Open Access. Powered by Scholars. Published by Universities.®
- Publication Year
Articles 1 - 17 of 17
Full-Text Articles in Law
Privacy Almighty? The Cjeu's Judgment In Google Spain Sl V. Aepd, David J. Stute
Privacy Almighty? The Cjeu's Judgment In Google Spain Sl V. Aepd, David J. Stute
Michigan Journal of International Law
The Internet has matured into an unprecedented repository of data, retrievable through myriad unique “links,” or Uniform Resource Locators. Yet, this wealth of information only became broadly accessible through the invention and continual development of algorithm-based search engines. Keyword searches empowered search-engine users to find—and sometimes stumble upon—information with great ease. Indeed, search-engine indices arguably have become the most comprehensive catalogues of information the world has ever seen. This wealth of accessible information poses challenges to traditional notions of privacy: aspects of our private and public lives, which previously would have rarely left the vicinities of our immediate social or …
A Global Panopticon - The Changing Role Of International Organizations In The Information Age, Jennifer Shkabatur
A Global Panopticon - The Changing Role Of International Organizations In The Information Age, Jennifer Shkabatur
Michigan Journal of International Law
The outbreaks of Severe Acute Respiratory Syndrome (SARS) in 2002-2003 and Swine Flu (H1N1) in 2009 captured a great deal of global attention. The swift spread of these diseases wreaked havoc, generated public hysteria, disrupted global trade and travel, and inflicted severe economic losses to countries, corporations, and individuals. Although affected states were required to report to the World Health Organization (WHO) events that may have constituted a public health emergency, many failed to do so. The WHO and the rest of the international community were therefore desperate for accurate, up-to-date information as to the nature of the pandemics, their …
Protecting Anonymous Expression: The Internet's Role In Washington State's Disclosure Laws And The Direct Democracy Process, Karen Cullinane
Protecting Anonymous Expression: The Internet's Role In Washington State's Disclosure Laws And The Direct Democracy Process, Karen Cullinane
University of Michigan Journal of Law Reform
This Note proposes that the Washington State Legislature amend its Public Records Act to exempt from public disclosure personal information legally required to be disclosed by signers of referendum petitions. This Note also proposes that the Washington State Legislature designate an electronic system, to be detailed in its election law, by which referendum petitions can be checked for fraud without violating the right to anonymous expression protected by the First Amendment. Part I describes Washington State's referendum process and the path of Doe v. Reed, the case animating the reform presented in this Note. Part II illustrates how the rise …
There Is A Time To Keep Silent And A Time To Speak, The Hard Part Is Knowing Which Is Which: Striking The Balance Between Privacy Protection And The Flow Of Health Care Information, Daniel J. Gilman, James C. Cooper
There Is A Time To Keep Silent And A Time To Speak, The Hard Part Is Knowing Which Is Which: Striking The Balance Between Privacy Protection And The Flow Of Health Care Information, Daniel J. Gilman, James C. Cooper
Michigan Telecommunications & Technology Law Review
Health information technology (HIT) has become a signal element of federal health policy, especially as the recently enacted American Recovery and Reinvestment Act of 2009 (Recovery Act or ARRA) comprises numerous provisions related to HIT and commits tens of billions of dollars to its development and adoption. These provisions charge various agencies of the federal government with both general and specific HIT-related implementation tasks including, inter alia, providing funding for HIT in various contexts: the implementation of interoperable HIT, HIT-related infrastructure, and HIT-related training and research. The Recovery Act also contains various regulatory provisions pertaining to HIT. Provisions of the …
Corporate Cooperation Through Cost-Sharing, Nicola Faith Sharpe
Corporate Cooperation Through Cost-Sharing, Nicola Faith Sharpe
Michigan Telecommunications & Technology Law Review
Applying a game-theoretic approach based on the classic prisoners' dilemma provides valuable insights into corporate managers' decision-making incentives under existing discovery rules. It demonstrates that the fee structure imposed by current discovery rules leads to inefficiency and motivates corporate litigants on either side of a controversy to employ abusive discovery practices, although each party would benefit from cooperation. Using this framework, this Article shows how a cost-sharing regime can motivate litigants to engage in cooperative discovery and, as a consequence, facilitate more efficient and less abusive discovery practices. To date, scholars, who have posited that cooperative behavior in the discovery …
Electronic Discovery Sanctions In The Twenty-First Century, Shira A. Scheindlin, Kachana Wangkeo
Electronic Discovery Sanctions In The Twenty-First Century, Shira A. Scheindlin, Kachana Wangkeo
Michigan Telecommunications & Technology Law Review
At the federal level, the Civil Rules Advisory Committee has responded to the "unique and necessary feature of computer systems--the automatic recycling, overwriting, and alteration of electronically stored information"--with a proposed amendment to Rule 37. The proposed Rule 37(f) would shield litigants from sanctions for the destruction of electronic data if the party "took reasonable steps to preserve the information after it knew or should have known the information was discoverable in the action" and "the failure resulted from the loss of the information because of the routine operation of the party's electronic information system." The safe harbor provision would …
Taking A Bite Out Of Circumvention: Analyzing 17 U.S.C. 1201 As A Criminal Law, Jason M. Schulz
Taking A Bite Out Of Circumvention: Analyzing 17 U.S.C. 1201 As A Criminal Law, Jason M. Schulz
Michigan Telecommunications & Technology Law Review
...information content providers who depend heavily on copyright law are growing increasingly wary of advances in digital technology that allow manipulation of their content and potentially diminish the effectiveness of their copyright protection. Technology firms, on the other hand, are looking more and more at developing products which provide low-cost, high quality access to content without restriction. Thus, as technologists work feverishly to find new ways to free up information, content providers are fighting just as hard to constrain access in order to prevent market-killing duplication and distribution of their works. These two codependent yet clashing interest groups recently met …
The Quest For Enabling Metaphors For Law And Lawyering In The Information Agae, Pamela Samuelson
The Quest For Enabling Metaphors For Law And Lawyering In The Information Agae, Pamela Samuelson
Michigan Law Review
A Review of James Boyle, Shamans, Software, and Spleens: Law and the Construction of the Information Society and M. Ethan Katsh, Law in a Digital World
Whose Genes Are These Anyway?: Familial Conflicts Over Access To Genetic Information, Sonia M. Suter
Whose Genes Are These Anyway?: Familial Conflicts Over Access To Genetic Information, Sonia M. Suter
Michigan Law Review
This Note argues first that courts and legislatures should follow a presumption against mandating disclosure of a person's genetic information to third parties. Second, genetic testing for the benefit of a third party should not, and constitutionally cannot, be compelled. Part I presents an overview of genetics and discusses the special legal and ethical issues genetic testing poses. Part II examines the issue of nonconsensual disclosure to family members, who could potentially use the information from tests that have already been performed. This Part concludes that there should be a presumption against disclosure. Part III examines a related, but different, …
Information Economics And Chemical Toxicity: Designing Laws To Produce And Use Data, Mary L. Lyndon
Information Economics And Chemical Toxicity: Designing Laws To Produce And Use Data, Mary L. Lyndon
Michigan Law Review
Just as laws may create entitlements to the use of information, they may also be written to distribute information and to encourage information production. This Article discusses the ways in which law affects the generation and distribution of information related to chemical exposure and toxicity. It describes the economic impact of recently enacted right-to-know laws and proposes that better and more abundant data could be produced if the law paid greater attention to basic economic principles that influence research and information systems.
Reciprocity In International Telecommunications Trade: A New Trade Barrier?, Sheryl Powers
Reciprocity In International Telecommunications Trade: A New Trade Barrier?, Sheryl Powers
Michigan Journal of International Law
To those advocating its use, reciprocity legislation is especially appropriate for the telecommunications industry. Only 5 percent of telecommunications equipment manufactured in the United States is exported for sale in other nations. Trade barriers, loyalty to domestic manufacturers and the importance of telecommunications to national defense systems have combined to restrict access to foreign markets in the telecommunications sector. To persuade other nations to increase market access in telecommunications, United States legislators added a requirement of reciprocity to two proposed bills, S.898 and H.R.5158. This note will examine these two bills, concluding that reciprocity is an inappropriate solution to United …
Integrated Servies Digital Network: Issues And Options For The World's Future Communications Systems, A. M. Rutkowski
Integrated Servies Digital Network: Issues And Options For The World's Future Communications Systems, A. M. Rutkowski
Michigan Journal of International Law
There has been virtually no public discussion of the significant public policy issues raised because of the intimidating nature of network engineering which forms the basis for nearly all the current dialogue. This paper discusses current ISDN developments, and sets forth an analytical framework within which these issues may be discussed.
Restrictions On Trade In Communication And Information Services, Geza Feketekuty, Jonathan David Aronson
Restrictions On Trade In Communication And Information Services, Geza Feketekuty, Jonathan David Aronson
Michigan Journal of International Law
Section one highlights some of the changes that the revolution in information exchange is producing. It also argues that transborder data flows could help facilitate international economic adjustment. Section two analyzes the types of reasons used to justify policy measures that inhibit the integration of the world communication network or prevent information from flowing across national borders. It also discusses the implication of restrictions on transborder data flows for the world trading system and for world economic growth. The final section discusses strategies for halting the proliferation of barriers to trade in communication and information services and for reducing existing …
The International Application Of The Second Computer Inquiry, Robert M. Frieden
The International Application Of The Second Computer Inquiry, Robert M. Frieden
Michigan Journal of International Law
This article chronicles the FCC's attempt to confront the confluence of telecommunications and data processing technologies by fashioning a regulatory scheme designed primarily for the United States. The Commission has chosen to apply this scheme, without significant qualification, internationally. Given the different objectives and structure of United States and foreign communications industries, the FCC's system cannot be transplanted abroad without prior consultation and substantial modification. After reviewing the international problems created by the Commission's application abroad of its newly developed scheme, this article concludes with recommendations for resolving these conflicts that currently threaten the well-being of carriers, customers, and international …
Private Leased Telecommunication Lines: Threats To Continued International Availabliltiy, Jill L. Martin
Private Leased Telecommunication Lines: Threats To Continued International Availabliltiy, Jill L. Martin
Michigan Journal of International Law
This article examines both actual and proposed actions by Japanese and European telecommunications authorities, known as Ministries of Post, Telephone, and Telegraph (PTTs), to restrict private leased line availability, and then explores the possibility that these actions presage the total elimination of private leased lines. It concludes that unless the United States government adopts a unified and reasonable policy opposing the escalation of regulations and restrictions, their deleterious effects will become more severe.
The Council Of Europe Convention Of The Oecd Guidelines On Data Protection, Jon Bing
The Council Of Europe Convention Of The Oecd Guidelines On Data Protection, Jon Bing
Michigan Journal of International Law
The first international legal instruments to be adopted were two Council of Europe resolutions in 1973 and 1974, the first on "the protection of the privacy of individuals vis-A-vis electronic data banks in the private sector," 9 and the second on "the protection of the privacy of individuals vis-A-vis electronic data banks in the public sector." This article will describe and compare the rules of data protection as they emerge in the instruments. Although this will require some assessment, the main objective will be to explain and amplify.
Personal Privacy In The Computer Age: The Challenge Of A New Technology In An Information-Oriented Society, Arthur R. Miller
Personal Privacy In The Computer Age: The Challenge Of A New Technology In An Information-Oriented Society, Arthur R. Miller
Michigan Law Review
The purpose of this Article is to survey the new technology's implications for personal privacy and to evaluate the contemporary common-law and statutory pattern relating to data-handling. In the course of this examination, it will appraise the existing framework's capacity to deal with the problems created by society's growing awareness of the primordial character of information. The Article is intended to be suggestive; any attempt at definitiveness would be premature. Avowedly, it was written with the bias of one who believes that the new information technology has enormous long-range societal implications and who is concerned about the consequences of the …