Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 14 of 14

Full-Text Articles in Law

Privacy Almighty? The Cjeu's Judgment In Google Spain Sl V. Aepd, David J. Stute Dec 2015

Privacy Almighty? The Cjeu's Judgment In Google Spain Sl V. Aepd, David J. Stute

Michigan Journal of International Law

The Internet has matured into an unprecedented repository of data, retrievable through myriad unique “links,” or Uniform Resource Locators. Yet, this wealth of information only became broadly accessible through the invention and continual development of algorithm-based search engines. Keyword searches empowered search-engine users to find—and sometimes stumble upon—information with great ease. Indeed, search-engine indices arguably have become the most comprehensive catalogues of information the world has ever seen. This wealth of accessible information poses challenges to traditional notions of privacy: aspects of our private and public lives, which previously would have rarely left the vicinities of our immediate social or …


Avoiding The Next Napster: Copyright Infringement And Investor Liability In The Age Of User Generated Content, Truan Savage Sep 2015

Avoiding The Next Napster: Copyright Infringement And Investor Liability In The Age Of User Generated Content, Truan Savage

Michigan Business & Entrepreneurial Law Review

Rapid developments in digital technology over the past quarter century have made it easier than ever for people to create and instantly share content. These developments have served as the basis for countless innovations and have spawned some of today’s largest and most profitable companies. As content creation and distribution continues to evolve, businesses seek new ways to profit from these technological innovations. But while businesses continue to develop around new methods of content distribution, the law of copyright, which generally aims to encourage the creation of content, has been slow to adapt. This era of modern technological innovation thus …


Rulemaking Vs. Democracy: Judging And Nudging Public Participation That Counts , Cynthia R. Farina, Mary Newhart, Josiah Heidt Jun 2015

Rulemaking Vs. Democracy: Judging And Nudging Public Participation That Counts , Cynthia R. Farina, Mary Newhart, Josiah Heidt

Cynthia R. Farina

This Article considers how open government “magical thinking” around technology has infused efforts to increase public participation in rulemaking. We propose a framework for assessing the value of technology-enabled rulemaking participation and offer specific principles of participation-system design, which are based on conceptual work and practical experience in the Regulation Room project at Cornell University. An underlying assumption of open government enthusiasts is that more public participation will lead to better government policymaking: If we use technology to give people easier opportunities to participate in public policymaking, they will use these opportunities to participate effectively. However, experience thus far with …


Loopholes For Circumventing The Constitution: Unrestrained Bulk Surveillance On Americans By Collecting Network Traffic Abroad, Axel Arnbak, Sharon Goldberg Jun 2015

Loopholes For Circumventing The Constitution: Unrestrained Bulk Surveillance On Americans By Collecting Network Traffic Abroad, Axel Arnbak, Sharon Goldberg

Michigan Telecommunications & Technology Law Review

This Article reveals interdependent legal and technical loopholes that the US intelligence community could use to circumvent constitutional and statutory safeguards for Americans. These loopholes involve the collection of Internet traffic on foreign territory, and leave Americans as unprotected as foreigners by current United States (US) surveillance laws. This Article will also describe how modern Internet protocols can be manipulated to deliberately divert American’s traffic abroad, where traffic can then be collected under a more permissive legal regime (Executive Order 12333) that is overseen solely by the executive branch of the US government. Although the media has reported on some …


Voluntary Disclosure Of Information As A Proposed Standard For The Fourth Amendment's Third-Party Doctrine, Margaret E. Twomey Jun 2015

Voluntary Disclosure Of Information As A Proposed Standard For The Fourth Amendment's Third-Party Doctrine, Margaret E. Twomey

Michigan Telecommunications & Technology Law Review

The third-party doctrine is a long-standing tenant of Fourth Amendment law that allows law enforcement officers to utilize information that was released to a third party without the probable cause required for a traditional search warrant. This has allowed law enforcement agents to use confidential informants, undercover agents, and access bank records of suspected criminals. However, in a digital age where exponentially more information is shared with Internet Service Providers, e-mail hosts, and social media “friends,” the traditional thirdparty doctrine ideas allow law enforcement officers access to a cache of personal information and data with a standard below probable cause. …


Obscured By Clouds: The Fourth Amendment And Searching Cloud Storage Accounts Through Locally Installed Software, Aaron J. Gold May 2015

Obscured By Clouds: The Fourth Amendment And Searching Cloud Storage Accounts Through Locally Installed Software, Aaron J. Gold

William & Mary Law Review

No abstract provided.


Silencing The Call To Arms: A Shift Away From Cyber Attacks As Warfare, Ryan Patterson Apr 2015

Silencing The Call To Arms: A Shift Away From Cyber Attacks As Warfare, Ryan Patterson

Loyola of Los Angeles Law Review

Cyberspace has developed into an indispensable aspect of modern society, but not without risk. Cyber attacks have increased in frequency, with many states declaring cyber operations a priority in what has been called the newest domain of warfare. But what rules govern? The Tallinn Manual on the International Law Applicable to Cyber Warfare suggests existent laws of war are sufficient to govern cyber activities; however, the Tallinn Manual ignores fundamental problems and unique differences between cyber attacks and kinetic attacks. This Article argues that several crucial impediments frustrate placing cyber attacks within the current umbra of warfare, chiefly the problems …


Cyberlaw: Problems Of Policy And Jurisprudence In The Information Age. 2nd Edition., Patricia Bellia, David Post, Paul Schiff Berman Mar 2015

Cyberlaw: Problems Of Policy And Jurisprudence In The Information Age. 2nd Edition., Patricia Bellia, David Post, Paul Schiff Berman

Patricia L. Bellia

This innovative casebookwhich has proved extremely popular with students and professors alikestarts from the premise that cyberlaw is not simply a set of legal rules governing online interaction, but a lens through which broader jurisprudential issues can be re-examined. Accordingly, this book goes beyond plugging Internet-related cases into a series of pre-existing doctrinal categoriesFirst Amendment, copyright, trademark, etc.and instead emphasizes the conceptual debates that cut across the areas of doctrine touched by cyberspace. Moreover, the casebook uses the rise of the Internet to encourage readers to reconsider various assumptions in traditional legal doctrine. This dual focus provides readers with broad-based …


Cyberlaw: Problems Of Policy And Jurisprudence In The Information Age. 3rd Edition., Patricia Bellia, David Post, Paul Schiff Berman Mar 2015

Cyberlaw: Problems Of Policy And Jurisprudence In The Information Age. 3rd Edition., Patricia Bellia, David Post, Paul Schiff Berman

Patricia L. Bellia

This innovative casebookwhich has proved extremely popular with students and professors alikestarts from the premise that cyberlaw is not simply a set of legal rules governing online interaction, but a lens through which broader jurisprudential issues can be re-examined. Accordingly, this book goes beyond plugging Internet-related cases into a series of pre-existing doctrinal categoriesFirst Amendment, copyright, trademark, etc.and instead emphasizes the conceptual debates that cut across the areas of doctrine touched by cyberspace. Moreover, the casebook uses the rise of the Internet to encourage readers to reconsider various assumptions in traditional legal doctrine. This dual focus provides readers with broad-based …


Can You Diagnose Me Now? A Proposal To Modify The Fda’S Regulation Of Smartphone Mobile Health Applications With A Pre-Market Notification And Application Database Program, Stephen Mcinerney Jan 2015

Can You Diagnose Me Now? A Proposal To Modify The Fda’S Regulation Of Smartphone Mobile Health Applications With A Pre-Market Notification And Application Database Program, Stephen Mcinerney

University of Michigan Journal of Law Reform

Advances in mobile technology continually create new possibilities for the future of medical care. Yet these changes have also created concerns about patient safety. Under the Food, Drug, and Cosmetic Act, the Food and Drug Administration (FDA) has the authority to regulate a broad spectrum of products beyond traditional medical devices like stethoscopes or pacemakers. The regulatory question is not if the FDA has the statutory authority to regulate health-related software, but rather how it will exercise its regulatory authority. In September 2013, the FDA published Final Guidance on Mobile Medical Applications; in it, the Agency limited its oversight to …


Can A One Star Review Get You Sued? The Right To Anonymous Speech On The Internet And The Future Of Internet “Unmasking” Statutes, Jesse D. Lively Jan 2015

Can A One Star Review Get You Sued? The Right To Anonymous Speech On The Internet And The Future Of Internet “Unmasking” Statutes, Jesse D. Lively

Jesse D Lively

This Comment argues that the Supreme Court of Virginia should first reverse the Virginia Court of Appeal’s decision when it hears the Yelp case later this year. Secondly, the court hold that the Virginia statute for identifying persons communicating anonymously over the Internet violates the First Amendment's required showing of merit on both law and facts before a subpoena duces tecum to identify an anonymous speaker can be enforced. Lastly, it should adopt a new “unveiling standard” similar to the standards used in either Dendrite or Cahill. Part II examines the jurisprudential history of identifying anonymous Internet speakers in defamation …


Internet Freedom With Teeth, Charles Duan Jan 2015

Internet Freedom With Teeth, Charles Duan

Articles in Law Reviews & Other Academic Journals

"You make the very salient statement that we shouldn't lose sight of the fact that this is a case about teeth. Well, Markman was a case about dry cleaning. But nobody thinks of Markman as standing for anything about dry cleaning."

So went what was Chief Judge Prost's perhaps most striking question to the attorney for the International Trade Commission at oral argument in ClearCorrect Operating, LLC v. International Trade Commission, which is the focus of Professor Sapna Kumar's recent article Regulating Digital Trade. Yet this is what remains so fascinating about ClearCorrect: an administrative agency decision about idiosyncratic facts …


Framing The Question, "Who Governs The Internet?", Robert J. Domanski Jan 2015

Framing The Question, "Who Governs The Internet?", Robert J. Domanski

Publications and Research

There remains a widespread perception among both the public and elements of academia that the Internet is “ungovernable”. However, this idea, as well as the notion that the Internet has become some type of cyber-libertarian utopia, is wholly inaccurate. Governments may certainly encounter tremendous difficulty in attempting to regulate the Internet, but numerous types of authority have nevertheless become pervasive. So who, then, governs the Internet? This book will contend that the Internet is, in fact, being governed, that it is being governed by specific and identifiable networks of policy actors, and that an argument can be made as to …


From Anonymity To Identification, A. Michael Froomkin Jan 2015

From Anonymity To Identification, A. Michael Froomkin

Articles

This article examines whether anonymity online has a future. In the early days of the Internet, strong cryptography, anonymous remailers, and a relative lack of surveillance created an environment conducive to anonymous communication. Today, the outlook for online anonymity is poor. Several forces combine against it: ideologies that hold that anonymity is dangerous, or that identifying evil-doers is more important than ensuring a safe mechanism for unpopular speech; the profitability of identification in commerce; government surveillance; the influence of intellectual property interests and in requiring hardware and other tools that enforce identification; and the law at both national and supranational …