Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Science and Technology Law

PDF

University of Michigan Law School

Michigan Telecommunications & Technology Law Review

Access to information

Publication Year

Articles 1 - 4 of 4

Full-Text Articles in Law

There Is A Time To Keep Silent And A Time To Speak, The Hard Part Is Knowing Which Is Which: Striking The Balance Between Privacy Protection And The Flow Of Health Care Information, Daniel J. Gilman, James C. Cooper Jan 2010

There Is A Time To Keep Silent And A Time To Speak, The Hard Part Is Knowing Which Is Which: Striking The Balance Between Privacy Protection And The Flow Of Health Care Information, Daniel J. Gilman, James C. Cooper

Michigan Telecommunications & Technology Law Review

Health information technology (HIT) has become a signal element of federal health policy, especially as the recently enacted American Recovery and Reinvestment Act of 2009 (Recovery Act or ARRA) comprises numerous provisions related to HIT and commits tens of billions of dollars to its development and adoption. These provisions charge various agencies of the federal government with both general and specific HIT-related implementation tasks including, inter alia, providing funding for HIT in various contexts: the implementation of interoperable HIT, HIT-related infrastructure, and HIT-related training and research. The Recovery Act also contains various regulatory provisions pertaining to HIT. Provisions of the …


Corporate Cooperation Through Cost-Sharing, Nicola Faith Sharpe Jan 2009

Corporate Cooperation Through Cost-Sharing, Nicola Faith Sharpe

Michigan Telecommunications & Technology Law Review

Applying a game-theoretic approach based on the classic prisoners' dilemma provides valuable insights into corporate managers' decision-making incentives under existing discovery rules. It demonstrates that the fee structure imposed by current discovery rules leads to inefficiency and motivates corporate litigants on either side of a controversy to employ abusive discovery practices, although each party would benefit from cooperation. Using this framework, this Article shows how a cost-sharing regime can motivate litigants to engage in cooperative discovery and, as a consequence, facilitate more efficient and less abusive discovery practices. To date, scholars, who have posited that cooperative behavior in the discovery …


Electronic Discovery Sanctions In The Twenty-First Century, Shira A. Scheindlin, Kachana Wangkeo Oct 2004

Electronic Discovery Sanctions In The Twenty-First Century, Shira A. Scheindlin, Kachana Wangkeo

Michigan Telecommunications & Technology Law Review

At the federal level, the Civil Rules Advisory Committee has responded to the "unique and necessary feature of computer systems--the automatic recycling, overwriting, and alteration of electronically stored information"--with a proposed amendment to Rule 37. The proposed Rule 37(f) would shield litigants from sanctions for the destruction of electronic data if the party "took reasonable steps to preserve the information after it knew or should have known the information was discoverable in the action" and "the failure resulted from the loss of the information because of the routine operation of the party's electronic information system." The safe harbor provision would …


Taking A Bite Out Of Circumvention: Analyzing 17 U.S.C. 1201 As A Criminal Law, Jason M. Schulz Jun 2000

Taking A Bite Out Of Circumvention: Analyzing 17 U.S.C. 1201 As A Criminal Law, Jason M. Schulz

Michigan Telecommunications & Technology Law Review

...information content providers who depend heavily on copyright law are growing increasingly wary of advances in digital technology that allow manipulation of their content and potentially diminish the effectiveness of their copyright protection. Technology firms, on the other hand, are looking more and more at developing products which provide low-cost, high quality access to content without restriction. Thus, as technologists work feverishly to find new ways to free up information, content providers are fighting just as hard to constrain access in order to prevent market-killing duplication and distribution of their works. These two codependent yet clashing interest groups recently met …