Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

University of Michigan Law School

Journal

Technology

Discipline
Publication Year
Publication

Articles 1 - 30 of 118

Full-Text Articles in Law

Regtech And Predictive Lawmaking: Closing The Reglag Between Prospective Regulated Activity And Regulation, John W. Bagby, Nizan G. Packin Apr 2021

Regtech And Predictive Lawmaking: Closing The Reglag Between Prospective Regulated Activity And Regulation, John W. Bagby, Nizan G. Packin

Michigan Business & Entrepreneurial Law Review

Regulation chronically suffers significant delay starting at the detectable initiation of a “regulable activity” and culminating at effective regulatory response. Regulator reaction is impeded by various obstacles: (i) confusion in optimal level, form and choice of regulatory agency, (ii) political resistance to creating new regulatory agencies, (iii) lack of statutory authorization to address particular novel problems, (iv) jurisdictional competition among regulators, (v) Congressional disinclination to regulate given political conditions, and (vi) a lack of expertise, both substantive and procedural, to deploy successful counter-measures. Delay is rooted in several stubborn institutions, including libertarian ideals permeating both the U.S. legal system and …


When Critical Race Theory Enters The Law & Technology Frame, Jessica M. Eaglin Jan 2021

When Critical Race Theory Enters The Law & Technology Frame, Jessica M. Eaglin

Michigan Journal of Race and Law

Michigan Technology Law Review is proud to partner with our peers to publish this essay by Professor Jessica Eaglin on the intertwining social construction of race, law and technology. This piece highlights how the approach to use technology as precise tools for criminal administration or objective solutions to societal issues often fails to consider how laws and technologies are created in our racialized society. If we do not consider how race and technology are co-productive, we will fail to reach substantive justice and instead reinforce existing racial hierarchies legitimated by laws.


How Reporters Can Evaluate Automated Driving Announcements, Bryant Walker Smith Jan 2020

How Reporters Can Evaluate Automated Driving Announcements, Bryant Walker Smith

Journal of Law and Mobility

This article identifies a series of specific questions that reporters can ask about claims made by developers of automated motor vehicles (“AVs”). Its immediate intent is to facilitate more critical, credible, and ultimately constructive reporting on progress toward automated driving. In turn, reporting of this kind advances three additional goals. First, it encourages AV developers to qualify and support their public claims. Second, it appropriately manages public expectations about these vehicles. Third, it fosters more technical accuracy and technological circumspection in legal and policy scholarship.


Reinvigorating The Human Right To Technology, Haochen Sun Jan 2020

Reinvigorating The Human Right To Technology, Haochen Sun

Michigan Journal of International Law

The right to technology is a forgotten human right. Dating back to 1948, the right was established by the Universal Declaration of Human Rights (“UDHR”) in response to the massive destruction wrought by technologically advanced weapons in the Second World War. This human right embodies one of the most profound lessons the framers of the UDHR learned from this war: Technology must benefit humanity rather than harm it.

It has been more than seventy years since the adoption of the UDHR, and technology has advanced at a rapid pace and become more important than ever in our daily lives. Yet …


Digital Colonialism: The 21st Century Scramble For Africa Through The Extraction And Control Of User Data And The Limitations Of Data Protection Laws, Danielle Coleman May 2019

Digital Colonialism: The 21st Century Scramble For Africa Through The Extraction And Control Of User Data And The Limitations Of Data Protection Laws, Danielle Coleman

Michigan Journal of Race and Law

As Western technology companies increasingly rely on user data globally, extensive data protection laws and regulations emerged to ensure ethical use of that data. These same protections, however, do not exist uniformly in the resource-rich, infrastructure-poor African countries, where Western tech seeks to establish its presence. These conditions provide an ideal landscape for digital colonialism.

Digital colonialism refers to a modern-day “Scramble for Africa” where largescale tech companies extract, analyze, and own user data for profit and market influence with nominal benefit to the data source. Under the guise of altruism, large scale tech companies can use their power and …


Carpenter's Legacy: Limiting The Scope Of The Electronic Private Search Doctrine, Sarah A. Mezera Jan 2019

Carpenter's Legacy: Limiting The Scope Of The Electronic Private Search Doctrine, Sarah A. Mezera

Michigan Law Review

One of the most significant challenges confronting courts and legal scholars in the twenty-first century is the application of Fourth Amendment doctrine to new technology. The circuit split over the application of the private search doctrine to electronic devices exemplifies how courts struggle to apply old doctrines to new circumstances. Some courts take the position that the old doctrine should apply consistently in the new context. Other courts have changed the scope of the old doctrine in order to account for the change in circumstances. The Supreme Court took the latter position in Carpenter v. United States and held that …


Minimum Virtual Contacts: A Framework For Specific Jurisdiction In Cyberspace, Adam R. Kleven Mar 2018

Minimum Virtual Contacts: A Framework For Specific Jurisdiction In Cyberspace, Adam R. Kleven

Michigan Law Review

As the ubiquity and importance of the internet continue to grow, courts will address more cases involving online activity. In doing so, courts will confront the threshold issue of whether a defendant can be subject to specific personal jurisdiction. The Supreme Court, however, has yet to speak to this internet-jurisdiction issue. Current precedent, when strictly applied to the internet, yields fundamentally unfair results when addressing specific jurisdiction. To better achieve the fairness aim of due process, this must change. This Note argues that, in internet tort cases, the “express aiming” requirement should be discarded from the jurisdictional analysis and that …


The Future Of Law And Mobility, Daniel A. Crane Jan 2018

The Future Of Law And Mobility, Daniel A. Crane

Journal of Law and Mobility

With the launch of the new Journal of Law and Mobility, the University of Michigan is recognizing the transformative impact of new transportation and mobility technologies, from cars, to trucks, to pedestrians, to drones. The coming transition towards intelligent, automated, and connected mobility systems will transform not only the way people and goods move about, but also the way human safety, privacy, and security are protected, cities are organized, machines and people are connected, and the public and private spheres are defined.

Law will be at the center of these transformations, as it always is. There has already been …


The Commodification Of Cryptocurrency, Neil Tiwari Jan 2018

The Commodification Of Cryptocurrency, Neil Tiwari

Michigan Law Review

Cryptocurrencies are digital tokens built on blockchain technology. This allows for a product that is fully decentralized, with no need for a third-party intermediary like a government or financial institution. Cryptocurrency creators use initial coin offerings (ICOs) to raise capital to build their tokens. Cryptocurrency ICOs are problematic because they do not fit neatly within either of two traditional categories—securities or commodities. Each of these categories has their own regulatory agency: the SEC for securities and the CFTC for commodities. At first blush, ICOs seem to be a sale of securities subject to regulation by the SEC, but this is …


Technology-Based? Cost Factoring In U.S. Environmental Standards, Jamison E. Colburn Nov 2017

Technology-Based? Cost Factoring In U.S. Environmental Standards, Jamison E. Colburn

Michigan Journal of Environmental & Administrative Law

Environmental controls in the United States are often said to be “technology-based” because the polluter’s duties are determined by the available technology for controlling that pollution rather than by the social costs and benefits of doing so. Indeed, this is much of what distinguishes U.S. environmental law post-1970 from that which preceded it. But technology-based standards have in fact weighed the costs of controlling pollution in unique, often obscure ways, yielding an analysis that defies standardization and basic notions of transparency. Often lumped under an umbrella heading called “feasibility” analysis and justified on the grounds that it avoids many of …


The Business Of Law: Evolution Of The Legal Services Market, Tyler J. Replogle Apr 2017

The Business Of Law: Evolution Of The Legal Services Market, Tyler J. Replogle

Michigan Business & Entrepreneurial Law Review

The legal services market is changing. This change has been driven by various factors through the years: expansion of in-house legal departments, globalization (through mergers and outsourcing), technological advances, and the rise of alternative legal service providers. This paper explores these factors in isolation—i.e., discussing each factor separately and distinctly from other factors. Then, this paper seeks to understand these factors together, as products of a legal services market that is evolving from the growth stage into the mature stage.

Part I summarizes the early history of law firms, including the rise of the Cravath System through the Golden Era …


Tightening The Ooda Loop: Police Militarization, Race, And Algorithmic Surveillance, Jeffrey L. Vagle Oct 2016

Tightening The Ooda Loop: Police Militarization, Race, And Algorithmic Surveillance, Jeffrey L. Vagle

Michigan Journal of Race and Law

This Article examines how military automated surveillance and intelligence systems and techniques, when used by civilian police departments to enhance predictive policing programs, have reinforced racial bias in policing. I will focus on two facets of this problem. First, I investigate the role played by advanced military technologies and methods within civilian police departments. These approaches have enabled a new focus on deterrence and crime prevention by creating a system of structural surveillance where decision support relies increasingly upon algorithms and automated data analysis tools and automates de facto penalization and containment based on race. Second, I will explore these …


Privacy Almighty? The Cjeu's Judgment In Google Spain Sl V. Aepd, David J. Stute Dec 2015

Privacy Almighty? The Cjeu's Judgment In Google Spain Sl V. Aepd, David J. Stute

Michigan Journal of International Law

The Internet has matured into an unprecedented repository of data, retrievable through myriad unique “links,” or Uniform Resource Locators. Yet, this wealth of information only became broadly accessible through the invention and continual development of algorithm-based search engines. Keyword searches empowered search-engine users to find—and sometimes stumble upon—information with great ease. Indeed, search-engine indices arguably have become the most comprehensive catalogues of information the world has ever seen. This wealth of accessible information poses challenges to traditional notions of privacy: aspects of our private and public lives, which previously would have rarely left the vicinities of our immediate social or …


Loopholes For Circumventing The Constitution: Unrestrained Bulk Surveillance On Americans By Collecting Network Traffic Abroad, Axel Arnbak, Sharon Goldberg Jun 2015

Loopholes For Circumventing The Constitution: Unrestrained Bulk Surveillance On Americans By Collecting Network Traffic Abroad, Axel Arnbak, Sharon Goldberg

Michigan Telecommunications & Technology Law Review

This Article reveals interdependent legal and technical loopholes that the US intelligence community could use to circumvent constitutional and statutory safeguards for Americans. These loopholes involve the collection of Internet traffic on foreign territory, and leave Americans as unprotected as foreigners by current United States (US) surveillance laws. This Article will also describe how modern Internet protocols can be manipulated to deliberately divert American’s traffic abroad, where traffic can then be collected under a more permissive legal regime (Executive Order 12333) that is overseen solely by the executive branch of the US government. Although the media has reported on some …


Voluntary Disclosure Of Information As A Proposed Standard For The Fourth Amendment's Third-Party Doctrine, Margaret E. Twomey Jun 2015

Voluntary Disclosure Of Information As A Proposed Standard For The Fourth Amendment's Third-Party Doctrine, Margaret E. Twomey

Michigan Telecommunications & Technology Law Review

The third-party doctrine is a long-standing tenant of Fourth Amendment law that allows law enforcement officers to utilize information that was released to a third party without the probable cause required for a traditional search warrant. This has allowed law enforcement agents to use confidential informants, undercover agents, and access bank records of suspected criminals. However, in a digital age where exponentially more information is shared with Internet Service Providers, e-mail hosts, and social media “friends,” the traditional thirdparty doctrine ideas allow law enforcement officers access to a cache of personal information and data with a standard below probable cause. …


Sexting Prosecutions: Minors As A Protected Class From Child Pornography Charges, Sarah Thompson Oct 2014

Sexting Prosecutions: Minors As A Protected Class From Child Pornography Charges, Sarah Thompson

University of Michigan Journal of Law Reform Caveat

"Firt love is only a little foolishness and a lot of curiosity." -- George Bernard Shaw Teenagers will explore their sexuality; this is no new phenomenon. However, the ways that teens are exploring their curiosity is changing with technology. This trend has serious repercussions for teens, society, and the law. ‘Sexting’—defined as the act of sending sexually explicit photographs or messages via cell phone—is one recently-developed means of sexual exploration. The practice overlaps with the production, distribution, and possession of child pornography that is banned by both state and federal law. Due to the overlap, minors have been prosecuted under …


Letting Go Of Old Ideas, William D. Henderson Apr 2014

Letting Go Of Old Ideas, William D. Henderson

Michigan Law Review

Two recently published books make the claim that the legal profession has changed (Steven Harper’s The Lawyer Bubble: A Profession in Crisis) or is changing (Richard Susskind’s Tomorrow’s Lawyers: An Introduction to Your Future). The books are interesting because they discuss the types of changes that are broad, sweeping, and dramatic. In suitable lawyer fashion, both books are unfailingly analytical. They both also argue that the old order is collapsing. The Lawyer Bubble is backward looking and laments the legacy we have squandered, while Tomorrow’s Lawyers is future oriented and offers fairly specific prescriptive advice, particularly to those lawyers entering …


Predictability And Nonobviousness In Patent Law After Ksr, Christopher A. Cotropia Jan 2014

Predictability And Nonobviousness In Patent Law After Ksr, Christopher A. Cotropia

Michigan Telecommunications & Technology Law Review

In KSR International Co. v. Teleflex, Inc., the Supreme Court addressed the doctrine of nonobviousness, the ultimate question of patentability, for the first time in thirty years. In mandating a flexible approach to deciding nonobviousness, the KSR opinion introduced two predictability standards for determining nonobviousness. The Court described predictability of use (hereinafter termed “Type I predictability”)— whether the inventor used the prior art in a predictable manner to create the invention—and predictability of the result (hereinafter termed “Type II predictability”)—whether the invention produced a predictable result—both as a means for proving obviousness. Although Type I predictability is easily explained as …


Holding Up And Holding Out, Colleen V. Chien Jan 2014

Holding Up And Holding Out, Colleen V. Chien

Michigan Telecommunications & Technology Law Review

Patent “hold-up” and patent “hold-out” present important, alternative theories for what ails the patent system. Patent “hold-up” occurs when a patent owner sues a company when it is most vulnerable—after it has implemented a technology—and is able wrest a settlement because it is too late for the company to change course. Patent “hold-out” is the practice of companies routinely ignoring patents and resisting patent owner demands because the odds of getting caught are small. Hold-up has arguably predicted the current patent crises, and the ex ante assertion of technology patents whether in the smartphone war, standards, or patent “troll” context. …


District Courts Versus The Usitc: Considering Exclusionary Relief For F/Rand-Encumbered Standard-Essential Patents, Helen H. Ji Jan 2014

District Courts Versus The Usitc: Considering Exclusionary Relief For F/Rand-Encumbered Standard-Essential Patents, Helen H. Ji

Michigan Telecommunications & Technology Law Review

Technological standards allow manufacturers and consumers to rely upon these agreed-upon basic systems to facilitate sales and further invention. However, where these standards involved patented technology, the process of standard-setting raises many concerns at the intersection of antitrust and patent law. As patent holders advocate for their patents to become part of technological standards, how should courts police this activity to prevent patent holdup and other anti-competitive practices? This Note explores the differing approaches to remedies employed by the United States International Trade Commission and the United States District Courts where standard-essential patents are infringed. This Note further proposes that …


Technology, Ethics, And Access To Justice: Should An Alogrithm Be Deciding Your Case?, Anjanette H. Raymond, Scott J. Shackelford Jan 2014

Technology, Ethics, And Access To Justice: Should An Alogrithm Be Deciding Your Case?, Anjanette H. Raymond, Scott J. Shackelford

Michigan Journal of International Law

At a time of U.S. budget cuts, popularly known as the “sequester,” court systems across the nation are facing financial shortfalls. Small claims courts are no exception. Among the worst hit states is California, which is suffering staffing cutbacks that result in long delays prompting consideration of the old maxim, “justice delayed is justice denied.” Similar problems, albeit on a larger scale, are evident in other nations including India where the Law Commission has argued that the millions of pending cases combined with the lagging uptake of technological best practices has impeded judicial productivity, leading to “disappointment and dissatisfaction among …


Wireless Localism: Beyond The Shroud Of Objectivity In Federal Spectrum Administration, Olivier Sylvain Dec 2013

Wireless Localism: Beyond The Shroud Of Objectivity In Federal Spectrum Administration, Olivier Sylvain

Michigan Telecommunications & Technology Law Review

Recent innovations in mobile wireless technology have instigated a debate between two camps of legal scholars about federal administration of the electromagnetic spectrum. The first camp argues that the Federal Communications Commission (“FCC”) should define spectrum use rights more clearly and give spectrum licensees broad property rights in frequencies. The second camp argues that, rather than award exclusive licenses to the highest bidder, the FCC ought to open much, if not most, of the spectrum to unlicensed use by smartphones and tablets equipped with the newest spectrum administration technology. First, this Article shows that both of these camps comprise a …


Power To The People: Why We Need Full Federal Preemption Of Electrical Transmission Regulation, Max Hensley Jun 2013

Power To The People: Why We Need Full Federal Preemption Of Electrical Transmission Regulation, Max Hensley

University of Michigan Journal of Law Reform

State and federal governments have made significant investments in the development and installation of renewable energy technology. However, further increases in renewable power use have been stymied by the continued mismatch between the national interest in connecting consumers with utility-scale wind and solar installations and state and local control over the siting of electrical transmission lines. Because renewable power potential is often located far from consumers, transmission lines must cross multiple jurisdictions whose local interests have tended to prevent or significantly delay development. This Note analyzes that disconnect, reviews academic and legislative proposals to overcome it, and proposes a way …


Interpreting Biological Similarity: Ongoing Challenges For Diverse Decision Makers, Sarah M. Cork Jan 2013

Interpreting Biological Similarity: Ongoing Challenges For Diverse Decision Makers, Sarah M. Cork

Michigan Telecommunications & Technology Law Review

Similarity is an elusive and complicated concept facing comparisons of biological molecules, as even minute changes to a molecule's structure can dramatically affect its function in the body. Yet the flood of biologic drugs on the market will increasingly force these similarity comparisons. These concerns are particularly relevant to two groups of drugs: families of biologic drugs that closely resemble each other in structure and function, here termed "similar-impact biologics," and the biosimilars, which are intended to closely approximate generic forms of biologic drugs. In bringing biologic drugs to the market, manufacturers are likely to face dual obstacles: FDA approval …


Geographically Restricted Streaming Content And Evasion Of Geolocation: The Applicability Of The Copyright Anticircumvention Rules, Jerusha Burnett Jan 2013

Geographically Restricted Streaming Content And Evasion Of Geolocation: The Applicability Of The Copyright Anticircumvention Rules, Jerusha Burnett

Michigan Telecommunications & Technology Law Review

A number of methods currently exist or are being developed to determine where Internet users are located geographically when they access a particular webpage. Yet regardless of the precautions taken by website operators to limit the locations from which they allow access, it is likely that users will find ways to gain access to restricted content. Should the evasion of geolocation constitute circumvention of access controls so that § 1201 of the Digital Millennium Copyright Act ("DMCA") applies? Because location data can properly be considered personally identifiable information ("PII"), this Note argues that § 1201 should not apply absent a …


Fracking Patents: The Emergence Of Patents As Information-Containment Tools In Shale Drilling, Daniel R. Cahoy, Joel Gehman, Zhen Lei Jan 2013

Fracking Patents: The Emergence Of Patents As Information-Containment Tools In Shale Drilling, Daniel R. Cahoy, Joel Gehman, Zhen Lei

Michigan Telecommunications & Technology Law Review

The advantages of new sources of energy must be weighed against environmental, health, and safety concerns related to new production technology. The rapid development of unconventional oil and gas fields, such as the Barnett and Marcellus Shales, provide an excellent context for these contrasting goals. Information about extraction hazards is an extremely important issue. In general, patents are viewed as a positive force in this regard, providing a vehicle for disseminating information in exchange for a limited property right over an invention. However, by limiting the evaluation of an invention by third parties, patents might also be used to control …


A Victimless Sex Crime: The Case For Decriminalizing Consensual Teen Sexting, Joanna R. Lampe Jan 2013

A Victimless Sex Crime: The Case For Decriminalizing Consensual Teen Sexting, Joanna R. Lampe

University of Michigan Journal of Law Reform

As teenagers' access to cellular phones and the internet has increased over the past two decades, so has their ability to harm themselves and others through misuse of new technology. One risky behavior that has become common among teenagers is "sexting"--the digital sharing of sexually suggestive images. To combat the dangers of teen sexting, many states have criminalized the act. Criminalization does not resolve the issue of teen sexting, however, and in many cases it may cause additional harm. This Note reviews existing state laws related to teen sexting, and critiques these laws on constitutional and policy grounds. It then …


Does The Constitution Protect Abortions Based On Fetal Anomaly?: Examining The Potential For Disability-Selective Abortion Bans In The Age Of Prenatal Whole Genome Sequencing, Greer Donley Jan 2013

Does The Constitution Protect Abortions Based On Fetal Anomaly?: Examining The Potential For Disability-Selective Abortion Bans In The Age Of Prenatal Whole Genome Sequencing, Greer Donley

Michigan Journal of Gender & Law

This Note examines whether the state or federal government has the power to enact a law that prevents women from obtaining abortions based on their fetus’s genetic abnormality. Such a ban has already been enacted in North Dakota and introduced in Indiana and Missouri. I argue below that this law presents a novel state intrusion on a woman’s right to obtain a pre-viability abortion. Moreover, these pieces of legislation contain an outdated understanding of prenatal genetic testing—-the landscape of which is quickly evolving as a result of a new technology: prenatal whole genome sequencing. This Note argues that the incorporation …


Rulemaking Vs. Democracy: Judging And Nudging Public Participation That Counts , Cynthia R. Farina, Mary Newhart, Josiah Heidt, Cornell Erulemaking Initiative Sep 2012

Rulemaking Vs. Democracy: Judging And Nudging Public Participation That Counts , Cynthia R. Farina, Mary Newhart, Josiah Heidt, Cornell Erulemaking Initiative

Michigan Journal of Environmental & Administrative Law

This Article considers how open government “magical thinking” around technology has infused efforts to increase public participation in rulemaking. We propose a framework for assessing the value of technology-enabled rulemaking participation and offer specific principles of participation-system design, which are based on conceptual work and practical experience in the Regulation Room project at Cornell University. An underlying assumption of open government enthusiasts is that more public participation will lead to better government policymaking: If we use technology to give people easier opportunities to participate in public policymaking, they will use these opportunities to participate effectively. However, experience thus far with …


Exploring The First Amendment Rights Of Teens In Relationship To Sexting And Censorship, Julia Halloran Mclaughlin Feb 2012

Exploring The First Amendment Rights Of Teens In Relationship To Sexting And Censorship, Julia Halloran Mclaughlin

University of Michigan Journal of Law Reform

This Article explores child pornography law in relation to teen sexting conduct. Recently, some teens who engaged in teen sexting have been convicted under child pornography laws and have been required to register as sexual predators. The criminalization of teens for developmentally typical behavior, mimicking the conduct of adults, can result in grave harm to most teens. Furthermore, the application of child pornography laws to teen sexting conduct demonstrates the constitutional overbreadth of the current definition of child pornography. Photographs have an emblematic role in society-capturing and celebrating youth. Moreover, the creation of teen sexting images accompanies a teen's developmental …