Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Science and Technology Law

2018

University of Michigan Law School

Technology

Articles 1 - 3 of 3

Full-Text Articles in Law

Fourth Amendment Constraints On The Technological Monitoring Of Convicted Sex Offenders, Ben A. Mcjunkin, J. J. Prescott Jul 2018

Fourth Amendment Constraints On The Technological Monitoring Of Convicted Sex Offenders, Ben A. Mcjunkin, J. J. Prescott

Articles

More than forty U.S. states currently track at least some of their convicted sex offenders using GPS devices. Many offenders will be monitored for life. The burdens and expense of living indefinitely under constant technological monitoring have been well documented, but most commentators have assumed that these burdens were of no constitutional moment because states have characterized such surveillance as ‘‘civil’’ in character—and courts have seemed to agree. In 2015, however, the Supreme Court decided in Grady v. North Carolina that attaching a GPS monitoring device to a person was a Fourth Amendment search, notwithstanding the ostensibly civil character of …


The Future Of Law And Mobility, Daniel A. Crane Jun 2018

The Future Of Law And Mobility, Daniel A. Crane

Articles

With the launch of the new Journal of Law and Mobility, the University of Michigan is recognizing the transformative impact of new transportation and mobility technologies, from cars, to trucks, to pedestrians, to drones. The coming transition towards intelligent, automated, and connected mobility systems will transform not only the way people and goods move about, but also the way human safety, privacy, and security are protected, cities are organized, machines and people are connected, and the public and private spheres are defined.


The Commodification Of Cryptocurrency, Neil Tiwari Jan 2018

The Commodification Of Cryptocurrency, Neil Tiwari

Michigan Law Review

Cryptocurrencies are digital tokens built on blockchain technology. This allows for a product that is fully decentralized, with no need for a third-party intermediary like a government or financial institution. Cryptocurrency creators use initial coin offerings (ICOs) to raise capital to build their tokens. Cryptocurrency ICOs are problematic because they do not fit neatly within either of two traditional categories—securities or commodities. Each of these categories has their own regulatory agency: the SEC for securities and the CFTC for commodities. At first blush, ICOs seem to be a sale of securities subject to regulation by the SEC, but this is …