Open Access. Powered by Scholars. Published by Universities.®

Science and Technology Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Administrative Law

2015

Institution
Keyword
Publication
Publication Type
File Type

Articles 1 - 22 of 22

Full-Text Articles in Science and Technology Law

Regulatory Competitive Shelters In The Area Of Personalized Medicine, Yaniv Heled Nov 2015

Regulatory Competitive Shelters In The Area Of Personalized Medicine, Yaniv Heled

Yaniv Heled

No abstract provided.


Regulating Drug Promotion To Promote The Public Health: A Response To Bennett, Et Al., Patricia J. Zettler Nov 2015

Regulating Drug Promotion To Promote The Public Health: A Response To Bennett, Et Al., Patricia J. Zettler

Faculty Publications By Year

No abstract provided.


Network Neutrality And The First Amendment, Andrew Patrick, Eric Scharphorn Oct 2015

Network Neutrality And The First Amendment, Andrew Patrick, Eric Scharphorn

Michigan Telecommunications & Technology Law Review

The First Amendment reflects the conviction that the widest possible dissemination of information from diverse and antagonistic sources is essential to public welfare. Like the printing press, the Internet has dramatically transformed the marketplace of ideas by providing unprecedented opportunities for individuals to communicate. Though its growth continues to be phenomenal, broadband service providers— acting as Internet gatekeepers—have developed the ability to discriminate against specific content and applications. First, these gatekeepers intercept and inspect data transferred over public networks, then selectively block or slow it. This practice has the potential to stifle the Internet’s value as a speech platform by …


The Privacy Dilemma In Digital Arrestee Mug Shots Under The Foia 7(C) And State And Local Policy Recommendations, Ahad Syed Aug 2015

The Privacy Dilemma In Digital Arrestee Mug Shots Under The Foia 7(C) And State And Local Policy Recommendations, Ahad Syed

Ahad Syed

This Article examines the purpose and interpretation by courts of Freedom of Information Act’s 7(C) Exemption. Specifically, the Article sets out to unravel the current federal circuit court split over Exemption 7(C) by examining its application to the digital privacy dilemma as applied to arrestee photographs, commonly known as “mug shots.” Automated data-scraping programs continuously scour the internet, reaping, replicating, and reposting photographs of arrestees who may or may not have had charges dismissed in order to shame them into paying website owners for removal. While other commentators have argued for state law penalizing pay-to-remove mug shot websites only, this …


Compassionate Use Of Experimental Therapies: Who Should Decide?, Patricia J. Zettler Jul 2015

Compassionate Use Of Experimental Therapies: Who Should Decide?, Patricia J. Zettler

Faculty Publications By Year

In addition to being an example of unsubstantiated hype about regenerative medicine, the controversy around the Italy-based Stamina Foundation's unproven stem cell therapy represents another chapter in a continuing debate about how to balance patients' requests for early access to experimental medicines with requirements for demonstrating safety and effectiveness. Compassionate use of the Stamina therapy arguably should not have been permitted under Italy's laws, but public pressure was intense and judges ultimately granted access. One lesson from these events is that expert regulatory agencies may be the institutions most competent to make compassionate use decisions and that policies should include …


The Evolution Of Internet Service Providers From Partners To Adversaries: Tracking Shifts In Interconnection Goals And Strategies In The Internet’S Fifth Generation, Rob Frieden Jul 2015

The Evolution Of Internet Service Providers From Partners To Adversaries: Tracking Shifts In Interconnection Goals And Strategies In The Internet’S Fifth Generation, Rob Frieden

Rob Frieden

At the Internet’s inception, carriers providing the bit switching and transmission function largely embraced expanding connections and users as a primary service goal. These ventures refrained from metering traffic and charging for carriage based on the assumption that traffic volumes roughly matched, or that traffic measurement was not worth the bother in light of external funding from government grants. Most Internet Service Providers (“ISPs”) bartered network access through a process known as peering in lieu of metering traffic and billing for network use. As governments removed subsidies and commercial carriers invested substantial funds to build larger and faster networks, identifying …


Regulatory Competitive Shelters In The Area Of Personalized Medicine, Yaniv Heled Jul 2015

Regulatory Competitive Shelters In The Area Of Personalized Medicine, Yaniv Heled

Faculty Publications By Year

No abstract provided.


Closing The Door To Lost Earnings Under The National Childhood Vaccine Injury Act Of 1986, Aaron M. Levin Jun 2015

Closing The Door To Lost Earnings Under The National Childhood Vaccine Injury Act Of 1986, Aaron M. Levin

Aaron M Levin

After a wave of lawsuits against vaccine manufacturers hindered the profitability and production of life-saving vaccines, Congress enacted The National Childhood Vaccine Injury Act of 1986. The Act offers an incentive for individuals to get vaccinated in order to mitigate the population’s exposure to disease, while encouraging the continued production of these serums by pharmaceutical companies. Although imperfect, the Vaccine Act fosters promise in filtering out frivolous claims and provides a central route for due process to the individuals who suffer from a vaccine-related injury. By removing a potential state tort issue to the Federal Circuit, Congress created a reasonably …


When Nominal Is Reasonable: Damages For The Unpracticed Patent, Oskar Liivak Jun 2015

When Nominal Is Reasonable: Damages For The Unpracticed Patent, Oskar Liivak

Oskar Liivak

To obtain a substantial patent damage award a patentee need not commercialize the patented invention; the patentee need only show that its patent was infringed. This surely incentivizes patenting but it dis-incentivizes innovation. Why commercialize yourself? The law allows you to wait for others to take the risks, and then you emerge later to lay claim to “in no event less than a reasonable” fraction of other people’s successes. It is rational to be a patent troll rather than an innovator. This troll-enabling interpretation of patent law’s reasonable royalty provision, however, is wrong as a matter of patent policy. Surprisingly, …


Rulemaking Vs. Democracy: Judging And Nudging Public Participation That Counts , Cynthia R. Farina, Mary Newhart, Josiah Heidt Jun 2015

Rulemaking Vs. Democracy: Judging And Nudging Public Participation That Counts , Cynthia R. Farina, Mary Newhart, Josiah Heidt

Cynthia R. Farina

This Article considers how open government “magical thinking” around technology has infused efforts to increase public participation in rulemaking. We propose a framework for assessing the value of technology-enabled rulemaking participation and offer specific principles of participation-system design, which are based on conceptual work and practical experience in the Regulation Room project at Cornell University. An underlying assumption of open government enthusiasts is that more public participation will lead to better government policymaking: If we use technology to give people easier opportunities to participate in public policymaking, they will use these opportunities to participate effectively. However, experience thus far with …


Instrument Choice, Carbon Emissions, And Information, Michael Wara May 2015

Instrument Choice, Carbon Emissions, And Information, Michael Wara

Michigan Journal of Environmental & Administrative Law

This Article examines the consequences of a previously unrecognized difference between pollutant cap-and-trade schemes and pollution taxes. Implementation of cap-and-trade relies on a forecast of future emissions, while implementation of a pollution tax does not. Realistic policy designs using either regulatory instrument almost always involve a phase-in over time to avoid economic disruption. Cap-and-trade accomplishes this phase-in via a limit on emissions that falls gradually below the forecast of future pollutant emissions. Emissions taxation accomplishes the same via a gradually increasing levy on pollution. Because of the administrative complexity of establishing an emissions trading market, cap-and-trade programs typically require between …


Sacrificing Privacy For Convenience: The Need For Stricter Ftc Regulations In An Age Of Smartphone Surveillance, Ashton Mckinnon May 2015

Sacrificing Privacy For Convenience: The Need For Stricter Ftc Regulations In An Age Of Smartphone Surveillance, Ashton Mckinnon

Journal of the National Association of Administrative Law Judiciary

This comment aims to focus on the most frequently used connector that consumers treasure not only for convenience but also as a lifelong necessity - the smartphone. The FTC needs to enforce federally mandated guidelines that will allow the consumer to use technology without the technology using the consumer. Part II of this comment focuses on the type of information that can be collected by various companies, service providers, and agencies from an individual's smartphone, and the intentions of these collectors behind use of this information. Part III evaluates how applications (apps) contribute to this scheme, and, specifically, apps' recordkeeping …


The Export Administration Act's Technical Data Regulations: Do They Violate The First Amendment?, Kenneth Kalivoda May 2015

The Export Administration Act's Technical Data Regulations: Do They Violate The First Amendment?, Kenneth Kalivoda

Georgia Journal of International & Comparative Law

No abstract provided.


Hello Barbie: First They Will Monitor You, Then They Will Discriminate Against You. Perfectly, David S. Olson, Irina D. Manta Mar 2015

Hello Barbie: First They Will Monitor You, Then They Will Discriminate Against You. Perfectly, David S. Olson, Irina D. Manta

David S. Olson

This Article argues that the evolution of software — and the looming age of the “Internet of Things” — will allow manufacturers to make use of consumer monitoring technologies and restrictive software licenses to more perfectly price discriminate. First, the increasing communication between software and its producers gives more opportunities to monitor consumer behavior and characteristics. Second, attaching restrictive copyright licenses to software, and to goods containing software, enables producers to restrict use and resale of their products. By combining monitoring and restrictive licensing, producers will have increasingly better ability and opportunities to price discriminate among their consumers.

This Article …


Protection Of Computers And Computer Software Before The United States International Trade Commission: In Re Certain Personal Computers And Components Thereof, Nicholas N. Leach Mar 2015

Protection Of Computers And Computer Software Before The United States International Trade Commission: In Re Certain Personal Computers And Components Thereof, Nicholas N. Leach

Georgia Journal of International & Comparative Law

No abstract provided.


Regulating Cyber-Security, Nathan Alexander Sales Jan 2015

Regulating Cyber-Security, Nathan Alexander Sales

Northwestern University Law Review

The conventional wisdom is that this country’s privately owned critical infrastructure—banks, telecommunications networks, the power grid, and so on—is vulnerable to catastrophic cyber-attacks. The existing academic literature does not adequately grapple with this problem, however, because it conceives of cyber-security in unduly narrow terms: most scholars understand cyber-attacks as a problem of either the criminal law or the law of armed conflict. Cyber-security scholarship need not run in such established channels. This Article argues that, rather than thinking of private companies merely as potential victims of cyber-crimes or as possible targets in cyber-conflicts, we should think of them in administrative …


Can You Diagnose Me Now? A Proposal To Modify The Fda’S Regulation Of Smartphone Mobile Health Applications With A Pre-Market Notification And Application Database Program, Stephen Mcinerney Jan 2015

Can You Diagnose Me Now? A Proposal To Modify The Fda’S Regulation Of Smartphone Mobile Health Applications With A Pre-Market Notification And Application Database Program, Stephen Mcinerney

University of Michigan Journal of Law Reform

Advances in mobile technology continually create new possibilities for the future of medical care. Yet these changes have also created concerns about patient safety. Under the Food, Drug, and Cosmetic Act, the Food and Drug Administration (FDA) has the authority to regulate a broad spectrum of products beyond traditional medical devices like stethoscopes or pacemakers. The regulatory question is not if the FDA has the statutory authority to regulate health-related software, but rather how it will exercise its regulatory authority. In September 2013, the FDA published Final Guidance on Mobile Medical Applications; in it, the Agency limited its oversight to …


Encouraging Maternal Sacrifice: How Regulations Governing The Consumption Of Pharmaceuticals During Pregnancy Prioritize Fetal Safety Over Maternal Health And Autonomy, Greer Donley Jan 2015

Encouraging Maternal Sacrifice: How Regulations Governing The Consumption Of Pharmaceuticals During Pregnancy Prioritize Fetal Safety Over Maternal Health And Autonomy, Greer Donley

Articles

Pregnant women are routinely faced with the stressful decision of whether to consume needed medications during their pregnancies. Because the risks associated with pharmaceutical drug consumption during pregnancy are largely unknown, pregnant women both inadvertently consume dangerous medications and avoid needed drugs. Both outcomes are harmful to pregnant women and their fetuses. This unparalleled lack of drug safety information is a result of ill-conceived, paternalistic regulations in two areas of the law: regulations governing ethical research in human subjects and regulations that dictate the required labels on drugs. The former categorizes pregnant women as “vulnerable” and thus precludes them from …


Reasonable Expectations Of Privacy Settings: Social Media And The Stored Communications Act, David Thaw, Christopher Borchert, Fernando Pinguelo Jan 2015

Reasonable Expectations Of Privacy Settings: Social Media And The Stored Communications Act, David Thaw, Christopher Borchert, Fernando Pinguelo

Articles

In 1986, Congress passed the Stored Communications Act (“SCA”) to provide additional protections for individuals’ private communications content held in electronic storage by third parties. Acting out of direct concern for the implications of the Third-Party Records Doctrine — a judicially created doctrine that generally eliminates Fourth Amendment protections for information entrusted to third parties — Congress sought to tailor the SCA to electronic communications sent via and stored by third parties. Yet, because Congress crafted the SCA with language specific to the technology of 1986, courts today have struggled to apply the SCA consistently with regard to similar private …


Who Regulates The Robots, Margot Kaminski Jan 2015

Who Regulates The Robots, Margot Kaminski

Publications

No abstract provided.


Agency Boundaries And Network Neutrality, Tejas N. Narechania Dec 2014

Agency Boundaries And Network Neutrality, Tejas N. Narechania

Tejas N. Narechania

The Federal Communications Commission’s latest network neutrality regulations, released in 2015, have been the subject of compliment and critique by a varied set of politicians, industry leaders, and scholars. But a potentially surprising font of criticism for these new rules lies within the administration itself: During the FCC’s rule-making proceeding, the Federal Trade Commission cautioned that the FCC could undermine the FTC’s authority to sanction unfair and anticompetitive conduct in broadband industries by activating its powers under Title II of the Communications Act. Simultaneously, members of the FTC argued that it, rather than the FCC, was better suited to address …


Law Abiding Drones, Henry H. Perritt Jr., Eliot O. Sprague Dec 2014

Law Abiding Drones, Henry H. Perritt Jr., Eliot O. Sprague

Henry H. Perritt, Jr.

Law Abiding Drones