Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 31 - 55 of 55

Full-Text Articles in Law

Biometrics: Weighing Convenience And National Security Against Your Privacy, Lauren D. Adkins Jan 2007

Biometrics: Weighing Convenience And National Security Against Your Privacy, Lauren D. Adkins

Michigan Telecommunications & Technology Law Review

The biometric identifier relies on an individual's unique biological information such as a hand, iris, fingerprint, facial or voice print. When used for verification purposes, a "one-to-one" match is generated in under one second. Biometric technology can substantially improve national security by identifying and verifying individuals in a number of different contexts, providing security in ways that exceed current identification technology and limiting access to areas where security breaches are especially high, such as airport tarmacs and critical infrastructure facilities. At the same time, a legitimate public concern exists concerning the misuse of biometric technology to invade or violate personal …


The Intent Element Of Inducement To Infringe Under Patent Law: Reflections On Grokster, Lynda J. Oswald Oct 2006

The Intent Element Of Inducement To Infringe Under Patent Law: Reflections On Grokster, Lynda J. Oswald

Michigan Telecommunications & Technology Law Review

In June, 2005, the United States Supreme Court set forth an "inducement" rule in MGM Studios, Inc. v. Grokster, Ltd. that imposes secondary liability on "one who distributes a device with the object of promoting its use to infringe copyright, as shown by clear expression or other affirmative steps taken to foster infringement." The Court emphasized the limitations of the liability standard it was setting forth, stating that the target was only "purposeful, culpable expression and conduct, and thus does nothing to compromise legitimate commerce or discourage innovation having a lawful promise." Yet, the liability standard set forth in Grokster …


The Temporal Dynamics Of Capable Of Substantial Noninfringing Uses, R. Anthony Reese Oct 2006

The Temporal Dynamics Of Capable Of Substantial Noninfringing Uses, R. Anthony Reese

Michigan Telecommunications & Technology Law Review

The copyright issues raised by "dual-use" technologies--equipment that can be used both in ways that infringe copyright and in ways that do not--first gained prominence in connection with the litigation over videocassette recorders that culminated in the Supreme Court's decision in Sony in 1984. Copyright owners had asserted that Sony's manufacture and distribution of VCRs rendered it liable for copyright infringement committed by customers using their Sony VCRs. The Supreme Court in Sony concluded that copyright law did not impose such secondary liability where the device in question was capable of substantial noninfringing uses (and that the VCR was such …


21st Century Copyright Law In The Digital Domain Symposium Transcript, Symposium Panelists Oct 2006

21st Century Copyright Law In The Digital Domain Symposium Transcript, Symposium Panelists

Michigan Telecommunications & Technology Law Review

21st Century Copyright Law in the Digital Domain Symposium held at Universtiy of Michigan Law School Friday, March 24, 2006


'Code' And The Slow Erosion Of Privacy, Bert-Jaap Koops, Ronald Leenes Sep 2005

'Code' And The Slow Erosion Of Privacy, Bert-Jaap Koops, Ronald Leenes

Michigan Telecommunications & Technology Law Review

The notion of software code replacing legal code as a mechanism to control human behavior--"code as law"--is often illustrated with examples in intellectual property and freedom of speech. This Article examines the neglected issue of the impact of "code as law" on privacy. To what extent is privacy-related "code" being used, either to undermine or to enhance privacy? On the basis of cases in the domains of law enforcement, national security, E-government, and commerce, it is concluded that technology rarely incorporates specific privacy-related norms. At the same time, however, technology very often does have clear effects on privacy, as it …


Not All Bad: An Historical Perspective On Software Patents, Martin Campbell-Kelly Apr 2005

Not All Bad: An Historical Perspective On Software Patents, Martin Campbell-Kelly

Michigan Telecommunications & Technology Law Review

This Paper places the current debates about software patents in the historical context of patenting in the information technology industries. The first computer-program products were sold in the mid 1960s when software patents were not generally allowed; as a result, trade secrecy became endemic to the software industry. Software products were also protected by copyright, but in practice this offered little protection against most forms of appropriation by reverse engineering or cloning. By the early 1980s a series of landmark cases led to the acceptance of software patents. It is argued that this development was consistent with the patenting of …


Technology Wars: The Failure Of Democratic Discourse, Gregory N. Mandel Apr 2005

Technology Wars: The Failure Of Democratic Discourse, Gregory N. Mandel

Michigan Telecommunications & Technology Law Review

Conflicts over the use and regulation of various technologies pervade public discourse and have dramatic implications for the public interest. Controversies over the regulation of genetically modified products, nuclear power, and nanotechnology, among others, provoke some of the most socially and politically volatile debates of our time. These technology conflicts extract a substantial price from society--they create costly inefficiencies, prevent society from optimally managing new technologies, consume vast resources, and retard technological growth. This Article develops a framework for understanding technology controversies, and consequently proposes new means for resolving or ameliorating a variety of seemingly intractable legal and regulatory standoffs. …


Fair's Fair: An Argument For Mandatory Disclosure Of Technological Protection Measures, Robert C. Denicola Oct 2004

Fair's Fair: An Argument For Mandatory Disclosure Of Technological Protection Measures, Robert C. Denicola

Michigan Telecommunications & Technology Law Review

Section 1201(a)(1) of the Copyright Act prohibits the act of "circumvent[ing] a technological measure that effectively controls access to a work," including, for example, by-passing password protection or encryption intended to restrict access to paying customers. Section 1201(a)(2) prohibits the manufacture or sale of "any technology, product, service, device, component, or part thereof" primarily designed for the purpose of circumventing access controls on copyrighted works. Additionally, § 1202(b) prohibits the manufacture or sale of products, devices or services primarily designed to circumvent "a technological measure that effectively protects a right of a copyright owner"--for example, a technological measure intended to …


Better, Faster, Cheaper - Later: What Happens When Technologies Are Suppressed, Kurt M. Saunders, Linda Levine Oct 2004

Better, Faster, Cheaper - Later: What Happens When Technologies Are Suppressed, Kurt M. Saunders, Linda Levine

Michigan Telecommunications & Technology Law Review

Some inventions never see the light of day. Others enter the spotlight after long delays and the factors that slowed the arrival of that innovation are ignored. Technology suppression is a real occurrence involving well known and widely used products. In this Article, we examine the topic of technology suppression, seeking to reveal the tactics of suppression and the patterns and conditions under which it occurs. Current examples of US technologies are used to highlight the significance of this phenomenon. We consider related factors, including market and innovation forces, and we identify suppressive tactics, using illustrative cases where patent nonuse …


Life Sciences, Technology, And The Law - Symosium Transcript - March 7, 2003, Philip R. Reilly, David H. Kaye, Jonathan J. Koehler, Richard O. Lempert Oct 2003

Life Sciences, Technology, And The Law - Symosium Transcript - March 7, 2003, Philip R. Reilly, David H. Kaye, Jonathan J. Koehler, Richard O. Lempert

Michigan Telecommunications & Technology Law Review

Life sciences, Technology, and the Law Symposium held at the University of Michigan Law School Friday, March 7, 2003


Regulating Speech Across Borders: Technology Vs. Values, Matthew Fagin Apr 2003

Regulating Speech Across Borders: Technology Vs. Values, Matthew Fagin

Michigan Telecommunications & Technology Law Review

The disfavored status within international law of unilateral state-based regulations that target extraterritorial actors arises from the inherent challenges such actions represent to state sovereignty. In the context of the Internet, the complexity of choice-of-law analysis is heightened: regulations imposed by one state have the potential to effectively block communications to citizens of all states and undermine the conflicting regulatory aims of neighboring states. Early legal commentators built upon this cascading chilling effect of state-based regulation to proclaim both the futility and illegitimacy of state-based action in the online environment. Subsequent scholars have demonstrated the commensurability of state-based online regulation …


Government Preferences For Promoting Open-Source Software: A Solution In Search Of A Problem, David S. Evans, Bernard J. Reddy Apr 2003

Government Preferences For Promoting Open-Source Software: A Solution In Search Of A Problem, David S. Evans, Bernard J. Reddy

Michigan Telecommunications & Technology Law Review

Governments around the world are making or considering efforts to promote open-source software (typically produced by cooperatives of individuals) at the expense of proprietary software (generally sold by for-profit software developers). This article examines the economic basis for these kinds of government interventions in the market. It first provides some background on the software industry. The article discusses the industrial organization and performance of the proprietary software business and describes how the open-source movement produces and distributes software. It then surveys current government proposals and initiatives to support open-source software and examines whether there is a significant market failure that …


Quibbles'n Bits: Making A Digital First Sale Doctrine Feasible, Victor F. Calaba Oct 2002

Quibbles'n Bits: Making A Digital First Sale Doctrine Feasible, Victor F. Calaba

Michigan Telecommunications & Technology Law Review

Whereas the first sale doctrine historically permitted the transfer and resale of copyrighted works, license agreements used by software companies and the DMCA's strict rules prohibiting tampering with access control devices frustrate exercise of the first sale doctrine with respect to many forms of digital works[...] This article explores the first sale doctrine as it pertains to digital works and proposes ways to make a digital first sale doctrine feasible. Part II describes the first sale doctrine as it has traditionally been applied to non-digital works. Part III discusses modern technology's impact on the distribution and use of copyrighted material. …


Researching Remedies In Intellectual Property Actions Involving Computer Technology: A Research Guide, Daniel N. Kassabian Oct 2002

Researching Remedies In Intellectual Property Actions Involving Computer Technology: A Research Guide, Daniel N. Kassabian

Michigan Telecommunications & Technology Law Review

The purpose of this research guide is not to answer the question "What remedies are available to an owner of computer related technology whose rights have been infringed?" but to provide a methodology by which a legal practitioner can find the answer to this question. This guide sets forth materials and methods of research that can be used for an inquiry that is broad in scope, such as researching which legal scheme's remedial component best suits a client's technology, but that are also capable of being used for a narrow or limited inquiry, such as looking for specific remedies available …


Festo: A Case Contravening The Convergence Of Doctrine Of Equivalents Jurisprudence In Germany, The United Kingdom, And The United States, Katherine E. White Jun 2002

Festo: A Case Contravening The Convergence Of Doctrine Of Equivalents Jurisprudence In Germany, The United Kingdom, And The United States, Katherine E. White

Michigan Telecommunications & Technology Law Review

Despite differences in patent law jurisprudence in Germany, the United Kingdom and the United States, the fundamental principles underlying each system serve the same basic purpose: to encourage technological innovation and dissemination of knowledge. In granting exclusive patent rights, it is important that the scope of patent protection not be so broad as to remove existing knowledge from the public domain. The scope of protection should strike a balance between granting adequate patent rights while preserving the public's ownership in the public domain or the prior art. To encourage innovation patentees must attain significant exclusive rights, while potential infringers receive …


Marking Carnivore's Territory: Rethinking Pen Registers On The Internet, Anthony E. Orr Jun 2002

Marking Carnivore's Territory: Rethinking Pen Registers On The Internet, Anthony E. Orr

Michigan Telecommunications & Technology Law Review

"Carnivore" entered the online world's collective consciousness in June 2000 when the Federal Bureau of Investigation unveiled the Internet surveillance software program to telecommunications industry specialists. The FBI claims the program allows agents to scan the traffic of an Internet Service Provider (ISP) for messages or commands to or from a criminal suspect and then intercept only those messages, capturing copies of e-mails, web site downloads and other file transfers[...] A central issue in the controversy surrounding Carnivore is whether current law permits the FBI to employ the program in the Internet context. Bureau officials claim statutory authority for deployments …


Computer Searches And Seizures: Some Unresolved Issues, Susan W. Brenner, Barbara A. Frederiksen Jun 2002

Computer Searches And Seizures: Some Unresolved Issues, Susan W. Brenner, Barbara A. Frederiksen

Michigan Telecommunications & Technology Law Review

The goal of this article is to illustrate the issues that arise in the context of computer search and seizures by examining several areas in which the application of Fourth Amendment concepts to computer searches and/or seizures can be problematic. In order to illustrate this point, the article will build on a hypothetical. The hypothetical situation assumes law enforcement officers have lawfully obtained a warrant to search for and seize evidence concerning the commission of one or more crimes. It will also be assumed that computer technology played some role in the commission of these crimes, so computer equipment and …


Legacy Of Lost Opportunity: Designated Entities And The Federal Communications Commission's Broadband Pcs Spectrum Auction, A, Mark W. Munson Jun 2001

Legacy Of Lost Opportunity: Designated Entities And The Federal Communications Commission's Broadband Pcs Spectrum Auction, A, Mark W. Munson

Michigan Telecommunications & Technology Law Review

The Federal Communications Commission's ("FCC") designated entity policy has challenged the efficiency of the use of auctions to allocate spectrum licenses. As an alternative to comparative hearings and lotteries, auctions provide an effective solution to the costs, administrative burdens, and delays associated with apportioning spectrum. Congress required the FCC to allow firms to participate in the auctions even if they had difficulty in obtaining financing. The FCC gave these firms, known as "designated entities," set-asides and other preferences to assist them in the competitive bidding process. In the broadband Personal Communications Services ("PCS") auctions, however, designated entities frequently were unable …


Taking A Bite Out Of Circumvention: Analyzing 17 U.S.C. 1201 As A Criminal Law, Jason M. Schulz Jun 2000

Taking A Bite Out Of Circumvention: Analyzing 17 U.S.C. 1201 As A Criminal Law, Jason M. Schulz

Michigan Telecommunications & Technology Law Review

...information content providers who depend heavily on copyright law are growing increasingly wary of advances in digital technology that allow manipulation of their content and potentially diminish the effectiveness of their copyright protection. Technology firms, on the other hand, are looking more and more at developing products which provide low-cost, high quality access to content without restriction. Thus, as technologists work feverishly to find new ways to free up information, content providers are fighting just as hard to constrain access in order to prevent market-killing duplication and distribution of their works. These two codependent yet clashing interest groups recently met …


Telemedicine: Rx For The Future Of Health Care, Susan E. Volkert Jun 2000

Telemedicine: Rx For The Future Of Health Care, Susan E. Volkert

Michigan Telecommunications & Technology Law Review

Quite simply, telemedicine symbolizes and catalyzes the clash between the reality of our legal and political approach to health care and the American dream of bringing health care to all patients. Telemedicine, like our health care delivery systems, is regulated by many layers of government. Unlike other issues, telemedicine cuts through and challenges the traditional controls of access and cost. As such, telemedicine is a microcosm of our health care delivery system and a lens through which one may analyze the obstacles to access in the current system. This article examines these issues, proposes that telemedicine's goal should be to …


To Innovate Or Not To Innovate, That Is The Question: The Functions, Failures, And Foibles Of The Reward Function Theory Of Patent Law In Relation To Computer Software Platforms , Seth A. Cohen Jun 1999

To Innovate Or Not To Innovate, That Is The Question: The Functions, Failures, And Foibles Of The Reward Function Theory Of Patent Law In Relation To Computer Software Platforms , Seth A. Cohen

Michigan Telecommunications & Technology Law Review

The patent system has traditionally been viewed as having two primary functions: the reward function and the prospect function. Although these theories do explain some behavior which results from the practical applications of the patent system, they also overlook some behavior of the patent system which indicates a failure of these functions. In order to properly prevent such failure, this paper proposes that the patent system adopt an orientation that will lead to increased innovative rivalry and competition. In Part I, using the computer operating system software market as an example, I propose a framework for reconceptualizing patent protection as …


Antitrust Enfocement And High-Technology Markets, William J. Baer, David A. Balto Jun 1999

Antitrust Enfocement And High-Technology Markets, William J. Baer, David A. Balto

Michigan Telecommunications & Technology Law Review

Although the antitrust laws apply to all industries, the application must be tempered in each case by the myriad ways in which competition can be modified by structural, behavioral, technological, regulatory, and other characteristics. The Commission applies the antitrust laws with sensitivity to the special characteristics of high-tech industries and of intellectual property, but also with the recognition that--as in other industries--competition plays an important role in spurring innovation and in spreading the benefits of that innovation to consumers. This focus is not new. This balanced approach has roots that go back at least to the 1977 Antitrust Guide to …


Building A Community Through Workplace E-Mail: The New Privacy Frontier, Peter Schnaitman Jun 1999

Building A Community Through Workplace E-Mail: The New Privacy Frontier, Peter Schnaitman

Michigan Telecommunications & Technology Law Review

The relatively new technology of electronic mail (e-mail) presents an entirely new issue of workplace privacy. Currently, whether a person has a privacy interest in their workplace e-mail communications is as unsettled an issue as it has been since the technology emerged in the early part of this decade as the preferred mode of communication in the workplace. Indeed, e-mail may soon be the preferred mode of communication in general. This comment will argue that all e-mail users have a privacy interest in workplace e-mail communications and that the current law does not afford e-mail users any type of protection …


Profits In Cyberspace: Should Newspaper And Magazine Publishers Pay Freelance Writers For Digital Content?, Rod Dixon Esq. Jun 1998

Profits In Cyberspace: Should Newspaper And Magazine Publishers Pay Freelance Writers For Digital Content?, Rod Dixon Esq.

Michigan Telecommunications & Technology Law Review

It is remarkable how fast recent trends have driven an increasing number of publishers of magazines, newspapers, and other similar works to port the print version of their works to digital and electronic format in the form of online computer databases and multimedia CDROM technologies. Online computer databases and CD-ROM media can be exceptionally profitable ventures for publishers who convert a preexisting print work into a digital product. However, publishers' profits from digital media may be impaired if there is a question as to whether the publisher has satisfactorily secured the copyright to the material making up the digital media. …


Telecommunications In Transition: Unbundling, Reintegration, And Competition, David J. Teece Jun 1995

Telecommunications In Transition: Unbundling, Reintegration, And Competition, David J. Teece

Michigan Telecommunications & Technology Law Review

The world economy is experiencing a technological revolution, fueled by rapid advances in microelectronics, optics, and computer science, that in the 1990s and beyond will dramatically change the way people everywhere communicate, learn, and access information and entertainment. This technological revolution has been underway for about a decade. The emergence of a fully-interactive communications network, sometimes referred to as the "Information Superhighway," is now upon us. This highway, made possible by fiber optics and the convergence of several different technologies, is capable of delivering a plethora of new interactive entertainment, informational, and instructional services that are powerful and user-friendly. The …