Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 57

Full-Text Articles in Law

Suggestions For State Laws On Biosimilar Substitution, Gary M. Fox May 2018

Suggestions For State Laws On Biosimilar Substitution, Gary M. Fox

Michigan Telecommunications & Technology Law Review

Biologic drugs offer major advancements over small-molecule drugs when it comes to treating serious diseases. Biosimilars, which mimic innovative biologic drugs, have the potential to further revolutionize the practice of medicine. States now have decades of experience regulating the substitution of generic, small-molecule drugs for their brand-name equivalents. But the complexities of biologic drugs and biosimilars force states to confront novel scientific and legal issues. Many states have begun tackling those issues by passing laws that regulate when pharmacists may substitute biosimilars for their corresponding biologic drugs. Other states have yet to do so. This Note surveys five provisions common …


Exclusion In Digital Markets, Konstantinos Stylianou Jan 2018

Exclusion In Digital Markets, Konstantinos Stylianou

Michigan Telecommunications & Technology Law Review

This article recasts the existing analytical framework on exclusion to account for the technology-intensive nature of digital markets. It discusses:

a) technological ways that affect the competitive intensity in digital markets
b) empirical data on the durability of competitive advantage in digital markets, and
c) the nature of exclusion as a monopolization tactic from a technological point of view

The technology element is important because as a matter of order it is technological capabilities and limitations that define what the transactional overlay can be, not the other way around. Economists start from the pre-assumption that “in the beginning there [are] …


Property Rights In Augmented Reality, Declan T. Conroy Nov 2017

Property Rights In Augmented Reality, Declan T. Conroy

Michigan Telecommunications & Technology Law Review

Increasingly, cities, towns, and even rural communities are being slowly reshaped by a dynamic yet initially imperceptible phenomenon: the elaboration of augmented reality. Through applications that place virtual features over specific, real-world locations, layers of augmented reality are proliferating, adding new elements to an increasingly wide range of places. However, while many welcome the sudden appearance of arenas for battling digital creatures in their neighborhood or the chance to write virtual messages on their neighbor’s wall, the areas being augmented oftentimes are privately owned, thereby implicating property rights. Many intrusions, of course, are de minimis: an isolated, invisible Pikachu unexpectedly …


Steering Consumers Toward Driverless Vehicles: A Federal Rebate Program As A Catalyst For Early Technology Adoption, Marie Williams Apr 2017

Steering Consumers Toward Driverless Vehicles: A Federal Rebate Program As A Catalyst For Early Technology Adoption, Marie Williams

Michigan Telecommunications & Technology Law Review

In the not-too-distant future, your car could drive itself; technology companies and automobile manufacturers alike are currently developing driverless vehicle technology. While there are many touted benefits to driverless vehicles, perhaps the most important societal benefit is a reduction in automobile accidents. Currently, car crashes are one of the leading causes of death in the United States, and the majority of accidents are caused by human error. Unlike humans, driverless vehicles will not get distracted, significantly decreasing the number of car crash fatalities that happen each year.

In order for driverless vehicles to save lives, driverless vehicles must be on …


A Comment On Privacy And Accountability In Black-Box Medicine, Carl E. Schneider Apr 2017

A Comment On Privacy And Accountability In Black-Box Medicine, Carl E. Schneider

Michigan Telecommunications & Technology Law Review

Human institutions and activities cannot avoid failures. Anxiety about them often provokes governments to try to prevent those failures. When that anxiety is vivid and urgent, government may do so without carefully asking whether regulation’s costs justify their benefits. Privacy and Accountability in Black Box Medicine admirably labors to bring discipline and rationality to thinking about an important development — the rise of “black-box medicine” — before it causes injuries regulation should have prevented and before it is impaired by improvident regulation. That is, Privacy and Accountability weighs the costs against the benefits of various forms of regulation across the …


New Threats To Vehicle Safety: How Cybersecurity Policy Will Shape The Future Of Autonomous Vehicles, Caleb Kennedy Apr 2017

New Threats To Vehicle Safety: How Cybersecurity Policy Will Shape The Future Of Autonomous Vehicles, Caleb Kennedy

Michigan Telecommunications & Technology Law Review

This note assesses the threat that hacking and related cybersecurity issues will pose to autonomous vehicles. Given the sweeping safety benefits autonomous vehicles will potentially bring to society, protecting against hacking and cyber-threats must be one of the top priorities for industry and public safety officials if autonomous vehicles are to gain widespread acceptance in the market. It proposes a framework for how these concerns should be addressed and how we can mitigate the risks. It addresses both proactive and reactive measures that can be taken by manufacturers, how to incentivize these measures, and the role cyber-insurance can play in …


Jailbreak!: What Happens When Autonomous Vehicle Owners Hack Into Their Own Cars, Michael Sinanian Apr 2017

Jailbreak!: What Happens When Autonomous Vehicle Owners Hack Into Their Own Cars, Michael Sinanian

Michigan Telecommunications & Technology Law Review

Autonomous and connected vehicles (ACVs) are a transformational force for humanity. It is highly likely that some owners of ACVs will circumvent their vehicle software to expose unauthorized functionality, known as “jailbreaking”. This would trigger copyright liability, the extent of which would be dependent upon the copyright system’s various rulemaking processes and common law interpretations. This note explores the world of software “jailbreaking”, with its roots in smartphone unlocking, and extrapolates that to ACVs. Some compelling (and at times dangerous) scenarios are contemplated, and recommendations are made for consumers, technologists, manufacturers, and policy makers.


A Survey Of Legal Issues Arising From The Deployment Of Autonomous And Connected Vehicles, Daniel A. Crane, Kyle D. Logue, Bryce C. Pilz Jan 2017

A Survey Of Legal Issues Arising From The Deployment Of Autonomous And Connected Vehicles, Daniel A. Crane, Kyle D. Logue, Bryce C. Pilz

Michigan Telecommunications & Technology Law Review

With concerns rising over the number and variety of state regulations, companies are increasingly looking to the federal government for guidance. Representatives from Google, GM, Lyft, and Delphi testified before Congress on March 15, urging Congress to pass a federal law concerning autonomous vehicles. While the passage of any federal legislation is unclear at this time, other parts of the federal government have been extremely active in recent months. In January 2016, the Obama administration proposed a 10-year, $4 billion investment in autonomous vehicle technology. In that same announcement, the Department of Transportation (“DOT”) committed to developing model state policy …


A New Take On An Old Problem: Employee Misclassification In The Modern Gig-Economy, Jennifer Pinsof Jul 2016

A New Take On An Old Problem: Employee Misclassification In The Modern Gig-Economy, Jennifer Pinsof

Michigan Telecommunications & Technology Law Review

For decades, U.S. labor and employment law has used a binary employment classification system, labeling workers as either employees or independent contractors. Employees are granted a variety of legal protections, while independent contractors are not. However, the explosion of the gig-economy—which connects consumers with underutilized resources—has produced a growing number of workers who do not seem to fit into either category. Though far from traditional employees, gig-workers bear little resemblance to independent contractors. Forced to choose, however, most gig-economy companies label their workers as independent contractors, depriving them of many basic worker-protections. Gig-workers have turned to the courts, hoping to …


Before Mayo & After Alice: The Changing Concept Of Abstract Ideas, Magnus Gan Jan 2016

Before Mayo & After Alice: The Changing Concept Of Abstract Ideas, Magnus Gan

Michigan Telecommunications & Technology Law Review

Mayo v. Prometheus and Alice v. CLS are landmark Supreme Court decisions which respectively introduced and then instituted a new, two-step patent-eligibility test. Step One tests the patent claims for abstractness, while Step Two tests for inventive application. This new test was so demanding that in the one-year period after Alice was decided, over 80 percent of all challenged patents had one or more claims invalidated. In fact, at the Federal Circuit over the same time period, only one recorded case of a successful Alice defense exists—DDR Holdings v. Hotels.com. This note explains DDR’s success as an inconsistency …


Virtual Violence - Disruptive Cyberspace Operations As "Attacks" Under International Humanitarian Law, Ido Kilovaty Jan 2016

Virtual Violence - Disruptive Cyberspace Operations As "Attacks" Under International Humanitarian Law, Ido Kilovaty

Michigan Telecommunications & Technology Law Review

Power outages, manipulations of data, and interruptions of Internet access are all possible effects of cyber operations. Unfortunately, recent efforts to address and regulate cyberspace operations under international law often emphasize the uncommon, though severe, cyber-attacks that cause deaths, injuries, or physical destruction. This paper deals with cyber operations during armed conflicts that cause major disruption or interruption effects – as opposed to deaths, injuries, or physical destruction. The purpose of this paper is to explore the consequences of these cyber operations that cause major disruption or interruption effects, and to argue that they might still constitute “acts of violence,” …


Valuing Spectrum Allocations, Thomas W. Hazlett, Michael Honig Jan 2016

Valuing Spectrum Allocations, Thomas W. Hazlett, Michael Honig

Michigan Telecommunications & Technology Law Review

Observing trends in which Wi-Fi and Bluetooth have become widely popular, some argue that unlicensed allocations hosting such wireless technologies are increasingly valuable and that administrative spectrum allocations should shift accordingly. We challenge that policy conclusion. A core issue is that the social value of a given spectrum allocation is widely assumed to equal the gains of the applications it is likely to host. This thinking is faulty, as vividly seen in what we deem the Broadcast TV Spectrum Valuation Fallacy – the idea that because wireless video, or broadcast network programs are popular, TV channels are efficiently defined. This …


Privacy And Accountability In Black-Box Medicine, Roger Allan Ford, W. Nicholson Price Ii Jan 2016

Privacy And Accountability In Black-Box Medicine, Roger Allan Ford, W. Nicholson Price Ii

Michigan Telecommunications & Technology Law Review

Black-box medicine—the use of big data and sophisticated machine-learning techniques for health-care applications—could be the future of personalized medicine. Black-box medicine promises to make it easier to diagnose rare diseases and conditions, identify the most promising treatments, and allocate scarce resources among different patients. But to succeed, it must overcome two separate, but related, problems: patient privacy and algorithmic accountability. Privacy is a problem because researchers need access to huge amounts of patient health information to generate useful medical predictions. And accountability is a problem because black-box algorithms must be verified by outsiders to ensure they are accurate and unbiased, …


Network Neutrality And The First Amendment, Andrew Patrick, Eric Scharphorn Oct 2015

Network Neutrality And The First Amendment, Andrew Patrick, Eric Scharphorn

Michigan Telecommunications & Technology Law Review

The First Amendment reflects the conviction that the widest possible dissemination of information from diverse and antagonistic sources is essential to public welfare. Like the printing press, the Internet has dramatically transformed the marketplace of ideas by providing unprecedented opportunities for individuals to communicate. Though its growth continues to be phenomenal, broadband service providers— acting as Internet gatekeepers—have developed the ability to discriminate against specific content and applications. First, these gatekeepers intercept and inspect data transferred over public networks, then selectively block or slow it. This practice has the potential to stifle the Internet’s value as a speech platform by …


The Cost Of Confusion: The Paradox Of Trademarked Pharmaceuticals, Hannah Brennan Oct 2015

The Cost Of Confusion: The Paradox Of Trademarked Pharmaceuticals, Hannah Brennan

Michigan Telecommunications & Technology Law Review

The United States spends nearly $1,000 per person annually on drugs—forty percent more than the next highest spender, Canada, and more than twice the amount France and Germany spend. Although myriad factors contribute to high drug spending in the United States, intellectual property law plays a crucial and well-documented role in inhibiting access to cheaper, generic medications. Yet, for the most part, the discussion of the relationship between intellectual property law and drug spending has centered on patent protection. Recently, however, a few researchers have turned their attention to a different avenue of exclusivity—trademark law. New studies suggest that pharmaceutical …


Regulating To Achieve Stability In The Domain Of High-Frequency Trading, Lindsey C. Crump Oct 2015

Regulating To Achieve Stability In The Domain Of High-Frequency Trading, Lindsey C. Crump

Michigan Telecommunications & Technology Law Review

High-frequency trading has become a darling of capital markets debate. This debate thrives because the true and long-lasting effects of high-frequency trading are still unknown. On one hand, high-frequency trading evidences recent and powerful advances in trading technology; on the other, it is said to harness speed at the expense of fairness, prudence, and stability. In part because of this duality, the regulation of high-frequency trading in the United States has been slow to develop. Other nations, however, have been quicker to react and to promulgate laws that directly, or indirectly, affect high-frequency trading. This Note explores the legal responses …


Loopholes For Circumventing The Constitution: Unrestrained Bulk Surveillance On Americans By Collecting Network Traffic Abroad, Axel Arnbak, Sharon Goldberg Jun 2015

Loopholes For Circumventing The Constitution: Unrestrained Bulk Surveillance On Americans By Collecting Network Traffic Abroad, Axel Arnbak, Sharon Goldberg

Michigan Telecommunications & Technology Law Review

This Article reveals interdependent legal and technical loopholes that the US intelligence community could use to circumvent constitutional and statutory safeguards for Americans. These loopholes involve the collection of Internet traffic on foreign territory, and leave Americans as unprotected as foreigners by current United States (US) surveillance laws. This Article will also describe how modern Internet protocols can be manipulated to deliberately divert American’s traffic abroad, where traffic can then be collected under a more permissive legal regime (Executive Order 12333) that is overseen solely by the executive branch of the US government. Although the media has reported on some …


Voluntary Disclosure Of Information As A Proposed Standard For The Fourth Amendment's Third-Party Doctrine, Margaret E. Twomey Jun 2015

Voluntary Disclosure Of Information As A Proposed Standard For The Fourth Amendment's Third-Party Doctrine, Margaret E. Twomey

Michigan Telecommunications & Technology Law Review

The third-party doctrine is a long-standing tenant of Fourth Amendment law that allows law enforcement officers to utilize information that was released to a third party without the probable cause required for a traditional search warrant. This has allowed law enforcement agents to use confidential informants, undercover agents, and access bank records of suspected criminals. However, in a digital age where exponentially more information is shared with Internet Service Providers, e-mail hosts, and social media “friends,” the traditional thirdparty doctrine ideas allow law enforcement officers access to a cache of personal information and data with a standard below probable cause. …


No More Shortcuts: Protect Cell Site Location Data With A Warrant Requirement, Lauren E. Babst Jan 2015

No More Shortcuts: Protect Cell Site Location Data With A Warrant Requirement, Lauren E. Babst

Michigan Telecommunications & Technology Law Review

In modern society, the cell phone has become a virtual extension of most Americans, managing all kinds of personal and business matters. Modern cell tower technology allows cell service providers to accumulate a wealth of individuals’ location information while they use their cell phones, and such data is available for law enforcement to obtain without a warrant. This is problematic under the Fourth Amendment, which protects reasonable expectations of privacy. Under the Katz two-prong test, (1) individuals have an actual, subjective expectation of privacy in their cell site location data, and (2) society is prepared to acknowledge that expectation as …


More Than Bric-A-Brac: Testing Chinese Exceptionalism In Patenting Behavior Using Comparative Empirical Analysis, Jay P. Kesan, Alan Marco, Richard Miller Jan 2015

More Than Bric-A-Brac: Testing Chinese Exceptionalism In Patenting Behavior Using Comparative Empirical Analysis, Jay P. Kesan, Alan Marco, Richard Miller

Michigan Telecommunications & Technology Law Review

Although many developing economies are increasingly influencing the global economy, China’s influence has been the greatest of these by far. Once hindered from competition by political and economic restrictions, China is now a major economic player. As China’s economic might has grown, so too has the demand for intellectual property protection for technologies originating from China. In this article, we present a detailed empirical study of Chinese patenting trends in the United States and the implications of these trends for the global economy. We compare these trends to patenting trends from earlier decades. Specifically, we compare Chinese patenting trends to …


Holding Up And Holding Out, Colleen V. Chien Jan 2014

Holding Up And Holding Out, Colleen V. Chien

Michigan Telecommunications & Technology Law Review

Patent “hold-up” and patent “hold-out” present important, alternative theories for what ails the patent system. Patent “hold-up” occurs when a patent owner sues a company when it is most vulnerable—after it has implemented a technology—and is able wrest a settlement because it is too late for the company to change course. Patent “hold-out” is the practice of companies routinely ignoring patents and resisting patent owner demands because the odds of getting caught are small. Hold-up has arguably predicted the current patent crises, and the ex ante assertion of technology patents whether in the smartphone war, standards, or patent “troll” context. …


After Myriad: Reconsidering The Incentives For Innovation In The Biotech Industry, Daniel K. Yarbrough Jan 2014

After Myriad: Reconsidering The Incentives For Innovation In The Biotech Industry, Daniel K. Yarbrough

Michigan Telecommunications & Technology Law Review

35 U.S.C. § 101 allows a patent for “any new and useful process, machine, manufacture, or composition of matter, or any new and useful improvement thereof.” Recently, the Supreme Court issued several key decisions affecting the doctrine of patentable subject matter under § 101. Starting with Bilski v. Kappos (2011), and continuing with Mayo Collaborative Services, Inc. v. Prometheus Laboratories (2012), Association for Molecular Pathology v. Myriad Genetics (2013) and, most recently, Alice Corporation Pty. Ltd. v. CLS Bank International (2014), every year has brought another major change to the way in which the Court assesses patentability. In Myriad, the …


District Courts Versus The Usitc: Considering Exclusionary Relief For F/Rand-Encumbered Standard-Essential Patents, Helen H. Ji Jan 2014

District Courts Versus The Usitc: Considering Exclusionary Relief For F/Rand-Encumbered Standard-Essential Patents, Helen H. Ji

Michigan Telecommunications & Technology Law Review

Technological standards allow manufacturers and consumers to rely upon these agreed-upon basic systems to facilitate sales and further invention. However, where these standards involved patented technology, the process of standard-setting raises many concerns at the intersection of antitrust and patent law. As patent holders advocate for their patents to become part of technological standards, how should courts police this activity to prevent patent holdup and other anti-competitive practices? This Note explores the differing approaches to remedies employed by the United States International Trade Commission and the United States District Courts where standard-essential patents are infringed. This Note further proposes that …


Wireless Localism: Beyond The Shroud Of Objectivity In Federal Spectrum Administration, Olivier Sylvain Dec 2013

Wireless Localism: Beyond The Shroud Of Objectivity In Federal Spectrum Administration, Olivier Sylvain

Michigan Telecommunications & Technology Law Review

Recent innovations in mobile wireless technology have instigated a debate between two camps of legal scholars about federal administration of the electromagnetic spectrum. The first camp argues that the Federal Communications Commission (“FCC”) should define spectrum use rights more clearly and give spectrum licensees broad property rights in frequencies. The second camp argues that, rather than award exclusive licenses to the highest bidder, the FCC ought to open much, if not most, of the spectrum to unlicensed use by smartphones and tablets equipped with the newest spectrum administration technology. First, this Article shows that both of these camps comprise a …


Geographically Restricted Streaming Content And Evasion Of Geolocation: The Applicability Of The Copyright Anticircumvention Rules, Jerusha Burnett Jan 2013

Geographically Restricted Streaming Content And Evasion Of Geolocation: The Applicability Of The Copyright Anticircumvention Rules, Jerusha Burnett

Michigan Telecommunications & Technology Law Review

A number of methods currently exist or are being developed to determine where Internet users are located geographically when they access a particular webpage. Yet regardless of the precautions taken by website operators to limit the locations from which they allow access, it is likely that users will find ways to gain access to restricted content. Should the evasion of geolocation constitute circumvention of access controls so that § 1201 of the Digital Millennium Copyright Act ("DMCA") applies? Because location data can properly be considered personally identifiable information ("PII"), this Note argues that § 1201 should not apply absent a …


Whose Social Network Account: A Trade Secret Approach To Allocating Rights, Zoe Argento Jan 2013

Whose Social Network Account: A Trade Secret Approach To Allocating Rights, Zoe Argento

Michigan Telecommunications & Technology Law Review

Who has the superior right to a social network account? This is the question in a growing number of disputes between employers and workers over social network accounts. The problem has no clear legal precedent. Although the disputes implicate rights under trademark, copyright, and privacy law, these legal paradigms fail to address the core issue. At base, disputes over social network accounts are disputes over the right to access the people, sometimes numbering in the tens of thousands, who follow an account. This Article evaluates the problem from the perspective of the public interest in social network use, particularly the …


High-Frequency Trading: Should Regulators Do More, Matt Prewitt Jan 2012

High-Frequency Trading: Should Regulators Do More, Matt Prewitt

Michigan Telecommunications & Technology Law Review

High-Frequency Trading ("HFT") is a diverse set of algorithmic trading strategies characterized by fast order execution. Its importance in international markets has increased vastly in recent years. From a regulatory perspective, HFT presents difficult and partially unresolved questions. The difficulties stem partly from the fact that HFT encompasses a wide range of trading strategies, and partly from a dearth of unambiguous empirical findings about HFT's effects on markets. Yet certain important conclusions are broadly accepted. HFT can increase systemic risk by causing or exacerbating events like the "Flash Crash" of May 6, 2010. HFT can also enable market manipulators to …


Patents V. Statutory Exclusivities In Biological Pharmaceuticals - Do We Really Need Both, Yaniv Heled Jan 2012

Patents V. Statutory Exclusivities In Biological Pharmaceuticals - Do We Really Need Both, Yaniv Heled

Michigan Telecommunications & Technology Law Review

Over the past decade or so, the United States has been the arena of a boisterous debate regarding the creation of a new regulatory framework for the approval of generic versions of biologics-based pharmaceutical products (also known as "biological products" and "biologics")--an important and increasingly growing class of drugs. The basic purpose of such a framework is to create a fast and less-costly route to FDA approval for biologics that would be similar or identical to already-approved biological products--typically ones that are sold on the market at monopoly rates--thereby allowing cheaper versions of such medicines to enter the market. One …


No Cause Of Action: Video Surveillance In New York City, Olivia J. Greer Jan 2012

No Cause Of Action: Video Surveillance In New York City, Olivia J. Greer

Michigan Telecommunications & Technology Law Review

In 2010, New York City Police Commissioner Raymond Kelly announced a new network of video surveillance in the City. The new network would be able to prevent future terrorist attacks by identifying suspicious behavior before catastrophic events could take place. Kelly told reporters, "If we're looking for a person in a red jacket, we can call up all the red jackets filmed in the last 30 days," and "[w]e're beginning to use software that can identify suspicious objects or behaviors." Gothamist later made a witticism of Kelly's statement, remarking, "Note to terrorists: red jackets are not a good look for …


Res Or Rules - Patents And The (Uncertain) Rules Of The Game, Emily Michiko Morris Jan 2012

Res Or Rules - Patents And The (Uncertain) Rules Of The Game, Emily Michiko Morris

Michigan Telecommunications & Technology Law Review

The Article proceeds as follows. Part I reviews the basics of patent claiming, the traditional view of claims as real property deeds, and why uncertainty as to the boundaries of those deeds is considered undesirable. Part II critiques the analogy between real property deeds and patent claims, highlighting in particular the requisite novelty and conceptual nature of the patent res, the differences between the purposes of the patent system and real property regimes, and the effect of these different purposes on the expected predictability of patent boundaries. Part III then changes the analogy from patent claims as property deeds to …