Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Science and Technology Law (5)
- European Law (2)
- Administrative Law (1)
- Civil Procedure (1)
- Communications Law (1)
-
- Courts (1)
- Criminal Law (1)
- Fourth Amendment (1)
- Health Law and Policy (1)
- Intellectual Property Law (1)
- Labor and Employment Law (1)
- Law Enforcement and Corrections (1)
- National Security Law (1)
- Organizations Law (1)
- President/Executive Department (1)
- Privacy Law (1)
- State and Local Government Law (1)
- Supreme Court of the United States (1)
- Publication
- Publication Type
Articles 1 - 8 of 8
Full-Text Articles in Law
Privacy Almighty? The Cjeu's Judgment In Google Spain Sl V. Aepd, David J. Stute
Privacy Almighty? The Cjeu's Judgment In Google Spain Sl V. Aepd, David J. Stute
Michigan Journal of International Law
The Internet has matured into an unprecedented repository of data, retrievable through myriad unique “links,” or Uniform Resource Locators. Yet, this wealth of information only became broadly accessible through the invention and continual development of algorithm-based search engines. Keyword searches empowered search-engine users to find—and sometimes stumble upon—information with great ease. Indeed, search-engine indices arguably have become the most comprehensive catalogues of information the world has ever seen. This wealth of accessible information poses challenges to traditional notions of privacy: aspects of our private and public lives, which previously would have rarely left the vicinities of our immediate social or …
Avoiding The Next Napster: Copyright Infringement And Investor Liability In The Age Of User Generated Content, Truan Savage
Avoiding The Next Napster: Copyright Infringement And Investor Liability In The Age Of User Generated Content, Truan Savage
Michigan Business & Entrepreneurial Law Review
Rapid developments in digital technology over the past quarter century have made it easier than ever for people to create and instantly share content. These developments have served as the basis for countless innovations and have spawned some of today’s largest and most profitable companies. As content creation and distribution continues to evolve, businesses seek new ways to profit from these technological innovations. But while businesses continue to develop around new methods of content distribution, the law of copyright, which generally aims to encourage the creation of content, has been slow to adapt. This era of modern technological innovation thus …
Loopholes For Circumventing The Constitution: Unrestrained Bulk Surveillance On Americans By Collecting Network Traffic Abroad, Axel Arnbak, Sharon Goldberg
Loopholes For Circumventing The Constitution: Unrestrained Bulk Surveillance On Americans By Collecting Network Traffic Abroad, Axel Arnbak, Sharon Goldberg
Michigan Telecommunications & Technology Law Review
This Article reveals interdependent legal and technical loopholes that the US intelligence community could use to circumvent constitutional and statutory safeguards for Americans. These loopholes involve the collection of Internet traffic on foreign territory, and leave Americans as unprotected as foreigners by current United States (US) surveillance laws. This Article will also describe how modern Internet protocols can be manipulated to deliberately divert American’s traffic abroad, where traffic can then be collected under a more permissive legal regime (Executive Order 12333) that is overseen solely by the executive branch of the US government. Although the media has reported on some …
Voluntary Disclosure Of Information As A Proposed Standard For The Fourth Amendment's Third-Party Doctrine, Margaret E. Twomey
Voluntary Disclosure Of Information As A Proposed Standard For The Fourth Amendment's Third-Party Doctrine, Margaret E. Twomey
Michigan Telecommunications & Technology Law Review
The third-party doctrine is a long-standing tenant of Fourth Amendment law that allows law enforcement officers to utilize information that was released to a third party without the probable cause required for a traditional search warrant. This has allowed law enforcement agents to use confidential informants, undercover agents, and access bank records of suspected criminals. However, in a digital age where exponentially more information is shared with Internet Service Providers, e-mail hosts, and social media “friends,” the traditional thirdparty doctrine ideas allow law enforcement officers access to a cache of personal information and data with a standard below probable cause. …
The Incitement Of Terrorism On The Internet: Legal Standards, Enforcement, And The Role Of The European Union, Ezekiel Rediker
The Incitement Of Terrorism On The Internet: Legal Standards, Enforcement, And The Role Of The European Union, Ezekiel Rediker
Michigan Journal of International Law
Consider this sentence: “The Shining Path is a heroic organization.” Over the past thirty years, the Shining Path has waged a violent guerilla war against the Peruvian government, prompting the European Union to designate the group as a terrorist organization. In certain European countries, speech inciting or glorifying terrorist organizations is criminalized. As a result, citizens risk prosecution if they do not carefully limit what they say about the Shining Path, or other terrorist organizations. But where does free speech end and incitement to terrorism begin? The debate over free speech and incitement to terrorism is actively being played out …
At The Fontier Of The Younger Doctrine: Reflections On Google V. Hood, Gil Seinfeld
At The Fontier Of The Younger Doctrine: Reflections On Google V. Hood, Gil Seinfeld
Articles
On December 19, 2014, long-simmering tensions between Mississippi Attorney General Jim Hood and the search engine giant Google boiled over into federal court when Google filed suit against the Attorney General to enjoin him from bringing civil or criminal charges against it for alleged violations of the Mississippi Consumer Protection Act. Hood had been investigating and threatening legal action against Google for over a year for its alleged failure to do enough to prevent its search engine, advertisements, and YouTube website from facilitating public access to illegal, dangerous, or copyright protected goods. The case has garnered a great deal of …
Can You Diagnose Me Now? A Proposal To Modify The Fda’S Regulation Of Smartphone Mobile Health Applications With A Pre-Market Notification And Application Database Program, Stephen Mcinerney
Can You Diagnose Me Now? A Proposal To Modify The Fda’S Regulation Of Smartphone Mobile Health Applications With A Pre-Market Notification And Application Database Program, Stephen Mcinerney
University of Michigan Journal of Law Reform
Advances in mobile technology continually create new possibilities for the future of medical care. Yet these changes have also created concerns about patient safety. Under the Food, Drug, and Cosmetic Act, the Food and Drug Administration (FDA) has the authority to regulate a broad spectrum of products beyond traditional medical devices like stethoscopes or pacemakers. The regulatory question is not if the FDA has the statutory authority to regulate health-related software, but rather how it will exercise its regulatory authority. In September 2013, the FDA published Final Guidance on Mobile Medical Applications; in it, the Agency limited its oversight to …
Social Media And The Job Market: How To Reconcile Applicant Privacy With Employer Needs, Peter B. Baumhart
Social Media And The Job Market: How To Reconcile Applicant Privacy With Employer Needs, Peter B. Baumhart
University of Michigan Journal of Law Reform
In the modern technological age, social media allows us to communicate vast amounts of personal information to countless people instantaneously. This information is valuable to more than just our “friends” and “followers,” however. Prospective employers can use this personal data to inform hiring decisions, thereby maximizing fit and minimizing potential liability. The question then arises, how best to acquire this information? For job applicants, the counter-question is how best to protect the privacy of their social media accounts. As these two competing desires begin to clash, it is important to find a method to mediate the conflict. Existing privacy law, …