Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 14 of 14

Full-Text Articles in Entire DC Network

Symbols, Systems, And Software As Intellectual Property: Time For Contu, Part Ii?, Timothy K. Armstrong May 2018

Symbols, Systems, And Software As Intellectual Property: Time For Contu, Part Ii?, Timothy K. Armstrong

Michigan Telecommunications & Technology Law Review

The functional nature of computer software underlies two propositions that were, until recently, fairly well settled in intellectual property law: first, that software, like other utilitarian articles, may qualify for patent protection; and second, that the scope of copyright protection for software is comparatively limited. Both propositions have become considerably shakier as a result of recent court decisions. Following Alice Corp. v. CLS Bank Int’l, 134 S. Ct. 2347 (2014), the lower courts have invalidated many software patents as unprotectable subject matter. Meanwhile, Oracle America v. Google Inc., 750 F.3d 1339 (Fed. Cir. 2014) extended far more expansive copyright protection …


Accessible Reliable Tax Advice, Emily Cauble Apr 2018

Accessible Reliable Tax Advice, Emily Cauble

University of Michigan Journal of Law Reform

Unsophisticated taxpayers who lack financial resources are disadvantaged by a shortage of adequate tax advice. The IRS does not have the resources to answer all questions asked, and the IRS’s informal advice comes with no guarantee as to its accuracy and offers the taxpayer no protection when it is mistaken. Furthermore, non-IRS sources of advice have not sufficiently filled the void left by a lack of satisfactory IRS guidance. These biases against unsophisticated taxpayers have been noted by existing literature. This Article contributes to existing literature by proposing several novel reform measures to assist unsophisticated taxpayers.

First, with respect to …


Regulating Black-Box Medicine, W. Nicholson Price Ii Dec 2017

Regulating Black-Box Medicine, W. Nicholson Price Ii

Michigan Law Review

Data drive modern medicine. And our tools to analyze those data are growing ever more powerful. As health data are collected in greater and greater amounts, sophisticated algorithms based on those data can drive medical innovation, improve the process of care, and increase efficiency. Those algorithms, however, vary widely in quality. Some are accurate and powerful, while others may be riddled with errors or based on faulty science. When an opaque algorithm recommends an insulin dose to a diabetic patient, how do we know that dose is correct? Patients, providers, and insurers face substantial difficulties in identifying high-quality algorithms; they …


Making Democracy Harder To Hack, Scott Shackelford, Bruce Schneier, Michael Sulmeyer, Anne Boustead, Ben Buchanan, Amanda N. Craig Deckard, Trey Herr, Jessica Malekos Smith Jan 2017

Making Democracy Harder To Hack, Scott Shackelford, Bruce Schneier, Michael Sulmeyer, Anne Boustead, Ben Buchanan, Amanda N. Craig Deckard, Trey Herr, Jessica Malekos Smith

University of Michigan Journal of Law Reform

With the Russian government hack of the Democratic National Convention email servers and related leaks, the drama of the 2016 U.S. presidential race highlights an important point: nefarious hackers do not just pose a risk to vulnerable companies; cyber attacks can potentially impact the trajectory of democracies. Yet a consensus has been slow to emerge as to the desirability and feasibility of reclassifying elections—in particular, voting machines—as critical infrastructure, due in part to the long history of local and state control of voting procedures. This Article takes on the debate—focusing on policy options beyond former Department of Homeland Security Secretary …


Fetishizing Copies, Jessica Litman Jan 2017

Fetishizing Copies, Jessica Litman

Book Chapters

Our copyright laws encourage authors to create new works and communicate them to the public, because we hope that people will read the books, listen to the music, see the art, watch the films, run the software, and build and inhabit the buildings. That is the way that copyright promotes the Progress of Science. Recently, that not-very-controversial principle has collided with copyright owners’ conviction that they should be able to control, or at least collect royalties from, all uses of their works. A particularly ill-considered manifestation of this conviction is what I have decided to call copy-fetish. This is the …


Shedding Light On The "Going Dark" Problem And The Encryption Debate, John Mylan Traylor Sep 2016

Shedding Light On The "Going Dark" Problem And The Encryption Debate, John Mylan Traylor

University of Michigan Journal of Law Reform

In an effort to protect the enormous volume of sensitive and valuable data that travels across the Internet and is stored on personal devices, private companies have created encryption software to secure data from criminals, hackers, and terrorists who wish to steal it. The greatest benefit of encryption also creates the biggest problem: Encryption software has become so secure that often not even the government can bypass it. The “Going Dark” problem—a scenario in which the government has obtained the legal authority to search a suspected criminal’s encrypted device but lacks the technical ability to do so—is becoming increasingly common. …


Protecting Personal Information: Achieving A Balance Between User Privacy And Behavioral Targeting, Patrick Myers Jan 2016

Protecting Personal Information: Achieving A Balance Between User Privacy And Behavioral Targeting, Patrick Myers

University of Michigan Journal of Law Reform

Websites and mobile applications provide immeasurable benefits to both users and companies. These services often collect vast amounts of personal information from the individuals that use them, including sensitive details such as Social Security numbers, credit card information, and physical location. Personal data collection and dissemination leave users vulnerable to various threats that arise from the invasion of their privacy, particularly because users are often ignorant of the existence or extent of these practices. Current privacy law does not provide users with adequate protection from the risks attendant to the collection and dissemination of their personal information. This Note advocates …


Installation Failure: How The Predominant Purpose Test Has Perpetuated Software’S Uncertain Legal Status Under The Uniform Commercial Code, Spencer Gottlieb Mar 2015

Installation Failure: How The Predominant Purpose Test Has Perpetuated Software’S Uncertain Legal Status Under The Uniform Commercial Code, Spencer Gottlieb

Michigan Law Review

Courts have struggled to uniformly classify software as a good or a service and have consequently failed to apply a consistent body of law in that domain. Instead, courts have relied on the predominant purpose test to determine whether the Uniform Commercial Code (“UCC”) or common law should apply to a given software contract. This test, designed for traditional goods and services that do not share software’s complexity or rapid advancement, has perpetuated the uncertainty surrounding software’s legal status. This Note proposes that courts adopt the substantial software test as an alternative to the predominant purpose test. Under this proposal, …


"Electronic Fingerprints": Doing Away With The Conception Of Computer-Generated Records As Hearsay, Adam Wolfson Oct 2005

"Electronic Fingerprints": Doing Away With The Conception Of Computer-Generated Records As Hearsay, Adam Wolfson

Michigan Law Review

One night, in the hours just before daybreak, the computer servers at Acme Corporation's headquarters quietly hum in the silence of the office's darkened hallways. Suddenly, they waken to life and begin haphazardly sifting through their files. Several states away, a hacker sits in his room, searching through the mainframe via an internet connection. His attack is quick-lasting only a short five minutes-but the evidence of invasion is apparent to Acme's IT employees when they come in to work the next morning. Nearly a year later, federal prosecutors bring suit in the federal district court against the person they believe …


Default Rules In Sales And The Myth Of Contracting Out, James J. White Jan 2002

Default Rules In Sales And The Myth Of Contracting Out, James J. White

Articles

In this article, I trace the dispute in the courts and before the ALI and NCCUSL over the proper contract formation and interpretation default rules. In Part II, I consider the Gateway litigation. In Part III, I deal with UCITA and the revision to Article 2. In Part IV, I consider the merits of the competing default rules.


The Limitations On The Protection Of Program Works Under Japanese Copyright Law, Dennis S. Karjala Jan 1987

The Limitations On The Protection Of Program Works Under Japanese Copyright Law, Dennis S. Karjala

Michigan Journal of International Law

This article examines these problems in the light of the program language, rule, and algorithm limitations on program protection under the Japanese Copyright Act. Section II sets forth the relevant statutory language, and Sections III and IV apply the program language and rule limitations to operating systems software and microcode. Section V considers the scope of protection under Japanese law in applications programs under the algorithm limitation on program protection. Finally, Section VI takes up the problem of whether copying for purposes of reverse engineering can be justified under the Act.


Computer Technology And Copyright- A Review Of Legislative And Judicial Developments In Japan, Teruo Doi Jan 1987

Computer Technology And Copyright- A Review Of Legislative And Judicial Developments In Japan, Teruo Doi

Michigan Journal of International Law

This article discusses and evaluates the legislative and judicial developments after the enactment of the Copyright Law which apply to computer programs and other computer-related technology. It examines: (1) the 1985 amendment to the Copyright Law enacted to protect computer programs, including the history of discussions by government agencies and judicial determinations that led to the amendment; (2) the 1986 Program Registration Law which supplements the existing provisions of the Copyright Law concerning registration; (3) the protection of databases under a new amendment to the Copyright Law; (4) the regulation of software rental business by the establishment of a public …


Recognition Of Proprietary Interests In Software In Korea: Programming For Comprehensive Reform, Byoung Kook Min, Gary Sullivan Jan 1987

Recognition Of Proprietary Interests In Software In Korea: Programming For Comprehensive Reform, Byoung Kook Min, Gary Sullivan

Michigan Journal of International Law

This article will review the legal environment and major issues concerning software protection in the Republic of Korea, and will describe the existing applicable laws and regulations and the trend towards software protection in the region. In addition, the implications of Korea's pending accession to the Universal Copyright Convention will be analyzed. Finally, this article will conclude with a discussion of the current reforms and their implications for Korean international trade law.


Personal Privacy In The Computer Age: The Challenge Of A New Technology In An Information-Oriented Society, Arthur R. Miller Apr 1969

Personal Privacy In The Computer Age: The Challenge Of A New Technology In An Information-Oriented Society, Arthur R. Miller

Michigan Law Review

The purpose of this Article is to survey the new technology's implications for personal privacy and to evaluate the contemporary common-law and statutory pattern relating to data-handling. In the course of this examination, it will appraise the existing framework's capacity to deal with the problems created by society's growing awareness of the primordial character of information. The Article is intended to be suggestive; any attempt at definitiveness would be premature. Avowedly, it was written with the bias of one who believes that the new information technology has enormous long-range societal implications and who is concerned about the consequences of the …