Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Journal

Internet Law

Michigan Telecommunications & Technology Law Review

Law reform

Articles 1 - 9 of 9

Full-Text Articles in Law

How Elonis Failed To Clarify The Analysis Of "True Threats" In Social Media Cases And The Subsequent Need For Congressional Response, Jessica L. Opila Nov 2017

How Elonis Failed To Clarify The Analysis Of "True Threats" In Social Media Cases And The Subsequent Need For Congressional Response, Jessica L. Opila

Michigan Telecommunications & Technology Law Review

Social media and other internet communications have altered the way people communicate with one another, including the way people threaten one another. In 2015, the United States Supreme Court decided Elonis v. United States, which imposed a heightened mental state requirement for federal prosecutions of threats issued in interstate commerce. Although the statute, 18 U.S.C. § 875(c), has no mental state requirement, the Supreme Court held that, consistent with the principles of criminal law, only those with guilty minds should be convicted and thus some showing of subjective intent is required. The opinion did not name the requisite mental …


Loopholes For Circumventing The Constitution: Unrestrained Bulk Surveillance On Americans By Collecting Network Traffic Abroad, Axel Arnbak, Sharon Goldberg Jun 2015

Loopholes For Circumventing The Constitution: Unrestrained Bulk Surveillance On Americans By Collecting Network Traffic Abroad, Axel Arnbak, Sharon Goldberg

Michigan Telecommunications & Technology Law Review

This Article reveals interdependent legal and technical loopholes that the US intelligence community could use to circumvent constitutional and statutory safeguards for Americans. These loopholes involve the collection of Internet traffic on foreign territory, and leave Americans as unprotected as foreigners by current United States (US) surveillance laws. This Article will also describe how modern Internet protocols can be manipulated to deliberately divert American’s traffic abroad, where traffic can then be collected under a more permissive legal regime (Executive Order 12333) that is overseen solely by the executive branch of the US government. Although the media has reported on some …


Geographically Restricted Streaming Content And Evasion Of Geolocation: The Applicability Of The Copyright Anticircumvention Rules, Jerusha Burnett Jan 2013

Geographically Restricted Streaming Content And Evasion Of Geolocation: The Applicability Of The Copyright Anticircumvention Rules, Jerusha Burnett

Michigan Telecommunications & Technology Law Review

A number of methods currently exist or are being developed to determine where Internet users are located geographically when they access a particular webpage. Yet regardless of the precautions taken by website operators to limit the locations from which they allow access, it is likely that users will find ways to gain access to restricted content. Should the evasion of geolocation constitute circumvention of access controls so that § 1201 of the Digital Millennium Copyright Act ("DMCA") applies? Because location data can properly be considered personally identifiable information ("PII"), this Note argues that § 1201 should not apply absent a …


Legislation For Effective Self-Regulation: A New Approach To Protecting Personal Privacy On The Internet, Richard M. Marsh Jr. Jan 2009

Legislation For Effective Self-Regulation: A New Approach To Protecting Personal Privacy On The Internet, Richard M. Marsh Jr.

Michigan Telecommunications & Technology Law Review

How can we best reap the benefits of online profiling while avoiding the privacy pitfalls plaguing the e-commerce community? Experts advocate legislation, civil litigation, or self-regulation to provide the ideal solution. Analyzing these proposals reveals a conflict between two basic principles: the need to preserve personal privacy and the desire to foster a thriving Internet-based industry. This Note argues that each approach tends to favor one principle at the expense of the other. This Note also proposes a new solution which creates incentives for effective self-regulation backed with legal enforcement. This scheme strikes an appropriate balance between privacy and e-commerce …


International And Comparative Law Perspectives On Internet Patents, Toshiko Takenaka Jun 2001

International And Comparative Law Perspectives On Internet Patents, Toshiko Takenaka

Michigan Telecommunications & Technology Law Review

The Internet and e-commerce have created a borderless market. Goods and services sold on the Internet are subject to the patent statutes and regulations of all countries in which customers have access. Because the presence or absence of patent protection--or variations in that protection--hinders the movement of goods and services throughout the Internet, it is necessary to harmonize the protection afforded by Internet patents in their early stages of development. Among the three papers, however, only Professor Chiappetta touched upon the problem of compliance with the provisions in TRIPS. None of the papers paid attention to the feasibility of harmonizing …


Plotting The Return Of An Ancient Tort To Cyberspace: Towards A New Federal Standard Of Responsibility For Defamation For Internet Service Providers, Christopher Butler Jun 2000

Plotting The Return Of An Ancient Tort To Cyberspace: Towards A New Federal Standard Of Responsibility For Defamation For Internet Service Providers, Christopher Butler

Michigan Telecommunications & Technology Law Review

Though the rapid development of the Internet has created a fertile ground for legal innovation, more often than not legislators and courts have sought to address this relatively new medium by attempting to squeeze it into precedents and paradigms better suited to older forms of communication, technology, and media. Part I of this article looks back at the courts' initial efforts at addressing defamation via the Internet. From the start the courts attempted to fit the role of the ISP into the common law's categorizing of print media as either "publishers" or "distributors" of information. One court's misstep in overextending …


Telemedicine: Rx For The Future Of Health Care, Susan E. Volkert Jun 2000

Telemedicine: Rx For The Future Of Health Care, Susan E. Volkert

Michigan Telecommunications & Technology Law Review

Quite simply, telemedicine symbolizes and catalyzes the clash between the reality of our legal and political approach to health care and the American dream of bringing health care to all patients. Telemedicine, like our health care delivery systems, is regulated by many layers of government. Unlike other issues, telemedicine cuts through and challenges the traditional controls of access and cost. As such, telemedicine is a microcosm of our health care delivery system and a lens through which one may analyze the obstacles to access in the current system. This article examines these issues, proposes that telemedicine's goal should be to …


Building A Community Through Workplace E-Mail: The New Privacy Frontier, Peter Schnaitman Jun 1999

Building A Community Through Workplace E-Mail: The New Privacy Frontier, Peter Schnaitman

Michigan Telecommunications & Technology Law Review

The relatively new technology of electronic mail (e-mail) presents an entirely new issue of workplace privacy. Currently, whether a person has a privacy interest in their workplace e-mail communications is as unsettled an issue as it has been since the technology emerged in the early part of this decade as the preferred mode of communication in the workplace. Indeed, e-mail may soon be the preferred mode of communication in general. This comment will argue that all e-mail users have a privacy interest in workplace e-mail communications and that the current law does not afford e-mail users any type of protection …


Law Of Nations In Cyberspace: Fashioning A Cause Of Action For The Supression Of Human Rights Reports On The Internet , Thomas Cochrane Jun 1998

Law Of Nations In Cyberspace: Fashioning A Cause Of Action For The Supression Of Human Rights Reports On The Internet , Thomas Cochrane

Michigan Telecommunications & Technology Law Review

For nearly two decades, two U.S. statutes have provided redress to victims of human rights abuses: the Alien Tort Statute and the Torture Victim Protection Act. A handful of plaintiffs have recovered under these laws against foreign perpetrators of a narrow range of human rights violations. The growth and proliferation of communications technology raises important questions about how these statutes will be used in the future. Human rights activists have discovered that they can instantly communicate over the Internet with supporters and news media anywhere in the world. Repressive regimes have responded by attempting to restrict such communications. Could cutting …