Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 91 - 120 of 201

Full-Text Articles in Law

Artificial Intelligence In Health Care: Applications And Legal Implications, W. Nicholson Price Ii Nov 2017

Artificial Intelligence In Health Care: Applications And Legal Implications, W. Nicholson Price Ii

Articles

Artificial intelligence (AI) is rapidly moving to change the healthcare system. Driven by the juxtaposition of big data and powerful machine learning techniques—terms I will explain momentarily—innovators have begun to develop tools to improve the process of clinical care, to advance medical research, and to improve efficiency. These tools rely on algorithms, programs created from healthcare data that can make predictions or recommendations. However, the algorithms themselves are often too complex for their reasoning to be understood or even stated explicitly. Such algorithms may be best described as “black-box.” This article briefly describes the concept of AI in medicine, including …


Improving Access To Justice In State Courts With Platform Technology, J. J. Prescott Nov 2017

Improving Access To Justice In State Courts With Platform Technology, J. J. Prescott

Articles

Access to justice often equates to access to state courts, and for millions of Americans, using state courts to resolve their disputes—often with the government—is a real challenge. Reforms are regularly proposed in the hopes of improving the situation (e.g., better legal aid), but until recently a significant part of the problem has been structural. Using state courts today for all but the simplest of legal transactions entails at the very least traveling to a courthouse and meeting with a decision maker in person and in a one-on-one setting. Even minimally effective access, therefore, requires time, transportation, and very often …


Contracts Ex Machina, Kevin Werbach, Nicolas Cornell Nov 2017

Contracts Ex Machina, Kevin Werbach, Nicolas Cornell

Articles

Smart contracts are self-executing digital transactions using decentralized cryptographic mechanisms for enforcement. They were theorized more than twenty years ago, but the recent development of Bitcoin and blockchain technologies has rekindled excitement about their potential among technologists and industry. Startup companies and major enterprises alike are now developing smart contract solutions for an array of markets, purporting to offer a digital bypass around traditional contract law. For legal scholars, smart contracts pose a significant question: Do smart contracts offer a superior solution to the problems that contract law addresses? In this article, we aim to understand both the potential and …


Data Collection And The Regulatory State, Hillary Green, James Cooper, Ahmed Ghappour, Felix Wu Sep 2017

Data Collection And The Regulatory State, Hillary Green, James Cooper, Ahmed Ghappour, Felix Wu

Articles

The following remarks were given on January 27, 2017 during the Connecticut Law Review's symposium, "Privacy, Security & Power: The State of Digital Surveillance."


Factors In Fairness And Emotion In Online Case Resolution Systems, Youyang Hou, Cliff Lampe, Maximilian Bulinski, J. J. Prescott May 2017

Factors In Fairness And Emotion In Online Case Resolution Systems, Youyang Hou, Cliff Lampe, Maximilian Bulinski, J. J. Prescott

Articles

Courts are increasingly adopting online information and communication technology, creating a need to consider the potential consequences of these tools for the justice system. Using survey responses from 209 litigants who had recently used an online case resolution system, we investigate factors that influenced litigants’ experiences of fairness and emotional feelings toward court officials. Our results show that ease of using the online case resolution system, the outcome of the case, and a litigant’s perceptions of procedural justice are positively associated both with whether the litigant views the process as fair and whether the litigant ultimately feels positive emotions toward …


Artificial Intelligence Policy: A Primer And Roadmap, Ryan Calo Jan 2017

Artificial Intelligence Policy: A Primer And Roadmap, Ryan Calo

Articles

Talk of artificial intelligence is everywhere. People marvel at the capacity of machines to translate any language and master any game. Others condemn the use of secret algorithms to sentence criminal defendants or recoil at the prospect of machines gunning for blue, pink, and white-collar jobs. Some worry aloud that artificial intelligence will be humankind’s “final invention.” This essay, prepared in connection with UC Davis Law Review's 50th anniversary symposium, explains why AI is suddenly on everyone's mind and provides a roadmap to the major policy questions AI raises. The essay is designed to help policymakers, investors, technologists, scholars, and …


Privacy, Vulnerability, And Affordance, Ryan Calo Jan 2017

Privacy, Vulnerability, And Affordance, Ryan Calo

Articles

This essay begins to unpack the complex, sometimes contradictory relationship between privacy and vulnerability. I begin by exploring how the law conceives of vulnerability — essentially, as a binary status meriting special consideration where present. Recent literature recognizes vulnerability not as a status but as a state — a dynamic and manipulable condition that everyone experiences to different degrees and at different times. I then discuss various ways in which vulnerability and privacy intersect. I introduce an analytic distinction between vulnerability rendering, i.e., making a person more vulnerable, and the exploitation of vulnerability whether manufactured or native. I also describe …


Manufacturing Barriers To Biologics Competition And Innovation, W. Nicholson Price Ii., Arti K. Rai Mar 2016

Manufacturing Barriers To Biologics Competition And Innovation, W. Nicholson Price Ii., Arti K. Rai

Articles

As finding breakthrough small-molecule drugs becomes more difficult, drug companies are increasingly turning to "large molecule" biologics. Although biologics represent many of the most promising new therapies for previously intractable diseases, they are extremely expensive. Moreover, the pathway for generic-type competition set up by Congress in 2010 is unlikely to yield significant cost savings. This Article provides a fresh diagnosis of and prescription for this major public policy problem. It argues that the key cause is pervasive trade secrecy in the complex area of biologics manufacturing. Under the current regime, this trade secrecy, combined with certain features of Food and …


Tesla, Dealer Franchise Laws, And The Politics Of Crony Capitalism, Daniel A. Crane Jan 2016

Tesla, Dealer Franchise Laws, And The Politics Of Crony Capitalism, Daniel A. Crane

Articles

Public choice theory has long proclaimed that business interests can capture regulatory processes to generate economic rents at the expense of consumers. Such political exploitation may go unnoticed and unchallenged for long time periods because, though the rents are captured by a relatively small number of individuals or firms, the costs are widely diffused over a large number of consumers. The triggering event to expose and mobilize opposition to the regulatory capture may not arise until a new technology seeks to challenge the incumbent technology, thus creating a motivated champion to expose and oppose the regulatory capture and advocate for …


Riley V. California And The Beginning Of The End For The Third-Party Search Doctrine, David A. Harris Jan 2016

Riley V. California And The Beginning Of The End For The Third-Party Search Doctrine, David A. Harris

Articles

In Riley v. California, the Supreme Court decided that when police officers seize a smart phone, they may not search through its contents -- the data found by looking into the call records, calendars, pictures and so forth in the phone -- without a warrant. In the course of the decision, the Court said that the rule applied not just to data that was physically stored on the device, but also to data stored "in the cloud" -- in remote sites -- but accessed through the device. This piece of the decision may, at last, allow a re-examination of …


Diagnostics Need Not Apply, Rebecca S. Eisenberg Sep 2015

Diagnostics Need Not Apply, Rebecca S. Eisenberg

Articles

Diagnostic testing helps caregivers and patients understand a patient's condition, predict future outcomes, select appropriate treatments, and determine whether treatment is working. Improvements in diagnostic testing are essential to bringing about the long-heralded promise of personalized medicine. Yet it seems increasingly clear that most important advances in this type of medical technology lie outside the boundaries of patent-eligible subject matter. The clarity of this conclusion has been obscured by ambiguity in the recent decisions of the Supreme Court concerning patent eligibility. Since its 2010 decision in Bilski v. Kappos, the Court has followed a discipline of limiting judicial exclusions from …


Coming Of Age: Innovation Districts And The Role Of Law Schools, Jennifer S. Fan Jan 2015

Coming Of Age: Innovation Districts And The Role Of Law Schools, Jennifer S. Fan

Articles

New urban models, dubbed “innovation districts” are gaining traction in entrepreneurial-focused areas across the United States. This article begins by defining what innovation districts are. It then examines the potential role that law schools, together with technology transfer offices, can play as innovation cultivators within such districts. Specifically, it looks at three potential models that law schools can consider when contemplating a relationship with the technology transfer office within a university. Integrating a clinic and technology transfer office within an innovation district does not come without its challenges, however. Accordingly, this article will suggest ways for transactional law clinics to …


Push, Pull, And Spill: A Transdisciplinary Case Study In Municipal Open Government, Jan Whittington, Ryan Calo, Mike Simon, Jesse Woo, Meg Young, Perter Schmiedeskamp Jan 2015

Push, Pull, And Spill: A Transdisciplinary Case Study In Municipal Open Government, Jan Whittington, Ryan Calo, Mike Simon, Jesse Woo, Meg Young, Perter Schmiedeskamp

Articles

Municipal open data raises hopes and concerns. The activities of cities produce a wide array of data, data that is vastly enriched by ubiquitous computing. Municipal data is opened as it is pushed to, pulled by, and spilled to the public through online portals, requests for public records, and releases by cities and their vendors, contractors, and partners. By opening data, cities hope to raise public trust and prompt innovation. Municipal data, however, is often about the people who live, work, and travel in the city. By opening data, cities raise concern for privacy and social justice.

This article presents …


Self-Defense Against Robots And Drones, A. Michael Froomkin, P. Zak Colangelo Jan 2015

Self-Defense Against Robots And Drones, A. Michael Froomkin, P. Zak Colangelo

Articles

Robots can pose-or can appear to pose-a threat to life, property, and privacy. May a landowner legally shoot down a trespassing drone? Can she hold a trespassing autonomous car as security against damage done or further torts? Is the fear that a drone may be operated by a paparazzo or Peeping Tom sufficient grounds to disable or interfere with it? How hard may you shove if the office robot rolls over your foot? This Article addresses all those issues and one more. what rules and standards we could put into place to make the resolution of those questions easier and …


Regulating Mass Surveillance As Privacy Pollution: Learning From Environmental Impact Statements, A. Michael Froomkin Jan 2015

Regulating Mass Surveillance As Privacy Pollution: Learning From Environmental Impact Statements, A. Michael Froomkin

Articles

Encroachments on privacy through mass surveillance greatly resemble the pollution crisis in that they can be understood as imposing an externality on the surveilled. This Article argues that this resemblance also suggests a solution: requiring those conducting mass surveillance in and through public spaces to disclose their plans publicly via an updated form of environmental impact statement, thus requiring an impact analysis and triggering a more informed public conversation about privacy. The Article first explains how mass surveillance is polluting public privacy and surveys the limited and inadequate doctrinal tools available to respond to mass surveillance technologies. Then, it provides …


From Anonymity To Identification, A. Michael Froomkin Jan 2015

From Anonymity To Identification, A. Michael Froomkin

Articles

This article examines whether anonymity online has a future. In the early days of the Internet, strong cryptography, anonymous remailers, and a relative lack of surveillance created an environment conducive to anonymous communication. Today, the outlook for online anonymity is poor. Several forces combine against it: ideologies that hold that anonymity is dangerous, or that identifying evil-doers is more important than ensuring a safe mechanism for unpopular speech; the profitability of identification in commerce; government surveillance; the influence of intellectual property interests and in requiring hardware and other tools that enforce identification; and the law at both national and supranational …


Campbell At 21/Sony At 31, Jessica D. Litman Jan 2015

Campbell At 21/Sony At 31, Jessica D. Litman

Articles

When copyright lawyers gather to discuss fair use, the most common refrain is its alarming expansion. Their distress about fair use’s enlarged footprint seems completely untethered from any appreciation of the remarkable increase in exclusive copyright rights. In the nearly forty years since Congress enacted the 1976 copyright act, the rights of copyright owners have expanded markedly. Copyright owners’ demands for further expansion continue unabated. Meanwhile, they raise strident objections to proposals to add new privileges and exceptions to the statute to shelter non-infringing uses that might be implicated by their expanded rights. Copyright owners have used the resulting uncertainty …


In Vitro Fertilization And The Law: How Legal And Regulatory Neglect Compromised A Medical Breakthrough, Steve P. Calandrillo, Chryssa V. Deliganis Jan 2015

In Vitro Fertilization And The Law: How Legal And Regulatory Neglect Compromised A Medical Breakthrough, Steve P. Calandrillo, Chryssa V. Deliganis

Articles

The rise of assisted reproductive technology like in vitro fertilization (“IVF”) as a method of human reproduction represents a remarkable medical achievement. Live births and success rates have increased dramatically in the past decade, so much so that many fertility clinics now “guarantee” a baby to clients who sign up.

But with successes come inevitable downsides. Everyone knows that the price tag is steep, but given the demand, relatively few individuals are deterred. More insidious are the increased birth-defect risks associated with reproductive technologies. For some time it was assumed that these risks were due to the fact that individuals …


Encouraging Maternal Sacrifice: How Regulations Governing The Consumption Of Pharmaceuticals During Pregnancy Prioritize Fetal Safety Over Maternal Health And Autonomy, Greer Donley Jan 2015

Encouraging Maternal Sacrifice: How Regulations Governing The Consumption Of Pharmaceuticals During Pregnancy Prioritize Fetal Safety Over Maternal Health And Autonomy, Greer Donley

Articles

Pregnant women are routinely faced with the stressful decision of whether to consume needed medications during their pregnancies. Because the risks associated with pharmaceutical drug consumption during pregnancy are largely unknown, pregnant women both inadvertently consume dangerous medications and avoid needed drugs. Both outcomes are harmful to pregnant women and their fetuses. This unparalleled lack of drug safety information is a result of ill-conceived, paternalistic regulations in two areas of the law: regulations governing ethical research in human subjects and regulations that dictate the required labels on drugs. The former categorizes pregnant women as “vulnerable” and thus precludes them from …


Reasonable Expectations Of Privacy Settings: Social Media And The Stored Communications Act, David Thaw, Christopher Borchert, Fernando Pinguelo Jan 2015

Reasonable Expectations Of Privacy Settings: Social Media And The Stored Communications Act, David Thaw, Christopher Borchert, Fernando Pinguelo

Articles

In 1986, Congress passed the Stored Communications Act (“SCA”) to provide additional protections for individuals’ private communications content held in electronic storage by third parties. Acting out of direct concern for the implications of the Third-Party Records Doctrine — a judicially created doctrine that generally eliminates Fourth Amendment protections for information entrusted to third parties — Congress sought to tailor the SCA to electronic communications sent via and stored by third parties. Yet, because Congress crafted the SCA with language specific to the technology of 1986, courts today have struggled to apply the SCA consistently with regard to similar private …


Derivative Works 2.0: Reconsidering Transformative Use In The Age Of Crowdsourced Creation, Jacqueline D. Lipton, John Tehranian Jan 2015

Derivative Works 2.0: Reconsidering Transformative Use In The Age Of Crowdsourced Creation, Jacqueline D. Lipton, John Tehranian

Articles

Apple invites us to “Rip. Mix. Burn.” while Sony exhorts us to “make.believe.” Digital service providers enable us to create new forms of derivative work — work based substantially on one or more preexisting works. But can we, in a carefree and creative spirit, remix music, movies, and television shows without fear of copyright infringement liability? Despite the exponential growth of remixing technologies, content holders continue to benefit from the vagaries of copyright law. There are no clear principles to determine whether any given remix will infringe one or more copyrights. Thus, rights holders can easily and plausibly threaten infringement …


A System Of Men And Not Of Laws: What Due Process Tells Us About The Deficiencies In Institutional Review Boards, Greer Donley Jan 2014

A System Of Men And Not Of Laws: What Due Process Tells Us About The Deficiencies In Institutional Review Boards, Greer Donley

Articles

Governmental regulation of human subjects research involves unique agency action. It delegates power to non-expert committees, Institutional Review Boards, to decide whether research protocols are "ethical" according to vague federal regulations. Without IRB approval, the protocol cannot be investigated. The empirical evidence regarding this system demonstrates that IRBs render deeply inconsistent and inaccurate outcomes. This Article argues that the lack of due process in the IRB system is to blame for such arbitrary agency action. By juxtaposing the levels of process required for IRB approval or research with FDA new drug approval--agency action involving similar interests--this Article highlights that IRBs …


Enlightened Regulatory Capture, David Thaw Jan 2014

Enlightened Regulatory Capture, David Thaw

Articles

Regulatory capture generally evokes negative images of private interests exerting excessive influence on government action to advance their own agendas at the expense of the public interest. There are some cases, however, where this conventional wisdom is exactly backwards. This Article explores the first verifiable case, taken from healthcare cybersecurity, where regulatory capture enabled regulators to harness private expertise to advance exclusively public goals. Comparing this example to other attempts at harnessing industry expertise reveals a set of characteristics under which regulatory capture can be used in the public interest. These include: 1) legislatively-mandated adoption of recommendations by an advisory …


Surveillance At The Source, David Thaw Jan 2014

Surveillance At The Source, David Thaw

Articles

Contemporary discussion concerning surveillance focuses predominantly on government activity. These discussions are important for a variety of reasons, but generally ignore a critical aspect of the surveillance-harm calculus – the source from which government entities derive the information they use. The source of surveillance data is the information "gathering" activity itself, which is where harms like "chilling" of speech and behavior begin.

Unlike the days where satellite imaging, communications intercepts, and other forms of information gathering were limited to advanced law enforcement, military, and intelligence activities, private corporations now play a dominant role in the collection of information about individuals' …


Defining Privacy And Utility In Data Sets, Felix T. Wu Oct 2013

Defining Privacy And Utility In Data Sets, Felix T. Wu

Articles

Is it possible to release useful data while preserving the privacy of the individuals whose information is in the database? This question has been the subject of considerable controversy, particularly in the wake of well-publicized instances in which researchers showed how to re-identify individuals in supposedly anonymous data. Some have argued that privacy and utility are fundamentally incompatible, while others have suggested that simple steps can be taken to achieve both simultaneously. Both sides have looked to the computer science literature for support.

What the existing debate has overlooked, however, is that the relationship between privacy and utility depends crucially …


"Pets Must Be On A Leash": How U.S. Law (And Industry Practice) Often Undermines And Even Forbids Valuable Privacy Enhancing Technology, A. Michael Froomkin Jan 2013

"Pets Must Be On A Leash": How U.S. Law (And Industry Practice) Often Undermines And Even Forbids Valuable Privacy Enhancing Technology, A. Michael Froomkin

Articles

No abstract provided.


Prometheus Rebound: Diagnostics, Nature, And Mathematical Algorithms, Rebecca S. Eisenberg Jan 2013

Prometheus Rebound: Diagnostics, Nature, And Mathematical Algorithms, Rebecca S. Eisenberg

Articles

The Supreme Court’s decision last Term in Mayo v. Prometheus left considerable uncertainty as to the boundaries of patentable subject matter for molecular diagnostic inventions. First, the Court took an expansive approach to what counts as an unpatentable natural law by applying that term to the relationship set forth in the challenged patent between a patient’s levels of a drug metabolite and the indication of a need to adjust the patient’s drug dosage. And second, in evaluating whether the patent claims add enough to this unpatentable natural law to be patent eligible, the Court did not consult precedents concerning the …


Protecting Elites: An Alternative Take On How United States V. Jones Fits Into The Court's Technology Jurisprudence, Tamara Rice Lave Jan 2013

Protecting Elites: An Alternative Take On How United States V. Jones Fits Into The Court's Technology Jurisprudence, Tamara Rice Lave

Articles

This Article argues that the Supreme Court's technology jurisprudence can be best understood as protecting the privacy interest of elites. After providing an overview of the major technology cases from Olmstead to Kyllo, the Article focuses on the recent case of United States v Jones. The Article does not contend that the Court intended to protect elites, but instead posits that this motive likely operated at a more unconscious level because of the Justices' greater relative affluence and elevated social position.


Does The Constitution Protect Abortions Based On Fetal Anomaly?: Examining The Potential For Disability-Selective Abortion Bans In The Age Of Prenatal Whole Genome Sequencing, Greer Donley Jan 2013

Does The Constitution Protect Abortions Based On Fetal Anomaly?: Examining The Potential For Disability-Selective Abortion Bans In The Age Of Prenatal Whole Genome Sequencing, Greer Donley

Articles

This Note examines whether the state or federal government has the power to enact a law that prevents women from obtaining abortions based on their fetus’s genetic abnormality. Such a ban has already been enacted in North Dakota and introduced in Indiana and Missouri. I argue below that this law presents a novel state intrusion on a woman’s right to obtain a pre-viability abortion. Moreover, these pieces of legislation contain an outdated understanding of prenatal genetic testing—the landscape of which is quickly evolving as a result of a new technology: prenatal whole genome sequencing. This Note argues that the incorporation …


Serious Flaw Of Employee Invention Ownership Under The Bayh-Dole Act In Stanford V. Roche: Finding The Missing Piece Of The Puzzle In The German Employee Invention Act, Toshiko Takenaka Jan 2012

Serious Flaw Of Employee Invention Ownership Under The Bayh-Dole Act In Stanford V. Roche: Finding The Missing Piece Of The Puzzle In The German Employee Invention Act, Toshiko Takenaka

Articles

This article argues that the current Bayh-Dole Act is incomplete because the Act fails to provide a mechanism for contractors to secure the ownership of federally funded inventions from their employees. Part I of this Article discusses this flaw in the current Bayh-Dole Act, highlighted by Stanford v. Roche, and argues that a historical accident resulted in this flaw due to Congress's failure to pass a series of bills based on the German EIA. Passages in the Bayh-Dole Act suggest that the Act assumes a transfer by operation of law to secure the ownership of federally funded inventions through …