Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Law

A Day In Court For Data Breach Plaintiffs: Preserving Standing Based On Increased Risk Of Identity Theft After Clapper V. Amnesty International Usa, Thomas Martecchini Jun 2016

A Day In Court For Data Breach Plaintiffs: Preserving Standing Based On Increased Risk Of Identity Theft After Clapper V. Amnesty International Usa, Thomas Martecchini

Michigan Law Review

Following a data breach, consumers suffer an increased risk of identity theft because of the exposure of their personal information. Limited protection by data-breach statutes has made it difficult for consumers to seek compensation for these injuries and penalize the companies that fail to protect their information, leading consumers to bring common law claims in court. Yet courts have disagreed about whether an increased risk of identity theft qualifies as an injury-in-fact under Article III standing principles: the Seventh and Ninth Circuits have approved of increased risk standing, while the Third Circuit has rejected it. The Supreme Court has further …


Understanding And Regulating Twenty-First Century Payment Systems: The Ripple Case Study, Marcel T. Rosner, Andrew Kang Feb 2016

Understanding And Regulating Twenty-First Century Payment Systems: The Ripple Case Study, Marcel T. Rosner, Andrew Kang

Michigan Law Review

Ripple is an open-source Internet software that enables users to conduct payments across national boundaries in multiple currencies as seamlessly as sending an email. This decentralized Internet payment protocol could provide a cure to an inefficient cross-border payments system. Although Ripple’s technology can reduce significant risks and costs that exist in the internationalpayments system, regulators should adopt a new regulatory framework that responds to how this technology works. This Note performs two functions to help regulators realize this goal. It first helps regulators and other market participants understand how Ripple operates by explaining what Ripple is and comparing it to …


Virtual Violence - Disruptive Cyberspace Operations As "Attacks" Under International Humanitarian Law, Ido Kilovaty Jan 2016

Virtual Violence - Disruptive Cyberspace Operations As "Attacks" Under International Humanitarian Law, Ido Kilovaty

Michigan Telecommunications & Technology Law Review

Power outages, manipulations of data, and interruptions of Internet access are all possible effects of cyber operations. Unfortunately, recent efforts to address and regulate cyberspace operations under international law often emphasize the uncommon, though severe, cyber-attacks that cause deaths, injuries, or physical destruction. This paper deals with cyber operations during armed conflicts that cause major disruption or interruption effects – as opposed to deaths, injuries, or physical destruction. The purpose of this paper is to explore the consequences of these cyber operations that cause major disruption or interruption effects, and to argue that they might still constitute “acts of violence,” …


How The E-Government Can Save Money By Building Bridges Across The Digital Divide, Alison Rogers Jan 2016

How The E-Government Can Save Money By Building Bridges Across The Digital Divide, Alison Rogers

Michigan Journal of Race and Law

As government agencies and federal aid recipients begin to build a presence online, they must recognize that language accessibility is morally required, fiscally responsible, and compulsory under federal civil rights law. This Note explores statutes, federal policies, and case law that purport to protect the rights of limited English proficient (“LEP”) individuals in cyberspace. The Note suggests reforms, policies, and programs that should be adopted by federal aid recipients to ensure that LEP individuals have meaningful access to online services.