Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 12 of 12

Full-Text Articles in Law

R-Egg-Ulation: A Call For Greater Regulation Of The Big Business Of Human Egg Harvesting, Danielle A. Vera Dec 2016

R-Egg-Ulation: A Call For Greater Regulation Of The Big Business Of Human Egg Harvesting, Danielle A. Vera

Michigan Journal of Gender & Law

When it comes to young healthy women “donating” their eggs, America has a regulation problem. This Note explains the science behind the harvesting of human eggs, focusing on potential egg donors, and describes the specific factors that make egg donation a unique type of transaction. It describes the current regulatory status of the assisted reproductive technology industry in the United States and highlights the ways in which this scheme fails to protect egg “donors.” This Note concludes with a call for comprehensive regulation of the assisted reproductive technology industry.


Optimal Property Rights For Emerging Natural Resources: A Case Study On Owning Atmospheric Moisture, Jianlin Chen Nov 2016

Optimal Property Rights For Emerging Natural Resources: A Case Study On Owning Atmospheric Moisture, Jianlin Chen

University of Michigan Journal of Law Reform

This Article critically examines the design of property rights for emerging natural resources—naturally occurring substances that humans have only recently come to be able to exploit viably—through a case study of how the fifty states allocate ownership in, and regulate the use of, atmospheric moisture, an issue that has emerged in the context of weather modification (particularly cloud seeding). Building on the surprising finding that legislative declarations of state ownership have not resulted in greater regulatory control or other substantial restrictions on private use, this Article highlights a dimension of property rights design that has yet to receive concerted scholarly …


Tightening The Ooda Loop: Police Militarization, Race, And Algorithmic Surveillance, Jeffrey L. Vagle Oct 2016

Tightening The Ooda Loop: Police Militarization, Race, And Algorithmic Surveillance, Jeffrey L. Vagle

Michigan Journal of Race and Law

This Article examines how military automated surveillance and intelligence systems and techniques, when used by civilian police departments to enhance predictive policing programs, have reinforced racial bias in policing. I will focus on two facets of this problem. First, I investigate the role played by advanced military technologies and methods within civilian police departments. These approaches have enabled a new focus on deterrence and crime prevention by creating a system of structural surveillance where decision support relies increasingly upon algorithms and automated data analysis tools and automates de facto penalization and containment based on race. Second, I will explore these …


Change In Regulation Is Necessary For Genetically Engineered Mosquitoes, Insung Hwang Oct 2016

Change In Regulation Is Necessary For Genetically Engineered Mosquitoes, Insung Hwang

Michigan Journal of Environmental & Administrative Law

Millions of genetically engineered (GE) mosquitoes could soon be released in Key West, Florida as an effort to eradicate wild mosquitoes that are transmitters of diseases such as malaria, dengue, and chikungunya. Both international and domestic regulations fail to provide effective regulatory schemes that can facilitate the application of this technology while ensuring all safety and environmental aspects are properly addressed. The Food and Drug Administration’s assertion of jurisdiction is based on its assessment that the GE mosquitoes are “animal drugs” under the Federal Food, Drug, and Cosmetic Act. This is especially troublesome because the end goal of using these …


A New Take On An Old Problem: Employee Misclassification In The Modern Gig-Economy, Jennifer Pinsof Jul 2016

A New Take On An Old Problem: Employee Misclassification In The Modern Gig-Economy, Jennifer Pinsof

Michigan Telecommunications & Technology Law Review

For decades, U.S. labor and employment law has used a binary employment classification system, labeling workers as either employees or independent contractors. Employees are granted a variety of legal protections, while independent contractors are not. However, the explosion of the gig-economy—which connects consumers with underutilized resources—has produced a growing number of workers who do not seem to fit into either category. Though far from traditional employees, gig-workers bear little resemblance to independent contractors. Forced to choose, however, most gig-economy companies label their workers as independent contractors, depriving them of many basic worker-protections. Gig-workers have turned to the courts, hoping to …


A Day In Court For Data Breach Plaintiffs: Preserving Standing Based On Increased Risk Of Identity Theft After Clapper V. Amnesty International Usa, Thomas Martecchini Jun 2016

A Day In Court For Data Breach Plaintiffs: Preserving Standing Based On Increased Risk Of Identity Theft After Clapper V. Amnesty International Usa, Thomas Martecchini

Michigan Law Review

Following a data breach, consumers suffer an increased risk of identity theft because of the exposure of their personal information. Limited protection by data-breach statutes has made it difficult for consumers to seek compensation for these injuries and penalize the companies that fail to protect their information, leading consumers to bring common law claims in court. Yet courts have disagreed about whether an increased risk of identity theft qualifies as an injury-in-fact under Article III standing principles: the Seventh and Ninth Circuits have approved of increased risk standing, while the Third Circuit has rejected it. The Supreme Court has further …


Before Mayo & After Alice: The Changing Concept Of Abstract Ideas, Magnus Gan Jan 2016

Before Mayo & After Alice: The Changing Concept Of Abstract Ideas, Magnus Gan

Michigan Telecommunications & Technology Law Review

Mayo v. Prometheus and Alice v. CLS are landmark Supreme Court decisions which respectively introduced and then instituted a new, two-step patent-eligibility test. Step One tests the patent claims for abstractness, while Step Two tests for inventive application. This new test was so demanding that in the one-year period after Alice was decided, over 80 percent of all challenged patents had one or more claims invalidated. In fact, at the Federal Circuit over the same time period, only one recorded case of a successful Alice defense exists—DDR Holdings v. Hotels.com. This note explains DDR’s success as an inconsistency …


Virtual Violence - Disruptive Cyberspace Operations As "Attacks" Under International Humanitarian Law, Ido Kilovaty Jan 2016

Virtual Violence - Disruptive Cyberspace Operations As "Attacks" Under International Humanitarian Law, Ido Kilovaty

Michigan Telecommunications & Technology Law Review

Power outages, manipulations of data, and interruptions of Internet access are all possible effects of cyber operations. Unfortunately, recent efforts to address and regulate cyberspace operations under international law often emphasize the uncommon, though severe, cyber-attacks that cause deaths, injuries, or physical destruction. This paper deals with cyber operations during armed conflicts that cause major disruption or interruption effects – as opposed to deaths, injuries, or physical destruction. The purpose of this paper is to explore the consequences of these cyber operations that cause major disruption or interruption effects, and to argue that they might still constitute “acts of violence,” …


Valuing Spectrum Allocations, Thomas W. Hazlett, Michael Honig Jan 2016

Valuing Spectrum Allocations, Thomas W. Hazlett, Michael Honig

Michigan Telecommunications & Technology Law Review

Observing trends in which Wi-Fi and Bluetooth have become widely popular, some argue that unlicensed allocations hosting such wireless technologies are increasingly valuable and that administrative spectrum allocations should shift accordingly. We challenge that policy conclusion. A core issue is that the social value of a given spectrum allocation is widely assumed to equal the gains of the applications it is likely to host. This thinking is faulty, as vividly seen in what we deem the Broadcast TV Spectrum Valuation Fallacy – the idea that because wireless video, or broadcast network programs are popular, TV channels are efficiently defined. This …


Privacy And Accountability In Black-Box Medicine, Roger Allan Ford, W. Nicholson Price Ii Jan 2016

Privacy And Accountability In Black-Box Medicine, Roger Allan Ford, W. Nicholson Price Ii

Michigan Telecommunications & Technology Law Review

Black-box medicine—the use of big data and sophisticated machine-learning techniques for health-care applications—could be the future of personalized medicine. Black-box medicine promises to make it easier to diagnose rare diseases and conditions, identify the most promising treatments, and allocate scarce resources among different patients. But to succeed, it must overcome two separate, but related, problems: patient privacy and algorithmic accountability. Privacy is a problem because researchers need access to huge amounts of patient health information to generate useful medical predictions. And accountability is a problem because black-box algorithms must be verified by outsiders to ensure they are accurate and unbiased, …


Beyond Eureka: What Creators Want (Freedom, Credit, And Audiences) And How Intellectual Property Can Better Give It To Them (By Supporting, Sharing, Licensing, And Attribution), Colleen Chien Jan 2016

Beyond Eureka: What Creators Want (Freedom, Credit, And Audiences) And How Intellectual Property Can Better Give It To Them (By Supporting, Sharing, Licensing, And Attribution), Colleen Chien

Michigan Law Review

In the theater of the courtroom or the rough and tumble arena of intellectual property policymaking, the day-to-day lives of creators are rarely presented. We often instead see one-dimensional vignettes, for example, “the new artist or band that has just released their [sic] first single and will not be paid for its success,” described on Taylor Swift’s Tumblr last summer when she initially withdrew from Apple’s music streaming service. While instructive, this description leaves out that Swift and other artists have long relied on “free play” mediums like radio and, more recently, YouTube to develop, not cannibalize, their audiences and …


Face-To-Face With Facial Recognition Evidence: Admissibility Under The Post-Crawford Confrontation Clause, Joseph Clarke Celentino Jan 2016

Face-To-Face With Facial Recognition Evidence: Admissibility Under The Post-Crawford Confrontation Clause, Joseph Clarke Celentino

Michigan Law Review

In Crawford v. Washington, the Supreme Court announced a major change in Confrontation Clause doctrine, abandoning a decades-old framework that focused on the common law principles of hearsay analysis: necessity and reliability. The new doctrine, grounded in an originalist interpretation of the Sixth Amendment, requires courts to determine whether a particular statement is testimonial. But the Court has struggled to present a coherent definition of the term testimonial. In its subsequent decisions, the Court illustrated that its new Confrontation Clause doctrine could be used to bar forensic evidence, including laboratory test results, if the government failed to produce the …