Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 9 of 9

Full-Text Articles in Law

Individuals As Gatekeepers Against Data Misuse, Ying Hu Dec 2021

Individuals As Gatekeepers Against Data Misuse, Ying Hu

Michigan Technology Law Review

This article makes a case for treating individual data subjects as gatekeepers against misuse of personal data. Imposing gatekeeper responsibility on individuals is most useful where (a) the primary wrongdoers engage in data misuse intentionally or recklessly; (b) misuse of personal data is likely to lead to serious harm; and (c) one or more individuals are able to detect and prevent data misuse at a reasonable cost.

As gatekeepers, individuals should have a legal duty to take reasonable measures to prevent data misuse where they are aware of facts indicating that the person seeking personal data from them is highly …


Regulating Black-Box Medicine, W. Nicholson Price Ii Dec 2017

Regulating Black-Box Medicine, W. Nicholson Price Ii

Michigan Law Review

Data drive modern medicine. And our tools to analyze those data are growing ever more powerful. As health data are collected in greater and greater amounts, sophisticated algorithms based on those data can drive medical innovation, improve the process of care, and increase efficiency. Those algorithms, however, vary widely in quality. Some are accurate and powerful, while others may be riddled with errors or based on faulty science. When an opaque algorithm recommends an insulin dose to a diabetic patient, how do we know that dose is correct? Patients, providers, and insurers face substantial difficulties in identifying high-quality algorithms; they …


Voluntary Disclosure Of Information As A Proposed Standard For The Fourth Amendment's Third-Party Doctrine, Margaret E. Twomey Jun 2015

Voluntary Disclosure Of Information As A Proposed Standard For The Fourth Amendment's Third-Party Doctrine, Margaret E. Twomey

Michigan Telecommunications & Technology Law Review

The third-party doctrine is a long-standing tenant of Fourth Amendment law that allows law enforcement officers to utilize information that was released to a third party without the probable cause required for a traditional search warrant. This has allowed law enforcement agents to use confidential informants, undercover agents, and access bank records of suspected criminals. However, in a digital age where exponentially more information is shared with Internet Service Providers, e-mail hosts, and social media “friends,” the traditional thirdparty doctrine ideas allow law enforcement officers access to a cache of personal information and data with a standard below probable cause. …


Protecting Anonymous Expression: The Internet's Role In Washington State's Disclosure Laws And The Direct Democracy Process, Karen Cullinane Jul 2011

Protecting Anonymous Expression: The Internet's Role In Washington State's Disclosure Laws And The Direct Democracy Process, Karen Cullinane

University of Michigan Journal of Law Reform

This Note proposes that the Washington State Legislature amend its Public Records Act to exempt from public disclosure personal information legally required to be disclosed by signers of referendum petitions. This Note also proposes that the Washington State Legislature designate an electronic system, to be detailed in its election law, by which referendum petitions can be checked for fraud without violating the right to anonymous expression protected by the First Amendment. Part I describes Washington State's referendum process and the path of Doe v. Reed, the case animating the reform presented in this Note. Part II illustrates how the rise …


Fair's Fair: An Argument For Mandatory Disclosure Of Technological Protection Measures, Robert C. Denicola Oct 2004

Fair's Fair: An Argument For Mandatory Disclosure Of Technological Protection Measures, Robert C. Denicola

Michigan Telecommunications & Technology Law Review

Section 1201(a)(1) of the Copyright Act prohibits the act of "circumvent[ing] a technological measure that effectively controls access to a work," including, for example, by-passing password protection or encryption intended to restrict access to paying customers. Section 1201(a)(2) prohibits the manufacture or sale of "any technology, product, service, device, component, or part thereof" primarily designed for the purpose of circumventing access controls on copyrighted works. Additionally, § 1202(b) prohibits the manufacture or sale of products, devices or services primarily designed to circumvent "a technological measure that effectively protects a right of a copyright owner"--for example, a technological measure intended to …


The Obsolescence Of Wall Street: A Contextual Approach To The Evolving Structure Of Federal Securities Regulation, Joel Seligman Feb 1995

The Obsolescence Of Wall Street: A Contextual Approach To The Evolving Structure Of Federal Securities Regulation, Joel Seligman

Michigan Law Review

As a matter of analytical style, this article illustrates a contextualist approach. For a considerable period of time, the dominant analytical style in corporate and securities .law has been a variant of economic, or law and economics, analysis. The virtue of this type of analysis is that it focuses on what its authors deem to be crucial variables and reaches conclusions derived from the core of a specific legal problem. The defect of this type of analysis is that so much is assumed or often assumed away.


Whose Genes Are These Anyway?: Familial Conflicts Over Access To Genetic Information, Sonia M. Suter Jun 1993

Whose Genes Are These Anyway?: Familial Conflicts Over Access To Genetic Information, Sonia M. Suter

Michigan Law Review

This Note argues first that courts and legislatures should follow a presumption against mandating disclosure of a person's genetic information to third parties. Second, genetic testing for the benefit of a third party should not, and constitutionally cannot, be compelled. Part I presents an overview of genetics and discusses the special legal and ethical issues genetic testing poses. Part II examines the issue of nonconsensual disclosure to family members, who could potentially use the information from tests that have already been performed. This Part concludes that there should be a presumption against disclosure. Part III examines a related, but different, …


Taking A Byte Out Of Abusive Agency Discretion: A Proposal For Disclosure In The Use Of Computer Models, John P. Barker Apr 1986

Taking A Byte Out Of Abusive Agency Discretion: A Proposal For Disclosure In The Use Of Computer Models, John P. Barker

University of Michigan Journal of Law Reform

This Note examines the need for comprehensive requirements for the release of information pertaining to the use of computer-generated simulations used by federal administrative agencies or parties appearing before regulatory bodies. Part I of this Note defines computer models, identifies some of their current uses in administrative proceedings and describes the advantages of these models. Part II reviews the current requirements for documentation of computer models and the judicial review standards for agency findings. Part III examines the potential problems in the use of models and discusses the need for more adequate disclosure. Part IV describes several tests for verifying …


Protection For Trade Secrets Under The Toxic Substances Control Act Of 1976, Paula R. Latovick Jan 1980

Protection For Trade Secrets Under The Toxic Substances Control Act Of 1976, Paula R. Latovick

University of Michigan Journal of Law Reform

This article will examine the protection provided by the Act and the measures the EPA has adopted for implementing the Act's provisions. The approach will be to focus on the different functional areas in which disclosure may take place. Part I examines the scheme for designating information as confidential and the mechanics of the reporting system under TSCA. Part II deals with disclosures of confidential information made while implementing the TSCA. Part III focuses on legal disclosures of information submitted as confidential. Finally, Part IV examines the measures taken within the EPA to guarantee the safety of confidential information, the …