Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Law

Consumer Preferences For Performance Defaults, Franklin G. Snyder, Ann M. Mirabito Oct 2016

Consumer Preferences For Performance Defaults, Franklin G. Snyder, Ann M. Mirabito

Michigan Business & Entrepreneurial Law Review

Commercial law in the United States is designed to facilitate private transactions, and thus to enforce the presumed intent of the parties, who generally are free to negotiate the terms they choose. But these contracts inevitably have gaps, both because the parties cannot anticipate every situation that might arise from their relationship, and because negotiation is not costless. When courts are faced with these gaps in a litigation context, they supply default terms to fill them. These defaults usually are set to reflect what courts believe similar parties would have agreed to if they had addressed the issue. These “majoritarian” …


Patent Privateers And Antitrust Fears, Matthew Sipe Jul 2016

Patent Privateers And Antitrust Fears, Matthew Sipe

Michigan Telecommunications & Technology Law Review

Patent trolls are categorically demonized as threatening American innovation and industry. But whether they are a threat that antitrust law is equipped to deal with is a complex question that depends on the particular type of patent troll and activities they engage in. This Article looks specifically at privateer patent trolls: entities that acquire their patents from operating entities and assert them against other industry members. In the particular context of privateering, antitrust law is almost certainly not the proper legal solution. Privateering does raise significant issues: circumventing litigation constraints, evading licensing obligations, and raising the cost and frequency of …


Three Problems (And Two Solutions) In The Law Of Partnership Formation, Shawn Bayern Apr 2016

Three Problems (And Two Solutions) In The Law Of Partnership Formation, Shawn Bayern

University of Michigan Journal of Law Reform

This Article considers several foundational questions concerning the formation of general partnerships, a topic that has received little modern attention and that is governed largely by classical axioms rather than adaptive modern considerations. Its three main topics concern (1) the timing of partnership formation, (2) the aggregation of multiple distinct questions under the single heading of “partnership formation,” and (3) the rarely challenged proposition that general partners ought to be liable for partnership obligations, a doctrine that is surprisingly at odds with the rest of modern business-entity law.


Property, Duress, And Consensual Relationships, David Blankfein-Tabachnick Apr 2016

Property, Duress, And Consensual Relationships, David Blankfein-Tabachnick

Michigan Law Review

Professor Seana Valentine Shiffrin has produced an exciting new book, Speech Matters: On Lying, Morality, and the Law. Shiffrin’s previous rigorous, careful, and morally sensitive work spans contract law, intellectual property, and the freedoms of association and expression. Speech Matters is in line with Shiffrin’s signature move: we ought to reform our social practices and legal and political institutions to, in various ways, address or accommodate moral values—here, a stringent moral prohibition against lying, a strident principle of promissory fidelity, that is, the principle that one ought to keep one’s promises, and the general value of veracity. The book …


Protecting Personal Information: Achieving A Balance Between User Privacy And Behavioral Targeting, Patrick Myers Jan 2016

Protecting Personal Information: Achieving A Balance Between User Privacy And Behavioral Targeting, Patrick Myers

University of Michigan Journal of Law Reform

Websites and mobile applications provide immeasurable benefits to both users and companies. These services often collect vast amounts of personal information from the individuals that use them, including sensitive details such as Social Security numbers, credit card information, and physical location. Personal data collection and dissemination leave users vulnerable to various threats that arise from the invasion of their privacy, particularly because users are often ignorant of the existence or extent of these practices. Current privacy law does not provide users with adequate protection from the risks attendant to the collection and dissemination of their personal information. This Note advocates …