Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Law reform (4)
- 2016 elections (1)
- Abusive tokenized speech (1)
- Access to information (1)
- Accuracy (1)
-
- Administrative agencies (1)
- Algorithms (1)
- All Writs Act (1)
- Apple (1)
- Arrangement (1)
- Brazil (1)
- California Online Privacy Protection Act (1)
- Classification (1)
- Commercial Privacy Bill of Rights Act of 2011 (1)
- Communications Assistance for Law Enforcement Act (1)
- Computer models (1)
- Computer security (1)
- Computer systems (1)
- Congress (1)
- Content removal (1)
- Cookies (1)
- Copyright law (1)
- Copyright protection (1)
- Critical infrastructure (1)
- Cyber attacks (1)
- Cybersecurity (1)
- Data collection (1)
- Databases (1)
- Deductions (1)
- Digital Privacy Act (1)
Articles 1 - 8 of 8
Full-Text Articles in Law
Nft For Eternity, Hadar Y. Jabotinsky, Michal Lavi
Nft For Eternity, Hadar Y. Jabotinsky, Michal Lavi
University of Michigan Journal of Law Reform
Non-fungible tokens (NFTs) are unique tokens stored on a digital ledger – the blockchain. They are meant to represent unique, non-interchangeable digital assets, as there is only one token with that exact data. Moreover, the information attached to the token cannot be altered as on a regular database. While copies of these digital items are available to all, NFTs are tracked on blockchains to provide the owner with proof of ownership. This possibility of buying and owning digital assets can be attractive to many individuals.
NFTs are presently at the stage of early adoption and their uses are expanding. In …
Accessible Reliable Tax Advice, Emily Cauble
Accessible Reliable Tax Advice, Emily Cauble
University of Michigan Journal of Law Reform
Unsophisticated taxpayers who lack financial resources are disadvantaged by a shortage of adequate tax advice. The IRS does not have the resources to answer all questions asked, and the IRS’s informal advice comes with no guarantee as to its accuracy and offers the taxpayer no protection when it is mistaken. Furthermore, non-IRS sources of advice have not sufficiently filled the void left by a lack of satisfactory IRS guidance. These biases against unsophisticated taxpayers have been noted by existing literature. This Article contributes to existing literature by proposing several novel reform measures to assist unsophisticated taxpayers.
First, with respect to …
Making Democracy Harder To Hack, Scott Shackelford, Bruce Schneier, Michael Sulmeyer, Anne Boustead, Ben Buchanan, Amanda N. Craig Deckard, Trey Herr, Jessica Malekos Smith
Making Democracy Harder To Hack, Scott Shackelford, Bruce Schneier, Michael Sulmeyer, Anne Boustead, Ben Buchanan, Amanda N. Craig Deckard, Trey Herr, Jessica Malekos Smith
University of Michigan Journal of Law Reform
With the Russian government hack of the Democratic National Convention email servers and related leaks, the drama of the 2016 U.S. presidential race highlights an important point: nefarious hackers do not just pose a risk to vulnerable companies; cyber attacks can potentially impact the trajectory of democracies. Yet a consensus has been slow to emerge as to the desirability and feasibility of reclassifying elections—in particular, voting machines—as critical infrastructure, due in part to the long history of local and state control of voting procedures. This Article takes on the debate—focusing on policy options beyond former Department of Homeland Security Secretary …
Shedding Light On The "Going Dark" Problem And The Encryption Debate, John Mylan Traylor
Shedding Light On The "Going Dark" Problem And The Encryption Debate, John Mylan Traylor
University of Michigan Journal of Law Reform
In an effort to protect the enormous volume of sensitive and valuable data that travels across the Internet and is stored on personal devices, private companies have created encryption software to secure data from criminals, hackers, and terrorists who wish to steal it. The greatest benefit of encryption also creates the biggest problem: Encryption software has become so secure that often not even the government can bypass it. The “Going Dark” problem—a scenario in which the government has obtained the legal authority to search a suspected criminal’s encrypted device but lacks the technical ability to do so—is becoming increasingly common. …
Protecting Personal Information: Achieving A Balance Between User Privacy And Behavioral Targeting, Patrick Myers
Protecting Personal Information: Achieving A Balance Between User Privacy And Behavioral Targeting, Patrick Myers
University of Michigan Journal of Law Reform
Websites and mobile applications provide immeasurable benefits to both users and companies. These services often collect vast amounts of personal information from the individuals that use them, including sensitive details such as Social Security numbers, credit card information, and physical location. Personal data collection and dissemination leave users vulnerable to various threats that arise from the invasion of their privacy, particularly because users are often ignorant of the existence or extent of these practices. Current privacy law does not provide users with adequate protection from the risks attendant to the collection and dissemination of their personal information. This Note advocates …
Databases And Dynamism, Michal Shur-Ofry
Databases And Dynamism, Michal Shur-Ofry
University of Michigan Journal of Law Reform
Databases are generally perceived in legal scholarship as static warehouses, storing up valuable facts and information. Accordingly, scholarship on copyright protection of databases typically concentrates on the social need to access their content. This Article seeks to shift the focus of the debate, arguing that the copyrightdatabases debate is not merely a static "access to information" story. Instead, it is a dynamic story of relations, hierarchies, and interactions between pieces of information, determined by database creators. It is also a story of patterns, categories, selections, and taxonomies that are often invisible to the naked eye, but that influence our perceptions …
Taking A Byte Out Of Abusive Agency Discretion: A Proposal For Disclosure In The Use Of Computer Models, John P. Barker
Taking A Byte Out Of Abusive Agency Discretion: A Proposal For Disclosure In The Use Of Computer Models, John P. Barker
University of Michigan Journal of Law Reform
This Note examines the need for comprehensive requirements for the release of information pertaining to the use of computer-generated simulations used by federal administrative agencies or parties appearing before regulatory bodies. Part I of this Note defines computer models, identifies some of their current uses in administrative proceedings and describes the advantages of these models. Part II reviews the current requirements for documentation of computer models and the judicial review standards for agency findings. Part III examines the potential problems in the use of models and discusses the need for more adequate disclosure. Part IV describes several tests for verifying …
Protection Of Privacy Of Computerized Records In The National Crime Information Center, Stuart R. Hemphill
Protection Of Privacy Of Computerized Records In The National Crime Information Center, Stuart R. Hemphill
University of Michigan Journal of Law Reform
The purpose of this article is to describe the social benefits and costs of the NCIC and to indicate the need for a program of operational controls to temper the system's impact on the balance between individual privacy and law enforcement needs. Various approaches which could be incorporated into a program of safeguards are introduced and briefly analyzed. Finally, the article discusses several overall design issues which should be considered in the construction of an adequate program of safeguards. Particular emphasis is placed on the NCCH file since it is the major source of the tensions underlying the issues addressed.