Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 274

Full-Text Articles in Law

Regulatory Paralysis: The Answer To The Unanswerable Question Of Fcc Minority Ownership Policy, Christopher Terry Apr 2023

Regulatory Paralysis: The Answer To The Unanswerable Question Of Fcc Minority Ownership Policy, Christopher Terry

Michigan Technology Law Review

For five decades, the Federal Communications Commission (FCC) has struggled to implement policies that promote minority ownership of broadcast stations. Four “Prometheus” decisions from the Third Circuit span a seventeen-year legal impasse that highlighted the agency’s shortcomings on effective minority ownership policies. Now, after the Supreme Court’s 2021 decision in FCC v. Prometheus Radio Project, the FCC is required to relaunch its media ownership policy in 2022. This paper explores how the FCC has interpreted diversity in media ownership policymaking by examining a range of diversity policies and assessment methodologies particularly regarding minority ownership. The paper then presents data from …


Answering The Call For Telephone Consumer Protection Act Reform: Effectuating Congressional Intent Within 47 U.S.C. § 227(B)(1)(A), Justice M. Hubbard Apr 2023

Answering The Call For Telephone Consumer Protection Act Reform: Effectuating Congressional Intent Within 47 U.S.C. § 227(B)(1)(A), Justice M. Hubbard

University of Michigan Journal of Law Reform

This Note analyzes the current state of the civil law surrounding the Telephone Consumer Protection Act (TCPA) and highlights a glaring flaw within the current practice of assigning liability to telephonic solicitors utilizing an automatic telephone dialing system (autodialer): solicitors can be subjected to liability even though their actions are not what Congress intended to prevent. Congress enacted the TCPA in response to unique consumer privacy and public safety concerns. For example, the use of an autodialer created a substantial likelihood that autodialers would call emergency services and could “seize” their telephone lines and prevent those lines from being utilized …


Beyond True And False: Fake News And The Digital Epistemic Divide, Gilad Abiri, Johannes Buchheim Sep 2022

Beyond True And False: Fake News And The Digital Epistemic Divide, Gilad Abiri, Johannes Buchheim

Michigan Technology Law Review

The massive fact-checking, flagging, and content removal campaigns run by major digital platforms during the 2020 elections and the Covid-19 pandemic did some good. However, they failed to prevent substantial portions of the population from believing that the election was stolen or that vaccinations are dangerous.

In this Article, we argue that the reason for the ineffectiveness of truth-based solutions—such as fact-checking— is that they do not reach the heart of the problem. Both scholars and policymakers share the implicit or explicit belief that the rise of digital fake news is harmful mainly because it spreads false information, which lays …


Private Censorship, Disinformation And The First Amendment: Rethinking Online Platforms Regulation In The Era Of A Global Pandemic, Tzu- Chiang Huang Sep 2022

Private Censorship, Disinformation And The First Amendment: Rethinking Online Platforms Regulation In The Era Of A Global Pandemic, Tzu- Chiang Huang

Michigan Technology Law Review

The proliferation of online disinformation and the rise of private censorship are paradigmatic examples of the challenges to traditional First Amendment jurisprudence in an algorithmic society. The limitations of traditional First Amendment jurisprudence are amplified by the impact of the COVID-19 pandemic in two ways. On the one hand, in the wake of the pandemic, we have entered an “infodemic” era where the volume of disinformation, as well as the harm it causes have reached unprecedented levels. For example, health disinformation has contributed to vaccine hesitancy. On the other hand, even though the proliferation of online disinformation seems to suggest …


The Contribution Of Eu Law To The Regulation Of Online Speech, Luc Von Danwitz Jan 2021

The Contribution Of Eu Law To The Regulation Of Online Speech, Luc Von Danwitz

Michigan Technology Law Review

Internet regulation in the European Union (EU) is receiving significant attention and criticism in the United States. The European Court of Justice’s (ECJ) judgment in the case Glawischnig-Piesczek v. Facebook Ireland, in which the ECJ found a take-down order against Facebook for defamatory content with global effect permissible under EU law, was closely scrutinized in the United States. These transsystemic debates are valuable but need to be conducted with a thorough understanding of the relevant legal framework and its internal logic. This note aims to provide the context to properly assess the role the ECJ and EU law play …


Publish, Share, Re-Tweet, And Repeat, Michal Lavi Jan 2021

Publish, Share, Re-Tweet, And Repeat, Michal Lavi

University of Michigan Journal of Law Reform

New technologies allow users to communicate ideas to a broad audience easily and quickly, affecting the way ideas are interpreted and their credibility. Each and every social network user can simply click “share” or “retweet” and automatically republish an existing post and expose a new message to a wide audience. The dissemination of ideas can raise public awareness about important issues and bring about social, political, and economic change.

Yet, digital sharing also provides vast opportunities to spread false rumors, defamation, and Fake News stories at the thoughtless click of a button. The spreading of falsehoods can severely harm the …


Symmetry And (Network) Neutrality, Tejas N. Narechania Dec 2020

Symmetry And (Network) Neutrality, Tejas N. Narechania

Michigan Law Review Online

In this short Essay, I take the opportunity to highlight one further potential asymmetry that may yet emerge from the Supreme Court’s application of Chevron’s many doctrines. Drawing on then-Judge Kavanaugh’s disdissental from the D.C. Circuit’s decision affirming network neutrality rules, I suggest that there is at least one vote on the Supreme Court—and perhaps more—for an asymmetric approach to the major questions doctrine. Moreover, I demonstrate how asymmetry in this context is deeply irrational. As applied to network neutrality, the asymmetry has at least one of two effects. One, it might simply favor one large industry over another, …


Unplanned Obsolescence: Interpreting The Automatic Telephone Dialing System After The Smartphone Epoch, Walter Allison Oct 2020

Unplanned Obsolescence: Interpreting The Automatic Telephone Dialing System After The Smartphone Epoch, Walter Allison

Michigan Law Review

Technology regulations succeed or fail based upon their ability to regulate an idea. Constant innovation forces legislators to draft statutes aimed at prohibiting the idea of a device, rather than a specific device itself, because new devices with new capacities emerge every day. The Telephone Consumer Protection Act (TCPA) is a federal statute that imposes liability based on the idea of an automatic telephone dialing system (ATDS). But the statute’s definition of the device is ambiguous. The FCC struggles to coherently apply the definition to new technologies, and courts interpret the definition inconsistently. Federal circuit courts have split over these …


How Reporters Can Evaluate Automated Driving Announcements, Bryant Walker Smith Jan 2020

How Reporters Can Evaluate Automated Driving Announcements, Bryant Walker Smith

Journal of Law and Mobility

This article identifies a series of specific questions that reporters can ask about claims made by developers of automated motor vehicles (“AVs”). Its immediate intent is to facilitate more critical, credible, and ultimately constructive reporting on progress toward automated driving. In turn, reporting of this kind advances three additional goals. First, it encourages AV developers to qualify and support their public claims. Second, it appropriately manages public expectations about these vehicles. Third, it fosters more technical accuracy and technological circumspection in legal and policy scholarship.


Does A Non-Extreme Answer To Extremism Exist?, Jeffrey Levicki Jun 2019

Does A Non-Extreme Answer To Extremism Exist?, Jeffrey Levicki

University of Michigan Journal of Law Reform

Foreword for the Journal of Law Reform symposium entitled Alt-Association: The Role of Law in Combatting Extremism.


Policing Hate Speech And Extremism: A Taxonomy Of Arguments In Opposition, Leonard M. Niehoff Jun 2019

Policing Hate Speech And Extremism: A Taxonomy Of Arguments In Opposition, Leonard M. Niehoff

University of Michigan Journal of Law Reform

Hate speech and extremist association do real and substantial harm to individuals, groups, and our society as a whole. Our common sense, experience, and empathy for the targets of extremism tell us that our laws should do more to address this issue. Current reform efforts have therefore sought to revise our laws to do a better job at policing, prohibiting, and punishing hate speech and extremist association.

Efforts to do so, however, encounter numerous and substantial challenges. We can divide them into three general categories: definitional problems, operational problems, and conscientious problems. An informed understanding of these three categories of …


The Airwaves Meet The Highways, David Redl Apr 2019

The Airwaves Meet The Highways, David Redl

Journal of Law and Mobility

I applaud and congratulate the University of Michigan for launching the Journal of Law and Mobility. The timing is perfect. The information superhighway is no longer just a clever metaphor. We are living in an era where internet connectivity is a critical part of making transportation safer and more convenient. Internet connectivity has powered the U.S. and global economies for years now. In the early stages, dial-up connections enabled users to access a vast store of digital information. As the internet and its usage grew, so did the demand for faster broadband speeds. Finally, wireless networks untethered the power of …


The Innocent Villain: Involuntary Manslaughter By Text, Charles Adside Iii Apr 2019

The Innocent Villain: Involuntary Manslaughter By Text, Charles Adside Iii

University of Michigan Journal of Law Reform

Michelle Carter’s texts instructing her mentally ill online boyfriend to commit suicide offended the social moral code. But the law does not categorize all morally reprehensible behavior as criminal. Commonwealth v. Carter is unprecedented in manslaughter law because Carter was convicted on the theory that she was virtually present as opposed to physically present—at the crime scene. The court’s reasoning is expansive, as the framework it employs is excessively vague and does not provide fair notice to the public of which actions constitute involuntary manslaughter. Disturbingly, the Massachusetts Supreme Judicial Court affirmed the trial court’s logic. This Article concludes that …


Virtual Hatred: How Russia Tried To Start A Race War In The United States, William J. Aceves Jan 2019

Virtual Hatred: How Russia Tried To Start A Race War In The United States, William J. Aceves

Michigan Journal of Race and Law

During the 2016 U.S. presidential election, the Russian government engaged in a sophisticated strategy to influence the U.S. political system and manipulate American democracy. While most news reports have focused on the cyber-attacks aimed at Democratic Party leaders and possible contacts between Russian officials and the Trump presidential campaign, a more pernicious intervention took place. Throughout the campaign, Russian operatives created hundreds of fake personas on social media platforms and then posted thousands of advertisements and messages that sought to promote racial divisions in the United States. This was a coordinated propaganda effort. Some Facebook and Twitter posts denounced the …


You Can’T Say That!: Public Forum Doctrine And Viewpoint Discrimination In The Social Media Era, Micah Telegen Oct 2018

You Can’T Say That!: Public Forum Doctrine And Viewpoint Discrimination In The Social Media Era, Micah Telegen

University of Michigan Journal of Law Reform

The growing prevalence of privately-owned social media platforms is changing the way Americans and their governments communicate. This shift offers new opportunities, but also requires a reinterpretation of the First Amendment’s proscription of government limitations of speech. The public forum doctrine and its proscription of viewpoint discrimination seem particularly stretched by the digital revolution and the development of social media. In ongoing cases, litigants and courts have invoked the doctrine to limit the government’s ability to ‘block’ those who comment critically on government pages—much to the chagrin of those who note the private status of the companies hosting the pages …


How Elonis Failed To Clarify The Analysis Of "True Threats" In Social Media Cases And The Subsequent Need For Congressional Response, Jessica L. Opila Nov 2017

How Elonis Failed To Clarify The Analysis Of "True Threats" In Social Media Cases And The Subsequent Need For Congressional Response, Jessica L. Opila

Michigan Telecommunications & Technology Law Review

Social media and other internet communications have altered the way people communicate with one another, including the way people threaten one another. In 2015, the United States Supreme Court decided Elonis v. United States, which imposed a heightened mental state requirement for federal prosecutions of threats issued in interstate commerce. Although the statute, 18 U.S.C. § 875(c), has no mental state requirement, the Supreme Court held that, consistent with the principles of criminal law, only those with guilty minds should be convicted and thus some showing of subjective intent is required. The opinion did not name the requisite mental …


Valuing Spectrum Allocations, Thomas W. Hazlett, Michael Honig Jan 2016

Valuing Spectrum Allocations, Thomas W. Hazlett, Michael Honig

Michigan Telecommunications & Technology Law Review

Observing trends in which Wi-Fi and Bluetooth have become widely popular, some argue that unlicensed allocations hosting such wireless technologies are increasingly valuable and that administrative spectrum allocations should shift accordingly. We challenge that policy conclusion. A core issue is that the social value of a given spectrum allocation is widely assumed to equal the gains of the applications it is likely to host. This thinking is faulty, as vividly seen in what we deem the Broadcast TV Spectrum Valuation Fallacy – the idea that because wireless video, or broadcast network programs are popular, TV channels are efficiently defined. This …


Blacklining Editorial Privilege, Justin Hurwitz Jan 2016

Blacklining Editorial Privilege, Justin Hurwitz

Michigan Telecommunications & Technology Law Review

Over the past year, FCC Commissioner Mike O’Rielly has drawn valuable attention to various Commission procedures in need of reform. Of these procedures perhaps the most perplexing is that of “editorial privileges” – a process whereby Commission staff is granted permission to continue editing Commission Orders subsequent to their adoption, such that the text of the Order voted on by the Commission is not necessarily the same as that ultimately published in the Federal Register or otherwise released to the public. This procedure is longstanding – predating institutional memory; yet it is also entirely unprecedented in the canon of administrative …


Astroturf Campaigns: Transparency In Telecom Merger Review, Victoria Peng Jan 2016

Astroturf Campaigns: Transparency In Telecom Merger Review, Victoria Peng

University of Michigan Journal of Law Reform

Large telecommunications companies looking to merge spend millions of dollars in their lobbying efforts to clear regulatory hurdles and obtain approval for their proposed mergers. Corporations such as AT&T, Comcast, and Time Warner use public participation processes as vehicles to influence regulatory decision-making. In the Federal Communications Commission (FCC) merger review context, the notice- and-comment process and public hearings have become fertile breeding grounds for hidden corporate influence. Corporations spend millions on corporate social responsibility programs and call upon nonprofit organizations that receive their largesse to represent their corporate interests as grassroots interests when the FCC seeks public comment. This …


What Common Law And Common Sense Teach Us About Corporate Cybersecurity, Stephanie Balitzer Jan 2016

What Common Law And Common Sense Teach Us About Corporate Cybersecurity, Stephanie Balitzer

University of Michigan Journal of Law Reform

This Note examines the challenges of corporate cyberdefense and suggests an approach to mitigate them. Part I outlines the background of the corporate cyberdefense quandary and various cyberdefense strategies. Part II explores the current landscape of cybersecurity law in the United States and the regulatory infrastructure that governs cybercrimes. Part II also surveys case law that illustrates the legal loopholes and ambiguities corporations face when implementing cybersecurity measures. Finally, Part III argues that the proposed active defense model fails to comport with practical concerns and established legal principles. This Note’s comparative analysis of common law ‘defense of property’ principles and …


Network Neutrality And The First Amendment, Andrew Patrick, Eric Scharphorn Oct 2015

Network Neutrality And The First Amendment, Andrew Patrick, Eric Scharphorn

Michigan Telecommunications & Technology Law Review

The First Amendment reflects the conviction that the widest possible dissemination of information from diverse and antagonistic sources is essential to public welfare. Like the printing press, the Internet has dramatically transformed the marketplace of ideas by providing unprecedented opportunities for individuals to communicate. Though its growth continues to be phenomenal, broadband service providers— acting as Internet gatekeepers—have developed the ability to discriminate against specific content and applications. First, these gatekeepers intercept and inspect data transferred over public networks, then selectively block or slow it. This practice has the potential to stifle the Internet’s value as a speech platform by …


Loopholes For Circumventing The Constitution: Unrestrained Bulk Surveillance On Americans By Collecting Network Traffic Abroad, Axel Arnbak, Sharon Goldberg Jun 2015

Loopholes For Circumventing The Constitution: Unrestrained Bulk Surveillance On Americans By Collecting Network Traffic Abroad, Axel Arnbak, Sharon Goldberg

Michigan Telecommunications & Technology Law Review

This Article reveals interdependent legal and technical loopholes that the US intelligence community could use to circumvent constitutional and statutory safeguards for Americans. These loopholes involve the collection of Internet traffic on foreign territory, and leave Americans as unprotected as foreigners by current United States (US) surveillance laws. This Article will also describe how modern Internet protocols can be manipulated to deliberately divert American’s traffic abroad, where traffic can then be collected under a more permissive legal regime (Executive Order 12333) that is overseen solely by the executive branch of the US government. Although the media has reported on some …


In All Fairness: Using Political Broadcast Access Doctrine To Tailor Public Campaign Fund Matching, Andrew V. Moshirnia, Aaron T. Dozeman Apr 2015

In All Fairness: Using Political Broadcast Access Doctrine To Tailor Public Campaign Fund Matching, Andrew V. Moshirnia, Aaron T. Dozeman

University of Michigan Journal of Law Reform

Recent United States Supreme Court decisions have undermined the viability of campaign public financing systems, a vital tool for fighting political corruption. First, Citizens United v. FEC allowed privately financed candidates and independent groups to spend unlimited amounts of money on campaigning. Publicly financed candidates now risk being vastly outspent. Second, Arizona Free Enterprise Club’s Freedom PAC v. Bennett invalidated a proportional fund matching system whereby privately financed candidates’ or independent groups’ spending triggered funds to publicly funded candidates. These decisions effectuate a libertarian speech doctrine: all speakers, individual or corporate, must be absolutely unburdened. To comply with this approach, …


No More Shortcuts: Protect Cell Site Location Data With A Warrant Requirement, Lauren E. Babst Jan 2015

No More Shortcuts: Protect Cell Site Location Data With A Warrant Requirement, Lauren E. Babst

Michigan Telecommunications & Technology Law Review

In modern society, the cell phone has become a virtual extension of most Americans, managing all kinds of personal and business matters. Modern cell tower technology allows cell service providers to accumulate a wealth of individuals’ location information while they use their cell phones, and such data is available for law enforcement to obtain without a warrant. This is problematic under the Fourth Amendment, which protects reasonable expectations of privacy. Under the Katz two-prong test, (1) individuals have an actual, subjective expectation of privacy in their cell site location data, and (2) society is prepared to acknowledge that expectation as …


Sexting Prosecutions: Minors As A Protected Class From Child Pornography Charges, Sarah Thompson Oct 2014

Sexting Prosecutions: Minors As A Protected Class From Child Pornography Charges, Sarah Thompson

University of Michigan Journal of Law Reform Caveat

"Firt love is only a little foolishness and a lot of curiosity." -- George Bernard Shaw Teenagers will explore their sexuality; this is no new phenomenon. However, the ways that teens are exploring their curiosity is changing with technology. This trend has serious repercussions for teens, society, and the law. ‘Sexting’—defined as the act of sending sexually explicit photographs or messages via cell phone—is one recently-developed means of sexual exploration. The practice overlaps with the production, distribution, and possession of child pornography that is banned by both state and federal law. Due to the overlap, minors have been prosecuted under …


Wireless Localism: Beyond The Shroud Of Objectivity In Federal Spectrum Administration, Olivier Sylvain Dec 2013

Wireless Localism: Beyond The Shroud Of Objectivity In Federal Spectrum Administration, Olivier Sylvain

Michigan Telecommunications & Technology Law Review

Recent innovations in mobile wireless technology have instigated a debate between two camps of legal scholars about federal administration of the electromagnetic spectrum. The first camp argues that the Federal Communications Commission (“FCC”) should define spectrum use rights more clearly and give spectrum licensees broad property rights in frequencies. The second camp argues that, rather than award exclusive licenses to the highest bidder, the FCC ought to open much, if not most, of the spectrum to unlicensed use by smartphones and tablets equipped with the newest spectrum administration technology. First, this Article shows that both of these camps comprise a …


Rethinking Reporter's Privilege, Ronnell Andersen Jones May 2013

Rethinking Reporter's Privilege, Ronnell Andersen Jones

Michigan Law Review

Forty years ago, in Branzburg v. Hayes, the Supreme Court made its first and only inquiry into the constitutional protection of the relationship between a reporter and a confidential source. This case - decided at a moment in American history in which the role of an investigative press, and of information provided by confidential sources, was coming to the forefront of public consciousness in a new and significant way - produced a reporter-focused "privilege" that is now widely regarded to be both doctrinally questionable and deeply inconsistent in application. Although the post-Branzburg privilege has been recognized as flawed in a …


Commercial Speech In Crisis: Crisis Pregnancy Center Regulations And Definitions Of Commercial Speech, Kathryn E. Gilbert Feb 2013

Commercial Speech In Crisis: Crisis Pregnancy Center Regulations And Definitions Of Commercial Speech, Kathryn E. Gilbert

Michigan Law Review

Recent attempts to regulate Crisis Pregnancy Centers, pseudoclinics that surreptitiously aim to dissuade pregnant women from choosing abortion, have confronted the thorny problem of how to define commercial speech. The Supreme Court has offered three potential answers to this definitional quandary. This Note uses the Crisis Pregnancy Center cases to demonstrate that courts should use one of these solutions, the factor-based approach of Bolger v. Youngs Drugs Products Corp., to define commercial speech in the Crisis Pregnancy Center cases and elsewhere. In principle and in application, the Bolger factor-based approach succeeds in structuring commercial speech analysis at the margins of …


A Victimless Sex Crime: The Case For Decriminalizing Consensual Teen Sexting, Joanna R. Lampe Jan 2013

A Victimless Sex Crime: The Case For Decriminalizing Consensual Teen Sexting, Joanna R. Lampe

University of Michigan Journal of Law Reform

As teenagers' access to cellular phones and the internet has increased over the past two decades, so has their ability to harm themselves and others through misuse of new technology. One risky behavior that has become common among teenagers is "sexting"--the digital sharing of sexually suggestive images. To combat the dangers of teen sexting, many states have criminalized the act. Criminalization does not resolve the issue of teen sexting, however, and in many cases it may cause additional harm. This Note reviews existing state laws related to teen sexting, and critiques these laws on constitutional and policy grounds. It then …


Information Escrows, Ian Ayres, Cait Unkovic Nov 2012

Information Escrows, Ian Ayres, Cait Unkovic

Michigan Law Review

A variety of information escrows - including allegation escrows, suspicion escrows, and shared-interest escrows - hold the promise of reducing the first-mover disadvantage that can deter people with socially valuable private information from disclosing that information to others. Information escrows allow people to transmit sensitive information to a trusted intermediary, an escrow agent, who only forwards the information under prespecified conditions. For example, an allegation escrow for sexual harassment might allow a victim to place a private complaint into escrow with instructions that the complaint be lodged with the proper authorities only if the escrow agent receives at least one …