Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 20 of 20

Full-Text Articles in Law

Nft For Eternity, Hadar Y. Jabotinsky, Michal Lavi Apr 2023

Nft For Eternity, Hadar Y. Jabotinsky, Michal Lavi

University of Michigan Journal of Law Reform

Non-fungible tokens (NFTs) are unique tokens stored on a digital ledger – the blockchain. They are meant to represent unique, non-interchangeable digital assets, as there is only one token with that exact data. Moreover, the information attached to the token cannot be altered as on a regular database. While copies of these digital items are available to all, NFTs are tracked on blockchains to provide the owner with proof of ownership. This possibility of buying and owning digital assets can be attractive to many individuals.

NFTs are presently at the stage of early adoption and their uses are expanding. In …


Impostor Scams, David Adam Friedman Apr 2021

Impostor Scams, David Adam Friedman

University of Michigan Journal of Law Reform

Impostor scams have recently become the most common type of consumer scam in America, surpassing identity theft. It has never been easier and more profitable to be an impostor scammer. Though the core of these scams dates back centuries, these fraudsters consistently find novel ways to manipulate human motives and emotions. Nonetheless, the public should not give up hope. Policymakers and private actors can slow down this scourge if they focus on the key chokepoints that impostor scammers rely upon to achieve their ends. This Article provides a roadmap for a solution to impostor scams, offering specific suggestions for mitigating …


Publish, Share, Re-Tweet, And Repeat, Michal Lavi Jan 2021

Publish, Share, Re-Tweet, And Repeat, Michal Lavi

University of Michigan Journal of Law Reform

New technologies allow users to communicate ideas to a broad audience easily and quickly, affecting the way ideas are interpreted and their credibility. Each and every social network user can simply click “share” or “retweet” and automatically republish an existing post and expose a new message to a wide audience. The dissemination of ideas can raise public awareness about important issues and bring about social, political, and economic change.

Yet, digital sharing also provides vast opportunities to spread false rumors, defamation, and Fake News stories at the thoughtless click of a button. The spreading of falsehoods can severely harm the …


Different Problems Require Different Solutions: How Air Warfare Norms Should Inform Ihl Targeting Law Reform & Cyber Warfare, Christian H. Robertson Ii Jun 2019

Different Problems Require Different Solutions: How Air Warfare Norms Should Inform Ihl Targeting Law Reform & Cyber Warfare, Christian H. Robertson Ii

University of Michigan Journal of Law Reform

On February 19, 2018, United Nations Secretary-General Antonio Guterres claimed that he was “absolutely convinced” that “the next war will begin with a massive cyber-attack to destroy military capacity . . . and paralyze basic infrastructure.” The Secretary-General’s greatest concern, however, is that he believes “there is no regulatory scheme for that type of warfare, it is not clear how the Geneva Convention or international humanitarian law applies to it.” Although Additional Protocol I to the Geneva Conventions (AP I) targeting laws generally identify who and what States may target in war, it expressly limits itself to attacks affecting people …


The Innocent Villain: Involuntary Manslaughter By Text, Charles Adside Iii Apr 2019

The Innocent Villain: Involuntary Manslaughter By Text, Charles Adside Iii

University of Michigan Journal of Law Reform

Michelle Carter’s texts instructing her mentally ill online boyfriend to commit suicide offended the social moral code. But the law does not categorize all morally reprehensible behavior as criminal. Commonwealth v. Carter is unprecedented in manslaughter law because Carter was convicted on the theory that she was virtually present as opposed to physically present—at the crime scene. The court’s reasoning is expansive, as the framework it employs is excessively vague and does not provide fair notice to the public of which actions constitute involuntary manslaughter. Disturbingly, the Massachusetts Supreme Judicial Court affirmed the trial court’s logic. This Article concludes that …


You Can’T Say That!: Public Forum Doctrine And Viewpoint Discrimination In The Social Media Era, Micah Telegen Oct 2018

You Can’T Say That!: Public Forum Doctrine And Viewpoint Discrimination In The Social Media Era, Micah Telegen

University of Michigan Journal of Law Reform

The growing prevalence of privately-owned social media platforms is changing the way Americans and their governments communicate. This shift offers new opportunities, but also requires a reinterpretation of the First Amendment’s proscription of government limitations of speech. The public forum doctrine and its proscription of viewpoint discrimination seem particularly stretched by the digital revolution and the development of social media. In ongoing cases, litigants and courts have invoked the doctrine to limit the government’s ability to ‘block’ those who comment critically on government pages—much to the chagrin of those who note the private status of the companies hosting the pages …


Do We Need Help Using Yelp? Regulating Advertising On Mediated Reputation Systems, David Adam Friedman Nov 2017

Do We Need Help Using Yelp? Regulating Advertising On Mediated Reputation Systems, David Adam Friedman

University of Michigan Journal of Law Reform

Yelp, Angie’s List, Avvo, and similar entities enable consumers to access an incredibly useful trove of information about peer experiences with businesses and their goods and services. These “mediated reputation systems,” gatherers and disseminators of consumer peer opinions, are more trusted by consumers than traditional commercial channels. They are omnipresent, carried everywhere on mobile devices, and used by consumers ready to transact.

Though this information is valuable, a troubling conflict emerges in its presentation. Most of these reputation platforms rely heavily on advertising sales to support their business models. This reliance compels these entities to display persuasive advertising right along …


Human Rights And Cybersecurity Due Diligence: A Comparative Study, Scott J. Shackelford Jun 2017

Human Rights And Cybersecurity Due Diligence: A Comparative Study, Scott J. Shackelford

University of Michigan Journal of Law Reform

No company, just like no nation, is an island in cyberspace; the actions of actors from hacktivists to nation-states have the potential to impact the bottom line, along with the human rights of consumers and the public writ large. To help meet the multifaceted challenges replete in a rapidly globalizing world—and owing to the relative lack of binding international law to regulate both cybersecurity and the impact of business on human rights—companies are reconceptualizing what constitutes “due diligence.” This Article takes lessons from both the cybersecurity and human rights due diligence contexts to determine areas for cross-pollination in an effort …


Products Liability And The Internet Of (Insecure) Things: Should Manufacturers Be Liable For Damage Caused By Hacked Devices?, Alan Butler Jun 2017

Products Liability And The Internet Of (Insecure) Things: Should Manufacturers Be Liable For Damage Caused By Hacked Devices?, Alan Butler

University of Michigan Journal of Law Reform

While the application of products liability to insecure software is a frequently-discussed concept in academic literature, many commentators have been skeptical of the viability of such claims for several reasons. First, the economic loss doctrine bars recovery for productivity loss, business disruption, and other common damages caused by software defects. Second, the application of design defects principles to software is difficult given the complexity of the devices and recent tort reform trends that have limited liability. Third, the intervening cause of damage from insecure software is typically a criminal or tortious act by a third party, so principles of causation …


Automating Threat Sharing: How Companies Can Best Ensure Liability Protection When Sharing Cyber Threat Information With Other Companies Or Organizations, Ari Schwartz, Sejal C. Shah, Matthew H. Mackenzie, Sheena Thomas, Tara Sugiyama Potashnik, Bri Law Jun 2017

Automating Threat Sharing: How Companies Can Best Ensure Liability Protection When Sharing Cyber Threat Information With Other Companies Or Organizations, Ari Schwartz, Sejal C. Shah, Matthew H. Mackenzie, Sheena Thomas, Tara Sugiyama Potashnik, Bri Law

University of Michigan Journal of Law Reform

This Article takes an in-depth look at the evolution of cybersecurity information sharing legislation, leading to the recent passage of the Cybersecurity Information Sharing Act (CISA) and offers insights into how automated information sharing mechanisms and associated requirements implemented pursuant to CISA can be leveraged to help ensure liability protections when engaging in cyber threat information sharing with and amongst other non-federal government entities.


Social Media And The Job Market: How To Reconcile Applicant Privacy With Employer Needs, Peter B. Baumhart Jan 2015

Social Media And The Job Market: How To Reconcile Applicant Privacy With Employer Needs, Peter B. Baumhart

University of Michigan Journal of Law Reform

In the modern technological age, social media allows us to communicate vast amounts of personal information to countless people instantaneously. This information is valuable to more than just our “friends” and “followers,” however. Prospective employers can use this personal data to inform hiring decisions, thereby maximizing fit and minimizing potential liability. The question then arises, how best to acquire this information? For job applicants, the counter-question is how best to protect the privacy of their social media accounts. As these two competing desires begin to clash, it is important to find a method to mediate the conflict. Existing privacy law, …


Can You Diagnose Me Now? A Proposal To Modify The Fda’S Regulation Of Smartphone Mobile Health Applications With A Pre-Market Notification And Application Database Program, Stephen Mcinerney Jan 2015

Can You Diagnose Me Now? A Proposal To Modify The Fda’S Regulation Of Smartphone Mobile Health Applications With A Pre-Market Notification And Application Database Program, Stephen Mcinerney

University of Michigan Journal of Law Reform

Advances in mobile technology continually create new possibilities for the future of medical care. Yet these changes have also created concerns about patient safety. Under the Food, Drug, and Cosmetic Act, the Food and Drug Administration (FDA) has the authority to regulate a broad spectrum of products beyond traditional medical devices like stethoscopes or pacemakers. The regulatory question is not if the FDA has the statutory authority to regulate health-related software, but rather how it will exercise its regulatory authority. In September 2013, the FDA published Final Guidance on Mobile Medical Applications; in it, the Agency limited its oversight to …


Protecting Anonymous Expression: The Internet's Role In Washington State's Disclosure Laws And The Direct Democracy Process, Karen Cullinane Jul 2011

Protecting Anonymous Expression: The Internet's Role In Washington State's Disclosure Laws And The Direct Democracy Process, Karen Cullinane

University of Michigan Journal of Law Reform

This Note proposes that the Washington State Legislature amend its Public Records Act to exempt from public disclosure personal information legally required to be disclosed by signers of referendum petitions. This Note also proposes that the Washington State Legislature designate an electronic system, to be detailed in its election law, by which referendum petitions can be checked for fraud without violating the right to anonymous expression protected by the First Amendment. Part I describes Washington State's referendum process and the path of Doe v. Reed, the case animating the reform presented in this Note. Part II illustrates how the rise …


Databases And Dynamism, Michal Shur-Ofry Feb 2011

Databases And Dynamism, Michal Shur-Ofry

University of Michigan Journal of Law Reform

Databases are generally perceived in legal scholarship as static warehouses, storing up valuable facts and information. Accordingly, scholarship on copyright protection of databases typically concentrates on the social need to access their content. This Article seeks to shift the focus of the debate, arguing that the copyrightdatabases debate is not merely a static "access to information" story. Instead, it is a dynamic story of relations, hierarchies, and interactions between pieces of information, determined by database creators. It is also a story of patterns, categories, selections, and taxonomies that are often invisible to the naked eye, but that influence our perceptions …


Technology Convergence And Federalism: Who Should Decide The Future Of Telecommunications Regulation?, Daniel A. Lyons Dec 2010

Technology Convergence And Federalism: Who Should Decide The Future Of Telecommunications Regulation?, Daniel A. Lyons

University of Michigan Journal of Law Reform

This Article critically examines the division of regulatory jurisdiction over telecommunications issues between the federal government and the states. Currently, the line between federal and state jurisdiction varies depending on the service at issue. This compartmentalization might have made sense fifteen years ago, but the advent of technology convergence has largely rendered this model obsolete. Yesterday's telephone and cable companies now compete head-to-head to offer consumers the vaunted "triple play" of voice, video, and internet services. But these telecommunications companies are finding it increasingly difficult to fit new operations into arcane, rigid regulatory compartments. Moreover, services that consumers view as …


Interactive Computer Service Liability For User-Generated Content After Roommates.Com, Bradley M. Smyer May 2010

Interactive Computer Service Liability For User-Generated Content After Roommates.Com, Bradley M. Smyer

University of Michigan Journal of Law Reform

This Note explores the future of interactive computer service provider (ICSP) liability for user-generated content under the Communications Decency Act (CDA) after Roommates.com II. Roommates.com II held that a housing website was not entitled to immunity under § 230 of the CDA from federal Fair Housing Act claims, in part because providing preselected answers to a mandatory questionnaire rendered the site an "information content provider" at least partially responsible for creation or development of answers. After examining the historical and legislative origins of ICSP immunity for user-generated content under 47 U.S. C. § 230, this Note argues that courts …


Privacy 3.0-The Principle Of Proportionality, Andrew B. Serwin Jul 2009

Privacy 3.0-The Principle Of Proportionality, Andrew B. Serwin

University of Michigan Journal of Law Reform

Individual concern over privacy has existed as long as humans have said or done things they do not wish others to know about. In their groundbreaking law review article The Right to Privacy, Warren and Brandeis posited that the common law should protect an individual's right to privacy under a right formulated as the right to be let alone-Privacy 1.0. As technology advanced and societal values also changed, a belief surfaced that the Warren and Brandeis formulation did not provide sufficient structure for the development of privacy laws. As such, a second theoretical construct of privacy, Privacy 2.0 as …


Race, Media Consolidation, And Online Content: The Lack Of Substitutes Available To Media Consumers Of Color, Leonard M. Baynes Jan 2006

Race, Media Consolidation, And Online Content: The Lack Of Substitutes Available To Media Consumers Of Color, Leonard M. Baynes

University of Michigan Journal of Law Reform

In its 2003 media ownership proceedings, the FCC relied on the existence of the Internet to provide justification for radically relaxing the FCC ownership rules. These rules limited the national audience reach of the broadcast licensees and the cross-ownership of different media properties by broadcasters and newspapers. In relaxing these rules, the FCC failed to recognize that a media submarket for African Americans and Latinos/as existed. This separate market is evidenced by the different television viewing habits of African Americans and Latinos/as as compared to Whites and Billboard magazine's delineation of R&B/urban music radio stations as a separate radio station …


Not From Concentrate? Media Regulation At The Turn Of The Millennium M Arch 18-19, 2005, Journal Of Law Reform Jan 2006

Not From Concentrate? Media Regulation At The Turn Of The Millennium M Arch 18-19, 2005, Journal Of Law Reform

University of Michigan Journal of Law Reform

Transcript from a March 2005 Symposium held in the University of Michigan Law School, Hutchins Hall.


Electronic Mail And Michigan's Public Disclosure Laws: The Argument For Public Access To Governmental Electronic Mail, Daniel F. Hunter Jun 1995

Electronic Mail And Michigan's Public Disclosure Laws: The Argument For Public Access To Governmental Electronic Mail, Daniel F. Hunter

University of Michigan Journal of Law Reform

This Note explores the potential for citizens to request electronic mail (e-mail) records from government agencies using public disclosure laws, with emphasis on the Michigan Freedom of Information Act (FOIA). E-mail is a medium that has come to replace both telephone calls and paper documents for many purposes. The applicability of public disclosure laws to e-mail, however, is less than clear. Telephone conversations by public employees for most purposes are confidential, while paper records created by those same employees can be requested under the FOIA. Thus, should public e-mail remain private and confidential or should it be subject to FOIA …