Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 94

Full-Text Articles in Law

New Tech, Old Problem: The Rise Of Virtual Rent-To-Own Agreements, Carrie Floyd Jan 2024

New Tech, Old Problem: The Rise Of Virtual Rent-To-Own Agreements, Carrie Floyd

Fellow, Adjunct, Lecturer, and Research Scholar Works

This Article explores how fintech has disrupted the traditional rent-to-own (RTO) industry, giving rise to new, virtual RTO agreements (VirTOs). These VirTOs have enabled the RTO industry to expand into the service industry and to markets for products not traditionally associated with rentals, such as vehicle repairs, pet ownership, and medical devices. This Article analyzes this development.

RTO agreements purport to rent products to a consumer until the conclusion of a set number of renewable rental payments, at which point ownership transfers. The fundamental characteristic of these agreements – and why they are not regulated as loans – are that …


The Promise And Limits Of Lawfulness: Inequality, Law, And The Techlash, Salomé Viljoen Sep 2021

The Promise And Limits Of Lawfulness: Inequality, Law, And The Techlash, Salomé Viljoen

Articles

In response to widespread skepticism about the recent rise of “tech ethics”, many critics have called for legal reform instead. In contrast with the “ethics response”, critics consider the “lawfulness response” more capable of disciplining the excesses of the technology industry. In fact, both are simultaneously vulnerable to industry capture and capable of advancing a more democratic egalitarian agenda for the information economy. Both ethics and law offer a terrain of contestation, rather than a predetermined set of commitments by which to achieve more democratic and egalitarian technological production. In advancing this argument, the essay focuses on two misunderstandings common …


Regtech And Predictive Lawmaking: Closing The Reglag Between Prospective Regulated Activity And Regulation, John W. Bagby, Nizan G. Packin Apr 2021

Regtech And Predictive Lawmaking: Closing The Reglag Between Prospective Regulated Activity And Regulation, John W. Bagby, Nizan G. Packin

Michigan Business & Entrepreneurial Law Review

Regulation chronically suffers significant delay starting at the detectable initiation of a “regulable activity” and culminating at effective regulatory response. Regulator reaction is impeded by various obstacles: (i) confusion in optimal level, form and choice of regulatory agency, (ii) political resistance to creating new regulatory agencies, (iii) lack of statutory authorization to address particular novel problems, (iv) jurisdictional competition among regulators, (v) Congressional disinclination to regulate given political conditions, and (vi) a lack of expertise, both substantive and procedural, to deploy successful counter-measures. Delay is rooted in several stubborn institutions, including libertarian ideals permeating both the U.S. legal system and …


Designing Legal Experiences, Maximilian A. Bulinski, J.J. Prescott Feb 2021

Designing Legal Experiences, Maximilian A. Bulinski, J.J. Prescott

Book Chapters

Technological advancements are improving how courts operate by changing the way they handle proceedings and interact with litigants. Court Innovations is a socially minded software startup that enables citizens, law enforcement, and courts to resolve legal matters through Matterhorn, an online communication and dispute resolution platform. Matterhorn was conceived at the University of Michigan Law School and successfully piloted in two Michigan district courts beginning in 2014. The platform now operates in over 40 courts and in at least eight states, and it has facilitated the resolution of more than 40,000 cases to date. These numbers will continue to grow …


When Critical Race Theory Enters The Law & Technology Frame, Jessica M. Eaglin Jan 2021

When Critical Race Theory Enters The Law & Technology Frame, Jessica M. Eaglin

Michigan Journal of Race and Law

Michigan Technology Law Review is proud to partner with our peers to publish this essay by Professor Jessica Eaglin on the intertwining social construction of race, law and technology. This piece highlights how the approach to use technology as precise tools for criminal administration or objective solutions to societal issues often fails to consider how laws and technologies are created in our racialized society. If we do not consider how race and technology are co-productive, we will fail to reach substantive justice and instead reinforce existing racial hierarchies legitimated by laws.


Clearing Opacity Through Machine Learning, W. Nicholson Price Ii, Arti K. Rai Jan 2021

Clearing Opacity Through Machine Learning, W. Nicholson Price Ii, Arti K. Rai

Articles

Artificial intelligence and machine learning represent powerful tools in many fields, ranging from criminal justice to human biology to climate change. Part of the power of these tools arises from their ability to make predictions and glean useful information about complex real-world systems without the need to understand the workings of those systems.


How Reporters Can Evaluate Automated Driving Announcements, Bryant Walker Smith Jan 2020

How Reporters Can Evaluate Automated Driving Announcements, Bryant Walker Smith

Journal of Law and Mobility

This article identifies a series of specific questions that reporters can ask about claims made by developers of automated motor vehicles (“AVs”). Its immediate intent is to facilitate more critical, credible, and ultimately constructive reporting on progress toward automated driving. In turn, reporting of this kind advances three additional goals. First, it encourages AV developers to qualify and support their public claims. Second, it appropriately manages public expectations about these vehicles. Third, it fosters more technical accuracy and technological circumspection in legal and policy scholarship.


Reinvigorating The Human Right To Technology, Haochen Sun Jan 2020

Reinvigorating The Human Right To Technology, Haochen Sun

Michigan Journal of International Law

The right to technology is a forgotten human right. Dating back to 1948, the right was established by the Universal Declaration of Human Rights (“UDHR”) in response to the massive destruction wrought by technologically advanced weapons in the Second World War. This human right embodies one of the most profound lessons the framers of the UDHR learned from this war: Technology must benefit humanity rather than harm it.

It has been more than seventy years since the adoption of the UDHR, and technology has advanced at a rapid pace and become more important than ever in our daily lives. Yet …


Are Litigation Outcome Disparities Inevitable? Courts, Technology, And The Future Of Impartiality., Avital Mentovich, J.J. Prescott, Orna Rabinovich-Einy Jan 2020

Are Litigation Outcome Disparities Inevitable? Courts, Technology, And The Future Of Impartiality., Avital Mentovich, J.J. Prescott, Orna Rabinovich-Einy

Articles

This article explores the ability of technology—specifically, online judicial procedures—to eliminate systematic group-level litigation outcome disparities (i.e., disparities correlated with the visible identity markers of litigants). Our judicial system has long operated under the assumption that it can only be “impartial enough.” After all, judges, like all human beings, harbor implicit biases that are often sizable, unconscious, and triggered automatically, and research indicates that strategies to curb implicit biases in human decision making may be ineffective, especially in the face of the resource and caseload constraints of modern-day adjudication. The recent emergence of online court proceedings, however, offers new hope …


Medical Ai And Contextual Bias, W. Nicholson Price Ii Sep 2019

Medical Ai And Contextual Bias, W. Nicholson Price Ii

Articles

Artificial intelligence will transform medicine. One particularly attractive possibility is the democratization of medical expertise. If black-box medical algorithms can be trained to match the performance of high-level human experts — to identify malignancies as well as trained radiologists, to diagnose diabetic retinopathy as well as board-certified ophthalmologists, or to recommend tumor-specific courses of treatment as well as top-ranked oncologists — then those algorithms could be deployed in medical settings where human experts are not available, and patients could benefit. But there is a problem with this vision. Privacy law, malpractice, insurance reimbursement, and FDA approval standards all encourage developers …


Digital Colonialism: The 21st Century Scramble For Africa Through The Extraction And Control Of User Data And The Limitations Of Data Protection Laws, Danielle Coleman May 2019

Digital Colonialism: The 21st Century Scramble For Africa Through The Extraction And Control Of User Data And The Limitations Of Data Protection Laws, Danielle Coleman

Michigan Journal of Race and Law

As Western technology companies increasingly rely on user data globally, extensive data protection laws and regulations emerged to ensure ethical use of that data. These same protections, however, do not exist uniformly in the resource-rich, infrastructure-poor African countries, where Western tech seeks to establish its presence. These conditions provide an ideal landscape for digital colonialism.

Digital colonialism refers to a modern-day “Scramble for Africa” where largescale tech companies extract, analyze, and own user data for profit and market influence with nominal benefit to the data source. Under the guise of altruism, large scale tech companies can use their power and …


Ask A Director: Tackling Technology Competencies, Kincaid C. Brown Jan 2019

Ask A Director: Tackling Technology Competencies, Kincaid C. Brown

Law Librarian Scholarship

Question: What technology competencies do librarians and legal information professionals need to assist their organizations as they grapple with issues such as data analytics, artificial intelligence, etc.?


Carpenter's Legacy: Limiting The Scope Of The Electronic Private Search Doctrine, Sarah A. Mezera Jan 2019

Carpenter's Legacy: Limiting The Scope Of The Electronic Private Search Doctrine, Sarah A. Mezera

Michigan Law Review

One of the most significant challenges confronting courts and legal scholars in the twenty-first century is the application of Fourth Amendment doctrine to new technology. The circuit split over the application of the private search doctrine to electronic devices exemplifies how courts struggle to apply old doctrines to new circumstances. Some courts take the position that the old doctrine should apply consistently in the new context. Other courts have changed the scope of the old doctrine in order to account for the change in circumstances. The Supreme Court took the latter position in Carpenter v. United States and held that …


Fourth Amendment Constraints On The Technological Monitoring Of Convicted Sex Offenders, Ben A. Mcjunkin, J. J. Prescott Jul 2018

Fourth Amendment Constraints On The Technological Monitoring Of Convicted Sex Offenders, Ben A. Mcjunkin, J. J. Prescott

Articles

More than forty U.S. states currently track at least some of their convicted sex offenders using GPS devices. Many offenders will be monitored for life. The burdens and expense of living indefinitely under constant technological monitoring have been well documented, but most commentators have assumed that these burdens were of no constitutional moment because states have characterized such surveillance as ‘‘civil’’ in character—and courts have seemed to agree. In 2015, however, the Supreme Court decided in Grady v. North Carolina that attaching a GPS monitoring device to a person was a Fourth Amendment search, notwithstanding the ostensibly civil character of …


The Future Of Law And Mobility, Daniel A. Crane Jun 2018

The Future Of Law And Mobility, Daniel A. Crane

Articles

With the launch of the new Journal of Law and Mobility, the University of Michigan is recognizing the transformative impact of new transportation and mobility technologies, from cars, to trucks, to pedestrians, to drones. The coming transition towards intelligent, automated, and connected mobility systems will transform not only the way people and goods move about, but also the way human safety, privacy, and security are protected, cities are organized, machines and people are connected, and the public and private spheres are defined.


The Commodification Of Cryptocurrency, Neil Tiwari Jan 2018

The Commodification Of Cryptocurrency, Neil Tiwari

Michigan Law Review

Cryptocurrencies are digital tokens built on blockchain technology. This allows for a product that is fully decentralized, with no need for a third-party intermediary like a government or financial institution. Cryptocurrency creators use initial coin offerings (ICOs) to raise capital to build their tokens. Cryptocurrency ICOs are problematic because they do not fit neatly within either of two traditional categories—securities or commodities. Each of these categories has their own regulatory agency: the SEC for securities and the CFTC for commodities. At first blush, ICOs seem to be a sale of securities subject to regulation by the SEC, but this is …


Technology-Based? Cost Factoring In U.S. Environmental Standards, Jamison E. Colburn Nov 2017

Technology-Based? Cost Factoring In U.S. Environmental Standards, Jamison E. Colburn

Michigan Journal of Environmental & Administrative Law

Environmental controls in the United States are often said to be “technology-based” because the polluter’s duties are determined by the available technology for controlling that pollution rather than by the social costs and benefits of doing so. Indeed, this is much of what distinguishes U.S. environmental law post-1970 from that which preceded it. But technology-based standards have in fact weighed the costs of controlling pollution in unique, often obscure ways, yielding an analysis that defies standardization and basic notions of transparency. Often lumped under an umbrella heading called “feasibility” analysis and justified on the grounds that it avoids many of …


Improving Access To Justice In State Courts With Platform Technology, J. J. Prescott Nov 2017

Improving Access To Justice In State Courts With Platform Technology, J. J. Prescott

Articles

Access to justice often equates to access to state courts, and for millions of Americans, using state courts to resolve their disputes—often with the government—is a real challenge. Reforms are regularly proposed in the hopes of improving the situation (e.g., better legal aid), but until recently a significant part of the problem has been structural. Using state courts today for all but the simplest of legal transactions entails at the very least traveling to a courthouse and meeting with a decision maker in person and in a one-on-one setting. Even minimally effective access, therefore, requires time, transportation, and very often …


Factors In Fairness And Emotion In Online Case Resolution Systems, Youyang Hou, Cliff Lampe, Maximilian Bulinski, J. J. Prescott May 2017

Factors In Fairness And Emotion In Online Case Resolution Systems, Youyang Hou, Cliff Lampe, Maximilian Bulinski, J. J. Prescott

Articles

Courts are increasingly adopting online information and communication technology, creating a need to consider the potential consequences of these tools for the justice system. Using survey responses from 209 litigants who had recently used an online case resolution system, we investigate factors that influenced litigants’ experiences of fairness and emotional feelings toward court officials. Our results show that ease of using the online case resolution system, the outcome of the case, and a litigant’s perceptions of procedural justice are positively associated both with whether the litigant views the process as fair and whether the litigant ultimately feels positive emotions toward …


Fetishizing Copies, Jessica Litman Jan 2017

Fetishizing Copies, Jessica Litman

Book Chapters

Our copyright laws encourage authors to create new works and communicate them to the public, because we hope that people will read the books, listen to the music, see the art, watch the films, run the software, and build and inhabit the buildings. That is the way that copyright promotes the Progress of Science. Recently, that not-very-controversial principle has collided with copyright owners’ conviction that they should be able to control, or at least collect royalties from, all uses of their works. A particularly ill-considered manifestation of this conviction is what I have decided to call copy-fetish. This is the …


Tightening The Ooda Loop: Police Militarization, Race, And Algorithmic Surveillance, Jeffrey L. Vagle Oct 2016

Tightening The Ooda Loop: Police Militarization, Race, And Algorithmic Surveillance, Jeffrey L. Vagle

Michigan Journal of Race and Law

This Article examines how military automated surveillance and intelligence systems and techniques, when used by civilian police departments to enhance predictive policing programs, have reinforced racial bias in policing. I will focus on two facets of this problem. First, I investigate the role played by advanced military technologies and methods within civilian police departments. These approaches have enabled a new focus on deterrence and crime prevention by creating a system of structural surveillance where decision support relies increasingly upon algorithms and automated data analysis tools and automates de facto penalization and containment based on race. Second, I will explore these …


Privacy Almighty? The Cjeu's Judgment In Google Spain Sl V. Aepd, David J. Stute Dec 2015

Privacy Almighty? The Cjeu's Judgment In Google Spain Sl V. Aepd, David J. Stute

Michigan Journal of International Law

The Internet has matured into an unprecedented repository of data, retrievable through myriad unique “links,” or Uniform Resource Locators. Yet, this wealth of information only became broadly accessible through the invention and continual development of algorithm-based search engines. Keyword searches empowered search-engine users to find—and sometimes stumble upon—information with great ease. Indeed, search-engine indices arguably have become the most comprehensive catalogues of information the world has ever seen. This wealth of accessible information poses challenges to traditional notions of privacy: aspects of our private and public lives, which previously would have rarely left the vicinities of our immediate social or …


Loopholes For Circumventing The Constitution: Unrestrained Bulk Surveillance On Americans By Collecting Network Traffic Abroad, Axel Arnbak, Sharon Goldberg Jun 2015

Loopholes For Circumventing The Constitution: Unrestrained Bulk Surveillance On Americans By Collecting Network Traffic Abroad, Axel Arnbak, Sharon Goldberg

Michigan Telecommunications & Technology Law Review

This Article reveals interdependent legal and technical loopholes that the US intelligence community could use to circumvent constitutional and statutory safeguards for Americans. These loopholes involve the collection of Internet traffic on foreign territory, and leave Americans as unprotected as foreigners by current United States (US) surveillance laws. This Article will also describe how modern Internet protocols can be manipulated to deliberately divert American’s traffic abroad, where traffic can then be collected under a more permissive legal regime (Executive Order 12333) that is overseen solely by the executive branch of the US government. Although the media has reported on some …


Voluntary Disclosure Of Information As A Proposed Standard For The Fourth Amendment's Third-Party Doctrine, Margaret E. Twomey Jun 2015

Voluntary Disclosure Of Information As A Proposed Standard For The Fourth Amendment's Third-Party Doctrine, Margaret E. Twomey

Michigan Telecommunications & Technology Law Review

The third-party doctrine is a long-standing tenant of Fourth Amendment law that allows law enforcement officers to utilize information that was released to a third party without the probable cause required for a traditional search warrant. This has allowed law enforcement agents to use confidential informants, undercover agents, and access bank records of suspected criminals. However, in a digital age where exponentially more information is shared with Internet Service Providers, e-mail hosts, and social media “friends,” the traditional thirdparty doctrine ideas allow law enforcement officers access to a cache of personal information and data with a standard below probable cause. …


Campbell At 21/Sony At 31, Jessica D. Litman Jan 2015

Campbell At 21/Sony At 31, Jessica D. Litman

Articles

When copyright lawyers gather to discuss fair use, the most common refrain is its alarming expansion. Their distress about fair use’s enlarged footprint seems completely untethered from any appreciation of the remarkable increase in exclusive copyright rights. In the nearly forty years since Congress enacted the 1976 copyright act, the rights of copyright owners have expanded markedly. Copyright owners’ demands for further expansion continue unabated. Meanwhile, they raise strident objections to proposals to add new privileges and exceptions to the statute to shelter non-infringing uses that might be implicated by their expanded rights. Copyright owners have used the resulting uncertainty …


Sexting Prosecutions: Minors As A Protected Class From Child Pornography Charges, Sarah Thompson Oct 2014

Sexting Prosecutions: Minors As A Protected Class From Child Pornography Charges, Sarah Thompson

University of Michigan Journal of Law Reform Caveat

"Firt love is only a little foolishness and a lot of curiosity." -- George Bernard Shaw Teenagers will explore their sexuality; this is no new phenomenon. However, the ways that teens are exploring their curiosity is changing with technology. This trend has serious repercussions for teens, society, and the law. ‘Sexting’—defined as the act of sending sexually explicit photographs or messages via cell phone—is one recently-developed means of sexual exploration. The practice overlaps with the production, distribution, and possession of child pornography that is banned by both state and federal law. Due to the overlap, minors have been prosecuted under …


Holding Up And Holding Out, Colleen V. Chien Jan 2014

Holding Up And Holding Out, Colleen V. Chien

Michigan Telecommunications & Technology Law Review

Patent “hold-up” and patent “hold-out” present important, alternative theories for what ails the patent system. Patent “hold-up” occurs when a patent owner sues a company when it is most vulnerable—after it has implemented a technology—and is able wrest a settlement because it is too late for the company to change course. Patent “hold-out” is the practice of companies routinely ignoring patents and resisting patent owner demands because the odds of getting caught are small. Hold-up has arguably predicted the current patent crises, and the ex ante assertion of technology patents whether in the smartphone war, standards, or patent “troll” context. …


District Courts Versus The Usitc: Considering Exclusionary Relief For F/Rand-Encumbered Standard-Essential Patents, Helen H. Ji Jan 2014

District Courts Versus The Usitc: Considering Exclusionary Relief For F/Rand-Encumbered Standard-Essential Patents, Helen H. Ji

Michigan Telecommunications & Technology Law Review

Technological standards allow manufacturers and consumers to rely upon these agreed-upon basic systems to facilitate sales and further invention. However, where these standards involved patented technology, the process of standard-setting raises many concerns at the intersection of antitrust and patent law. As patent holders advocate for their patents to become part of technological standards, how should courts police this activity to prevent patent holdup and other anti-competitive practices? This Note explores the differing approaches to remedies employed by the United States International Trade Commission and the United States District Courts where standard-essential patents are infringed. This Note further proposes that …


Technology, Ethics, And Access To Justice: Should An Alogrithm Be Deciding Your Case?, Anjanette H. Raymond, Scott J. Shackelford Jan 2014

Technology, Ethics, And Access To Justice: Should An Alogrithm Be Deciding Your Case?, Anjanette H. Raymond, Scott J. Shackelford

Michigan Journal of International Law

At a time of U.S. budget cuts, popularly known as the “sequester,” court systems across the nation are facing financial shortfalls. Small claims courts are no exception. Among the worst hit states is California, which is suffering staffing cutbacks that result in long delays prompting consideration of the old maxim, “justice delayed is justice denied.” Similar problems, albeit on a larger scale, are evident in other nations including India where the Law Commission has argued that the millions of pending cases combined with the lagging uptake of technological best practices has impeded judicial productivity, leading to “disappointment and dissatisfaction among …


Wireless Localism: Beyond The Shroud Of Objectivity In Federal Spectrum Administration, Olivier Sylvain Dec 2013

Wireless Localism: Beyond The Shroud Of Objectivity In Federal Spectrum Administration, Olivier Sylvain

Michigan Telecommunications & Technology Law Review

Recent innovations in mobile wireless technology have instigated a debate between two camps of legal scholars about federal administration of the electromagnetic spectrum. The first camp argues that the Federal Communications Commission (“FCC”) should define spectrum use rights more clearly and give spectrum licensees broad property rights in frequencies. The second camp argues that, rather than award exclusive licenses to the highest bidder, the FCC ought to open much, if not most, of the spectrum to unlicensed use by smartphones and tablets equipped with the newest spectrum administration technology. First, this Article shows that both of these camps comprise a …