Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

University of Michigan Law School

Internet

Discipline
Publication Year
Publication
Publication Type

Articles 1 - 30 of 132

Full-Text Articles in Law

Reviving Negotiated Rulemaking For An Accessible Internet, Julie Moroney May 2021

Reviving Negotiated Rulemaking For An Accessible Internet, Julie Moroney

Michigan Law Review

Web accessibility requires designing and developing websites so that people with disabilities can use them without barriers. While the internet has become central to daily life, websites have overwhelmingly remained inaccessible to the millions of users who have disabilities. Congress enacted the Americans with Disabilities Act (ADA) to combat discrimination against people with disabilities. Passed in 1990, it lacks any specific mention of the internet Courts are split as to whether the ADA applies to websites, and if so, what actions businesses must take to comply with the law. Further complicating matters, the Department of Justice (DOJ) initiated the rulemaking …


Symmetry And (Network) Neutrality, Tejas N. Narechania Dec 2020

Symmetry And (Network) Neutrality, Tejas N. Narechania

Michigan Law Review Online

In this short Essay, I take the opportunity to highlight one further potential asymmetry that may yet emerge from the Supreme Court’s application of Chevron’s many doctrines. Drawing on then-Judge Kavanaugh’s disdissental from the D.C. Circuit’s decision affirming network neutrality rules, I suggest that there is at least one vote on the Supreme Court—and perhaps more—for an asymmetric approach to the major questions doctrine. Moreover, I demonstrate how asymmetry in this context is deeply irrational. As applied to network neutrality, the asymmetry has at least one of two effects. One, it might simply favor one large industry over another, …


Cyber Mobs, Disinformation, And Death Videos: The Internet As It Is (And As It Should Be), Danielle Keats Citron May 2020

Cyber Mobs, Disinformation, And Death Videos: The Internet As It Is (And As It Should Be), Danielle Keats Citron

Michigan Law Review

Review of Nick Drnaso's Sabrina.


The Airwaves Meet The Highways, David Redl Apr 2019

The Airwaves Meet The Highways, David Redl

Journal of Law and Mobility

I applaud and congratulate the University of Michigan for launching the Journal of Law and Mobility. The timing is perfect. The information superhighway is no longer just a clever metaphor. We are living in an era where internet connectivity is a critical part of making transportation safer and more convenient. Internet connectivity has powered the U.S. and global economies for years now. In the early stages, dial-up connections enabled users to access a vast store of digital information. As the internet and its usage grew, so did the demand for faster broadband speeds. Finally, wireless networks untethered the power of …


The Future Of Law And Mobility, Daniel A. Crane Jun 2018

The Future Of Law And Mobility, Daniel A. Crane

Articles

With the launch of the new Journal of Law and Mobility, the University of Michigan is recognizing the transformative impact of new transportation and mobility technologies, from cars, to trucks, to pedestrians, to drones. The coming transition towards intelligent, automated, and connected mobility systems will transform not only the way people and goods move about, but also the way human safety, privacy, and security are protected, cities are organized, machines and people are connected, and the public and private spheres are defined.


A Unifying Approach To Nexus Under The Dormant Commerce Clause, Adam B. Thimmesch Mar 2018

A Unifying Approach To Nexus Under The Dormant Commerce Clause, Adam B. Thimmesch

Michigan Law Review Online

The Supreme Court has long debated the existence and scope of its power to restrict state regulation under the so-called negative or dormant Commerce Clause. The Court took a broad view of that power in the late 1800s, but it has refined and restricted its role over time. One area where the Court has continued to wield considerable power, however, has been in the context of state taxes. Specifically, the Court has continued to restrict states' power to compel out-of-state vendors to collect their sales and use taxes based on a physical-presence "nexus" rule. That rule dates back to the …


Minimum Virtual Contacts: A Framework For Specific Jurisdiction In Cyberspace, Adam R. Kleven Mar 2018

Minimum Virtual Contacts: A Framework For Specific Jurisdiction In Cyberspace, Adam R. Kleven

Michigan Law Review

As the ubiquity and importance of the internet continue to grow, courts will address more cases involving online activity. In doing so, courts will confront the threshold issue of whether a defendant can be subject to specific personal jurisdiction. The Supreme Court, however, has yet to speak to this internet-jurisdiction issue. Current precedent, when strictly applied to the internet, yields fundamentally unfair results when addressing specific jurisdiction. To better achieve the fairness aim of due process, this must change. This Note argues that, in internet tort cases, the “express aiming” requirement should be discarded from the jurisdictional analysis and that …


Is The First Amendment Obsolete?, Tim Wu Jan 2018

Is The First Amendment Obsolete?, Tim Wu

Michigan Law Review

The First Amendment was brought to life in a period, the twentieth century, when the political speech environment was markedly different than today’s. With respect to any given issue, speech was scarce and limited to a few newspapers, pamphlets or magazines. The law was embedded, therefore, with the presumption that the greatest threat to free speech was direct punishment of speakers by government.

Today, in the internet and social media age, it is no longer speech that is scarce—rather, it is the attention of listeners. And those who seek to control speech use new methods that rely on the weaponization …


Human Rights And Cybersecurity Due Diligence: A Comparative Study, Scott J. Shackelford Jun 2017

Human Rights And Cybersecurity Due Diligence: A Comparative Study, Scott J. Shackelford

University of Michigan Journal of Law Reform

No company, just like no nation, is an island in cyberspace; the actions of actors from hacktivists to nation-states have the potential to impact the bottom line, along with the human rights of consumers and the public writ large. To help meet the multifaceted challenges replete in a rapidly globalizing world—and owing to the relative lack of binding international law to regulate both cybersecurity and the impact of business on human rights—companies are reconceptualizing what constitutes “due diligence.” This Article takes lessons from both the cybersecurity and human rights due diligence contexts to determine areas for cross-pollination in an effort …


Products Liability And The Internet Of (Insecure) Things: Should Manufacturers Be Liable For Damage Caused By Hacked Devices?, Alan Butler Jun 2017

Products Liability And The Internet Of (Insecure) Things: Should Manufacturers Be Liable For Damage Caused By Hacked Devices?, Alan Butler

University of Michigan Journal of Law Reform

While the application of products liability to insecure software is a frequently-discussed concept in academic literature, many commentators have been skeptical of the viability of such claims for several reasons. First, the economic loss doctrine bars recovery for productivity loss, business disruption, and other common damages caused by software defects. Second, the application of design defects principles to software is difficult given the complexity of the devices and recent tort reform trends that have limited liability. Third, the intervening cause of damage from insecure software is typically a criminal or tortious act by a third party, so principles of causation …


Automating Threat Sharing: How Companies Can Best Ensure Liability Protection When Sharing Cyber Threat Information With Other Companies Or Organizations, Ari Schwartz, Sejal C. Shah, Matthew H. Mackenzie, Sheena Thomas, Tara Sugiyama Potashnik, Bri Law Jun 2017

Automating Threat Sharing: How Companies Can Best Ensure Liability Protection When Sharing Cyber Threat Information With Other Companies Or Organizations, Ari Schwartz, Sejal C. Shah, Matthew H. Mackenzie, Sheena Thomas, Tara Sugiyama Potashnik, Bri Law

University of Michigan Journal of Law Reform

This Article takes an in-depth look at the evolution of cybersecurity information sharing legislation, leading to the recent passage of the Cybersecurity Information Sharing Act (CISA) and offers insights into how automated information sharing mechanisms and associated requirements implemented pursuant to CISA can be leveraged to help ensure liability protections when engaging in cyber threat information sharing with and amongst other non-federal government entities.


Factors In Fairness And Emotion In Online Case Resolution Systems, Youyang Hou, Cliff Lampe, Maximilian Bulinski, J. J. Prescott May 2017

Factors In Fairness And Emotion In Online Case Resolution Systems, Youyang Hou, Cliff Lampe, Maximilian Bulinski, J. J. Prescott

Articles

Courts are increasingly adopting online information and communication technology, creating a need to consider the potential consequences of these tools for the justice system. Using survey responses from 209 litigants who had recently used an online case resolution system, we investigate factors that influenced litigants’ experiences of fairness and emotional feelings toward court officials. Our results show that ease of using the online case resolution system, the outcome of the case, and a litigant’s perceptions of procedural justice are positively associated both with whether the litigant views the process as fair and whether the litigant ultimately feels positive emotions toward …


Source, Character And Taxable Presence In A Digital World: International Taxation Of Online Advertising, Assaf Prussak Jan 2017

Source, Character And Taxable Presence In A Digital World: International Taxation Of Online Advertising, Assaf Prussak

SJD Dissertations

The purpose of this dissertation is to examine the application of the U.S. and international tax rules and norms to income derived from online advertising, to consider the challenges and problems that arise when these rules are applied to such a purely-digital type of income, to propose an alternative framework for the taxation of online advertising, and to discuss the legislative measures adopted by various countries in an attempt to tax this type of income (and other income derived from digital-based activities).


Update Your Bookmarks! Great Sites For Effective Research, Nancy E. Vettorello Jan 2017

Update Your Bookmarks! Great Sites For Effective Research, Nancy E. Vettorello

Articles

There are more than one billion websites available online. Many are useful tools for attorneys, so it makes sense to review and refresh your favorite bookmarks regularly. While none of the many free sites offer the sophisticated search abilities of fee-based research services, a few minutes spent exploring free sites can help researchers significantly narrow their searches once they turn to a fee-based system. Remember to always take advantage of the advancesearch option when available on a free site. Free sites are offering increasingly sophisticated search options, such as Boolean and proximity searches, which were previously exclusive to paid services.


How The E-Government Can Save Money By Building Bridges Across The Digital Divide, Alison Rogers Jan 2016

How The E-Government Can Save Money By Building Bridges Across The Digital Divide, Alison Rogers

Michigan Journal of Race and Law

As government agencies and federal aid recipients begin to build a presence online, they must recognize that language accessibility is morally required, fiscally responsible, and compulsory under federal civil rights law. This Note explores statutes, federal policies, and case law that purport to protect the rights of limited English proficient (“LEP”) individuals in cyberspace. The Note suggests reforms, policies, and programs that should be adopted by federal aid recipients to ensure that LEP individuals have meaningful access to online services.


Privacy Almighty? The Cjeu's Judgment In Google Spain Sl V. Aepd, David J. Stute Dec 2015

Privacy Almighty? The Cjeu's Judgment In Google Spain Sl V. Aepd, David J. Stute

Michigan Journal of International Law

The Internet has matured into an unprecedented repository of data, retrievable through myriad unique “links,” or Uniform Resource Locators. Yet, this wealth of information only became broadly accessible through the invention and continual development of algorithm-based search engines. Keyword searches empowered search-engine users to find—and sometimes stumble upon—information with great ease. Indeed, search-engine indices arguably have become the most comprehensive catalogues of information the world has ever seen. This wealth of accessible information poses challenges to traditional notions of privacy: aspects of our private and public lives, which previously would have rarely left the vicinities of our immediate social or …


Avoiding The Next Napster: Copyright Infringement And Investor Liability In The Age Of User Generated Content, Truan Savage Sep 2015

Avoiding The Next Napster: Copyright Infringement And Investor Liability In The Age Of User Generated Content, Truan Savage

Michigan Business & Entrepreneurial Law Review

Rapid developments in digital technology over the past quarter century have made it easier than ever for people to create and instantly share content. These developments have served as the basis for countless innovations and have spawned some of today’s largest and most profitable companies. As content creation and distribution continues to evolve, businesses seek new ways to profit from these technological innovations. But while businesses continue to develop around new methods of content distribution, the law of copyright, which generally aims to encourage the creation of content, has been slow to adapt. This era of modern technological innovation thus …


Loopholes For Circumventing The Constitution: Unrestrained Bulk Surveillance On Americans By Collecting Network Traffic Abroad, Axel Arnbak, Sharon Goldberg Jun 2015

Loopholes For Circumventing The Constitution: Unrestrained Bulk Surveillance On Americans By Collecting Network Traffic Abroad, Axel Arnbak, Sharon Goldberg

Michigan Telecommunications & Technology Law Review

This Article reveals interdependent legal and technical loopholes that the US intelligence community could use to circumvent constitutional and statutory safeguards for Americans. These loopholes involve the collection of Internet traffic on foreign territory, and leave Americans as unprotected as foreigners by current United States (US) surveillance laws. This Article will also describe how modern Internet protocols can be manipulated to deliberately divert American’s traffic abroad, where traffic can then be collected under a more permissive legal regime (Executive Order 12333) that is overseen solely by the executive branch of the US government. Although the media has reported on some …


Voluntary Disclosure Of Information As A Proposed Standard For The Fourth Amendment's Third-Party Doctrine, Margaret E. Twomey Jun 2015

Voluntary Disclosure Of Information As A Proposed Standard For The Fourth Amendment's Third-Party Doctrine, Margaret E. Twomey

Michigan Telecommunications & Technology Law Review

The third-party doctrine is a long-standing tenant of Fourth Amendment law that allows law enforcement officers to utilize information that was released to a third party without the probable cause required for a traditional search warrant. This has allowed law enforcement agents to use confidential informants, undercover agents, and access bank records of suspected criminals. However, in a digital age where exponentially more information is shared with Internet Service Providers, e-mail hosts, and social media “friends,” the traditional thirdparty doctrine ideas allow law enforcement officers access to a cache of personal information and data with a standard below probable cause. …


The Incitement Of Terrorism On The Internet: Legal Standards, Enforcement, And The Role Of The European Union, Ezekiel Rediker Apr 2015

The Incitement Of Terrorism On The Internet: Legal Standards, Enforcement, And The Role Of The European Union, Ezekiel Rediker

Michigan Journal of International Law

Consider this sentence: “The Shining Path is a heroic organization.” Over the past thirty years, the Shining Path has waged a violent guerilla war against the Peruvian government, prompting the European Union to designate the group as a terrorist organization. In certain European countries, speech inciting or glorifying terrorist organizations is criminalized. As a result, citizens risk prosecution if they do not carefully limit what they say about the Shining Path, or other terrorist organizations. But where does free speech end and incitement to terrorism begin? The debate over free speech and incitement to terrorism is actively being played out …


At The Fontier Of The Younger Doctrine: Reflections On Google V. Hood, Gil Seinfeld Mar 2015

At The Fontier Of The Younger Doctrine: Reflections On Google V. Hood, Gil Seinfeld

Articles

On December 19, 2014, long-simmering tensions between Mississippi Attorney General Jim Hood and the search engine giant Google boiled over into federal court when Google filed suit against the Attorney General to enjoin him from bringing civil or criminal charges against it for alleged violations of the Mississippi Consumer Protection Act. Hood had been investigating and threatening legal action against Google for over a year for its alleged failure to do enough to prevent its search engine, advertisements, and YouTube website from facilitating public access to illegal, dangerous, or copyright protected goods. The case has garnered a great deal of …


Social Media And The Job Market: How To Reconcile Applicant Privacy With Employer Needs, Peter B. Baumhart Jan 2015

Social Media And The Job Market: How To Reconcile Applicant Privacy With Employer Needs, Peter B. Baumhart

University of Michigan Journal of Law Reform

In the modern technological age, social media allows us to communicate vast amounts of personal information to countless people instantaneously. This information is valuable to more than just our “friends” and “followers,” however. Prospective employers can use this personal data to inform hiring decisions, thereby maximizing fit and minimizing potential liability. The question then arises, how best to acquire this information? For job applicants, the counter-question is how best to protect the privacy of their social media accounts. As these two competing desires begin to clash, it is important to find a method to mediate the conflict. Existing privacy law, …


Can You Diagnose Me Now? A Proposal To Modify The Fda’S Regulation Of Smartphone Mobile Health Applications With A Pre-Market Notification And Application Database Program, Stephen Mcinerney Jan 2015

Can You Diagnose Me Now? A Proposal To Modify The Fda’S Regulation Of Smartphone Mobile Health Applications With A Pre-Market Notification And Application Database Program, Stephen Mcinerney

University of Michigan Journal of Law Reform

Advances in mobile technology continually create new possibilities for the future of medical care. Yet these changes have also created concerns about patient safety. Under the Food, Drug, and Cosmetic Act, the Food and Drug Administration (FDA) has the authority to regulate a broad spectrum of products beyond traditional medical devices like stethoscopes or pacemakers. The regulatory question is not if the FDA has the statutory authority to regulate health-related software, but rather how it will exercise its regulatory authority. In September 2013, the FDA published Final Guidance on Mobile Medical Applications; in it, the Agency limited its oversight to …


Tesla And The Car Dealers' Lobby, Daniel A. Crane Jun 2014

Tesla And The Car Dealers' Lobby, Daniel A. Crane

Articles

Tesla Motors, the offspring of entrepreneur Elon Musk (who brought us Pay-Pal and SpaceX), is the most exciting automotive development in many decades and a marquee story of American technological dynamism and innovation. The company’s luxury electric cars have caused a sensation in the auto industry, including a review by Consumer Reports calling Tesla’s Model S the best car it ever tested. Despite the acclaim, Tesla faces enormous challenges Despite the acclaim, Tesla faces enormous challenges in penetrating an automotive market that has been dominated for a century by internal combustion engines. Not only must it build cars that customers …


Responding To Independent Juror Research In The Internet Age: Positive Rules, Negative Rules, And Outside Mechanisms, Robbie Manhas Mar 2014

Responding To Independent Juror Research In The Internet Age: Positive Rules, Negative Rules, And Outside Mechanisms, Robbie Manhas

Michigan Law Review

Independent juror research is an old problem for jury trials. It invites potentially prejudicial, irrelevant, and inaccurate information to guide jury decisionmaking. At the same time, independent juror research compromises our adversarial system by preventing parties from responding to all the evidence under consideration and obfuscating the record on which the jury’s decision is made. These threats have only increased in the internet age, where inappropriate sources of information are ubiquitous and where improper access is hard to detect. Nevertheless, courts and parties continue to engage in the same inhibitory measures they have employed for decades. This Note argues for …


Jurisdictional Limits Of In Rem Proceedings Against Domain Names, Michael Xun Liu Jan 2014

Jurisdictional Limits Of In Rem Proceedings Against Domain Names, Michael Xun Liu

Michigan Telecommunications & Technology Law Review

In 1999, Congress passed the Anticybersquatting Consumer Protection Act (ACPA) to combat “cybersquatters” who profited by registering domain names that were confusingly similar to established trademarks. Under the ACPA, trademark owners have a specific cause of action against domain name registrants accused of cybersquatting. Moreover, the law gives U.S. courts in rem jurisdiction over trademark infringing domain names registered to parties that are not subject to personal jurisdiction. Over the past decade, proceeding in rem against domain names has proven to be an effective strategy for trademark owners. While many companies have used the ACPA against cybersquatters, others have relied …


After Search Neutrality: Drawing A Line Between Promotion And Demotion, Daniel A. Crane Jan 2014

After Search Neutrality: Drawing A Line Between Promotion And Demotion, Daniel A. Crane

Articles

The Federal Trade Commission's (“FTC” or “the commission”) January 3, 2013 decision to close its longstanding investigation of Google1 brings to a close a flurry of discussion over the possibility that Google could become subject to a “search neutrality” principle in the United States. Although the Commission found against Google on several grounds, it rejected petitions from Google's critics to create a search neutrality principle as a matter of antitrust law. This essay briefly analyzes what remains of U.S. antitrust scrutiny of Internet search bias after the Google settlement. In particular, it suggests that a sensible line can be drawn …


Tollbooths And Newsstands On The Information Superhighway, Brad A. Greenberg Dec 2013

Tollbooths And Newsstands On The Information Superhighway, Brad A. Greenberg

Michigan Telecommunications & Technology Law Review

Countering the perception that speech limitations affecting distribution necessarily reduce access to information, this Essay proffers that copyright expansions actually can increase access and thereby serve important copyright and First Amendment values. In doing so, this discussion contributes to the growing literature and two recent Supreme Court opinions discussing whether copyright law and First Amendment interests can coexist.


Wireless Localism: Beyond The Shroud Of Objectivity In Federal Spectrum Administration, Olivier Sylvain Dec 2013

Wireless Localism: Beyond The Shroud Of Objectivity In Federal Spectrum Administration, Olivier Sylvain

Michigan Telecommunications & Technology Law Review

Recent innovations in mobile wireless technology have instigated a debate between two camps of legal scholars about federal administration of the electromagnetic spectrum. The first camp argues that the Federal Communications Commission (“FCC”) should define spectrum use rights more clearly and give spectrum licensees broad property rights in frequencies. The second camp argues that, rather than award exclusive licenses to the highest bidder, the FCC ought to open much, if not most, of the spectrum to unlicensed use by smartphones and tablets equipped with the newest spectrum administration technology. First, this Article shows that both of these camps comprise a …


Misplaced Misrepresentations: Why Misrepresentation-Of-Age Statutes Must Be Reinterpreted As They Apply To Children’S Online Contracts, Michelle A. Sargent Nov 2013

Misplaced Misrepresentations: Why Misrepresentation-Of-Age Statutes Must Be Reinterpreted As They Apply To Children’S Online Contracts, Michelle A. Sargent

Michigan Law Review

The information age revolutionized the relationship between individuals and the internet. Today, children are the targets of online advertisements that lure them into accepting terms of service, thus entering into online agreements. While children may feel comfortable navigating websites, they are psychologically predisposed to be unsophisticated and impulsive actors online. Children lack the digital literacy to understand the implications of accepting website terms of service. Meanwhile, several states have misrepresentation-of-age statutes that prevent children from using the infancy doctrine to disaffirm online contracts because, in accepting the terms of service, children often represent that they are old enough to enter …