Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 53

Full-Text Articles in Law

A Fake Future: The Threat Of Foreign Disinformation On The U.S. And Its Allies, Brandon M. Rubsamen Apr 2023

A Fake Future: The Threat Of Foreign Disinformation On The U.S. And Its Allies, Brandon M. Rubsamen

Global Tides

This paper attempts to explain the threat that foreign disinformation poses for the United States Intelligence Community and its allies. The paper examines Russian disinformation from both a historical and contemporary context and how its effect on Western democracies may only be exacerbated in light of Chinese involvement and evolving technologies. Fortunately, the paper also studies practices and strategies that the United States Intelligence Community and its allied foreign counterparts may use to respond. It is hoped that this study will help shed further light on Russian and Chinese disinformation campaigns and explain how the Intelligence Community can efficiently react.


Publish, Share, Re-Tweet, And Repeat, Michal Lavi Jan 2021

Publish, Share, Re-Tweet, And Repeat, Michal Lavi

University of Michigan Journal of Law Reform

New technologies allow users to communicate ideas to a broad audience easily and quickly, affecting the way ideas are interpreted and their credibility. Each and every social network user can simply click “share” or “retweet” and automatically republish an existing post and expose a new message to a wide audience. The dissemination of ideas can raise public awareness about important issues and bring about social, political, and economic change.

Yet, digital sharing also provides vast opportunities to spread false rumors, defamation, and Fake News stories at the thoughtless click of a button. The spreading of falsehoods can severely harm the …


Internet Architecture And Disability, Blake Reid Apr 2020

Internet Architecture And Disability, Blake Reid

Indiana Law Journal

The Internet is essential for education, employment, information, and cultural and democratic participation. For tens of millions of people with disabilities in the United States, barriers to accessing the Internet—including the visual presentation of information to people who are blind or visually impaired, the aural presentation of information to people who are deaf or hard of hearing, and the persistence of Internet technology, interfaces, and content without regard to prohibitive cognitive load for people with cognitive and intellectual disabilities—collectively pose one of the most significant civil rights issues of the information age. Yet disability law lacks a comprehensive theoretical approach …


Selling Wine Without Bottles: The Economy Of Mind On The Global Net, John Perry Barlow Aug 2019

Selling Wine Without Bottles: The Economy Of Mind On The Global Net, John Perry Barlow

Duke Law & Technology Review

No abstract provided.


The Past And Future Of The Internet: A Symposium For John Perry Barlow Aug 2019

The Past And Future Of The Internet: A Symposium For John Perry Barlow

Duke Law & Technology Review

No abstract provided.


Privacy Statements Under The Gdpr, Mike Hintze Apr 2019

Privacy Statements Under The Gdpr, Mike Hintze

Seattle University Law Review

The need to include specific types of information in a privacy statement is a GDPR compliance obligation that does not get as much attention as some other GDPR requirements. Perhaps that is because privacy statements have been much maligned in recent years. They are too long and full of legalese. Nobody reads them. They are part of a notice and consent approach to privacy that puts an unrealistic burden on consumers to make informed choices. But despite these well-known criticisms, the GDPR doubles down on privacy statements. In fact, gauging by the roughly fourfold increase in privacy statement requirements compared …


Confiding In Con Men: U.S. Privacy Law, The Gdpr, And Information Fiduciaries, Lindsey Barrett Apr 2019

Confiding In Con Men: U.S. Privacy Law, The Gdpr, And Information Fiduciaries, Lindsey Barrett

Seattle University Law Review

In scope, ambition, and animating philosophy, U.S. privacy law and Europe’s General Data Protection Regulation are almost diametric opposites. The GDPR’s ambitious individual rights, significant prohibitions, substantive enforcement regime, and broad applicability contrast vividly with a scattershot U.S. regime that generally prioritizes facilitating commerce over protecting individuals, and which has created perverse incentives for industry through anemic enforcement of the few meaningful limitations that do exist. A privacy law that characterizes data collectors as information fiduciaries could coalesce with the commercial focus of U.S. law, while emulating the GDPR’s laudable normative objectives and fortifying U.S. consumer privacy law with a …


Understanding The Consumer Review Fairness Act Of 2016, Eric Goldman Nov 2017

Understanding The Consumer Review Fairness Act Of 2016, Eric Goldman

Michigan Telecommunications & Technology Law Review

Consumer reviews are vitally important to our modern economy. Markets become stronger and more efficient when consumers share their marketplace experiences and guide other consumers toward the best vendors and away from poor ones. Businesses recognize the importance of consumer reviews, and many businesses take numerous steps to manage how consumer reviews affect their public image. Unfortunately, in a misguided effort to control consumer reviews, some businesses have deployed contract provisions that ban or inhibit their consumers from reviewing them. I call those provisions “antireview clauses.”

Anti-review clauses distort the marketplace benefits society gets from consumer reviews by suppressing peer …


Do We Need Help Using Yelp? Regulating Advertising On Mediated Reputation Systems, David Adam Friedman Nov 2017

Do We Need Help Using Yelp? Regulating Advertising On Mediated Reputation Systems, David Adam Friedman

University of Michigan Journal of Law Reform

Yelp, Angie’s List, Avvo, and similar entities enable consumers to access an incredibly useful trove of information about peer experiences with businesses and their goods and services. These “mediated reputation systems,” gatherers and disseminators of consumer peer opinions, are more trusted by consumers than traditional commercial channels. They are omnipresent, carried everywhere on mobile devices, and used by consumers ready to transact.

Though this information is valuable, a troubling conflict emerges in its presentation. Most of these reputation platforms rely heavily on advertising sales to support their business models. This reliance compels these entities to display persuasive advertising right along …


Keynote Address: The Digital Forevermore, Thomas J. Ridge Mar 2017

Keynote Address: The Digital Forevermore, Thomas J. Ridge

University of Richmond Law Review

No abstract provided.


The 2016 Amendments To Criminal Rule 41: National Search Warrants To Seize Cyberspace, "Particularly" Speaking, Devin M. Adams Mar 2017

The 2016 Amendments To Criminal Rule 41: National Search Warrants To Seize Cyberspace, "Particularly" Speaking, Devin M. Adams

University of Richmond Law Review

No abstract provided.


Digital Technology And Analog Law: Cellular Location Data, The Third-Party Doctrine, And The Law's Need To Evolve, Justin Hill Mar 2017

Digital Technology And Analog Law: Cellular Location Data, The Third-Party Doctrine, And The Law's Need To Evolve, Justin Hill

University of Richmond Law Review

No abstract provided.


Privacy Almighty? The Cjeu's Judgment In Google Spain Sl V. Aepd, David J. Stute Dec 2015

Privacy Almighty? The Cjeu's Judgment In Google Spain Sl V. Aepd, David J. Stute

Michigan Journal of International Law

The Internet has matured into an unprecedented repository of data, retrievable through myriad unique “links,” or Uniform Resource Locators. Yet, this wealth of information only became broadly accessible through the invention and continual development of algorithm-based search engines. Keyword searches empowered search-engine users to find—and sometimes stumble upon—information with great ease. Indeed, search-engine indices arguably have become the most comprehensive catalogues of information the world has ever seen. This wealth of accessible information poses challenges to traditional notions of privacy: aspects of our private and public lives, which previously would have rarely left the vicinities of our immediate social or …


Voluntary Disclosure Of Information As A Proposed Standard For The Fourth Amendment's Third-Party Doctrine, Margaret E. Twomey Jun 2015

Voluntary Disclosure Of Information As A Proposed Standard For The Fourth Amendment's Third-Party Doctrine, Margaret E. Twomey

Michigan Telecommunications & Technology Law Review

The third-party doctrine is a long-standing tenant of Fourth Amendment law that allows law enforcement officers to utilize information that was released to a third party without the probable cause required for a traditional search warrant. This has allowed law enforcement agents to use confidential informants, undercover agents, and access bank records of suspected criminals. However, in a digital age where exponentially more information is shared with Internet Service Providers, e-mail hosts, and social media “friends,” the traditional thirdparty doctrine ideas allow law enforcement officers access to a cache of personal information and data with a standard below probable cause. …


Social Media And The Job Market: How To Reconcile Applicant Privacy With Employer Needs, Peter B. Baumhart Jan 2015

Social Media And The Job Market: How To Reconcile Applicant Privacy With Employer Needs, Peter B. Baumhart

University of Michigan Journal of Law Reform

In the modern technological age, social media allows us to communicate vast amounts of personal information to countless people instantaneously. This information is valuable to more than just our “friends” and “followers,” however. Prospective employers can use this personal data to inform hiring decisions, thereby maximizing fit and minimizing potential liability. The question then arises, how best to acquire this information? For job applicants, the counter-question is how best to protect the privacy of their social media accounts. As these two competing desires begin to clash, it is important to find a method to mediate the conflict. Existing privacy law, …


Electronic Privacy Information Center V. National Security Agency: How Glomar Responses Benefit Businesses And Provide An Epic Blow To Individuals, Joshua R. Chazen Jan 2014

Electronic Privacy Information Center V. National Security Agency: How Glomar Responses Benefit Businesses And Provide An Epic Blow To Individuals, Joshua R. Chazen

Journal of Business & Technology Law

No abstract provided.


Tollbooths And Newsstands On The Information Superhighway, Brad A. Greenberg Dec 2013

Tollbooths And Newsstands On The Information Superhighway, Brad A. Greenberg

Michigan Telecommunications & Technology Law Review

Countering the perception that speech limitations affecting distribution necessarily reduce access to information, this Essay proffers that copyright expansions actually can increase access and thereby serve important copyright and First Amendment values. In doing so, this discussion contributes to the growing literature and two recent Supreme Court opinions discussing whether copyright law and First Amendment interests can coexist.


Stop Being Evil: A Proposal For Unbiased Google Search, Joshua G. Hazan Mar 2013

Stop Being Evil: A Proposal For Unbiased Google Search, Joshua G. Hazan

Michigan Law Review

Since its inception in the late 1990s, Google has done as much as anyone to create an "open internet." Thanks to Google's unparalleled search algorithms, anyone's ideas can be heard, and all kinds of information are easier than ever to find. As Google has extended its ambition beyond its core function, however it has conducted itself in a manner that now threatens the openness and diversity of the same internet ecosystem that it once championed. By promoting its own content and vertical search services above all others, Google places a significant obstacle in the path of its competitors. This handicap …


The Discovery And Use Of Computerized Information: An Examination Of Current Approaches, Richard M. Long Jan 2013

The Discovery And Use Of Computerized Information: An Examination Of Current Approaches, Richard M. Long

Pepperdine Law Review

In recent years, the legal profession has run head on into the increasing use of computers and computerized information. Discovery and evidentiary rules developed to deal with written documentation may not be flexible enough to adequately cover this relatively new method of storing information. This comment examines various methods by which courts have attempted to deal with discovery and evidentiary problems involving computerized information, and suggests certain areas that should be explored in supporting or attacking the credibility of such information.


Geographically Restricted Streaming Content And Evasion Of Geolocation: The Applicability Of The Copyright Anticircumvention Rules, Jerusha Burnett Jan 2013

Geographically Restricted Streaming Content And Evasion Of Geolocation: The Applicability Of The Copyright Anticircumvention Rules, Jerusha Burnett

Michigan Telecommunications & Technology Law Review

A number of methods currently exist or are being developed to determine where Internet users are located geographically when they access a particular webpage. Yet regardless of the precautions taken by website operators to limit the locations from which they allow access, it is likely that users will find ways to gain access to restricted content. Should the evasion of geolocation constitute circumvention of access controls so that § 1201 of the Digital Millennium Copyright Act ("DMCA") applies? Because location data can properly be considered personally identifiable information ("PII"), this Note argues that § 1201 should not apply absent a …


Rulemaking Vs. Democracy: Judging And Nudging Public Participation That Counts , Cynthia R. Farina, Mary Newhart, Josiah Heidt, Cornell Erulemaking Initiative Sep 2012

Rulemaking Vs. Democracy: Judging And Nudging Public Participation That Counts , Cynthia R. Farina, Mary Newhart, Josiah Heidt, Cornell Erulemaking Initiative

Michigan Journal of Environmental & Administrative Law

This Article considers how open government “magical thinking” around technology has infused efforts to increase public participation in rulemaking. We propose a framework for assessing the value of technology-enabled rulemaking participation and offer specific principles of participation-system design, which are based on conceptual work and practical experience in the Regulation Room project at Cornell University. An underlying assumption of open government enthusiasts is that more public participation will lead to better government policymaking: If we use technology to give people easier opportunities to participate in public policymaking, they will use these opportunities to participate effectively. However, experience thus far with …


Viewer Discretion Is Advised: Disconnects Between The Marketplace Of Ideas And Social Media Used To Communicate Information During Emergencies And Public Health Crises, Peter Maggiore Jan 2012

Viewer Discretion Is Advised: Disconnects Between The Marketplace Of Ideas And Social Media Used To Communicate Information During Emergencies And Public Health Crises, Peter Maggiore

Michigan Telecommunications & Technology Law Review

In a sense, social media has become the ideal manifestation of the "Marketplace of Ideas" (hereinafter "Marketplace") that Chief Justice Oliver Wendell Holmes articulated. The Marketplace concept will be discussed in greater detail below, but in brief, it is the theory that truth will surface over falsehoods when all opinions and ideas are freely expressed, because the value or worth of that opinion or idea will be determined on the market of public opinion. Part I of this Note will examine the Marketplace concept through the works of various legal and philosophical theorists. Chief among them is Frederick Schauer's work …


Privacy Policies, Terms Of Service, And Ftc Enforcement: Broadening Unfairness Regulation For A New Era, G. S. Hans Jan 2012

Privacy Policies, Terms Of Service, And Ftc Enforcement: Broadening Unfairness Regulation For A New Era, G. S. Hans

Michigan Telecommunications & Technology Law Review

This Note examines website privacy policies in the context of FTC regulation. The relevant portion of Section 5 of the Federal Trade Commission Act, 15 U.S.C. § 45(a), uses the following language to define the scope of the agency's regulatory authority: "Unfair methods of competition in or affecting commerce, and unfair or deceptive acts or practices in or affecting commerce, are hereby declared unlawful." Specifically, this Note analyzes the FTC's power to regulate unfair practices (referred to as the FTC's "unfairness power") granted by Section 5, and also discusses the deception prong of Section 5, which allows the agency to …


Enhancing Public Access To Online Rulemaking Information, Cary Coglianese Jan 2012

Enhancing Public Access To Online Rulemaking Information, Cary Coglianese

Michigan Journal of Environmental & Administrative Law

One of the most significant powers exercised by federal agencies is their power to make rules. Given the importance of agency rulemaking, the process by which agencies develop rules has long been subject to procedural requirements aiming to advance democratic values of openness and public participation. With the advent of the digital age, government agencies have engaged in increasing efforts to make rulemaking information available online as well as to elicit public participation via electronic means of communication. How successful are these efforts? How might they be improved? In this article, I investigate agencies’ efforts to make rulemaking information available …


Protecting Anonymous Expression: The Internet's Role In Washington State's Disclosure Laws And The Direct Democracy Process, Karen Cullinane Jul 2011

Protecting Anonymous Expression: The Internet's Role In Washington State's Disclosure Laws And The Direct Democracy Process, Karen Cullinane

University of Michigan Journal of Law Reform

This Note proposes that the Washington State Legislature amend its Public Records Act to exempt from public disclosure personal information legally required to be disclosed by signers of referendum petitions. This Note also proposes that the Washington State Legislature designate an electronic system, to be detailed in its election law, by which referendum petitions can be checked for fraud without violating the right to anonymous expression protected by the First Amendment. Part I describes Washington State's referendum process and the path of Doe v. Reed, the case animating the reform presented in this Note. Part II illustrates how the rise …


Databases And Dynamism, Michal Shur-Ofry Feb 2011

Databases And Dynamism, Michal Shur-Ofry

University of Michigan Journal of Law Reform

Databases are generally perceived in legal scholarship as static warehouses, storing up valuable facts and information. Accordingly, scholarship on copyright protection of databases typically concentrates on the social need to access their content. This Article seeks to shift the focus of the debate, arguing that the copyrightdatabases debate is not merely a static "access to information" story. Instead, it is a dynamic story of relations, hierarchies, and interactions between pieces of information, determined by database creators. It is also a story of patterns, categories, selections, and taxonomies that are often invisible to the naked eye, but that influence our perceptions …


Spoliation Of Electronic Evidence: Sanctions Versus Advocacy, Charles W. Adams Jan 2011

Spoliation Of Electronic Evidence: Sanctions Versus Advocacy, Charles W. Adams

Michigan Telecommunications & Technology Law Review

This Article proposes that courts should refrain from imposing adverse inference jury instructions as sanctions for the spoliation of evidence. This proposal bears some similarity to the approach taken twenty years ago by the 1993 amendments to Rule 11, which constrained courts' ability to sanction. Instead of imposing an adverse jury instruction as a sanction for spoliation of evidence, courts should allow evidence of spoliation to be admitted at trial if a reasonable jury could find that spoliation had occurred and if the spoliation was relevant to a material issue. If a court allows the introduction of evidence of spoliation …


Does Law Matter Online - Empirical Evidence On Privacy Law Compliance, Michael Birnhack, Niva Elkin-Koren Jan 2011

Does Law Matter Online - Empirical Evidence On Privacy Law Compliance, Michael Birnhack, Niva Elkin-Koren

Michigan Telecommunications & Technology Law Review

Does law matter in the information environment? What can we learn from the experience of applying a particular legal regime to the online environment? Informational privacy (or to use the European term, data protection) provides an excellent illustration of the challenges faced by regulators who seek to secure user rights and shape online behavior. A comprehensive study of Israeli website compliance with information privacy regulation in 2003 and 2006 provides insights for understanding these challenges. The study examined the information privacy practices of 1360 active websites, determining the extent to which these sites comply with applicable legal requirements related to …


A Path Toward User Control Of Online Profiling, Tracy A. Steindel Jan 2011

A Path Toward User Control Of Online Profiling, Tracy A. Steindel

Michigan Telecommunications & Technology Law Review

Online profiling is "the practice of tracking information about consumers' interests by monitoring their movements online." A primary purpose of online profiling is to "deliver advertising tailored to the individual's interests," a practice known as online behavioral advertising (OBA). In order to accomplish this, publishers and advertisers track a individual's online behavior using cookies and other means. Publishers and advertisers aggregate the information, often compile it with information from offline sources, and sort individuals into groups based on characteristics such as age, income, and hobbies. Advertisers can then purchase access to these consumer groups, controlling their selections with such specificity …


Information Anxieties, G. S. Hans Jan 2011

Information Anxieties, G. S. Hans

Michigan Telecommunications & Technology Law Review

The constant access and instant publication that the Internet allows have given every pundit an online soapbox. This content explosion has created two related problems for consumers and industry: how to find valuable content online (whatever "valuable" means) and how to moderate the flow of the content itself. Tim Wu argues in The Master Switch that the second issue of content control and mediation has been fiercely debated in the United States as far back as the invention of the telephone in the late nineteenth century. Consumers, creators, companies, and government officials have disputed the appropriate regulations for the devices …