Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

University of Michigan Law School

2017

Liability

Internet Law

Articles 1 - 3 of 3

Full-Text Articles in Law

Paypal Is New Money: Extending Secondary Copyright Liability Safe Harbors To Online Payment Processors, Erika Douglas Nov 2017

Paypal Is New Money: Extending Secondary Copyright Liability Safe Harbors To Online Payment Processors, Erika Douglas

Michigan Telecommunications & Technology Law Review

The Digital Millennium Copyright Act (DMCA) has shaped the Internet as we know it. This legislation shields online service providers from secondary copyright infringement liability in exchange for takedown of infringing content of their users. Yet online payment processors, the backbone of $300 billion in U.S. e-commerce, are completely outside of the DMCA’s protection. This Article uses PayPal, the most popular online payment company in the U.S., to illustrate the growing risk of secondary liability for payment processors. First it looks at jurisprudence that expands secondary copyright liability online, and explains how it might be applied to PayPal. Then it …


Products Liability And The Internet Of (Insecure) Things: Should Manufacturers Be Liable For Damage Caused By Hacked Devices?, Alan Butler Jun 2017

Products Liability And The Internet Of (Insecure) Things: Should Manufacturers Be Liable For Damage Caused By Hacked Devices?, Alan Butler

University of Michigan Journal of Law Reform

While the application of products liability to insecure software is a frequently-discussed concept in academic literature, many commentators have been skeptical of the viability of such claims for several reasons. First, the economic loss doctrine bars recovery for productivity loss, business disruption, and other common damages caused by software defects. Second, the application of design defects principles to software is difficult given the complexity of the devices and recent tort reform trends that have limited liability. Third, the intervening cause of damage from insecure software is typically a criminal or tortious act by a third party, so principles of causation …


Automating Threat Sharing: How Companies Can Best Ensure Liability Protection When Sharing Cyber Threat Information With Other Companies Or Organizations, Ari Schwartz, Sejal C. Shah, Matthew H. Mackenzie, Sheena Thomas, Tara Sugiyama Potashnik, Bri Law Jun 2017

Automating Threat Sharing: How Companies Can Best Ensure Liability Protection When Sharing Cyber Threat Information With Other Companies Or Organizations, Ari Schwartz, Sejal C. Shah, Matthew H. Mackenzie, Sheena Thomas, Tara Sugiyama Potashnik, Bri Law

University of Michigan Journal of Law Reform

This Article takes an in-depth look at the evolution of cybersecurity information sharing legislation, leading to the recent passage of the Cybersecurity Information Sharing Act (CISA) and offers insights into how automated information sharing mechanisms and associated requirements implemented pursuant to CISA can be leveraged to help ensure liability protections when engaging in cyber threat information sharing with and amongst other non-federal government entities.