Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Law

Regulating Black-Box Medicine, W. Nicholson Price Ii Dec 2017

Regulating Black-Box Medicine, W. Nicholson Price Ii

Michigan Law Review

Data drive modern medicine. And our tools to analyze those data are growing ever more powerful. As health data are collected in greater and greater amounts, sophisticated algorithms based on those data can drive medical innovation, improve the process of care, and increase efficiency. Those algorithms, however, vary widely in quality. Some are accurate and powerful, while others may be riddled with errors or based on faulty science. When an opaque algorithm recommends an insulin dose to a diabetic patient, how do we know that dose is correct? Patients, providers, and insurers face substantial difficulties in identifying high-quality algorithms; they …


Structure From Nothing And Claims For Free: Using A Whole-System View Of The Patent System To Improve Notice And Predictability For Software Patents, Holly K. Victorson Jan 2014

Structure From Nothing And Claims For Free: Using A Whole-System View Of The Patent System To Improve Notice And Predictability For Software Patents, Holly K. Victorson

Michigan Telecommunications & Technology Law Review

No uniform or customary method of disclosure for software patents is currently employed by inventors. This Note examines the issues that develop from software patent claims disclosed at various levels of abstraction, and the difficulties encountered by courts and the public when investigating the contours of the software patent space. While the courts have placed some restrictions on the manner in which software inventions are claimed, they are easily bypassed by clever patent applicants who desire to claim the maximum scope of their inventions. In the long run, however, a large “patent thicket” of overlapping and potentially overbroad inventions will …


Notification Of Data Security Breaches, Paul M. Schwartz, Edward J. Janger Jan 2007

Notification Of Data Security Breaches, Paul M. Schwartz, Edward J. Janger

Michigan Law Review

The law increasingly requires private companies to disclose information for the benefit of consumers. The latest examples of such regulation are state and federal laws that require companies to notify individuals of data security incidents involving their personal information. These laws, proposed in the wake of highly publicized data spills, seek to punish the breached entity and to protect consumers by requiring the entity to notify its customers about the security breach. There are competing approaches, however to how the law is to mandate release of information about data leaks. This Article finds that the current statutes' focus on reputational …


Taking A Byte Out Of Abusive Agency Discretion: A Proposal For Disclosure In The Use Of Computer Models, John P. Barker Apr 1986

Taking A Byte Out Of Abusive Agency Discretion: A Proposal For Disclosure In The Use Of Computer Models, John P. Barker

University of Michigan Journal of Law Reform

This Note examines the need for comprehensive requirements for the release of information pertaining to the use of computer-generated simulations used by federal administrative agencies or parties appearing before regulatory bodies. Part I of this Note defines computer models, identifies some of their current uses in administrative proceedings and describes the advantages of these models. Part II reviews the current requirements for documentation of computer models and the judicial review standards for agency findings. Part III examines the potential problems in the use of models and discusses the need for more adequate disclosure. Part IV describes several tests for verifying …