Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Science and Technology Law (20)
- Communications Law (7)
- Computer Law (7)
- Administrative Law (5)
- Civil Rights and Discrimination (5)
-
- International Trade Law (5)
- Internet Law (5)
- Law and Economics (5)
- Criminal Law (4)
- Privacy Law (4)
- Courts (3)
- Law and Society (3)
- Legislation (3)
- Supreme Court of the United States (3)
- Antitrust and Trade Regulation (2)
- Banking and Finance Law (2)
- Constitutional Law (2)
- Consumer Protection Law (2)
- Criminal Procedure (2)
- Environmental Law (2)
- Evidence (2)
- Jurisprudence (2)
- Law Enforcement and Corrections (2)
- Law and Race (2)
- Legal Writing and Research (2)
- Litigation (2)
- State and Local Government Law (2)
- Animal Law (1)
- Bankruptcy Law (1)
- Publication Year
Articles 1 - 30 of 39
Full-Text Articles in Law
Taking It With You: Platform Barriers To Entry And The Limits Of Data Portability, Gabriel Nicholas
Taking It With You: Platform Barriers To Entry And The Limits Of Data Portability, Gabriel Nicholas
Michigan Technology Law Review
Policymakers are faced with a vexing problem: how to increase competition in a tech sector dominated by a few giants. One answer proposed and adopted by regulators in the United States and abroad is to require large platforms to allow consumers to move their data from one platform to another, an approach known as data portability. Facebook, Google, Apple, and other major tech companies have enthusiastically supported data portability through their own technical and political initiatives. Today, data portability has taken hold as one of the go-to solutions to address the tech industry’s competition concerns.
This Article argues that despite …
Natural Language Processing For Lawyers And Judges, Frank Fagan
Natural Language Processing For Lawyers And Judges, Frank Fagan
Michigan Law Review
A Review of Law as Data: Computation, Text, & the Future of Legal Analysis. Edited by Michael A. Livermore and Daniel N. Rockmore.
America's Paper Prisons: The Second Chance Gap, Colleen Chien
America's Paper Prisons: The Second Chance Gap, Colleen Chien
Michigan Law Review
Over the last decade, dozens of states and the federal government have enacted “second chance” reforms that increase the eligibility of individuals arrested, charged, or convicted of crimes to shorten their sentences, clear their criminal records, and/or regain the right to vote. While much fanfare has accompanied the increasing availability of “second chances,” little attention has been paid to their delivery. This study introduces the concept of the “second chance gap,” which it defines as the difference between eligibility and delivery of second chance relief; explores its causes; and approximates its size in connection with several second chance laws and …
Digital Colonialism: The 21st Century Scramble For Africa Through The Extraction And Control Of User Data And The Limitations Of Data Protection Laws, Danielle Coleman
Digital Colonialism: The 21st Century Scramble For Africa Through The Extraction And Control Of User Data And The Limitations Of Data Protection Laws, Danielle Coleman
Michigan Journal of Race and Law
As Western technology companies increasingly rely on user data globally, extensive data protection laws and regulations emerged to ensure ethical use of that data. These same protections, however, do not exist uniformly in the resource-rich, infrastructure-poor African countries, where Western tech seeks to establish its presence. These conditions provide an ideal landscape for digital colonialism.
Digital colonialism refers to a modern-day “Scramble for Africa” where largescale tech companies extract, analyze, and own user data for profit and market influence with nominal benefit to the data source. Under the guise of altruism, large scale tech companies can use their power and …
Title 2.0: Discrimination Law In A Data-Driven Society, Bryan Casey
Title 2.0: Discrimination Law In A Data-Driven Society, Bryan Casey
Journal of Law and Mobility
More than a quarter century after civil rights activists pioneered America’s first ridesharing network, the connections between transportation, innovation, and discrimination are again on full display. Industry leaders such as Uber, Amazon, and Waze have garnered widespread acclaim for successfully combatting stubbornly persistent barriers to transportation. But alongside this well-deserved praise has come a new set of concerns. Indeed, a growing number of studies have uncovered troubling racial disparities in wait times, ride cancellation rates, and service availability in companies including Uber, Lyft, Task Rabbit, Grubhub, and Amazon Delivery.
Surveying the methodologies employed by these studies reveals a subtle, but …
Privacy Preserving Social Norm Nudges, Yifat Nahmias
Privacy Preserving Social Norm Nudges, Yifat Nahmias
Michigan Technology Law Review
Nudges comprise a key component of the regulatory toolbox. Both the public and private sectors use nudges extensively in various domains, ranging from environmental regulation to health, food and financial regulation. This article focuses on a particular type of nudge: social norm nudges. It discusses, for the first time, the privacy risks of such nudges. Social norm nudges induce behavioral change by capitalizing on people’s desire to fit in with others, on their predisposition to social conformity, and on their susceptibility to the way information is framed. In order to design effective social norm nudges, personal information about individuals and …
Forensic Border Searches After Carpenter Require Probable Cause And A Warrant, Christopher I. Pryby
Forensic Border Searches After Carpenter Require Probable Cause And A Warrant, Christopher I. Pryby
Michigan Law Review
Under the border search doctrine, courts have upheld the federal government's practice of searching people and their possessions upon entry into or exit from the United States, without any requirement of suspicion, as reasonable under the Fourth Amendment. Since the advent of electronic devices with large storage capacities, courts have grappled with whether this definition of reasonableness continues to apply. So far, courts have consistently characterized “nonforensic” border inspections of electronic devices (for example, paging through photos on a phone) as “routine” searches that, like inspecting luggage brought across international lines, require no suspicion. But there is a circuit split …
Prosecutors Matter: A Response To Bellin’S Review Of Locked In, John P. Pfaff
Prosecutors Matter: A Response To Bellin’S Review Of Locked In, John P. Pfaff
Michigan Law Review Online
In this year's Book Review issue, Jeffrey Bellin reviews my book, Locked In: The True Causes of Mass Incarceration and How to Achieve Real Reform, and he finds much to disagree with. I appreciate the editors of the Law Review providing me with the opportunity to correct a significant error he makes when discussing some of my data. In the book, I use data from the National Center for State Courts (NCSC) to show that prosecutors filed increasingly more felony cases over the 1990s and 2000s, even as crime fell. Bellin makes two primary claims about how I used …
Change, Creation, And Unpredictability In Statutory Interpretation: Interpretive Canon Use In The Roberts Court's First Decade, Nina A. Mendelson
Change, Creation, And Unpredictability In Statutory Interpretation: Interpretive Canon Use In The Roberts Court's First Decade, Nina A. Mendelson
Michigan Law Review
In resolving questions of statutory meaning, the lion’s share of Roberts Court opinions considers and applies at least one interpretive canon, whether the rule against surplusage or the presumption against state law preemption. This is part of a decades-long turn toward textualist statutory interpretation in the Supreme Court. Commentators have debated how to justify canons, since they are judicially created rules that reside outside the statutory text. Earlier studies have cast substantial doubt on whether these canons can be justified as capturing congressional practices or preferences; commentators have accordingly turned toward second-order justifications, arguing that canons usefully make interpretation constrained …
Regulating Black-Box Medicine, W. Nicholson Price Ii
Regulating Black-Box Medicine, W. Nicholson Price Ii
Michigan Law Review
Data drive modern medicine. And our tools to analyze those data are growing ever more powerful. As health data are collected in greater and greater amounts, sophisticated algorithms based on those data can drive medical innovation, improve the process of care, and increase efficiency. Those algorithms, however, vary widely in quality. Some are accurate and powerful, while others may be riddled with errors or based on faulty science. When an opaque algorithm recommends an insulin dose to a diabetic patient, how do we know that dose is correct? Patients, providers, and insurers face substantial difficulties in identifying high-quality algorithms; they …
The Racist Algorithm?, Anupam Chander
The Racist Algorithm?, Anupam Chander
Michigan Law Review
Review of The Black Box Society: The Secret Algorithms That Control Money and Information by Frank Pasquale.
Uncertainty, Precaution, And Adaptive Management In Wildlife Trade, Annecoos Wiersema
Uncertainty, Precaution, And Adaptive Management In Wildlife Trade, Annecoos Wiersema
Michigan Journal of International Law
Wildlife trade is big business. Legal international trade in just some of the wild animals and plants traded worldwide is estimated at $350 to $530 million per year. The United States is the primary importer of virtually every major taxon of these species, including mammals, reptiles, fish, and plants. When it comes to illegal trade, estimates of its value range from $7 to $23 billion annually, covering wild animals, fish, and timber. This illegal trade fuels organized crime and militia and terrorist groups. In the face of all this pressure, some wild species appear to be traded in sustainable amounts. …
The Systematic Risk Of Private Funds After The Dodd-Frank Act, Wulf A. Kaal
The Systematic Risk Of Private Funds After The Dodd-Frank Act, Wulf A. Kaal
Michigan Business & Entrepreneurial Law Review
The Financial Stability Oversight Council (FSOC) was created under the Dodd-Frank Act with the primary mandate of guarding against systemic risk and correcting perceived regulatory weaknesses that may have contributed to the financial crisis of 2008-2009. The Securities and Exchange Commission (SEC) collects data pertaining to private fund advisers in order to facilitate FSOC’s assessment of non-bank financial institutions’ potential systemic risks. Evidence that the SEC’s data collection encounters accuracy and consistency problems might hamper FSOC’s ability to evaluate the systemic risk of private fund advisers. The author shows that while the SEC’s data plays a crucial role in all …
The $1.75 Trillion Lie, Lisa Heinzerling, Frank Ackerman
The $1.75 Trillion Lie, Lisa Heinzerling, Frank Ackerman
Michigan Journal of Environmental & Administrative Law
A 2010 study commissioned by the Office of Advocacy of the U.S. Small Business Administration claims that federal regulations impose annual economic costs of $1.75 trillion. This estimate has been widely circulated, in everything from op-ed pages to Congressional testimony. But the estimate is not credible. For costs of economic regulations, the estimate reflects a calculation that rests on a misunderstanding of the definition of the relevant data, flunks an elementary question on the normal distribution, pads the analysis with several years of near-identical data, and fails to recognize the difference between correlation and causation. For costs of environmental regulation, …
The Supreme Court's Controversial Gvrs - And An Alternative, Aaron-Andrew P. Bruhl
The Supreme Court's Controversial Gvrs - And An Alternative, Aaron-Andrew P. Bruhl
Michigan Law Review
This Article addresses a relatively neglected portion of the Supreme Court's docket: the "GVR"-that is, the Court's procedure for summarily granting certiorari, vacating the decision below without finding error, and remanding the case for further consideration by the lower court. The purpose of the GVR device is to give the lower court the initial opportunity to consider the possible impact of a new development (such as a recently issued Supreme Court decision) and, if necessary, to revise its ruling in light of the changed circumstances. The Court may issue scores or even hundreds of these orders every year. This Article …
Improving Post-Approval Risk Surveillance For Drugs: Active Post-Market Risk Identification, Matthew Gordon
Improving Post-Approval Risk Surveillance For Drugs: Active Post-Market Risk Identification, Matthew Gordon
Michigan Telecommunications & Technology Law Review
Pre-approval clinical trials cannot possibly ensure that a drug will not have disastrous side effects once it arrives on the market. Post-approval drug safety data gathering was put in place to address this problem, but as implemented, it has not proven to be as effective as hoped. Congress recently overhauled the legislation regarding post-approval drug risk identification, and in doing so made a deliberate decision to put much of the burden of post-approval drug surveillance on the FDA through data mining. Further, the legislation gave the FDA the power to require post-approval clinical trials from drug makers only in limited …
Measuring The Next 30 Years, Beth Locker, Andrew Barclay
Measuring The Next 30 Years, Beth Locker, Andrew Barclay
University of Michigan Journal of Law Reform
The last thirty years have seen many changes in the field of child protection, as child welfare law and policy have been undergoing nearly constant change. Those changes, however, have rarely been supported by data or scientific research; rather, they seem to have been largely driven by individual perception of events and gut instincts resulting in what has become essentially a folklore-based system. By focusing on data and scientific research, we hope for better outcomes, but short of that, we at least hope to know whether, and why, outcomes change. The move towards data collection and analysis has begun, but …
Transferring Water In The American West: 1987-2005, Jedidiah Brewer, Robert Glennon, Alan Ker, Gary Libecap
Transferring Water In The American West: 1987-2005, Jedidiah Brewer, Robert Glennon, Alan Ker, Gary Libecap
University of Michigan Journal of Law Reform
Rising urban and environmental demand for water has created growing pressure to re-allocate water from traditional agricultural uses. Water markets are powerful institutions for facilitating this re-allocation, yet the evolution of water markets has been more complicated than those for other resources. In this paper, we set the context for water marketing with an overview of western water law that highlights unique aspects of water law that affect how or whether a water market can develop. Second, we present new, comprehensive data on the extent, nature, and timing of water transfers across 12 western states from 1987-2005. We describe the …
Illuminating Secrecy: A New Economic Analysis Of Confidential Settlements, Scott A. Moss
Illuminating Secrecy: A New Economic Analysis Of Confidential Settlements, Scott A. Moss
Michigan Law Review
Even the most hotly contested lawsuits typically end in a confidential settlement forbidding the parties from disclosing their allegations, evidence, or settlement amount. Confidentiality draws fierce criticism for harming third parties by concealing serious misdeeds like discrimination, pollution, defective manufacturing, and sexual abuse. Others defend confidentiality as a mutually beneficial pay-for-silence bargain that facilitates settlement, serves judicial economy, and prevents frivolous copycat lawsuits. This debate is based in economic logic, yet most analyses have been surprisingly shallow as to how confidentiality affects incentives to settle. Depicting a more nuanced, complex reality of litigation and settlement, this Article reaches several conclusions …
Contract As Statute, Stephen J. Choi, G. Mitu Gulati
Contract As Statute, Stephen J. Choi, G. Mitu Gulati
Michigan Law Review
The traditional model of contract interpretation focuses on the "meeting of the minds." Parties agree on how to structure their respective obligations and rights and then specify their agreement in a written document. Gaps and ambiguities are inevitable. But where contract language exists for the point in contention and a dispute arises as to the meaning of this language, courts attempt to divine what the parties intended. Among the justifications for deferring to the intent of the parties is the assumption that parties know what is best for themselves. Deference also arguably furthers autonomy values. Not all contracts and contract …
State Sentencing Policy And New Prison Admissions, Ben Trachtenberg
State Sentencing Policy And New Prison Admissions, Ben Trachtenberg
University of Michigan Journal of Law Reform
As the academy's focus has turned to sentencing in the wake of Blakely v. Washington and United States v. Booker, most commentators have continued their benign neglect of actual sentencing practices as they occur in state courts, not to mention whether and how such policies are effective in achieving the goals of criminal justice.
This Note examines trends in state sentencing policies and prison populations from the perspective of a would-be state reformer hoping to decrease her state's prison budget. Economic pressures, efficiency arguments, and social justice claims have combined to cause some states to desire lower prison populations, …
Electronic Discovery Sanctions In The Twenty-First Century, Shira A. Scheindlin, Kachana Wangkeo
Electronic Discovery Sanctions In The Twenty-First Century, Shira A. Scheindlin, Kachana Wangkeo
Michigan Telecommunications & Technology Law Review
At the federal level, the Civil Rules Advisory Committee has responded to the "unique and necessary feature of computer systems--the automatic recycling, overwriting, and alteration of electronically stored information"--with a proposed amendment to Rule 37. The proposed Rule 37(f) would shield litigants from sanctions for the destruction of electronic data if the party "took reasonable steps to preserve the information after it knew or should have known the information was discoverable in the action" and "the failure resulted from the loss of the information because of the routine operation of the party's electronic information system." The safe harbor provision would …
Theorizing Behavioral Law And Economics: A Defense Of Evolutionary Analysis And The Law, Neel P. Parekh
Theorizing Behavioral Law And Economics: A Defense Of Evolutionary Analysis And The Law, Neel P. Parekh
University of Michigan Journal of Law Reform
Behavioral law and economics (BLE) provides a steady stream of empirical evidence that counters the predictions of law and economics. Despite this research and data, however, many theorists argue that BLE ultimately fails because it posits no underlying theory. This Note argues that perspectives from evolutionary biology, evolutionary psychology, and the brain sciences can provide the missing motivational theory for BLE's empirical findings. The Note also examines the implications a more consistent and reasoned consideration of evolutionary analysis and the law (EA) has for our legal regime. In theorizing BLE and defending EA, this Note aims to show how evolutionary …
Information Economics And Chemical Toxicity: Designing Laws To Produce And Use Data, Mary L. Lyndon
Information Economics And Chemical Toxicity: Designing Laws To Produce And Use Data, Mary L. Lyndon
Michigan Law Review
Just as laws may create entitlements to the use of information, they may also be written to distribute information and to encourage information production. This Article discusses the ways in which law affects the generation and distribution of information related to chemical exposure and toxicity. It describes the economic impact of recently enacted right-to-know laws and proposes that better and more abundant data could be produced if the law paid greater attention to basic economic principles that influence research and information systems.
Webs Of Things In The Mind: A New Science Of Evidence, Peter Tillers
Webs Of Things In The Mind: A New Science Of Evidence, Peter Tillers
Michigan Law Review
A Review of Evidence and Inference for the Intelligence Analyst by David Schum
Transborder Data Flows: Do We Mean Freedom Or Business?, Michael Bothe
Transborder Data Flows: Do We Mean Freedom Or Business?, Michael Bothe
Michigan Journal of International Law
The growth of the modem "information society" is a phenomenon transcending national borders, characterized by tremendous progress in both telecommunications and computer technology - a technology called collectively "telematics." Telematics have not only become the vital nervous system of our domestic economies and begun to play an increasing role in our private lifestyles, but have grown to link the nations of the world in constant, instantaneous, and complex ways. These communications and the data conveyed through them (whether their raw material is written text, tables, numbers, pictures, or voices), due to their importance, are in many respects a matter of …
The Effectiveness Of Measures To Increase Appellate Court Efficiency And Decision Output, Thomas B. Marvell, Carlisle E. Moody
The Effectiveness Of Measures To Increase Appellate Court Efficiency And Decision Output, Thomas B. Marvell, Carlisle E. Moody
University of Michigan Journal of Law Reform
This Article will examine the effectiveness of measures commonly employed to increase appellate court productivity. Part I of the Article sets forth some common design problems and explains how the research technique employed in the present study avoids these problems by using a multiple time-series research design. Part II applies this design to state court data. Part II also describes the dependent variable, the number of appeals decided per judge, used in the regression analysis. Part III discusses the results of that analysis-the impact of each change listed above on judicial productivity. The Article, although not advocating the adoption of …
Federal Agency Treatment Of Uncertainty In Environmental Impact Statements Under The Ceq's Amended Nepa Regulation § 1502.22: Worst Case Analysis Or Risk Threshold, Charles F. Weiss
Michigan Law Review
This Note traces the judicial and administrative treatment of uncertainty under NEPA and supports the CEQ's replacement of worst case analysis with a qualitative probability threshold. Part I discusses the development of reasonableness standards in NEPA common law to define agency obligations prior to promulgation of the worst case analysis regulation. Part II reviews the worst case analysis regulation and its judicial construction. Finally, Part III outlines the amended regulation, which replaces worst case analysis with a probability threshold employing the rule of reason to limit EIS discussion to environmental effects shown through credible scientific evidence to be reasonably foreseeable. …
Black Innocence And The White Jury, Sheri Lynn Johnson
Black Innocence And The White Jury, Sheri Lynn Johnson
Michigan Law Review
Racial prejudice has come under increasingly close scrutiny during the past thirty years, yet its influence on the decisionmaking of criminal juries remains largely hidden from judicial and critical examination. In this Article, Professor Johnson takes a close look at this neglected area. She first sets forth a large body of social science research that reveals a widespread tendency among whites to convict black defendants in instances in which white defendants would be acquitted. Next, she argues that none of the existing techniques for eliminating the influence of racial bias on criminal trials adequately protects minority-race defendants. She contends that …
Reciprocity In International Telecommunications Trade: A New Trade Barrier?, Sheryl Powers
Reciprocity In International Telecommunications Trade: A New Trade Barrier?, Sheryl Powers
Michigan Journal of International Law
To those advocating its use, reciprocity legislation is especially appropriate for the telecommunications industry. Only 5 percent of telecommunications equipment manufactured in the United States is exported for sale in other nations. Trade barriers, loyalty to domestic manufacturers and the importance of telecommunications to national defense systems have combined to restrict access to foreign markets in the telecommunications sector. To persuade other nations to increase market access in telecommunications, United States legislators added a requirement of reciprocity to two proposed bills, S.898 and H.R.5158. This note will examine these two bills, concluding that reciprocity is an inappropriate solution to United …