Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 7 of 7

Full-Text Articles in Law

Privacy Almighty? The Cjeu's Judgment In Google Spain Sl V. Aepd, David J. Stute Dec 2015

Privacy Almighty? The Cjeu's Judgment In Google Spain Sl V. Aepd, David J. Stute

Michigan Journal of International Law

The Internet has matured into an unprecedented repository of data, retrievable through myriad unique “links,” or Uniform Resource Locators. Yet, this wealth of information only became broadly accessible through the invention and continual development of algorithm-based search engines. Keyword searches empowered search-engine users to find—and sometimes stumble upon—information with great ease. Indeed, search-engine indices arguably have become the most comprehensive catalogues of information the world has ever seen. This wealth of accessible information poses challenges to traditional notions of privacy: aspects of our private and public lives, which previously would have rarely left the vicinities of our immediate social or …


Avoiding The Next Napster: Copyright Infringement And Investor Liability In The Age Of User Generated Content, Truan Savage Sep 2015

Avoiding The Next Napster: Copyright Infringement And Investor Liability In The Age Of User Generated Content, Truan Savage

Michigan Business & Entrepreneurial Law Review

Rapid developments in digital technology over the past quarter century have made it easier than ever for people to create and instantly share content. These developments have served as the basis for countless innovations and have spawned some of today’s largest and most profitable companies. As content creation and distribution continues to evolve, businesses seek new ways to profit from these technological innovations. But while businesses continue to develop around new methods of content distribution, the law of copyright, which generally aims to encourage the creation of content, has been slow to adapt. This era of modern technological innovation thus …


Loopholes For Circumventing The Constitution: Unrestrained Bulk Surveillance On Americans By Collecting Network Traffic Abroad, Axel Arnbak, Sharon Goldberg Jun 2015

Loopholes For Circumventing The Constitution: Unrestrained Bulk Surveillance On Americans By Collecting Network Traffic Abroad, Axel Arnbak, Sharon Goldberg

Michigan Telecommunications & Technology Law Review

This Article reveals interdependent legal and technical loopholes that the US intelligence community could use to circumvent constitutional and statutory safeguards for Americans. These loopholes involve the collection of Internet traffic on foreign territory, and leave Americans as unprotected as foreigners by current United States (US) surveillance laws. This Article will also describe how modern Internet protocols can be manipulated to deliberately divert American’s traffic abroad, where traffic can then be collected under a more permissive legal regime (Executive Order 12333) that is overseen solely by the executive branch of the US government. Although the media has reported on some …


Voluntary Disclosure Of Information As A Proposed Standard For The Fourth Amendment's Third-Party Doctrine, Margaret E. Twomey Jun 2015

Voluntary Disclosure Of Information As A Proposed Standard For The Fourth Amendment's Third-Party Doctrine, Margaret E. Twomey

Michigan Telecommunications & Technology Law Review

The third-party doctrine is a long-standing tenant of Fourth Amendment law that allows law enforcement officers to utilize information that was released to a third party without the probable cause required for a traditional search warrant. This has allowed law enforcement agents to use confidential informants, undercover agents, and access bank records of suspected criminals. However, in a digital age where exponentially more information is shared with Internet Service Providers, e-mail hosts, and social media “friends,” the traditional thirdparty doctrine ideas allow law enforcement officers access to a cache of personal information and data with a standard below probable cause. …


Obscured By Clouds: The Fourth Amendment And Searching Cloud Storage Accounts Through Locally Installed Software, Aaron J. Gold May 2015

Obscured By Clouds: The Fourth Amendment And Searching Cloud Storage Accounts Through Locally Installed Software, Aaron J. Gold

William & Mary Law Review

No abstract provided.


Silencing The Call To Arms: A Shift Away From Cyber Attacks As Warfare, Ryan Patterson Apr 2015

Silencing The Call To Arms: A Shift Away From Cyber Attacks As Warfare, Ryan Patterson

Loyola of Los Angeles Law Review

Cyberspace has developed into an indispensable aspect of modern society, but not without risk. Cyber attacks have increased in frequency, with many states declaring cyber operations a priority in what has been called the newest domain of warfare. But what rules govern? The Tallinn Manual on the International Law Applicable to Cyber Warfare suggests existent laws of war are sufficient to govern cyber activities; however, the Tallinn Manual ignores fundamental problems and unique differences between cyber attacks and kinetic attacks. This Article argues that several crucial impediments frustrate placing cyber attacks within the current umbra of warfare, chiefly the problems …


Can You Diagnose Me Now? A Proposal To Modify The Fda’S Regulation Of Smartphone Mobile Health Applications With A Pre-Market Notification And Application Database Program, Stephen Mcinerney Jan 2015

Can You Diagnose Me Now? A Proposal To Modify The Fda’S Regulation Of Smartphone Mobile Health Applications With A Pre-Market Notification And Application Database Program, Stephen Mcinerney

University of Michigan Journal of Law Reform

Advances in mobile technology continually create new possibilities for the future of medical care. Yet these changes have also created concerns about patient safety. Under the Food, Drug, and Cosmetic Act, the Food and Drug Administration (FDA) has the authority to regulate a broad spectrum of products beyond traditional medical devices like stethoscopes or pacemakers. The regulatory question is not if the FDA has the statutory authority to regulate health-related software, but rather how it will exercise its regulatory authority. In September 2013, the FDA published Final Guidance on Mobile Medical Applications; in it, the Agency limited its oversight to …