Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 13 of 13

Full-Text Articles in Law

Individuals As Gatekeepers Against Data Misuse, Ying Hu Dec 2021

Individuals As Gatekeepers Against Data Misuse, Ying Hu

Michigan Technology Law Review

This article makes a case for treating individual data subjects as gatekeepers against misuse of personal data. Imposing gatekeeper responsibility on individuals is most useful where (a) the primary wrongdoers engage in data misuse intentionally or recklessly; (b) misuse of personal data is likely to lead to serious harm; and (c) one or more individuals are able to detect and prevent data misuse at a reasonable cost.

As gatekeepers, individuals should have a legal duty to take reasonable measures to prevent data misuse where they are aware of facts indicating that the person seeking personal data from them is highly …


Grants, Nicholson Price Ii May 2019

Grants, Nicholson Price Ii

Articles

Innovation is a primary source of economic growth and is accordingly the target of substantial academic and government attention. Grants are a key tool in the government’s arsenal to promote innovation, but legal academic studies of that arsenal have given them short shrift. Although patents, prizes, and regulator-enforced exclusivity are each the subject of substantial literature, grants are typically addressed briefly, if at all. According to the conventional story, grants may be the only feasible tool to drive basic research, as opposed to applied research, but they are a blunt tool for that task. Three critiques of grants underlie this …


Regulating Black-Box Medicine, W. Nicholson Price Ii Dec 2017

Regulating Black-Box Medicine, W. Nicholson Price Ii

Michigan Law Review

Data drive modern medicine. And our tools to analyze those data are growing ever more powerful. As health data are collected in greater and greater amounts, sophisticated algorithms based on those data can drive medical innovation, improve the process of care, and increase efficiency. Those algorithms, however, vary widely in quality. Some are accurate and powerful, while others may be riddled with errors or based on faulty science. When an opaque algorithm recommends an insulin dose to a diabetic patient, how do we know that dose is correct? Patients, providers, and insurers face substantial difficulties in identifying high-quality algorithms; they …


Voluntary Disclosure Of Information As A Proposed Standard For The Fourth Amendment's Third-Party Doctrine, Margaret E. Twomey Jun 2015

Voluntary Disclosure Of Information As A Proposed Standard For The Fourth Amendment's Third-Party Doctrine, Margaret E. Twomey

Michigan Telecommunications & Technology Law Review

The third-party doctrine is a long-standing tenant of Fourth Amendment law that allows law enforcement officers to utilize information that was released to a third party without the probable cause required for a traditional search warrant. This has allowed law enforcement agents to use confidential informants, undercover agents, and access bank records of suspected criminals. However, in a digital age where exponentially more information is shared with Internet Service Providers, e-mail hosts, and social media “friends,” the traditional thirdparty doctrine ideas allow law enforcement officers access to a cache of personal information and data with a standard below probable cause. …


Protecting Anonymous Expression: The Internet's Role In Washington State's Disclosure Laws And The Direct Democracy Process, Karen Cullinane Jul 2011

Protecting Anonymous Expression: The Internet's Role In Washington State's Disclosure Laws And The Direct Democracy Process, Karen Cullinane

University of Michigan Journal of Law Reform

This Note proposes that the Washington State Legislature amend its Public Records Act to exempt from public disclosure personal information legally required to be disclosed by signers of referendum petitions. This Note also proposes that the Washington State Legislature designate an electronic system, to be detailed in its election law, by which referendum petitions can be checked for fraud without violating the right to anonymous expression protected by the First Amendment. Part I describes Washington State's referendum process and the path of Doe v. Reed, the case animating the reform presented in this Note. Part II illustrates how the rise …


Foreword: Rulemaking, Democracy, And Torrents Of E-Mail, Nina A. Mendelson Jan 2011

Foreword: Rulemaking, Democracy, And Torrents Of E-Mail, Nina A. Mendelson

Articles

This Foreword is meant as an initial foray into the question of what agencies should do with mass public comments, particularly on broad questions of policy. Part I discusses the extent to which congressional control, presidential control, and agency procedures themselves can ensure that agency decisions are democratically responsive. In view of shortcomings in both congressional and presidential control, I underscore the need to focus closely on rulemaking procedures as a source of democratic responsiveness. The possibility that agencies may be systematically discounting certain public submissions raises difficulties, and I present some examples. Part II makes a preliminary case that …


Harnessing And Sharing The Benefits Of State-Sponsored Research: Intellectual Property Rights And Data Sharing In California's Stem Cell Initiative, Rebecca S. Eisenberg, Arti K. Rai Jan 2006

Harnessing And Sharing The Benefits Of State-Sponsored Research: Intellectual Property Rights And Data Sharing In California's Stem Cell Initiative, Rebecca S. Eisenberg, Arti K. Rai

Articles

This Article discusses data sharing in California's stem cell initiative against the background of other data sharing efforts and in light of the competing interests that CIRM is directed to balance. We begin by considering how IP law affects data sharing. We then assess the strategic considerations that guide the IP and data policies and strategies of federal, state, and private research sponsors. With this background, we discuss four specific sets of issues that public sponsors of data-rich research, including CIRM, are likely to confront: (1) how to motivate researchers to contribute data; (2) who should have access to the …


Fair's Fair: An Argument For Mandatory Disclosure Of Technological Protection Measures, Robert C. Denicola Oct 2004

Fair's Fair: An Argument For Mandatory Disclosure Of Technological Protection Measures, Robert C. Denicola

Michigan Telecommunications & Technology Law Review

Section 1201(a)(1) of the Copyright Act prohibits the act of "circumvent[ing] a technological measure that effectively controls access to a work," including, for example, by-passing password protection or encryption intended to restrict access to paying customers. Section 1201(a)(2) prohibits the manufacture or sale of "any technology, product, service, device, component, or part thereof" primarily designed for the purpose of circumventing access controls on copyrighted works. Additionally, § 1202(b) prohibits the manufacture or sale of products, devices or services primarily designed to circumvent "a technological measure that effectively protects a right of a copyright owner"--for example, a technological measure intended to …


The Obsolescence Of Wall Street: A Contextual Approach To The Evolving Structure Of Federal Securities Regulation, Joel Seligman Feb 1995

The Obsolescence Of Wall Street: A Contextual Approach To The Evolving Structure Of Federal Securities Regulation, Joel Seligman

Michigan Law Review

As a matter of analytical style, this article illustrates a contextualist approach. For a considerable period of time, the dominant analytical style in corporate and securities .law has been a variant of economic, or law and economics, analysis. The virtue of this type of analysis is that it focuses on what its authors deem to be crucial variables and reaches conclusions derived from the core of a specific legal problem. The defect of this type of analysis is that so much is assumed or often assumed away.


Opinion Letter As To The Patentability Of Certain Inventions Associated With The Identification Of Partial Cdna Sequences, Rebecca S. Eisenberg, Robert P. Merges Jan 1995

Opinion Letter As To The Patentability Of Certain Inventions Associated With The Identification Of Partial Cdna Sequences, Rebecca S. Eisenberg, Robert P. Merges

Articles

You have asked for our legal opinion on the patentability of inventions claimed in U.S. patent applications 07/716,831, filed June 21, 1991 (the '831 application, or .'831"), 07/837,195, filed September 25, 1992 ("'195"), and 07/952,911, filed February 12, 1993 (."911"), all filed in the name of Craig Venter and others and assigned to the National Institutes of Health "(NIH)." We understand that NIH has abandoned these patent applications and has no present intention of filing similar applications in the future, but that NIH remains interested in the patenting of human DNA sequences from a broader public policy perspective. We have …


Whose Genes Are These Anyway?: Familial Conflicts Over Access To Genetic Information, Sonia M. Suter Jun 1993

Whose Genes Are These Anyway?: Familial Conflicts Over Access To Genetic Information, Sonia M. Suter

Michigan Law Review

This Note argues first that courts and legislatures should follow a presumption against mandating disclosure of a person's genetic information to third parties. Second, genetic testing for the benefit of a third party should not, and constitutionally cannot, be compelled. Part I presents an overview of genetics and discusses the special legal and ethical issues genetic testing poses. Part II examines the issue of nonconsensual disclosure to family members, who could potentially use the information from tests that have already been performed. This Part concludes that there should be a presumption against disclosure. Part III examines a related, but different, …


Taking A Byte Out Of Abusive Agency Discretion: A Proposal For Disclosure In The Use Of Computer Models, John P. Barker Apr 1986

Taking A Byte Out Of Abusive Agency Discretion: A Proposal For Disclosure In The Use Of Computer Models, John P. Barker

University of Michigan Journal of Law Reform

This Note examines the need for comprehensive requirements for the release of information pertaining to the use of computer-generated simulations used by federal administrative agencies or parties appearing before regulatory bodies. Part I of this Note defines computer models, identifies some of their current uses in administrative proceedings and describes the advantages of these models. Part II reviews the current requirements for documentation of computer models and the judicial review standards for agency findings. Part III examines the potential problems in the use of models and discusses the need for more adequate disclosure. Part IV describes several tests for verifying …


Protection For Trade Secrets Under The Toxic Substances Control Act Of 1976, Paula R. Latovick Jan 1980

Protection For Trade Secrets Under The Toxic Substances Control Act Of 1976, Paula R. Latovick

University of Michigan Journal of Law Reform

This article will examine the protection provided by the Act and the measures the EPA has adopted for implementing the Act's provisions. The approach will be to focus on the different functional areas in which disclosure may take place. Part I examines the scheme for designating information as confidential and the mechanics of the reporting system under TSCA. Part II deals with disclosures of confidential information made while implementing the TSCA. Part III focuses on legal disclosures of information submitted as confidential. Finally, Part IV examines the measures taken within the EPA to guarantee the safety of confidential information, the …