Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Science and Technology Law (27)
- Intellectual Property Law (26)
- Internet Law (19)
- Communications Law (10)
- Privacy Law (8)
-
- Computer Law (7)
- Business Organizations Law (5)
- Legislation (5)
- Administrative Law (4)
- Commercial Law (4)
- Courts (4)
- National Security Law (4)
- Supreme Court of the United States (4)
- Entertainment, Arts, and Sports Law (3)
- First Amendment (3)
- Fourth Amendment (3)
- Legal History (3)
- Marketing Law (3)
- Antitrust and Trade Regulation (2)
- Comparative and Foreign Law (2)
- Energy and Utilities Law (2)
- Evidence (2)
- Transnational Law (2)
- Criminal Law (1)
- Environmental Law (1)
- Food and Drug Law (1)
- Health Law and Policy (1)
- International Trade Law (1)
- Jurisprudence (1)
Articles 1 - 30 of 55
Full-Text Articles in Law
Loopholes For Circumventing The Constitution: Unrestrained Bulk Surveillance On Americans By Collecting Network Traffic Abroad, Axel Arnbak, Sharon Goldberg
Loopholes For Circumventing The Constitution: Unrestrained Bulk Surveillance On Americans By Collecting Network Traffic Abroad, Axel Arnbak, Sharon Goldberg
Michigan Telecommunications & Technology Law Review
This Article reveals interdependent legal and technical loopholes that the US intelligence community could use to circumvent constitutional and statutory safeguards for Americans. These loopholes involve the collection of Internet traffic on foreign territory, and leave Americans as unprotected as foreigners by current United States (US) surveillance laws. This Article will also describe how modern Internet protocols can be manipulated to deliberately divert American’s traffic abroad, where traffic can then be collected under a more permissive legal regime (Executive Order 12333) that is overseen solely by the executive branch of the US government. Although the media has reported on some …
Voluntary Disclosure Of Information As A Proposed Standard For The Fourth Amendment's Third-Party Doctrine, Margaret E. Twomey
Voluntary Disclosure Of Information As A Proposed Standard For The Fourth Amendment's Third-Party Doctrine, Margaret E. Twomey
Michigan Telecommunications & Technology Law Review
The third-party doctrine is a long-standing tenant of Fourth Amendment law that allows law enforcement officers to utilize information that was released to a third party without the probable cause required for a traditional search warrant. This has allowed law enforcement agents to use confidential informants, undercover agents, and access bank records of suspected criminals. However, in a digital age where exponentially more information is shared with Internet Service Providers, e-mail hosts, and social media “friends,” the traditional thirdparty doctrine ideas allow law enforcement officers access to a cache of personal information and data with a standard below probable cause. …
Predictability And Nonobviousness In Patent Law After Ksr, Christopher A. Cotropia
Predictability And Nonobviousness In Patent Law After Ksr, Christopher A. Cotropia
Michigan Telecommunications & Technology Law Review
In KSR International Co. v. Teleflex, Inc., the Supreme Court addressed the doctrine of nonobviousness, the ultimate question of patentability, for the first time in thirty years. In mandating a flexible approach to deciding nonobviousness, the KSR opinion introduced two predictability standards for determining nonobviousness. The Court described predictability of use (hereinafter termed “Type I predictability”)— whether the inventor used the prior art in a predictable manner to create the invention—and predictability of the result (hereinafter termed “Type II predictability”)—whether the invention produced a predictable result—both as a means for proving obviousness. Although Type I predictability is easily explained as …
Holding Up And Holding Out, Colleen V. Chien
Holding Up And Holding Out, Colleen V. Chien
Michigan Telecommunications & Technology Law Review
Patent “hold-up” and patent “hold-out” present important, alternative theories for what ails the patent system. Patent “hold-up” occurs when a patent owner sues a company when it is most vulnerable—after it has implemented a technology—and is able wrest a settlement because it is too late for the company to change course. Patent “hold-out” is the practice of companies routinely ignoring patents and resisting patent owner demands because the odds of getting caught are small. Hold-up has arguably predicted the current patent crises, and the ex ante assertion of technology patents whether in the smartphone war, standards, or patent “troll” context. …
District Courts Versus The Usitc: Considering Exclusionary Relief For F/Rand-Encumbered Standard-Essential Patents, Helen H. Ji
District Courts Versus The Usitc: Considering Exclusionary Relief For F/Rand-Encumbered Standard-Essential Patents, Helen H. Ji
Michigan Telecommunications & Technology Law Review
Technological standards allow manufacturers and consumers to rely upon these agreed-upon basic systems to facilitate sales and further invention. However, where these standards involved patented technology, the process of standard-setting raises many concerns at the intersection of antitrust and patent law. As patent holders advocate for their patents to become part of technological standards, how should courts police this activity to prevent patent holdup and other anti-competitive practices? This Note explores the differing approaches to remedies employed by the United States International Trade Commission and the United States District Courts where standard-essential patents are infringed. This Note further proposes that …
Wireless Localism: Beyond The Shroud Of Objectivity In Federal Spectrum Administration, Olivier Sylvain
Wireless Localism: Beyond The Shroud Of Objectivity In Federal Spectrum Administration, Olivier Sylvain
Michigan Telecommunications & Technology Law Review
Recent innovations in mobile wireless technology have instigated a debate between two camps of legal scholars about federal administration of the electromagnetic spectrum. The first camp argues that the Federal Communications Commission (“FCC”) should define spectrum use rights more clearly and give spectrum licensees broad property rights in frequencies. The second camp argues that, rather than award exclusive licenses to the highest bidder, the FCC ought to open much, if not most, of the spectrum to unlicensed use by smartphones and tablets equipped with the newest spectrum administration technology. First, this Article shows that both of these camps comprise a …
Interpreting Biological Similarity: Ongoing Challenges For Diverse Decision Makers, Sarah M. Cork
Interpreting Biological Similarity: Ongoing Challenges For Diverse Decision Makers, Sarah M. Cork
Michigan Telecommunications & Technology Law Review
Similarity is an elusive and complicated concept facing comparisons of biological molecules, as even minute changes to a molecule's structure can dramatically affect its function in the body. Yet the flood of biologic drugs on the market will increasingly force these similarity comparisons. These concerns are particularly relevant to two groups of drugs: families of biologic drugs that closely resemble each other in structure and function, here termed "similar-impact biologics," and the biosimilars, which are intended to closely approximate generic forms of biologic drugs. In bringing biologic drugs to the market, manufacturers are likely to face dual obstacles: FDA approval …
Geographically Restricted Streaming Content And Evasion Of Geolocation: The Applicability Of The Copyright Anticircumvention Rules, Jerusha Burnett
Geographically Restricted Streaming Content And Evasion Of Geolocation: The Applicability Of The Copyright Anticircumvention Rules, Jerusha Burnett
Michigan Telecommunications & Technology Law Review
A number of methods currently exist or are being developed to determine where Internet users are located geographically when they access a particular webpage. Yet regardless of the precautions taken by website operators to limit the locations from which they allow access, it is likely that users will find ways to gain access to restricted content. Should the evasion of geolocation constitute circumvention of access controls so that § 1201 of the Digital Millennium Copyright Act ("DMCA") applies? Because location data can properly be considered personally identifiable information ("PII"), this Note argues that § 1201 should not apply absent a …
Fracking Patents: The Emergence Of Patents As Information-Containment Tools In Shale Drilling, Daniel R. Cahoy, Joel Gehman, Zhen Lei
Fracking Patents: The Emergence Of Patents As Information-Containment Tools In Shale Drilling, Daniel R. Cahoy, Joel Gehman, Zhen Lei
Michigan Telecommunications & Technology Law Review
The advantages of new sources of energy must be weighed against environmental, health, and safety concerns related to new production technology. The rapid development of unconventional oil and gas fields, such as the Barnett and Marcellus Shales, provide an excellent context for these contrasting goals. Information about extraction hazards is an extremely important issue. In general, patents are viewed as a positive force in this regard, providing a vehicle for disseminating information in exchange for a limited property right over an invention. However, by limiting the evaluation of an invention by third parties, patents might also be used to control …
High-Frequency Trading: Should Regulators Do More, Matt Prewitt
High-Frequency Trading: Should Regulators Do More, Matt Prewitt
Michigan Telecommunications & Technology Law Review
High-Frequency Trading ("HFT") is a diverse set of algorithmic trading strategies characterized by fast order execution. Its importance in international markets has increased vastly in recent years. From a regulatory perspective, HFT presents difficult and partially unresolved questions. The difficulties stem partly from the fact that HFT encompasses a wide range of trading strategies, and partly from a dearth of unambiguous empirical findings about HFT's effects on markets. Yet certain important conclusions are broadly accepted. HFT can increase systemic risk by causing or exacerbating events like the "Flash Crash" of May 6, 2010. HFT can also enable market manipulators to …
No Cause Of Action: Video Surveillance In New York City, Olivia J. Greer
No Cause Of Action: Video Surveillance In New York City, Olivia J. Greer
Michigan Telecommunications & Technology Law Review
In 2010, New York City Police Commissioner Raymond Kelly announced a new network of video surveillance in the City. The new network would be able to prevent future terrorist attacks by identifying suspicious behavior before catastrophic events could take place. Kelly told reporters, "If we're looking for a person in a red jacket, we can call up all the red jackets filmed in the last 30 days," and "[w]e're beginning to use software that can identify suspicious objects or behaviors." Gothamist later made a witticism of Kelly's statement, remarking, "Note to terrorists: red jackets are not a good look for …
Creating A Plug-In Electric Vehicle Industry Cluster In Michigan: Prospects And Policy Options, Thomas P. Lyon, Russell A. Baruffi Jr.
Creating A Plug-In Electric Vehicle Industry Cluster In Michigan: Prospects And Policy Options, Thomas P. Lyon, Russell A. Baruffi Jr.
Michigan Telecommunications & Technology Law Review
This Article seeks to examine how policy can be used strategically to foster the development of a plug-in electric vehicle ("PEV") industry cluster in Michigan. The tendency for certain industries to localize in particular regions has captured the interest of much economic research and policy discussion in recent years. The trend toward the clustering of new industries has stayed strong despite the acceleration of globalization. Attention to clusters has proven to be an enduring theme in economic development circles for nearly thirty years. Clusters generate synergies that make industrial activity greater than the sum of contributions by individual players. In …
The Case For Clean Energy Technology Manufacturing: Ten Steps Business And Industry Must Take To Optimize Opportunities In The Emerging Clean Energy Economy, Stanley Pruss
Michigan Telecommunications & Technology Law Review
Clean energy policy choices will be critical both for economic vitality within the United States and for international competitiveness in the race to improve clean energy technology and capture emerging markets. With legislative solutions losing momentum, business and industry leaders will be the key drivers in reorienting American policy, discourse, and economics in the clean energy economy. The problem, however, is that many political and business leaders are unaware of the job-creating potential and economic benefits in the clean energy sectors. These benefits could be realized if we made a serious, strategic effort to align our latent strengths in manufacturing …
Information Anxieties, G. S. Hans
Information Anxieties, G. S. Hans
Michigan Telecommunications & Technology Law Review
The constant access and instant publication that the Internet allows have given every pundit an online soapbox. This content explosion has created two related problems for consumers and industry: how to find valuable content online (whatever "valuable" means) and how to moderate the flow of the content itself. Tim Wu argues in The Master Switch that the second issue of content control and mediation has been fiercely debated in the United States as far back as the invention of the telephone in the late nineteenth century. Consumers, creators, companies, and government officials have disputed the appropriate regulations for the devices …
Everything In Its Right Place: Social Cooperation And Artist Compensation, Leah Belsky, Byron Kahr, Max Berkelhammer, Yochai Benkler
Everything In Its Right Place: Social Cooperation And Artist Compensation, Leah Belsky, Byron Kahr, Max Berkelhammer, Yochai Benkler
Michigan Telecommunications & Technology Law Review
The music industry's crisis response to the Internet has been the primary driver of U.S. copyright policy for over a decade. The core institutional response has been to increase the scope of copyright and the use of litigation, prosecution, and technical control mechanisms for its enforcement. The assumption driving these efforts has been that without heavily-enforced copyright, artists will not be able to make a living from their art. Throughout this period artists have been experimenting with approaches that do not rely on technological or legal enforcement, but on constructing web-based business models that engage fans and rely on voluntary …
Ill Telecommunications: How Internet Infrastructure Providers Lose First Amendment Protection, Nicholas Bramble
Ill Telecommunications: How Internet Infrastructure Providers Lose First Amendment Protection, Nicholas Bramble
Michigan Telecommunications & Technology Law Review
The Federal Communications Commission (FCC) recently proposed an Internet nondiscrimination rule: "Subject to reasonable network management, a provider of broadband Internet access service must treat lawful content, applications, and services in a nondiscriminatory manner." Among other requests, the FCC sought comment on whether the proposed nondiscrimination rule would "promote free speech, civic participation, and democratic engagement," and whether it would "impose any burdens on access providers' speech that would be cognizable for purposes of the First Amendment." The purpose of this Article is to suggest that a wide range of responses to these First Amendment questions, offered by telecommunications providers …
Media-Rich Input Application Liability, David R. Krohn, Pekarek
Media-Rich Input Application Liability, David R. Krohn, Pekarek
Michigan Telecommunications & Technology Law Review
Until recently, media-rich online interactions were mostly unidirectional: multimedia content was delivered by the service provider to the user. Input from the user came almost exclusively in the form of text. Even when searching the Internet for images or audio, a user typically entered text into a search engine. In addition, search engines indexed multimedia content by analyzing not the content itself but the text surrounding it. This is rapidly changing. With the rise of multimedia-capable smartphones and wireless broadband, applications that allow users to search using non-textual inputs are quickly becoming popular. These applications go much further than simply …
Not So Technical: An Analysis Of Federal Circuit Patent Decisions Appealed From The Itc, Holly Lance
Not So Technical: An Analysis Of Federal Circuit Patent Decisions Appealed From The Itc, Holly Lance
Michigan Telecommunications & Technology Law Review
A widespread perception among the patent law community is that the patent system would be more effective if judges with technical backgrounds and patent law experience decided patent disputes. Proponents believe that if judges all had similar baseline knowledge of technological analysis, there would be more consistency in decision-making, leading to more predictability for parties. Some district courts have unofficially become semi-specialized in patent law disputes, and Congress is debating whether to institute a more formalized Patent Pilot Program in which district court judges specialize in patent law cases. This Note joins the debate and examines patent law cases at …
Patenting By Entrepreneurs: An Empirical Study, Ted Sichelman, Stuart J.H. Graham
Patenting By Entrepreneurs: An Empirical Study, Ted Sichelman, Stuart J.H. Graham
Michigan Telecommunications & Technology Law Review
[T]he Ewing Marion Kauffman Foundation--an organization that studies and promotes entrepreneurship in the United States--funded an effort at the University of California, Berkeley School of Law, to undertake the first comprehensive survey of the relationship between patenting and entrepreneurship in the United States. The authors, along with other investigators, administered the survey in 2008 to approximately 15,000 startup and early-stage companies in the biotechnology, medical device, information technology (IT) hardware, and software and Internet sectors. A portion of the survey examined why entrepreneurs, startups, and early-stage companies do (and do not) seek patents. This Article reports and analyzes results from …
Google Adwords: Trademark Infringer Or Trade Liberalizer, Ashley Tan
Google Adwords: Trademark Infringer Or Trade Liberalizer, Ashley Tan
Michigan Telecommunications & Technology Law Review
Google is the world's most preferred search engine, with an audience share of eighty percent of Internet users worldwide. With so many people browsing its search results, Google is a natural advertising vehicle, and it has exploited this quality to become one of the most profitable Internet companies in U.S. history. However, success has not come without controversy, and one of the most significant concerns Google AdWords, which displays keyword-triggered ads and sponsored links alongside non-sponsored search results. AdWords has come under attack in the United States and in the European Union ("EU") for its role in trademark infringement on …
Wireless Net Neutrality Regulation And The Problem With Pricing: An Empirical, Cautionary Tale, Babette E.L. Boliek
Wireless Net Neutrality Regulation And The Problem With Pricing: An Empirical, Cautionary Tale, Babette E.L. Boliek
Michigan Telecommunications & Technology Law Review
I present here a unique empirical analysis of the consumer welfare benefits of prior regulation in the mobile telecommunications industry. In particular, I analyze the relative consumer benefits of state rate regulation and federal entry regulation. The institution of filing requirements and FTC review and approval of various consumer pricing regimes is highly analogous to the consumer price controls imposed by various state level public utility commissions in the past. Furthermore, the imposition of a zero-price rule is analogous to past rate regulation; in particular it is similar to past wholesale regulation with its underlying principles of open access and …
Legislation For Effective Self-Regulation: A New Approach To Protecting Personal Privacy On The Internet, Richard M. Marsh Jr.
Legislation For Effective Self-Regulation: A New Approach To Protecting Personal Privacy On The Internet, Richard M. Marsh Jr.
Michigan Telecommunications & Technology Law Review
How can we best reap the benefits of online profiling while avoiding the privacy pitfalls plaguing the e-commerce community? Experts advocate legislation, civil litigation, or self-regulation to provide the ideal solution. Analyzing these proposals reveals a conflict between two basic principles: the need to preserve personal privacy and the desire to foster a thriving Internet-based industry. This Note argues that each approach tends to favor one principle at the expense of the other. This Note also proposes a new solution which creates incentives for effective self-regulation backed with legal enforcement. This scheme strikes an appropriate balance between privacy and e-commerce …
The General Public License Version 3.0: Making Or Breaking The Foss Movement, Clark D. Asay
The General Public License Version 3.0: Making Or Breaking The Foss Movement, Clark D. Asay
Michigan Telecommunications & Technology Law Review
Free and open source software (FOSS) is a big deal. FOSS has become an undeniably important element for businesses and the global economy in general, as companies increasingly use it internally and attempt to monetize it. Governments have even gotten into the act, as a recent study notes that FOSS plays a critical role in the US Department of Defense's systems. Others have pushed for the adoption of FOSS to help third-world countries develop. Given many of its technological and developmental advantages, FOSS's use, adoption, and development are only projected to grow.[...] The FSF created the most popular version of …
When Mobile Phones Are Rfid-Equipped - Finding E.U.-U.S. Solutions To Protect Consumer Privacy And Facilitate Mobile Commerce, Nancy J. King
When Mobile Phones Are Rfid-Equipped - Finding E.U.-U.S. Solutions To Protect Consumer Privacy And Facilitate Mobile Commerce, Nancy J. King
Michigan Telecommunications & Technology Law Review
New mobile phones have been designed to include delivery of mobile advertising and other useful location-based services, but have they also been designed to protect consumers' privacy? One of the key enabling technologies for these new types of phones and new mobile services is Radio Frequency Identification (RFID), a wireless communication technology that enables the unique identification of tagged objects. In the case of RFID-enabled mobile phones, the personal nature of the devices makes it very likely that, by locating a phone, businesses will also be able to locate its owner. Consumers are currently testing new RFID-enabled phones around the …
Patents And Diversity In Innovation, Brian Kahin
Patents And Diversity In Innovation, Brian Kahin
Michigan Telecommunications & Technology Law Review
Over the past quarter-century, the patent system has expanded in scope and significance, claiming a central position in a U.S. economy increasingly based on knowledge and intangible assets. This historic expansion has come at the cost of controversy and, within the past five years, growing public scrutiny from outside the system--from the press, business, Congress, and finally the Supreme Court. However, proposed reforms are marked by deepening divisions between sectors of the economy. The information technology (IT) and services industries favor strong reforms while pharmaceutical and biotech industries, as well as the patent bar, favor modest, incremental reforms. This yawning …
Justice, And Only Justice, You Shall Pursue: Network Neutrality, The First Amendment And John Rawls's Theory Of Justice, Amit M. Schejter, Moran Yemini
Justice, And Only Justice, You Shall Pursue: Network Neutrality, The First Amendment And John Rawls's Theory Of Justice, Amit M. Schejter, Moran Yemini
Michigan Telecommunications & Technology Law Review
As broadband becomes the public's technology of choice to access the Internet, it is also emerging as the battlefield upon which the struggle for control of the Internet is being fought. Operators who provide physical access to the service claim the right to discriminate among the content providers who use the infrastructure in which the operators have invested. In contrast, content providers warn that exercising such a policy would "undermine the principles that have made the Internet such a success."[...] For academic observers, analysis of this issue has thus far been confined to the areas of property law, innovation, and …
The Myth Of Inherent And Inevitable Industry Differences: Diversity As Artifact In The Quest For Patent Reforms, Robert A. Armitage
The Myth Of Inherent And Inevitable Industry Differences: Diversity As Artifact In The Quest For Patent Reforms, Robert A. Armitage
Michigan Telecommunications & Technology Law Review
The University of Michigan Law School hosted a two-day conference entitled "Patents and Diversity in Innovation." The morning of the first day featured a panel devoted to "industry differences." This panel took up the task of dealing with the following questions: How has diversification of innovation and the expansion of patentable subject matter affected patent practice? How do markets for technology vary from sector to sector? And how do they reflect or influence patent practice? To what extent are business practices and competitive markets shaped by the nature of the technology, product, or service?[...] A conference titled "Patents and Diversity" …
A Method For Reforming The Patent System, Peter S. Menell
A Method For Reforming The Patent System, Peter S. Menell
Michigan Telecommunications & Technology Law Review
The principal recent studies of patent reform (NAS (2004), FTC (2003), Jaffe and Lerner (2004)) contend that a uniform system of patent protection must (or should) be available for "anything under the sun made by man" based upon one or more of the following premises: (1) the Patent Act requires this breadth and uniformity of treatment; (2) "discriminating" against any particular field of "technology" would be undesirable; (3) discrimination among technologies would present insurmountable boundary problems and could easily be circumvented through clever patent drafting; and (4) interest group politics stand in the way of excluding any subject matter classes …
What Is Hiding In The Bushes - Ebay's Effect On Holdout Behavior In Patent Thickets, Gavin D. George
What Is Hiding In The Bushes - Ebay's Effect On Holdout Behavior In Patent Thickets, Gavin D. George
Michigan Telecommunications & Technology Law Review
Importantly, at least a few relevant patent holders are inevitably left out of an industry organization's collection of patents. These left-out patent holders, known as "holdouts," can undermine the collective arrangement with demand letters and infringement suits.[...] The first part of this Note explains why holdouts exist in the first place, given the benefits of joining an organization of collected patents. In the second part of this Note, I explore the lack of legal protections against holdout demands offered by pre-eBay patent law. The third part of this Note introduces the eBay decision as revolutionary addition to list of legal …
Compulsory Patent Licensing: Is It A Viable Solution In The United States, Carol M. Nielsen, Michael R. Samardzija
Compulsory Patent Licensing: Is It A Viable Solution In The United States, Carol M. Nielsen, Michael R. Samardzija
Michigan Telecommunications & Technology Law Review
As technology continues to advance at a rapid pace, so do the number of patents that cover every aspect of making, using, and selling these innovations. In 1996, to compound the rapid change of technology, the U.S. Supreme Court affirmed that business methods are also patentable. Hence in the current environment, scores of patents, assigned to many different parties, may cover a single electronic device or software--making it increasingly impossible to manufacture an electronic device without receiving a cease and desist letter or other notice from a patentee demanding a large royalty or threatening an injunction. Companies, particularly those in …