Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

University of Michigan Law School

Technology

Internet Law

Michigan Telecommunications & Technology Law Review

Articles 1 - 19 of 19

Full-Text Articles in Law

Loopholes For Circumventing The Constitution: Unrestrained Bulk Surveillance On Americans By Collecting Network Traffic Abroad, Axel Arnbak, Sharon Goldberg Jun 2015

Loopholes For Circumventing The Constitution: Unrestrained Bulk Surveillance On Americans By Collecting Network Traffic Abroad, Axel Arnbak, Sharon Goldberg

Michigan Telecommunications & Technology Law Review

This Article reveals interdependent legal and technical loopholes that the US intelligence community could use to circumvent constitutional and statutory safeguards for Americans. These loopholes involve the collection of Internet traffic on foreign territory, and leave Americans as unprotected as foreigners by current United States (US) surveillance laws. This Article will also describe how modern Internet protocols can be manipulated to deliberately divert American’s traffic abroad, where traffic can then be collected under a more permissive legal regime (Executive Order 12333) that is overseen solely by the executive branch of the US government. Although the media has reported on some …


Voluntary Disclosure Of Information As A Proposed Standard For The Fourth Amendment's Third-Party Doctrine, Margaret E. Twomey Jun 2015

Voluntary Disclosure Of Information As A Proposed Standard For The Fourth Amendment's Third-Party Doctrine, Margaret E. Twomey

Michigan Telecommunications & Technology Law Review

The third-party doctrine is a long-standing tenant of Fourth Amendment law that allows law enforcement officers to utilize information that was released to a third party without the probable cause required for a traditional search warrant. This has allowed law enforcement agents to use confidential informants, undercover agents, and access bank records of suspected criminals. However, in a digital age where exponentially more information is shared with Internet Service Providers, e-mail hosts, and social media “friends,” the traditional thirdparty doctrine ideas allow law enforcement officers access to a cache of personal information and data with a standard below probable cause. …


Wireless Localism: Beyond The Shroud Of Objectivity In Federal Spectrum Administration, Olivier Sylvain Dec 2013

Wireless Localism: Beyond The Shroud Of Objectivity In Federal Spectrum Administration, Olivier Sylvain

Michigan Telecommunications & Technology Law Review

Recent innovations in mobile wireless technology have instigated a debate between two camps of legal scholars about federal administration of the electromagnetic spectrum. The first camp argues that the Federal Communications Commission (“FCC”) should define spectrum use rights more clearly and give spectrum licensees broad property rights in frequencies. The second camp argues that, rather than award exclusive licenses to the highest bidder, the FCC ought to open much, if not most, of the spectrum to unlicensed use by smartphones and tablets equipped with the newest spectrum administration technology. First, this Article shows that both of these camps comprise a …


Geographically Restricted Streaming Content And Evasion Of Geolocation: The Applicability Of The Copyright Anticircumvention Rules, Jerusha Burnett Jan 2013

Geographically Restricted Streaming Content And Evasion Of Geolocation: The Applicability Of The Copyright Anticircumvention Rules, Jerusha Burnett

Michigan Telecommunications & Technology Law Review

A number of methods currently exist or are being developed to determine where Internet users are located geographically when they access a particular webpage. Yet regardless of the precautions taken by website operators to limit the locations from which they allow access, it is likely that users will find ways to gain access to restricted content. Should the evasion of geolocation constitute circumvention of access controls so that § 1201 of the Digital Millennium Copyright Act ("DMCA") applies? Because location data can properly be considered personally identifiable information ("PII"), this Note argues that § 1201 should not apply absent a …


Information Anxieties, G. S. Hans Jan 2011

Information Anxieties, G. S. Hans

Michigan Telecommunications & Technology Law Review

The constant access and instant publication that the Internet allows have given every pundit an online soapbox. This content explosion has created two related problems for consumers and industry: how to find valuable content online (whatever "valuable" means) and how to moderate the flow of the content itself. Tim Wu argues in The Master Switch that the second issue of content control and mediation has been fiercely debated in the United States as far back as the invention of the telephone in the late nineteenth century. Consumers, creators, companies, and government officials have disputed the appropriate regulations for the devices …


Everything In Its Right Place: Social Cooperation And Artist Compensation, Leah Belsky, Byron Kahr, Max Berkelhammer, Yochai Benkler Jan 2010

Everything In Its Right Place: Social Cooperation And Artist Compensation, Leah Belsky, Byron Kahr, Max Berkelhammer, Yochai Benkler

Michigan Telecommunications & Technology Law Review

The music industry's crisis response to the Internet has been the primary driver of U.S. copyright policy for over a decade. The core institutional response has been to increase the scope of copyright and the use of litigation, prosecution, and technical control mechanisms for its enforcement. The assumption driving these efforts has been that without heavily-enforced copyright, artists will not be able to make a living from their art. Throughout this period artists have been experimenting with approaches that do not rely on technological or legal enforcement, but on constructing web-based business models that engage fans and rely on voluntary …


Ill Telecommunications: How Internet Infrastructure Providers Lose First Amendment Protection, Nicholas Bramble Jan 2010

Ill Telecommunications: How Internet Infrastructure Providers Lose First Amendment Protection, Nicholas Bramble

Michigan Telecommunications & Technology Law Review

The Federal Communications Commission (FCC) recently proposed an Internet nondiscrimination rule: "Subject to reasonable network management, a provider of broadband Internet access service must treat lawful content, applications, and services in a nondiscriminatory manner." Among other requests, the FCC sought comment on whether the proposed nondiscrimination rule would "promote free speech, civic participation, and democratic engagement," and whether it would "impose any burdens on access providers' speech that would be cognizable for purposes of the First Amendment." The purpose of this Article is to suggest that a wide range of responses to these First Amendment questions, offered by telecommunications providers …


Google Adwords: Trademark Infringer Or Trade Liberalizer, Ashley Tan Jan 2010

Google Adwords: Trademark Infringer Or Trade Liberalizer, Ashley Tan

Michigan Telecommunications & Technology Law Review

Google is the world's most preferred search engine, with an audience share of eighty percent of Internet users worldwide. With so many people browsing its search results, Google is a natural advertising vehicle, and it has exploited this quality to become one of the most profitable Internet companies in U.S. history. However, success has not come without controversy, and one of the most significant concerns Google AdWords, which displays keyword-triggered ads and sponsored links alongside non-sponsored search results. AdWords has come under attack in the United States and in the European Union ("EU") for its role in trademark infringement on …


Wireless Net Neutrality Regulation And The Problem With Pricing: An Empirical, Cautionary Tale, Babette E.L. Boliek Jan 2009

Wireless Net Neutrality Regulation And The Problem With Pricing: An Empirical, Cautionary Tale, Babette E.L. Boliek

Michigan Telecommunications & Technology Law Review

I present here a unique empirical analysis of the consumer welfare benefits of prior regulation in the mobile telecommunications industry. In particular, I analyze the relative consumer benefits of state rate regulation and federal entry regulation. The institution of filing requirements and FTC review and approval of various consumer pricing regimes is highly analogous to the consumer price controls imposed by various state level public utility commissions in the past. Furthermore, the imposition of a zero-price rule is analogous to past rate regulation; in particular it is similar to past wholesale regulation with its underlying principles of open access and …


Legislation For Effective Self-Regulation: A New Approach To Protecting Personal Privacy On The Internet, Richard M. Marsh Jr. Jan 2009

Legislation For Effective Self-Regulation: A New Approach To Protecting Personal Privacy On The Internet, Richard M. Marsh Jr.

Michigan Telecommunications & Technology Law Review

How can we best reap the benefits of online profiling while avoiding the privacy pitfalls plaguing the e-commerce community? Experts advocate legislation, civil litigation, or self-regulation to provide the ideal solution. Analyzing these proposals reveals a conflict between two basic principles: the need to preserve personal privacy and the desire to foster a thriving Internet-based industry. This Note argues that each approach tends to favor one principle at the expense of the other. This Note also proposes a new solution which creates incentives for effective self-regulation backed with legal enforcement. This scheme strikes an appropriate balance between privacy and e-commerce …


Justice, And Only Justice, You Shall Pursue: Network Neutrality, The First Amendment And John Rawls's Theory Of Justice, Amit M. Schejter, Moran Yemini Jan 2007

Justice, And Only Justice, You Shall Pursue: Network Neutrality, The First Amendment And John Rawls's Theory Of Justice, Amit M. Schejter, Moran Yemini

Michigan Telecommunications & Technology Law Review

As broadband becomes the public's technology of choice to access the Internet, it is also emerging as the battlefield upon which the struggle for control of the Internet is being fought. Operators who provide physical access to the service claim the right to discriminate among the content providers who use the infrastructure in which the operators have invested. In contrast, content providers warn that exercising such a policy would "undermine the principles that have made the Internet such a success."[...] For academic observers, analysis of this issue has thus far been confined to the areas of property law, innovation, and …


'Code' And The Slow Erosion Of Privacy, Bert-Jaap Koops, Ronald Leenes Sep 2005

'Code' And The Slow Erosion Of Privacy, Bert-Jaap Koops, Ronald Leenes

Michigan Telecommunications & Technology Law Review

The notion of software code replacing legal code as a mechanism to control human behavior--"code as law"--is often illustrated with examples in intellectual property and freedom of speech. This Article examines the neglected issue of the impact of "code as law" on privacy. To what extent is privacy-related "code" being used, either to undermine or to enhance privacy? On the basis of cases in the domains of law enforcement, national security, E-government, and commerce, it is concluded that technology rarely incorporates specific privacy-related norms. At the same time, however, technology very often does have clear effects on privacy, as it …


Regulating Speech Across Borders: Technology Vs. Values, Matthew Fagin Apr 2003

Regulating Speech Across Borders: Technology Vs. Values, Matthew Fagin

Michigan Telecommunications & Technology Law Review

The disfavored status within international law of unilateral state-based regulations that target extraterritorial actors arises from the inherent challenges such actions represent to state sovereignty. In the context of the Internet, the complexity of choice-of-law analysis is heightened: regulations imposed by one state have the potential to effectively block communications to citizens of all states and undermine the conflicting regulatory aims of neighboring states. Early legal commentators built upon this cascading chilling effect of state-based regulation to proclaim both the futility and illegitimacy of state-based action in the online environment. Subsequent scholars have demonstrated the commensurability of state-based online regulation …


Quibbles'n Bits: Making A Digital First Sale Doctrine Feasible, Victor F. Calaba Oct 2002

Quibbles'n Bits: Making A Digital First Sale Doctrine Feasible, Victor F. Calaba

Michigan Telecommunications & Technology Law Review

Whereas the first sale doctrine historically permitted the transfer and resale of copyrighted works, license agreements used by software companies and the DMCA's strict rules prohibiting tampering with access control devices frustrate exercise of the first sale doctrine with respect to many forms of digital works[...] This article explores the first sale doctrine as it pertains to digital works and proposes ways to make a digital first sale doctrine feasible. Part II describes the first sale doctrine as it has traditionally been applied to non-digital works. Part III discusses modern technology's impact on the distribution and use of copyrighted material. …


Marking Carnivore's Territory: Rethinking Pen Registers On The Internet, Anthony E. Orr Jun 2002

Marking Carnivore's Territory: Rethinking Pen Registers On The Internet, Anthony E. Orr

Michigan Telecommunications & Technology Law Review

"Carnivore" entered the online world's collective consciousness in June 2000 when the Federal Bureau of Investigation unveiled the Internet surveillance software program to telecommunications industry specialists. The FBI claims the program allows agents to scan the traffic of an Internet Service Provider (ISP) for messages or commands to or from a criminal suspect and then intercept only those messages, capturing copies of e-mails, web site downloads and other file transfers[...] A central issue in the controversy surrounding Carnivore is whether current law permits the FBI to employ the program in the Internet context. Bureau officials claim statutory authority for deployments …


Telemedicine: Rx For The Future Of Health Care, Susan E. Volkert Jun 2000

Telemedicine: Rx For The Future Of Health Care, Susan E. Volkert

Michigan Telecommunications & Technology Law Review

Quite simply, telemedicine symbolizes and catalyzes the clash between the reality of our legal and political approach to health care and the American dream of bringing health care to all patients. Telemedicine, like our health care delivery systems, is regulated by many layers of government. Unlike other issues, telemedicine cuts through and challenges the traditional controls of access and cost. As such, telemedicine is a microcosm of our health care delivery system and a lens through which one may analyze the obstacles to access in the current system. This article examines these issues, proposes that telemedicine's goal should be to …


Building A Community Through Workplace E-Mail: The New Privacy Frontier, Peter Schnaitman Jun 1999

Building A Community Through Workplace E-Mail: The New Privacy Frontier, Peter Schnaitman

Michigan Telecommunications & Technology Law Review

The relatively new technology of electronic mail (e-mail) presents an entirely new issue of workplace privacy. Currently, whether a person has a privacy interest in their workplace e-mail communications is as unsettled an issue as it has been since the technology emerged in the early part of this decade as the preferred mode of communication in the workplace. Indeed, e-mail may soon be the preferred mode of communication in general. This comment will argue that all e-mail users have a privacy interest in workplace e-mail communications and that the current law does not afford e-mail users any type of protection …


Profits In Cyberspace: Should Newspaper And Magazine Publishers Pay Freelance Writers For Digital Content?, Rod Dixon Esq. Jun 1998

Profits In Cyberspace: Should Newspaper And Magazine Publishers Pay Freelance Writers For Digital Content?, Rod Dixon Esq.

Michigan Telecommunications & Technology Law Review

It is remarkable how fast recent trends have driven an increasing number of publishers of magazines, newspapers, and other similar works to port the print version of their works to digital and electronic format in the form of online computer databases and multimedia CDROM technologies. Online computer databases and CD-ROM media can be exceptionally profitable ventures for publishers who convert a preexisting print work into a digital product. However, publishers' profits from digital media may be impaired if there is a question as to whether the publisher has satisfactorily secured the copyright to the material making up the digital media. …


Telecommunications In Transition: Unbundling, Reintegration, And Competition, David J. Teece Jun 1995

Telecommunications In Transition: Unbundling, Reintegration, And Competition, David J. Teece

Michigan Telecommunications & Technology Law Review

The world economy is experiencing a technological revolution, fueled by rapid advances in microelectronics, optics, and computer science, that in the 1990s and beyond will dramatically change the way people everywhere communicate, learn, and access information and entertainment. This technological revolution has been underway for about a decade. The emergence of a fully-interactive communications network, sometimes referred to as the "Information Superhighway," is now upon us. This highway, made possible by fiber optics and the convergence of several different technologies, is capable of delivering a plethora of new interactive entertainment, informational, and instructional services that are powerful and user-friendly. The …