Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 17 of 17

Full-Text Articles in Law

Privacy Almighty? The Cjeu's Judgment In Google Spain Sl V. Aepd, David J. Stute Dec 2015

Privacy Almighty? The Cjeu's Judgment In Google Spain Sl V. Aepd, David J. Stute

Michigan Journal of International Law

The Internet has matured into an unprecedented repository of data, retrievable through myriad unique “links,” or Uniform Resource Locators. Yet, this wealth of information only became broadly accessible through the invention and continual development of algorithm-based search engines. Keyword searches empowered search-engine users to find—and sometimes stumble upon—information with great ease. Indeed, search-engine indices arguably have become the most comprehensive catalogues of information the world has ever seen. This wealth of accessible information poses challenges to traditional notions of privacy: aspects of our private and public lives, which previously would have rarely left the vicinities of our immediate social or …


A Global Panopticon - The Changing Role Of International Organizations In The Information Age, Jennifer Shkabatur Oct 2011

A Global Panopticon - The Changing Role Of International Organizations In The Information Age, Jennifer Shkabatur

Michigan Journal of International Law

The outbreaks of Severe Acute Respiratory Syndrome (SARS) in 2002-2003 and Swine Flu (H1N1) in 2009 captured a great deal of global attention. The swift spread of these diseases wreaked havoc, generated public hysteria, disrupted global trade and travel, and inflicted severe economic losses to countries, corporations, and individuals. Although affected states were required to report to the World Health Organization (WHO) events that may have constituted a public health emergency, many failed to do so. The WHO and the rest of the international community were therefore desperate for accurate, up-to-date information as to the nature of the pandemics, their …


Protecting Anonymous Expression: The Internet's Role In Washington State's Disclosure Laws And The Direct Democracy Process, Karen Cullinane Jul 2011

Protecting Anonymous Expression: The Internet's Role In Washington State's Disclosure Laws And The Direct Democracy Process, Karen Cullinane

University of Michigan Journal of Law Reform

This Note proposes that the Washington State Legislature amend its Public Records Act to exempt from public disclosure personal information legally required to be disclosed by signers of referendum petitions. This Note also proposes that the Washington State Legislature designate an electronic system, to be detailed in its election law, by which referendum petitions can be checked for fraud without violating the right to anonymous expression protected by the First Amendment. Part I describes Washington State's referendum process and the path of Doe v. Reed, the case animating the reform presented in this Note. Part II illustrates how the rise …


There Is A Time To Keep Silent And A Time To Speak, The Hard Part Is Knowing Which Is Which: Striking The Balance Between Privacy Protection And The Flow Of Health Care Information, Daniel J. Gilman, James C. Cooper Jan 2010

There Is A Time To Keep Silent And A Time To Speak, The Hard Part Is Knowing Which Is Which: Striking The Balance Between Privacy Protection And The Flow Of Health Care Information, Daniel J. Gilman, James C. Cooper

Michigan Telecommunications & Technology Law Review

Health information technology (HIT) has become a signal element of federal health policy, especially as the recently enacted American Recovery and Reinvestment Act of 2009 (Recovery Act or ARRA) comprises numerous provisions related to HIT and commits tens of billions of dollars to its development and adoption. These provisions charge various agencies of the federal government with both general and specific HIT-related implementation tasks including, inter alia, providing funding for HIT in various contexts: the implementation of interoperable HIT, HIT-related infrastructure, and HIT-related training and research. The Recovery Act also contains various regulatory provisions pertaining to HIT. Provisions of the …


Corporate Cooperation Through Cost-Sharing, Nicola Faith Sharpe Jan 2009

Corporate Cooperation Through Cost-Sharing, Nicola Faith Sharpe

Michigan Telecommunications & Technology Law Review

Applying a game-theoretic approach based on the classic prisoners' dilemma provides valuable insights into corporate managers' decision-making incentives under existing discovery rules. It demonstrates that the fee structure imposed by current discovery rules leads to inefficiency and motivates corporate litigants on either side of a controversy to employ abusive discovery practices, although each party would benefit from cooperation. Using this framework, this Article shows how a cost-sharing regime can motivate litigants to engage in cooperative discovery and, as a consequence, facilitate more efficient and less abusive discovery practices. To date, scholars, who have posited that cooperative behavior in the discovery …


Electronic Discovery Sanctions In The Twenty-First Century, Shira A. Scheindlin, Kachana Wangkeo Oct 2004

Electronic Discovery Sanctions In The Twenty-First Century, Shira A. Scheindlin, Kachana Wangkeo

Michigan Telecommunications & Technology Law Review

At the federal level, the Civil Rules Advisory Committee has responded to the "unique and necessary feature of computer systems--the automatic recycling, overwriting, and alteration of electronically stored information"--with a proposed amendment to Rule 37. The proposed Rule 37(f) would shield litigants from sanctions for the destruction of electronic data if the party "took reasonable steps to preserve the information after it knew or should have known the information was discoverable in the action" and "the failure resulted from the loss of the information because of the routine operation of the party's electronic information system." The safe harbor provision would …


Taking A Bite Out Of Circumvention: Analyzing 17 U.S.C. 1201 As A Criminal Law, Jason M. Schulz Jun 2000

Taking A Bite Out Of Circumvention: Analyzing 17 U.S.C. 1201 As A Criminal Law, Jason M. Schulz

Michigan Telecommunications & Technology Law Review

...information content providers who depend heavily on copyright law are growing increasingly wary of advances in digital technology that allow manipulation of their content and potentially diminish the effectiveness of their copyright protection. Technology firms, on the other hand, are looking more and more at developing products which provide low-cost, high quality access to content without restriction. Thus, as technologists work feverishly to find new ways to free up information, content providers are fighting just as hard to constrain access in order to prevent market-killing duplication and distribution of their works. These two codependent yet clashing interest groups recently met …


The Quest For Enabling Metaphors For Law And Lawyering In The Information Agae, Pamela Samuelson May 1996

The Quest For Enabling Metaphors For Law And Lawyering In The Information Agae, Pamela Samuelson

Michigan Law Review

A Review of James Boyle, Shamans, Software, and Spleens: Law and the Construction of the Information Society and M. Ethan Katsh, Law in a Digital World


Whose Genes Are These Anyway?: Familial Conflicts Over Access To Genetic Information, Sonia M. Suter Jun 1993

Whose Genes Are These Anyway?: Familial Conflicts Over Access To Genetic Information, Sonia M. Suter

Michigan Law Review

This Note argues first that courts and legislatures should follow a presumption against mandating disclosure of a person's genetic information to third parties. Second, genetic testing for the benefit of a third party should not, and constitutionally cannot, be compelled. Part I presents an overview of genetics and discusses the special legal and ethical issues genetic testing poses. Part II examines the issue of nonconsensual disclosure to family members, who could potentially use the information from tests that have already been performed. This Part concludes that there should be a presumption against disclosure. Part III examines a related, but different, …


Information Economics And Chemical Toxicity: Designing Laws To Produce And Use Data, Mary L. Lyndon Jun 1989

Information Economics And Chemical Toxicity: Designing Laws To Produce And Use Data, Mary L. Lyndon

Michigan Law Review

Just as laws may create entitlements to the use of information, they may also be written to distribute information and to encourage information production. This Article discusses the ways in which law affects the generation and distribution of information related to chemical exposure and toxicity. It describes the economic impact of recently enacted right-to-know laws and proposes that better and more abundant data could be produced if the law paid greater attention to basic economic principles that influence research and information systems.


Reciprocity In International Telecommunications Trade: A New Trade Barrier?, Sheryl Powers Jan 1984

Reciprocity In International Telecommunications Trade: A New Trade Barrier?, Sheryl Powers

Michigan Journal of International Law

To those advocating its use, reciprocity legislation is especially appropriate for the telecommunications industry. Only 5 percent of telecommunications equipment manufactured in the United States is exported for sale in other nations. Trade barriers, loyalty to domestic manufacturers and the importance of telecommunications to national defense systems have combined to restrict access to foreign markets in the telecommunications sector. To persuade other nations to increase market access in telecommunications, United States legislators added a requirement of reciprocity to two proposed bills, S.898 and H.R.5158. This note will examine these two bills, concluding that reciprocity is an inappropriate solution to United …


Integrated Servies Digital Network: Issues And Options For The World's Future Communications Systems, A. M. Rutkowski Jan 1984

Integrated Servies Digital Network: Issues And Options For The World's Future Communications Systems, A. M. Rutkowski

Michigan Journal of International Law

There has been virtually no public discussion of the significant public policy issues raised because of the intimidating nature of network engineering which forms the basis for nearly all the current dialogue. This paper discusses current ISDN developments, and sets forth an analytical framework within which these issues may be discussed.


Restrictions On Trade In Communication And Information Services, Geza Feketekuty, Jonathan David Aronson Jan 1984

Restrictions On Trade In Communication And Information Services, Geza Feketekuty, Jonathan David Aronson

Michigan Journal of International Law

Section one highlights some of the changes that the revolution in information exchange is producing. It also argues that transborder data flows could help facilitate international economic adjustment. Section two analyzes the types of reasons used to justify policy measures that inhibit the integration of the world communication network or prevent information from flowing across national borders. It also discusses the implication of restrictions on transborder data flows for the world trading system and for world economic growth. The final section discusses strategies for halting the proliferation of barriers to trade in communication and information services and for reducing existing …


The International Application Of The Second Computer Inquiry, Robert M. Frieden Jan 1984

The International Application Of The Second Computer Inquiry, Robert M. Frieden

Michigan Journal of International Law

This article chronicles the FCC's attempt to confront the confluence of telecommunications and data processing technologies by fashioning a regulatory scheme designed primarily for the United States. The Commission has chosen to apply this scheme, without significant qualification, internationally. Given the different objectives and structure of United States and foreign communications industries, the FCC's system cannot be transplanted abroad without prior consultation and substantial modification. After reviewing the international problems created by the Commission's application abroad of its newly developed scheme, this article concludes with recommendations for resolving these conflicts that currently threaten the well-being of carriers, customers, and international …


Private Leased Telecommunication Lines: Threats To Continued International Availabliltiy, Jill L. Martin Jan 1984

Private Leased Telecommunication Lines: Threats To Continued International Availabliltiy, Jill L. Martin

Michigan Journal of International Law

This article examines both actual and proposed actions by Japanese and European telecommunications authorities, known as Ministries of Post, Telephone, and Telegraph (PTTs), to restrict private leased line availability, and then explores the possibility that these actions presage the total elimination of private leased lines. It concludes that unless the United States government adopts a unified and reasonable policy opposing the escalation of regulations and restrictions, their deleterious effects will become more severe.


The Council Of Europe Convention Of The Oecd Guidelines On Data Protection, Jon Bing Jan 1984

The Council Of Europe Convention Of The Oecd Guidelines On Data Protection, Jon Bing

Michigan Journal of International Law

The first international legal instruments to be adopted were two Council of Europe resolutions in 1973 and 1974, the first on "the protection of the privacy of individuals vis-A-vis electronic data banks in the private sector," 9 and the second on "the protection of the privacy of individuals vis-A-vis electronic data banks in the public sector." This article will describe and compare the rules of data protection as they emerge in the instruments. Although this will require some assessment, the main objective will be to explain and amplify.


Personal Privacy In The Computer Age: The Challenge Of A New Technology In An Information-Oriented Society, Arthur R. Miller Apr 1969

Personal Privacy In The Computer Age: The Challenge Of A New Technology In An Information-Oriented Society, Arthur R. Miller

Michigan Law Review

The purpose of this Article is to survey the new technology's implications for personal privacy and to evaluate the contemporary common-law and statutory pattern relating to data-handling. In the course of this examination, it will appraise the existing framework's capacity to deal with the problems created by society's growing awareness of the primordial character of information. The Article is intended to be suggestive; any attempt at definitiveness would be premature. Avowedly, it was written with the bias of one who believes that the new information technology has enormous long-range societal implications and who is concerned about the consequences of the …