Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

University of Michigan Law School

Michigan Technology Law Review

Articles 1 - 30 of 37

Full-Text Articles in Law

An Intelligent Path For Improving Diversity At Law Firms (Un)Artificially, Rimsha Syeda Apr 2023

An Intelligent Path For Improving Diversity At Law Firms (Un)Artificially, Rimsha Syeda

Michigan Technology Law Review

Most law firms are struggling when it comes to diversity and inclusion. There are fewer women in law firms compared to men. The majority of lawyers—81%—are White, despite White people making up only about 65% of the law school population. Lawyers of color remain underrepresented with the historic high being only 28.32%. By comparison, 13.4% of the United States population is Black and 5.9% is Asian. The biases that perpetuate this lack of diversity in law firms begin during the hiring process and extend to associate retainment. For example, an applicant’s resume reveals a lot, including the prestige of the …


Regulatory Paralysis: The Answer To The Unanswerable Question Of Fcc Minority Ownership Policy, Christopher Terry Apr 2023

Regulatory Paralysis: The Answer To The Unanswerable Question Of Fcc Minority Ownership Policy, Christopher Terry

Michigan Technology Law Review

For five decades, the Federal Communications Commission (FCC) has struggled to implement policies that promote minority ownership of broadcast stations. Four “Prometheus” decisions from the Third Circuit span a seventeen-year legal impasse that highlighted the agency’s shortcomings on effective minority ownership policies. Now, after the Supreme Court’s 2021 decision in FCC v. Prometheus Radio Project, the FCC is required to relaunch its media ownership policy in 2022. This paper explores how the FCC has interpreted diversity in media ownership policymaking by examining a range of diversity policies and assessment methodologies particularly regarding minority ownership. The paper then presents data from …


Coca-Cola Curses: Hate Speech In A Post-Colonial Context, Brittan Heller Apr 2023

Coca-Cola Curses: Hate Speech In A Post-Colonial Context, Brittan Heller

Michigan Technology Law Review

Hate speech is a contextual phenomenon. What offends or inflames in one context may differ from what incites violence in a different time, place, and cultural landscape. Theories of hate speech, especially Susan Benesch’s concept of “dangerous speech” (hateful speech that incites violence), have focused on the factors that cut across these paradigms. However, the existing scholarship is narrowly focused on situations of mass violence or societal unrest in America or Europe.

This paper discusses how online hate speech may operate differently in a postcolonial context. While hate speech impacts all societies, the global South—Africa in particular—has been sorely understudied. …


Equitable Ecosystem: A Two-Pronged Approach To Equity In Artificial Intelligence, Rangita De Silva De Alwis, Amani Carter, Govind Nagubandi Jan 2023

Equitable Ecosystem: A Two-Pronged Approach To Equity In Artificial Intelligence, Rangita De Silva De Alwis, Amani Carter, Govind Nagubandi

Michigan Technology Law Review

Lawmakers, technologists, and thought leaders are facing a once-in-a-generation opportunity to build equity into the digital infrastructure that will power our lives; we argue for a two-pronged approach to seize that opportunity. Artificial Intelligence (AI) is poised to radically transform our world, but we are already seeing evidence that theoretical concerns about potential bias are now being borne out in the market. To change this trajectory and ensure that development teams are focused explicitly on creating equitable AI, we argue that we need to shift the flow of investment dollars. Venture Capital (VC) firms have an outsized impact in determining …


Degrees Of Confidence As A Legal Tool To Assess Ai System Liability, Joshua Song Sep 2022

Degrees Of Confidence As A Legal Tool To Assess Ai System Liability, Joshua Song

Michigan Technology Law Review

AI systems have become increasingly integrated into our everyday lives, and harms caused by these systems have graduated from raising hypothetical ethical concerns to questions of actual legal liability. Civil liability schemes are generally designed to address harms caused by humans; thus, it may be tempting to analogize new types of harms caused by AI systems to familiar harms caused by humans in order to justify commandeering existing human-centered legal tools to assess AI liability. However, the analogy is inappropriate and misrepresents salient legal differences in how harms are committed by humans and AI systems. Thus, “as is often the …


Cloud Gaming Demystified: An Introduction To The Legal Implications Of Cloud-Based Videogames, Mitchell Longan, Gaetano Dimita, Johan David Michels, Christopher Millard Sep 2022

Cloud Gaming Demystified: An Introduction To The Legal Implications Of Cloud-Based Videogames, Mitchell Longan, Gaetano Dimita, Johan David Michels, Christopher Millard

Michigan Technology Law Review

In this paper, we “demystify” cloud-based videogaming and its legal implications, in two stages. First, we describe the videogame sector; explain the basics of cloud computing and traditional videogame technologies and set out how the two converge in cloud-based videogame systems. Based on this analysis, we distinguish three separate models for cloud gaming services: (i) the “layered” model of Gaming-as-a-Service (‘GaaS’); (ii) the ‘integrated’ model of GaaS; and (iii) the ‘consumer infrastructure-as-a-service’ model. We argue that these three models are key to analyzing how intellectual property rights, contractual rights, and regulatory issues will develop in this novel environment for videogame …


Beyond True And False: Fake News And The Digital Epistemic Divide, Gilad Abiri, Johannes Buchheim Sep 2022

Beyond True And False: Fake News And The Digital Epistemic Divide, Gilad Abiri, Johannes Buchheim

Michigan Technology Law Review

The massive fact-checking, flagging, and content removal campaigns run by major digital platforms during the 2020 elections and the Covid-19 pandemic did some good. However, they failed to prevent substantial portions of the population from believing that the election was stolen or that vaccinations are dangerous.

In this Article, we argue that the reason for the ineffectiveness of truth-based solutions—such as fact-checking— is that they do not reach the heart of the problem. Both scholars and policymakers share the implicit or explicit belief that the rise of digital fake news is harmful mainly because it spreads false information, which lays …


Private Censorship, Disinformation And The First Amendment: Rethinking Online Platforms Regulation In The Era Of A Global Pandemic, Tzu- Chiang Huang Sep 2022

Private Censorship, Disinformation And The First Amendment: Rethinking Online Platforms Regulation In The Era Of A Global Pandemic, Tzu- Chiang Huang

Michigan Technology Law Review

The proliferation of online disinformation and the rise of private censorship are paradigmatic examples of the challenges to traditional First Amendment jurisprudence in an algorithmic society. The limitations of traditional First Amendment jurisprudence are amplified by the impact of the COVID-19 pandemic in two ways. On the one hand, in the wake of the pandemic, we have entered an “infodemic” era where the volume of disinformation, as well as the harm it causes have reached unprecedented levels. For example, health disinformation has contributed to vaccine hesitancy. On the other hand, even though the proliferation of online disinformation seems to suggest …


Mental Health Mobile Apps And The Need To Update Federal Regulations To Protect Users, Kewa Jiang Apr 2022

Mental Health Mobile Apps And The Need To Update Federal Regulations To Protect Users, Kewa Jiang

Michigan Technology Law Review

With greater societal emphasis on the need for better mental health services coupled with COVID-19 limits, mental health mobile applications have significantly risen in variety, availability, and accessibility. As more consumers use mental health mobile applications, more data is generated and collected by mobile application companies. However, consumers may have the false assumption that the data collected is protected under HIPAA or have an expectation of privacy protection higher than current regulations afford. This Note examines HIPAA, Health Breach Notification Rule, and section 5 of the Federal Trade Commission Act, as well as how these regulations fall short of protecting …


Unreasonable: A Strict Liability Solution To The Ftc’S Data Security Problem, James C. Cooper, Bruce H. Kobayashi Apr 2022

Unreasonable: A Strict Liability Solution To The Ftc’S Data Security Problem, James C. Cooper, Bruce H. Kobayashi

Michigan Technology Law Review

For over two decades, the FTC creatively employed its capacious statute to police against shoddy data practices. Although the FTC’s actions were arguably needed at the time to fill a gap in enforcement, there are reasons to believe that its current approach has outlived its usefulness and is in serious need of updating. In particular, our analysis shows that the FTC’s current approach to data security is unlikely to instill anything close to optimal incentives for data holders. These shortcomings cannot be fixed through changes to the FTC enforcement approach, as they are largely generated by a mismatch between the …


The Best Data Plan Is To Have A Game Plan: Obstacles And Solutions To Reaching International Data Privacy Agreements, James Y. Wang Apr 2022

The Best Data Plan Is To Have A Game Plan: Obstacles And Solutions To Reaching International Data Privacy Agreements, James Y. Wang

Michigan Technology Law Review

The modern digital world relies on the instantaneous transfer of data. This digital highway is essential for the growth of the modern digital economy and contributes to the rise of globalization. In order to facilitate these data transfers, ground rules must first be put into place. To date, there are few, if any, binding international data privacy agreements. This is in part due to practical considerations, such as high administrability costs, inadequate enforcement agencies, and complex jurisdictional procedures. More fundamentally, however, this is due to competing incentive structures, as countries are incentivized to protect their own digital sovereignty by limiting …


The Ping-Pong Olympics Of Antisuit Injunction In Frand Litigation, King Fung Tsang, Jyh-An Lee Apr 2022

The Ping-Pong Olympics Of Antisuit Injunction In Frand Litigation, King Fung Tsang, Jyh-An Lee

Michigan Technology Law Review

In the past two years, antisuit injunctions (ASIs) and subsequent legal proceedings associated with standard-essential patents (SEPs) subject to fair, reasonable, and nondiscriminatory (FRAND) commitments have proliferated in multiple jurisdictions. This phenomenon reveals not only the transnational nature of technical standards and FRAND-encumbered SEPs but also the jurisdictional tension between different national courts. This Article explains the emergence of ASIs in FRAND scenarios and recent developments in six jurisdictions with major interests in standard development and adoption. Countries have developed different approaches to ASIs based on their own domestic rules and interests. We believe that to promote technical compatibility and …


The “License As Tax” Fallacy, Jonathan M. Barnett Jan 2022

The “License As Tax” Fallacy, Jonathan M. Barnett

Michigan Technology Law Review

Intellectual property licenses are commonly portrayed as a “tax” that limits access to technology assets, which in turn stunts innovation by intermediate users and inflates prices for end-users. Renewed skepticism toward IP licensing, and associated judicial and regulatory interventions that apply per se-like liability rules under patent and antitrust law to IP licensing, overlook the fact that IP licenses typically play a “positive-sum” enabling function, rather than a “zero-sum” exclusionary function, by mitigating expropriation risks that would otherwise frustrate transactions between the holders of complementary specialized IP and non-IP assets. As illustrated by paradigm examples of licensing and other IP-dependent …


Nhtsa Up In The Clouds: The Formal Recall Process & Over-The-Air Software Updates, Emma Himes Dec 2021

Nhtsa Up In The Clouds: The Formal Recall Process & Over-The-Air Software Updates, Emma Himes

Michigan Technology Law Review

Software updates are pushed to vehicles “over-the-air” (OTA) with increasing frequency as they reduce costs of visiting dealerships and auto shops to receive maintenance. These updates, pushed from the cloud, have been used to remedy safety defects in vehicles and improve software controlling all aspects of vehicles from steering to rearview mirrors. Remedies of vehicle safety defects are overseen by the National Highway Traffic Safety Administration (NHTSA); however, because many OTA software updates do not remedy issues officially deemed safety defects, they are pushed straight from the manufacturer to drivers with little government oversight or transparency. NHTSA’s recall process was …


Content Moderation Remedies, Eric Goldman Dec 2021

Content Moderation Remedies, Eric Goldman

Michigan Technology Law Review

This Article addresses a critical but underexplored aspect of content moderation: if a user’s online content or actions violate an Internet service’s rules, what should happen next? The longstanding expectation is that Internet services should remove violative content or accounts from their services as quickly as possible, and many laws mandate that result. However, Internet services have a wide range of other options—what I call “remedies”—they can use to redress content or accounts that violate the applicable rules. This Article describes dozens of remedies that Internet services have actually imposed. It then provides a normative framework to help Internet services …


Arms Control 2.0: Updating The Cyberweapon Arms Control Framework, Evan Mulbry Dec 2021

Arms Control 2.0: Updating The Cyberweapon Arms Control Framework, Evan Mulbry

Michigan Technology Law Review

This Note analyzes multiple problems with the existing arms control framework for cyberweapons as well as surveillance technology and calls for four specific areas of reform. First, the existing framework does not specifically enumerate the software controlled under existing arms control treaties, which can lead to gaps in international export control compliance. Cyberweapons should be enumerated with greater specificity to prevent confusing and disjointed implementation by states. Second, the divide between Wassenaar and Shanghai Cooperation Organization conceptions of what constitutes a cyberweapon reduces the effectiveness of international control because nations do not share an agreed upon cyberweapon definition. States should …


An Empirical Study: Willful Infringement & Enhanced Damages In Patent Law After Halo, Karen E. Sandrik Dec 2021

An Empirical Study: Willful Infringement & Enhanced Damages In Patent Law After Halo, Karen E. Sandrik

Michigan Technology Law Review

For decades, companies and attorneys have instructed teams of engineers, researchers, and computer scientists to ignore patents. The reasoning for this advice: if there is no pre-suit knowledge of a patent, then it is nearly impossible for a patent holder to prove that enhanced damages are warranted. Pre-suit knowledge is a prerequisite for a finding of willful infringement, which is itself a prerequisite for awarding enhanced damages. The median patent damages award is around ten million dollars, and large companies like Intel, Teva Pharmaceuticals, Microsoft, and Abbott Laboratories have all recently faced billion-dollar patent infringement judgments. In this landscape, a …


Individuals As Gatekeepers Against Data Misuse, Ying Hu Dec 2021

Individuals As Gatekeepers Against Data Misuse, Ying Hu

Michigan Technology Law Review

This article makes a case for treating individual data subjects as gatekeepers against misuse of personal data. Imposing gatekeeper responsibility on individuals is most useful where (a) the primary wrongdoers engage in data misuse intentionally or recklessly; (b) misuse of personal data is likely to lead to serious harm; and (c) one or more individuals are able to detect and prevent data misuse at a reasonable cost.

As gatekeepers, individuals should have a legal duty to take reasonable measures to prevent data misuse where they are aware of facts indicating that the person seeking personal data from them is highly …


Pushing Back On Stricter Copyright Isp Liability Rules, Pamela Samuelson Apr 2021

Pushing Back On Stricter Copyright Isp Liability Rules, Pamela Samuelson

Michigan Technology Law Review

For more than two decades, internet service providers (ISPs) in the United States, the European Union (EU), and many other countries have been shielded from copyright liability under “safe harbor” rules. These rules apply to ISPs who did not know about or participate in user-uploaded infringements and who take infringing content down after receiving notice from rights holders. Major copyright industry groups were never satisfied with these safe harbors, and their dissatisfaction has become more strident over time as online infringements have grown to scale.

Responding to copyright industry complaints, the EU in 2019 adopted its Directive on Copyright and …


Mitochondrial Replacement Therapy: Let The Science Decide, Sabrina K. Glavota Apr 2021

Mitochondrial Replacement Therapy: Let The Science Decide, Sabrina K. Glavota

Michigan Technology Law Review

Mitochondrial replacement therapy (MRT) is an in vitro fertilization technique designed to prevent women who are carriers of mitochondrial diseases from passing on these heritable genetic diseases to their children. It is an innovative assisted reproductive technology that is only legal in a small number of countries. The United States has essentially stagnated all opportunities for research and clinical trials on MRT through a rider in H.R.2029 – Consolidated Appropriations Act, 2016. The rider bans clinical trials on all therapies in which a human embryo is intentionally altered to include a heritable genetic modification. This note argues that the rider …


The Right To An Artificial Reality? Freedom Of Thought And The Fiction Of Philip K. Dick, Marc Jonathan Blitz Apr 2021

The Right To An Artificial Reality? Freedom Of Thought And The Fiction Of Philip K. Dick, Marc Jonathan Blitz

Michigan Technology Law Review

In Anarchy, State, and Utopia, the philosopher Robert Nozick describes what he calls an “Experience Machine.” In essence, it produces a form of virtual reality (VR). People can use it to immerse themselves in a custom-designed dream: They have the experience of climbing a mountain, reading a book, or conversing with a friend when they are actually lying isolated in a tank with electrodes feeding perceptions into their brain. Nozick describes the Experience Machine as part of a philosophical thought experiment—one designed to show that a valuable life consists of more than mental states, like those we receive in …


Taking It With You: Platform Barriers To Entry And The Limits Of Data Portability, Gabriel Nicholas Apr 2021

Taking It With You: Platform Barriers To Entry And The Limits Of Data Portability, Gabriel Nicholas

Michigan Technology Law Review

Policymakers are faced with a vexing problem: how to increase competition in a tech sector dominated by a few giants. One answer proposed and adopted by regulators in the United States and abroad is to require large platforms to allow consumers to move their data from one platform to another, an approach known as data portability. Facebook, Google, Apple, and other major tech companies have enthusiastically supported data portability through their own technical and political initiatives. Today, data portability has taken hold as one of the go-to solutions to address the tech industry’s competition concerns.

This Article argues that despite …


How Can I Tell If My Algorithm Was Reasonable?, Karni A. Chagal-Feferkorn Apr 2021

How Can I Tell If My Algorithm Was Reasonable?, Karni A. Chagal-Feferkorn

Michigan Technology Law Review

Self-learning algorithms are gradually dominating more and more aspects of our lives. They do so by performing tasks and reaching decisions that were once reserved exclusively for human beings. And not only that—in certain contexts, their decision-making performance is shown to be superior to that of humans. However, as superior as they may be, self-learning algorithms (also referred to as artificial intelligence (AI) systems, “smart robots,” or “autonomous machines”) can still cause damage.

When determining the liability of a human tortfeasor causing damage, the applicable legal framework is generally that of negligence. To be found negligent, the tortfeasor must have …


Enabling Science Fiction, Camilla A. Hrdy, Daniel H. Brean Apr 2021

Enabling Science Fiction, Camilla A. Hrdy, Daniel H. Brean

Michigan Technology Law Review

Patent law promotes innovation by giving inventors 20-year-long exclusive rights to their inventions. To be patented, however, an invention must be “enabled,” meaning the inventor must describe it in enough detail to teach others how to make and use the invention at the time the patent is filed. When inventions are not enabled, like a perpetual motion machine or a time travel device, they are derided as “mere science fiction”—products of the human mind, or the daydreams of armchair scientists, that are not suitable for the patent system.

This Article argues that, in fact, the literary genre of science fiction …


Association For Molecular Pathology V. Myriad Genetics: A Critical Reassessment, Jorge L. Contreras Jan 2021

Association For Molecular Pathology V. Myriad Genetics: A Critical Reassessment, Jorge L. Contreras

Michigan Technology Law Review

The Supreme Court’s 2013 decision in Association for Molecular Pathology v. Myriad Genetics is an essential piece of the Court’s recent quartet of patent eligibility decisions, which also includes Bilski v. Kappos, Mayo v. Prometheus, and Alice v. CLS Bank. Each of these decisions has significantly shaped the contours of patent eligibility under Section 101 of the Patent Act in ways that have been both applauded and criticized. The Myriad case, however, was significant beyond its impact on Section 101 jurisprudence. It was seen, and litigated, as a case impacting patient rights, access to healthcare, scientific freedom, …


From Automation To Autonomy: Legal And Ethical Responsibility Gaps In Artificial Intelligence Innovation, David Nersessian, Ruben Mancha Jan 2021

From Automation To Autonomy: Legal And Ethical Responsibility Gaps In Artificial Intelligence Innovation, David Nersessian, Ruben Mancha

Michigan Technology Law Review

The increasing prominence of artificial intelligence (AI) systems in daily life and the evolving capacity of these systems to process data and act without human input raise important legal and ethical concerns. This article identifies three primary AI actors in the value chain (innovators, providers, and users) and three primary types of AI (automation, augmentation, and autonomy). It then considers responsibility in AI innovation from two perspectives: (i) strict liability claims arising out of the development, commercialization, and use of products with built-in AI capabilities (designated herein as “AI artifacts”); and (ii) an original research study on the ethical practices …


The Contribution Of Eu Law To The Regulation Of Online Speech, Luc Von Danwitz Jan 2021

The Contribution Of Eu Law To The Regulation Of Online Speech, Luc Von Danwitz

Michigan Technology Law Review

Internet regulation in the European Union (EU) is receiving significant attention and criticism in the United States. The European Court of Justice’s (ECJ) judgment in the case Glawischnig-Piesczek v. Facebook Ireland, in which the ECJ found a take-down order against Facebook for defamatory content with global effect permissible under EU law, was closely scrutinized in the United States. These transsystemic debates are valuable but need to be conducted with a thorough understanding of the relevant legal framework and its internal logic. This note aims to provide the context to properly assess the role the ECJ and EU law play …


Will The "Legal Singularity" Hollow Out Law's Normative Core?, Robert F. Weber Jan 2021

Will The "Legal Singularity" Hollow Out Law's Normative Core?, Robert F. Weber

Michigan Technology Law Review

This Article undertakes a critical examination of the unintended consequences for the legal system if we arrive at the futurist dream of a legal singularity—the moment when predictive, mass-data technologies evolve to create a perfectly predictable, algorithmically-expressed legal system bereft of all legal uncertainty. It argues that although the singularity would surely enhance the efficiency of the legal system in a narrow sense, it would also undermine the rule of law, a bedrock institution of any liberal legal order and a key source of the legal system’s legitimacy. It would do so by dissolving the normative content of the two …


From Inactivity To Full Enforcement: The Implementation Of The "Do No Harm" Approach In Initial Coin Offerings, Marco Dell'erba May 2020

From Inactivity To Full Enforcement: The Implementation Of The "Do No Harm" Approach In Initial Coin Offerings, Marco Dell'erba

Michigan Technology Law Review

This Article analyzes the way the Securities and Exchange Commission (“SEC”) has enforced securities laws with regard to Initial Coin Offerings (“ICOs”). In a speech held in 2016, the U.S. Commodities Futures Trading Commission (“CFTC”) Chairman Christopher Giancarlo emphasized the similarities between the advent of the blockchain technology and the Internet era. He offered the “do no harm” approach as the best way to regulate blockchain technology. The Clinton administration implemented the “do no harm” approach at the beginning of the Internet Era in the 1990s when regulators sought to support technological innovations without stifling them with burdensome rules.

This …


Exploring Lawful Hacking As A Possible Answer To The "Going Dark" Debate, Carlos Liguori May 2020

Exploring Lawful Hacking As A Possible Answer To The "Going Dark" Debate, Carlos Liguori

Michigan Technology Law Review

The debate on government access to encrypted data, popularly known as the “going dark” debate, has intensified over the years. On the one hand, law enforcement authorities have been pushing for mandatory exceptional access mechanisms on encryption systems in order to enable criminal investigations of both data in transit and at rest. On the other hand, both technical and industry experts argue that this solution compromises the security of encrypted systems and, thus, the privacy of their users. Some claim that other means of investigation could provide the information authorities seek without weakening encryption, with lawful hacking being one of …