Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Intellectual Property Law (8)
- Internet Law (5)
- First Amendment (4)
- Science and Technology Law (4)
- Communications Law (3)
-
- Legislation (3)
- Privacy Law (3)
- Supreme Court of the United States (3)
- Administrative Law (2)
- Constitutional Law (2)
- Health Law and Policy (2)
- Litigation (2)
- Civil Procedure (1)
- Computer Law (1)
- Courts (1)
- Criminal Law (1)
- Energy and Utilities Law (1)
- Environmental Law (1)
- Evidence (1)
- Food and Drug Law (1)
- Juvenile Law (1)
- Legal History (1)
- Natural Law (1)
- Oil, Gas, and Mineral Law (1)
- Public Law and Legal Theory (1)
- Rule of Law (1)
- State and Local Government Law (1)
- Transnational Law (1)
Articles 1 - 16 of 16
Full-Text Articles in Law
Tollbooths And Newsstands On The Information Superhighway, Brad A. Greenberg
Tollbooths And Newsstands On The Information Superhighway, Brad A. Greenberg
Michigan Telecommunications & Technology Law Review
Countering the perception that speech limitations affecting distribution necessarily reduce access to information, this Essay proffers that copyright expansions actually can increase access and thereby serve important copyright and First Amendment values. In doing so, this discussion contributes to the growing literature and two recent Supreme Court opinions discussing whether copyright law and First Amendment interests can coexist.
Fracking Patents: The Emergence Of Patents As Information-Containment Tools In Shale Drilling, Daniel R. Cahoy, Joel Gehman, Zhen Lei
Fracking Patents: The Emergence Of Patents As Information-Containment Tools In Shale Drilling, Daniel R. Cahoy, Joel Gehman, Zhen Lei
Michigan Telecommunications & Technology Law Review
The advantages of new sources of energy must be weighed against environmental, health, and safety concerns related to new production technology. The rapid development of unconventional oil and gas fields, such as the Barnett and Marcellus Shales, provide an excellent context for these contrasting goals. Information about extraction hazards is an extremely important issue. In general, patents are viewed as a positive force in this regard, providing a vehicle for disseminating information in exchange for a limited property right over an invention. However, by limiting the evaluation of an invention by third parties, patents might also be used to control …
Property As Control: The Case Of Information, Jane B. Baron
Property As Control: The Case Of Information, Jane B. Baron
Michigan Telecommunications & Technology Law Review
If heath policy makers' wishes come true, by the end of the current decade the paper charts in which most of our medical information is currently recorded will be replaced by networked electronic health records ("EHRs").[...] Like all computerized records, networked EHRs are difficult to secure, and the information in EHRs is both particularly sensitive and particularly valuable for commercial purposes. Sadly, the existing federal statute meant to address this problem, the Health Insurance Portability and Accountability Act of 1996 ("HIPAA"), is probably inadequate to the task.[...] Health law, privacy, and intellectual property scholars have all suggested that the river …
The People's Trade Secrets, David S. Levine
The People's Trade Secrets, David S. Levine
Michigan Telecommunications & Technology Law Review
The content of administered public school exams, modifications made by a government to its voting machines, and the business strategies of government corporations should be of interest to the public. At a minimum, they are the kinds of information that a government should allow its citizens to see and examine. After all, the public might have some legitimate questions for its government: Is that public school examination fair and accurate? Is that voting machine working so that my vote gets counted? To whom or what is that government agency marketing and are kickbacks involved? One would think that the government …
There Is A Time To Keep Silent And A Time To Speak, The Hard Part Is Knowing Which Is Which: Striking The Balance Between Privacy Protection And The Flow Of Health Care Information, Daniel J. Gilman, James C. Cooper
There Is A Time To Keep Silent And A Time To Speak, The Hard Part Is Knowing Which Is Which: Striking The Balance Between Privacy Protection And The Flow Of Health Care Information, Daniel J. Gilman, James C. Cooper
Michigan Telecommunications & Technology Law Review
Health information technology (HIT) has become a signal element of federal health policy, especially as the recently enacted American Recovery and Reinvestment Act of 2009 (Recovery Act or ARRA) comprises numerous provisions related to HIT and commits tens of billions of dollars to its development and adoption. These provisions charge various agencies of the federal government with both general and specific HIT-related implementation tasks including, inter alia, providing funding for HIT in various contexts: the implementation of interoperable HIT, HIT-related infrastructure, and HIT-related training and research. The Recovery Act also contains various regulatory provisions pertaining to HIT. Provisions of the …
It Is Time: Why The Fda Should Start Disclosing Drug Trial Data, Mustafa Ünlü
It Is Time: Why The Fda Should Start Disclosing Drug Trial Data, Mustafa Ünlü
Michigan Telecommunications & Technology Law Review
Although [drug] manufacturers bear the cost of research data generation, it is oftentimes a worthwhile investment that also confers significant commercial advantages. Consequently, they have argued that research data should be considered a trade secret and kept confidential. The FDA's longstanding position has been to accept this proposition. Even when Congress appeared to mandate disclosure or weaken the underlying rationale for secrecy, the FDA has continued to treat research data as confidential. A strong argument against a default posture of confidentiality is that research data disclosure would promote broad public interests by eliminating the societal costs brought about by keeping …
Corporate Cooperation Through Cost-Sharing, Nicola Faith Sharpe
Corporate Cooperation Through Cost-Sharing, Nicola Faith Sharpe
Michigan Telecommunications & Technology Law Review
Applying a game-theoretic approach based on the classic prisoners' dilemma provides valuable insights into corporate managers' decision-making incentives under existing discovery rules. It demonstrates that the fee structure imposed by current discovery rules leads to inefficiency and motivates corporate litigants on either side of a controversy to employ abusive discovery practices, although each party would benefit from cooperation. Using this framework, this Article shows how a cost-sharing regime can motivate litigants to engage in cooperative discovery and, as a consequence, facilitate more efficient and less abusive discovery practices. To date, scholars, who have posited that cooperative behavior in the discovery …
Fcc Jurisdiction Over Isps In Protocol-Specific Bandwidth Throttling, Andrew Gioia
Fcc Jurisdiction Over Isps In Protocol-Specific Bandwidth Throttling, Andrew Gioia
Michigan Telecommunications & Technology Law Review
Over the past decade, the Internet has matured from its dial-up infancy into the nation's dominant communications infrastructure. Such rapid growth and accessibility--while fostering free speech and innovation like nothing before--has nonetheless created complex regulatory and policy questions for both the Federal Communications Commission (FCC) and the cable companies providing the nation's broadband Internet access. For instance, Comcast, one such Internet provider, has recently brought to the fore the question of how, and to what extent, the FCC can ensure an open and accessible Internet through the company's recent actions in selectively targeting and interfering with the connections of certain …
Justice, And Only Justice, You Shall Pursue: Network Neutrality, The First Amendment And John Rawls's Theory Of Justice, Amit M. Schejter, Moran Yemini
Justice, And Only Justice, You Shall Pursue: Network Neutrality, The First Amendment And John Rawls's Theory Of Justice, Amit M. Schejter, Moran Yemini
Michigan Telecommunications & Technology Law Review
As broadband becomes the public's technology of choice to access the Internet, it is also emerging as the battlefield upon which the struggle for control of the Internet is being fought. Operators who provide physical access to the service claim the right to discriminate among the content providers who use the infrastructure in which the operators have invested. In contrast, content providers warn that exercising such a policy would "undermine the principles that have made the Internet such a success."[...] For academic observers, analysis of this issue has thus far been confined to the areas of property law, innovation, and …
Fair Use And The Digital Millennium Copyright Act, Thomas J. Loos
Fair Use And The Digital Millennium Copyright Act, Thomas J. Loos
Michigan Telecommunications & Technology Law Review
In the last decade of the 20th Century, more than 200 years after the first Copyright Act of 1790, the rights of copyright owners have increased relative to those of the public. The Visual Artists Rights Act of 1990 provided a limited right to visual artists to control their work; even after sold, limiting first use rights. The first copyright act had a 28 year term; in 1998, the term of copyright was increased to the life of the author plus 70 years. The Digital Millennium Copyright Act (DMCA) of 1998 dramatically shrank the fair use rights provided under 17 …
Trends In Protection For Informational Works Under Copyright Law During The 19th And 20th Centuries, Miriam Bitton
Trends In Protection For Informational Works Under Copyright Law During The 19th And 20th Centuries, Miriam Bitton
Michigan Telecommunications & Technology Law Review
The debate over databases protection has failed to identify and discuss some of its most basic and preliminary assumptions, accepting instead many of the historical aspects involved as given. This Article therefore seeks to challenge these underlying assumptions by providing a fresh look at the historical dimension of the debate. One common argument regarding database protection is that the U.S. Supreme Court decision in Feist v. Rural Publications Inc. brought about a dramatic change in the legal landscape, displacing the then-accepted "sweat of the brow" rationale for protecting rights in databases. This Article's historical analysis therefore thoroughly examines the treatment …
To Surf And Protect: The Children's Internet Protection Act Policies Material Harmful To Minors And A Whole Lot More, Michael B. Cassidy
To Surf And Protect: The Children's Internet Protection Act Policies Material Harmful To Minors And A Whole Lot More, Michael B. Cassidy
Michigan Telecommunications & Technology Law Review
This Note will examine the constitutional issues raised by installing Internet filtering software in public libraries. Part I explores the First Amendment, the standard of review for restricting Internet material, and the government's role in protecting minors and regulating speech. Part II discusses library patrons' First Amendment rights in public libraries. Part III provides the statutory framework of the E-rate and LSTA programs, as well as the Children's Internet Protection Act (CIPA). Part IV examines the effectiveness of current Internet filtering technology and provides the American Library Association's policies on Internet filtering in public libraries. Part V discusses the district …
Electronic Discovery Sanctions In The Twenty-First Century, Shira A. Scheindlin, Kachana Wangkeo
Electronic Discovery Sanctions In The Twenty-First Century, Shira A. Scheindlin, Kachana Wangkeo
Michigan Telecommunications & Technology Law Review
At the federal level, the Civil Rules Advisory Committee has responded to the "unique and necessary feature of computer systems--the automatic recycling, overwriting, and alteration of electronically stored information"--with a proposed amendment to Rule 37. The proposed Rule 37(f) would shield litigants from sanctions for the destruction of electronic data if the party "took reasonable steps to preserve the information after it knew or should have known the information was discoverable in the action" and "the failure resulted from the loss of the information because of the routine operation of the party's electronic information system." The safe harbor provision would …
Regulating Speech Across Borders: Technology Vs. Values, Matthew Fagin
Regulating Speech Across Borders: Technology Vs. Values, Matthew Fagin
Michigan Telecommunications & Technology Law Review
The disfavored status within international law of unilateral state-based regulations that target extraterritorial actors arises from the inherent challenges such actions represent to state sovereignty. In the context of the Internet, the complexity of choice-of-law analysis is heightened: regulations imposed by one state have the potential to effectively block communications to citizens of all states and undermine the conflicting regulatory aims of neighboring states. Early legal commentators built upon this cascading chilling effect of state-based regulation to proclaim both the futility and illegitimacy of state-based action in the online environment. Subsequent scholars have demonstrated the commensurability of state-based online regulation …
Constitutional Issues In Information Privacy, Fred H. Cate, Robert Litan
Constitutional Issues In Information Privacy, Fred H. Cate, Robert Litan
Michigan Telecommunications & Technology Law Review
The U.S. Constitution has been largely ignored in the recent flurry of privacy laws and regulations designed to protect personal information from incursion by the private sector despite the fact that many of these enactments and efforts to enforce them significantly implicate the First Amendment. Questions about the role of the Constitution have assumed new importance in the aftermath of the September 11, 2001 terrorist attacks on the World Trade Center and the Pentagon. Recent efforts to identify and apprehend terrorists and to protect against future attacks threaten to weaken constitutional protections against government intrusions into personal privacy. However, these …
Taking A Bite Out Of Circumvention: Analyzing 17 U.S.C. 1201 As A Criminal Law, Jason M. Schulz
Taking A Bite Out Of Circumvention: Analyzing 17 U.S.C. 1201 As A Criminal Law, Jason M. Schulz
Michigan Telecommunications & Technology Law Review
...information content providers who depend heavily on copyright law are growing increasingly wary of advances in digital technology that allow manipulation of their content and potentially diminish the effectiveness of their copyright protection. Technology firms, on the other hand, are looking more and more at developing products which provide low-cost, high quality access to content without restriction. Thus, as technologists work feverishly to find new ways to free up information, content providers are fighting just as hard to constrain access in order to prevent market-killing duplication and distribution of their works. These two codependent yet clashing interest groups recently met …