Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 12 of 12

Full-Text Articles in Law

Human Rights And Cybersecurity Due Diligence: A Comparative Study, Scott J. Shackelford Jun 2017

Human Rights And Cybersecurity Due Diligence: A Comparative Study, Scott J. Shackelford

University of Michigan Journal of Law Reform

No company, just like no nation, is an island in cyberspace; the actions of actors from hacktivists to nation-states have the potential to impact the bottom line, along with the human rights of consumers and the public writ large. To help meet the multifaceted challenges replete in a rapidly globalizing world—and owing to the relative lack of binding international law to regulate both cybersecurity and the impact of business on human rights—companies are reconceptualizing what constitutes “due diligence.” This Article takes lessons from both the cybersecurity and human rights due diligence contexts to determine areas for cross-pollination in an effort …


Products Liability And The Internet Of (Insecure) Things: Should Manufacturers Be Liable For Damage Caused By Hacked Devices?, Alan Butler Jun 2017

Products Liability And The Internet Of (Insecure) Things: Should Manufacturers Be Liable For Damage Caused By Hacked Devices?, Alan Butler

University of Michigan Journal of Law Reform

While the application of products liability to insecure software is a frequently-discussed concept in academic literature, many commentators have been skeptical of the viability of such claims for several reasons. First, the economic loss doctrine bars recovery for productivity loss, business disruption, and other common damages caused by software defects. Second, the application of design defects principles to software is difficult given the complexity of the devices and recent tort reform trends that have limited liability. Third, the intervening cause of damage from insecure software is typically a criminal or tortious act by a third party, so principles of causation …


Automating Threat Sharing: How Companies Can Best Ensure Liability Protection When Sharing Cyber Threat Information With Other Companies Or Organizations, Ari Schwartz, Sejal C. Shah, Matthew H. Mackenzie, Sheena Thomas, Tara Sugiyama Potashnik, Bri Law Jun 2017

Automating Threat Sharing: How Companies Can Best Ensure Liability Protection When Sharing Cyber Threat Information With Other Companies Or Organizations, Ari Schwartz, Sejal C. Shah, Matthew H. Mackenzie, Sheena Thomas, Tara Sugiyama Potashnik, Bri Law

University of Michigan Journal of Law Reform

This Article takes an in-depth look at the evolution of cybersecurity information sharing legislation, leading to the recent passage of the Cybersecurity Information Sharing Act (CISA) and offers insights into how automated information sharing mechanisms and associated requirements implemented pursuant to CISA can be leveraged to help ensure liability protections when engaging in cyber threat information sharing with and amongst other non-federal government entities.


Social Media And The Job Market: How To Reconcile Applicant Privacy With Employer Needs, Peter B. Baumhart Jan 2015

Social Media And The Job Market: How To Reconcile Applicant Privacy With Employer Needs, Peter B. Baumhart

University of Michigan Journal of Law Reform

In the modern technological age, social media allows us to communicate vast amounts of personal information to countless people instantaneously. This information is valuable to more than just our “friends” and “followers,” however. Prospective employers can use this personal data to inform hiring decisions, thereby maximizing fit and minimizing potential liability. The question then arises, how best to acquire this information? For job applicants, the counter-question is how best to protect the privacy of their social media accounts. As these two competing desires begin to clash, it is important to find a method to mediate the conflict. Existing privacy law, …


Can You Diagnose Me Now? A Proposal To Modify The Fda’S Regulation Of Smartphone Mobile Health Applications With A Pre-Market Notification And Application Database Program, Stephen Mcinerney Jan 2015

Can You Diagnose Me Now? A Proposal To Modify The Fda’S Regulation Of Smartphone Mobile Health Applications With A Pre-Market Notification And Application Database Program, Stephen Mcinerney

University of Michigan Journal of Law Reform

Advances in mobile technology continually create new possibilities for the future of medical care. Yet these changes have also created concerns about patient safety. Under the Food, Drug, and Cosmetic Act, the Food and Drug Administration (FDA) has the authority to regulate a broad spectrum of products beyond traditional medical devices like stethoscopes or pacemakers. The regulatory question is not if the FDA has the statutory authority to regulate health-related software, but rather how it will exercise its regulatory authority. In September 2013, the FDA published Final Guidance on Mobile Medical Applications; in it, the Agency limited its oversight to …


A Victimless Sex Crime: The Case For Decriminalizing Consensual Teen Sexting, Joanna R. Lampe Jan 2013

A Victimless Sex Crime: The Case For Decriminalizing Consensual Teen Sexting, Joanna R. Lampe

University of Michigan Journal of Law Reform

As teenagers' access to cellular phones and the internet has increased over the past two decades, so has their ability to harm themselves and others through misuse of new technology. One risky behavior that has become common among teenagers is "sexting"--the digital sharing of sexually suggestive images. To combat the dangers of teen sexting, many states have criminalized the act. Criminalization does not resolve the issue of teen sexting, however, and in many cases it may cause additional harm. This Note reviews existing state laws related to teen sexting, and critiques these laws on constitutional and policy grounds. It then …


Exploring The First Amendment Rights Of Teens In Relationship To Sexting And Censorship, Julia Halloran Mclaughlin Feb 2012

Exploring The First Amendment Rights Of Teens In Relationship To Sexting And Censorship, Julia Halloran Mclaughlin

University of Michigan Journal of Law Reform

This Article explores child pornography law in relation to teen sexting conduct. Recently, some teens who engaged in teen sexting have been convicted under child pornography laws and have been required to register as sexual predators. The criminalization of teens for developmentally typical behavior, mimicking the conduct of adults, can result in grave harm to most teens. Furthermore, the application of child pornography laws to teen sexting conduct demonstrates the constitutional overbreadth of the current definition of child pornography. Photographs have an emblematic role in society-capturing and celebrating youth. Moreover, the creation of teen sexting images accompanies a teen's developmental …


Protecting Anonymous Expression: The Internet's Role In Washington State's Disclosure Laws And The Direct Democracy Process, Karen Cullinane Jul 2011

Protecting Anonymous Expression: The Internet's Role In Washington State's Disclosure Laws And The Direct Democracy Process, Karen Cullinane

University of Michigan Journal of Law Reform

This Note proposes that the Washington State Legislature amend its Public Records Act to exempt from public disclosure personal information legally required to be disclosed by signers of referendum petitions. This Note also proposes that the Washington State Legislature designate an electronic system, to be detailed in its election law, by which referendum petitions can be checked for fraud without violating the right to anonymous expression protected by the First Amendment. Part I describes Washington State's referendum process and the path of Doe v. Reed, the case animating the reform presented in this Note. Part II illustrates how the rise …


Technology Convergence And Federalism: Who Should Decide The Future Of Telecommunications Regulation?, Daniel A. Lyons Dec 2010

Technology Convergence And Federalism: Who Should Decide The Future Of Telecommunications Regulation?, Daniel A. Lyons

University of Michigan Journal of Law Reform

This Article critically examines the division of regulatory jurisdiction over telecommunications issues between the federal government and the states. Currently, the line between federal and state jurisdiction varies depending on the service at issue. This compartmentalization might have made sense fifteen years ago, but the advent of technology convergence has largely rendered this model obsolete. Yesterday's telephone and cable companies now compete head-to-head to offer consumers the vaunted "triple play" of voice, video, and internet services. But these telecommunications companies are finding it increasingly difficult to fit new operations into arcane, rigid regulatory compartments. Moreover, services that consumers view as …


Privacy 3.0-The Principle Of Proportionality, Andrew B. Serwin Jul 2009

Privacy 3.0-The Principle Of Proportionality, Andrew B. Serwin

University of Michigan Journal of Law Reform

Individual concern over privacy has existed as long as humans have said or done things they do not wish others to know about. In their groundbreaking law review article The Right to Privacy, Warren and Brandeis posited that the common law should protect an individual's right to privacy under a right formulated as the right to be let alone-Privacy 1.0. As technology advanced and societal values also changed, a belief surfaced that the Warren and Brandeis formulation did not provide sufficient structure for the development of privacy laws. As such, a second theoretical construct of privacy, Privacy 2.0 as …


Race, Media Consolidation, And Online Content: The Lack Of Substitutes Available To Media Consumers Of Color, Leonard M. Baynes Jan 2006

Race, Media Consolidation, And Online Content: The Lack Of Substitutes Available To Media Consumers Of Color, Leonard M. Baynes

University of Michigan Journal of Law Reform

In its 2003 media ownership proceedings, the FCC relied on the existence of the Internet to provide justification for radically relaxing the FCC ownership rules. These rules limited the national audience reach of the broadcast licensees and the cross-ownership of different media properties by broadcasters and newspapers. In relaxing these rules, the FCC failed to recognize that a media submarket for African Americans and Latinos/as existed. This separate market is evidenced by the different television viewing habits of African Americans and Latinos/as as compared to Whites and Billboard magazine's delineation of R&B/urban music radio stations as a separate radio station …


Sexual Harassment: Limiting The Affirmative Defense In The Digital Workplace, Donald P. Harris, Daniel B. Garrie, Matthew J. Armstrong Oct 2005

Sexual Harassment: Limiting The Affirmative Defense In The Digital Workplace, Donald P. Harris, Daniel B. Garrie, Matthew J. Armstrong

University of Michigan Journal of Law Reform

Digital communications sexual harassment is on the rise. Such harassment occurs through sexually offensive and unwarranted e-mails, placing harassing messages on electronic bulletin boards, and other forms of harassment that occur through the Internet. To date, courts have remained silent on the issue of sexual harassment by digital communications. Should this type of harassment be treated any differently than harassment that occurs in the physical space? The somewhat surprising answer is yes.

This Article advocates applying a new judicial framework for addressing digital communications sexual harassment. This new framework accounts for the real-world technology in the digital workplace and the …