Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 8 of 8

Full-Text Articles in Law

Content Moderation Remedies, Eric Goldman Dec 2021

Content Moderation Remedies, Eric Goldman

Michigan Technology Law Review

This Article addresses a critical but underexplored aspect of content moderation: if a user’s online content or actions violate an Internet service’s rules, what should happen next? The longstanding expectation is that Internet services should remove violative content or accounts from their services as quickly as possible, and many laws mandate that result. However, Internet services have a wide range of other options—what I call “remedies”—they can use to redress content or accounts that violate the applicable rules. This Article describes dozens of remedies that Internet services have actually imposed. It then provides a normative framework to help Internet services …


Individuals As Gatekeepers Against Data Misuse, Ying Hu Dec 2021

Individuals As Gatekeepers Against Data Misuse, Ying Hu

Michigan Technology Law Review

This article makes a case for treating individual data subjects as gatekeepers against misuse of personal data. Imposing gatekeeper responsibility on individuals is most useful where (a) the primary wrongdoers engage in data misuse intentionally or recklessly; (b) misuse of personal data is likely to lead to serious harm; and (c) one or more individuals are able to detect and prevent data misuse at a reasonable cost.

As gatekeepers, individuals should have a legal duty to take reasonable measures to prevent data misuse where they are aware of facts indicating that the person seeking personal data from them is highly …


The Case For Banning (And Mandating) Ransomware Insurance, Kyle D. Logue, Adam B. Shniderman Aug 2021

The Case For Banning (And Mandating) Ransomware Insurance, Kyle D. Logue, Adam B. Shniderman

Law & Economics Working Papers

Ransomware attacks are becoming increasingly pervasive and disruptive. Not only are they shutting down (or at least “holding up”) businesses and local governments all around the country, they are disrupting institutions in many sectors of the U.S. economy — from school systems, to medical facilities, to critical elements of the U.S. energy infrastructure as well as the food supply chain. Ransomware attacks are also growing more frequent and the ransom demands more exorbitant. Those ransom payments are increasingly being covered by insurance. That insurance offers coverage for a variety of cyber-related losses, including many of the costs arising out of …


Reviving Negotiated Rulemaking For An Accessible Internet, Julie Moroney May 2021

Reviving Negotiated Rulemaking For An Accessible Internet, Julie Moroney

Michigan Law Review

Web accessibility requires designing and developing websites so that people with disabilities can use them without barriers. While the internet has become central to daily life, websites have overwhelmingly remained inaccessible to the millions of users who have disabilities. Congress enacted the Americans with Disabilities Act (ADA) to combat discrimination against people with disabilities. Passed in 1990, it lacks any specific mention of the internet Courts are split as to whether the ADA applies to websites, and if so, what actions businesses must take to comply with the law. Further complicating matters, the Department of Justice (DOJ) initiated the rulemaking …


Taking It With You: Platform Barriers To Entry And The Limits Of Data Portability, Gabriel Nicholas Apr 2021

Taking It With You: Platform Barriers To Entry And The Limits Of Data Portability, Gabriel Nicholas

Michigan Technology Law Review

Policymakers are faced with a vexing problem: how to increase competition in a tech sector dominated by a few giants. One answer proposed and adopted by regulators in the United States and abroad is to require large platforms to allow consumers to move their data from one platform to another, an approach known as data portability. Facebook, Google, Apple, and other major tech companies have enthusiastically supported data portability through their own technical and political initiatives. Today, data portability has taken hold as one of the go-to solutions to address the tech industry’s competition concerns.

This Article argues that despite …


Impostor Scams, David Adam Friedman Apr 2021

Impostor Scams, David Adam Friedman

University of Michigan Journal of Law Reform

Impostor scams have recently become the most common type of consumer scam in America, surpassing identity theft. It has never been easier and more profitable to be an impostor scammer. Though the core of these scams dates back centuries, these fraudsters consistently find novel ways to manipulate human motives and emotions. Nonetheless, the public should not give up hope. Policymakers and private actors can slow down this scourge if they focus on the key chokepoints that impostor scammers rely upon to achieve their ends. This Article provides a roadmap for a solution to impostor scams, offering specific suggestions for mitigating …


The Contribution Of Eu Law To The Regulation Of Online Speech, Luc Von Danwitz Jan 2021

The Contribution Of Eu Law To The Regulation Of Online Speech, Luc Von Danwitz

Michigan Technology Law Review

Internet regulation in the European Union (EU) is receiving significant attention and criticism in the United States. The European Court of Justice’s (ECJ) judgment in the case Glawischnig-Piesczek v. Facebook Ireland, in which the ECJ found a take-down order against Facebook for defamatory content with global effect permissible under EU law, was closely scrutinized in the United States. These transsystemic debates are valuable but need to be conducted with a thorough understanding of the relevant legal framework and its internal logic. This note aims to provide the context to properly assess the role the ECJ and EU law play …


Publish, Share, Re-Tweet, And Repeat, Michal Lavi Jan 2021

Publish, Share, Re-Tweet, And Repeat, Michal Lavi

University of Michigan Journal of Law Reform

New technologies allow users to communicate ideas to a broad audience easily and quickly, affecting the way ideas are interpreted and their credibility. Each and every social network user can simply click “share” or “retweet” and automatically republish an existing post and expose a new message to a wide audience. The dissemination of ideas can raise public awareness about important issues and bring about social, political, and economic change.

Yet, digital sharing also provides vast opportunities to spread false rumors, defamation, and Fake News stories at the thoughtless click of a button. The spreading of falsehoods can severely harm the …