information Superhighway, Brad A. Greenberg Dec 2013

Tollbooths And Newsstands On The Information Superhighway, Brad A. Greenberg

Michigan Telecommunications & Technology Law Review

Countering the perception that speech limitations affecting distribution necessarily reduce access to information, this Essay proffers that copyright expansions actually can increase access and thereby serve important copyright and First Amendment values. In doing so, this discussion contributes to the growing literature and two recent Supreme Court opinions discussing whether copyright law and First Amendment interests can coexist.


Chopping Down The Rainforest: Finding A Solution To The "Amazon Problem", Eric Andrew Felleman Jan 2012

Chopping Down The Rainforest: Finding A Solution To The "Amazon Problem", Eric Andrew Felleman

University of Michigan Journal of Law Reform Caveat

Current economic conditions in the United States have led to a dramatic decrease in state tax revenue. Without these funds, states will be unable to support important public services, and hundreds of thousands of jobs in the public and private sectors are at risk of being cut, as states work to close $103 billion in budget gaps. Accomplishing that will involve overcoming many hurdles, such as the unpopularity of raising taxes during times of economic trouble, but one largely untapped source could provide a significant amount of income to states. States currently lose around $23 billion annually in uncollected use …


Protecting Anonymous Expression: The Internet's Role In Washington State's Disclosure Laws And The Direct Democracy Process, Karen Cullinane Jul 2011

Protecting Anonymous Expression: The Internet's Role In Washington State's Disclosure Laws And The Direct Democracy Process, Karen Cullinane

University of Michigan Journal of Law Reform

This Note proposes that the Washington State Legislature amend its Public Records Act to exempt from public disclosure personal information legally required to be disclosed by signers of referendum petitions. This Note also proposes that the Washington State Legislature designate an electronic system, to be detailed in its election law, by which referendum petitions can be checked for fraud without violating the right to anonymous expression protected by the First Amendment. Part I describes Washington State's referendum process and the path of Doe v. Reed, the case animating the reform presented in this Note. Part II illustrates how the rise …


Three Reactions To Mgm V. Grokster, Pamela Samuelson Oct 2006

Three Reactions To Mgm V. Grokster, Pamela Samuelson

Michigan Telecommunications & Technology Law Review

It was prescient of the Michigan Telecommunications and Technology Law Review to have organized a conference to discuss the Supreme Court's decision in Metro-Goldwyn-Mayer, Inc. v. Grokster, Inc. As the articles in this issue reveal, commentators have had somewhat mixed reactions to the Grokster decision. Perhaps I am the most mixed (or mixed up) about Grokster among its commentators, for I have had not just one but three reactions to the Grokster decision. My first reaction was to question whether MGM and its co-plaintiffs really won the Grokster case, or at least won it in the way they had hoped. …


The Intent Element Of Inducement To Infringe Under Patent Law: Reflections On Grokster, Lynda J. Oswald Oct 2006

The Intent Element Of Inducement To Infringe Under Patent Law: Reflections On Grokster, Lynda J. Oswald

Michigan Telecommunications & Technology Law Review

In June, 2005, the United States Supreme Court set forth an "inducement" rule in MGM Studios, Inc. v. Grokster, Ltd. that imposes secondary liability on "one who distributes a device with the object of promoting its use to infringe copyright, as shown by clear expression or other affirmative steps taken to foster infringement." The Court emphasized the limitations of the liability standard it was setting forth, stating that the target was only "purposeful, culpable expression and conduct, and thus does nothing to compromise legitimate commerce or discourage innovation having a lawful promise." Yet, the liability standard set forth in Grokster …


The Temporal Dynamics Of Capable Of Substantial Noninfringing Uses, R. Anthony Reese Oct 2006

The Temporal Dynamics Of Capable Of Substantial Noninfringing Uses, R. Anthony Reese

Michigan Telecommunications & Technology Law Review

The copyright issues raised by "dual-use" technologies--equipment that can be used both in ways that infringe copyright and in ways that do not--first gained prominence in connection with the litigation over videocassette recorders that culminated in the Supreme Court's decision in Sony in 1984. Copyright owners had asserted that Sony's manufacture and distribution of VCRs rendered it liable for copyright infringement committed by customers using their Sony VCRs. The Supreme Court in Sony concluded that copyright law did not impose such secondary liability where the device in question was capable of substantial noninfringing uses (and that the VCR was such …


21st Century Copyright Law In The Digital Domain Symposium Transcript, Symposium Panelists Oct 2006

21st Century Copyright Law In The Digital Domain Symposium Transcript, Symposium Panelists

Michigan Telecommunications & Technology Law Review

21st Century Copyright Law in the Digital Domain Symposium held at Universtiy of Michigan Law School Friday, March 24, 2006


To Surf And Protect: The Children's Internet Protection Act Policies Material Harmful To Minors And A Whole Lot More, Michael B. Cassidy Apr 2005

To Surf And Protect: The Children's Internet Protection Act Policies Material Harmful To Minors And A Whole Lot More, Michael B. Cassidy

Michigan Telecommunications & Technology Law Review

This Note will examine the constitutional issues raised by installing Internet filtering software in public libraries. Part I explores the First Amendment, the standard of review for restricting Internet material, and the government's role in protecting minors and regulating speech. Part II discusses library patrons' First Amendment rights in public libraries. Part III provides the statutory framework of the E-rate and LSTA programs, as well as the Children's Internet Protection Act (CIPA). Part IV examines the effectiveness of current Internet filtering technology and provides the American Library Association's policies on Internet filtering in public libraries. Part V discusses the district …


Verdugo In Cyberspace: Boundaries Of Fourth Amendment Rights For Foreign Nationals In Cybercrime Cases, Stewart M. Young Oct 2003

Verdugo In Cyberspace: Boundaries Of Fourth Amendment Rights For Foreign Nationals In Cybercrime Cases, Stewart M. Young

Michigan Telecommunications & Technology Law Review

This Comment examines the current legal framework governing Fourth Amendment rights for foreign nationals accused of committing crimes within the United States. Over the past three years, federal courts have tried several cases charging foreign nationals with committing crimes through the use of the Internet; these cases demonstrate a lack of clarity in the standard for warrant requirements regarding these searches. Utilizing these cases, this Comment creates a hypothetical case that presents the issues of Fourth Amendment rights for foreign nationals and seeks to determine how such a question should be answered. It advocates the clear application of United States …


Criminalization Of True Anonymity In Cyberspace, The, George F. Du Pont Jun 2001

Criminalization Of True Anonymity In Cyberspace, The, George F. Du Pont

Michigan Telecommunications & Technology Law Review

The question of whether a state or the federal government can create a narrowly tailored restriction on cyberspace anonymity without violating the First Amendment remains unresolved[...]The Supreme Court has not directly addressed the issue, but it may soon consider the constitutionality of criminalizing certain kinds of cyber-anonymity in light of the unique nature of cyberspace. This comment explores the various forms of anonymity, examines the First Amendment status of anonymity in and outside of cyberspace, analyzes relevant scholarly commentary, and concludes that a narrowly tailored legislative restriction on "true" anonymity in cyberspace would not violate the First Amendment.


Incitement To Violence On The World Wide Web: Can Web Publishers Seek First Amendment Refuge?, Lonn Weissblum Jun 2000

Incitement To Violence On The World Wide Web: Can Web Publishers Seek First Amendment Refuge?, Lonn Weissblum

Michigan Telecommunications & Technology Law Review

The purpose of this comment is to analyze the potential First Amendment implications of the appearance of bomb-making instructions on the Web in the United States. Moreover, this comment will ultimately consider the notion that "because Brandenburg allows consideration of all the unique characteristics of the Web, there is no reason to formulate new jurisprudence merely because of new technology." Part II examines the seminal cases in the area of speech action, including Schenck v. United States, Hess v. Indiana, and Brandenburg v. Ohio, and the adulations and criticisms that resulted from these cases. Part III discusses the civil cases …