Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Technology (27)
- Information (13)
- Internet (12)
- Patent law (12)
- Privacy (9)
-
- Drugs (7)
- Law reform (7)
- Pharmaceuticals (7)
- Competition (6)
- Copyright law (5)
- Innovation (5)
- Markets (5)
- Patent infringement (5)
- Regulation (5)
- Access to information (4)
- Biotechnology (4)
- Digital Millennium Copyright Act (4)
- Driverless vehicles (4)
- Federal agencies (4)
- Health care (4)
- Incentives (4)
- Licenses (4)
- Telecommunications (4)
- United States Supreme Court (4)
- Wireless (4)
- Antitrust (3)
- Autonomous vehicles (3)
- Connected vehicles (3)
- Consumers (3)
- Corporations (3)
Articles 1 - 30 of 57
Full-Text Articles in Law
Suggestions For State Laws On Biosimilar Substitution, Gary M. Fox
Suggestions For State Laws On Biosimilar Substitution, Gary M. Fox
Michigan Telecommunications & Technology Law Review
Biologic drugs offer major advancements over small-molecule drugs when it comes to treating serious diseases. Biosimilars, which mimic innovative biologic drugs, have the potential to further revolutionize the practice of medicine. States now have decades of experience regulating the substitution of generic, small-molecule drugs for their brand-name equivalents. But the complexities of biologic drugs and biosimilars force states to confront novel scientific and legal issues. Many states have begun tackling those issues by passing laws that regulate when pharmacists may substitute biosimilars for their corresponding biologic drugs. Other states have yet to do so. This Note surveys five provisions common …
Exclusion In Digital Markets, Konstantinos Stylianou
Exclusion In Digital Markets, Konstantinos Stylianou
Michigan Telecommunications & Technology Law Review
This article recasts the existing analytical framework on exclusion to account for the technology-intensive nature of digital markets. It discusses:
a) technological ways that affect the competitive intensity in digital markets
b) empirical data on the durability of competitive advantage in digital markets, and
c) the nature of exclusion as a monopolization tactic from a technological point of view
The technology element is important because as a matter of order it is technological capabilities and limitations that define what the transactional overlay can be, not the other way around. Economists start from the pre-assumption that “in the beginning there [are] …
Property Rights In Augmented Reality, Declan T. Conroy
Property Rights In Augmented Reality, Declan T. Conroy
Michigan Telecommunications & Technology Law Review
Increasingly, cities, towns, and even rural communities are being slowly reshaped by a dynamic yet initially imperceptible phenomenon: the elaboration of augmented reality. Through applications that place virtual features over specific, real-world locations, layers of augmented reality are proliferating, adding new elements to an increasingly wide range of places. However, while many welcome the sudden appearance of arenas for battling digital creatures in their neighborhood or the chance to write virtual messages on their neighbor’s wall, the areas being augmented oftentimes are privately owned, thereby implicating property rights. Many intrusions, of course, are de minimis: an isolated, invisible Pikachu unexpectedly …
Steering Consumers Toward Driverless Vehicles: A Federal Rebate Program As A Catalyst For Early Technology Adoption, Marie Williams
Steering Consumers Toward Driverless Vehicles: A Federal Rebate Program As A Catalyst For Early Technology Adoption, Marie Williams
Michigan Telecommunications & Technology Law Review
In the not-too-distant future, your car could drive itself; technology companies and automobile manufacturers alike are currently developing driverless vehicle technology. While there are many touted benefits to driverless vehicles, perhaps the most important societal benefit is a reduction in automobile accidents. Currently, car crashes are one of the leading causes of death in the United States, and the majority of accidents are caused by human error. Unlike humans, driverless vehicles will not get distracted, significantly decreasing the number of car crash fatalities that happen each year.
In order for driverless vehicles to save lives, driverless vehicles must be on …
A Comment On Privacy And Accountability In Black-Box Medicine, Carl E. Schneider
A Comment On Privacy And Accountability In Black-Box Medicine, Carl E. Schneider
Michigan Telecommunications & Technology Law Review
Human institutions and activities cannot avoid failures. Anxiety about them often provokes governments to try to prevent those failures. When that anxiety is vivid and urgent, government may do so without carefully asking whether regulation’s costs justify their benefits. Privacy and Accountability in Black Box Medicine admirably labors to bring discipline and rationality to thinking about an important development — the rise of “black-box medicine” — before it causes injuries regulation should have prevented and before it is impaired by improvident regulation. That is, Privacy and Accountability weighs the costs against the benefits of various forms of regulation across the …
New Threats To Vehicle Safety: How Cybersecurity Policy Will Shape The Future Of Autonomous Vehicles, Caleb Kennedy
New Threats To Vehicle Safety: How Cybersecurity Policy Will Shape The Future Of Autonomous Vehicles, Caleb Kennedy
Michigan Telecommunications & Technology Law Review
This note assesses the threat that hacking and related cybersecurity issues will pose to autonomous vehicles. Given the sweeping safety benefits autonomous vehicles will potentially bring to society, protecting against hacking and cyber-threats must be one of the top priorities for industry and public safety officials if autonomous vehicles are to gain widespread acceptance in the market. It proposes a framework for how these concerns should be addressed and how we can mitigate the risks. It addresses both proactive and reactive measures that can be taken by manufacturers, how to incentivize these measures, and the role cyber-insurance can play in …
Jailbreak!: What Happens When Autonomous Vehicle Owners Hack Into Their Own Cars, Michael Sinanian
Jailbreak!: What Happens When Autonomous Vehicle Owners Hack Into Their Own Cars, Michael Sinanian
Michigan Telecommunications & Technology Law Review
Autonomous and connected vehicles (ACVs) are a transformational force for humanity. It is highly likely that some owners of ACVs will circumvent their vehicle software to expose unauthorized functionality, known as “jailbreaking”. This would trigger copyright liability, the extent of which would be dependent upon the copyright system’s various rulemaking processes and common law interpretations. This note explores the world of software “jailbreaking”, with its roots in smartphone unlocking, and extrapolates that to ACVs. Some compelling (and at times dangerous) scenarios are contemplated, and recommendations are made for consumers, technologists, manufacturers, and policy makers.
A Survey Of Legal Issues Arising From The Deployment Of Autonomous And Connected Vehicles, Daniel A. Crane, Kyle D. Logue, Bryce C. Pilz
A Survey Of Legal Issues Arising From The Deployment Of Autonomous And Connected Vehicles, Daniel A. Crane, Kyle D. Logue, Bryce C. Pilz
Michigan Telecommunications & Technology Law Review
With concerns rising over the number and variety of state regulations, companies are increasingly looking to the federal government for guidance. Representatives from Google, GM, Lyft, and Delphi testified before Congress on March 15, urging Congress to pass a federal law concerning autonomous vehicles. While the passage of any federal legislation is unclear at this time, other parts of the federal government have been extremely active in recent months. In January 2016, the Obama administration proposed a 10-year, $4 billion investment in autonomous vehicle technology. In that same announcement, the Department of Transportation (“DOT”) committed to developing model state policy …
A New Take On An Old Problem: Employee Misclassification In The Modern Gig-Economy, Jennifer Pinsof
A New Take On An Old Problem: Employee Misclassification In The Modern Gig-Economy, Jennifer Pinsof
Michigan Telecommunications & Technology Law Review
For decades, U.S. labor and employment law has used a binary employment classification system, labeling workers as either employees or independent contractors. Employees are granted a variety of legal protections, while independent contractors are not. However, the explosion of the gig-economy—which connects consumers with underutilized resources—has produced a growing number of workers who do not seem to fit into either category. Though far from traditional employees, gig-workers bear little resemblance to independent contractors. Forced to choose, however, most gig-economy companies label their workers as independent contractors, depriving them of many basic worker-protections. Gig-workers have turned to the courts, hoping to …
Before Mayo & After Alice: The Changing Concept Of Abstract Ideas, Magnus Gan
Before Mayo & After Alice: The Changing Concept Of Abstract Ideas, Magnus Gan
Michigan Telecommunications & Technology Law Review
Mayo v. Prometheus and Alice v. CLS are landmark Supreme Court decisions which respectively introduced and then instituted a new, two-step patent-eligibility test. Step One tests the patent claims for abstractness, while Step Two tests for inventive application. This new test was so demanding that in the one-year period after Alice was decided, over 80 percent of all challenged patents had one or more claims invalidated. In fact, at the Federal Circuit over the same time period, only one recorded case of a successful Alice defense exists—DDR Holdings v. Hotels.com. This note explains DDR’s success as an inconsistency …
Virtual Violence - Disruptive Cyberspace Operations As "Attacks" Under International Humanitarian Law, Ido Kilovaty
Virtual Violence - Disruptive Cyberspace Operations As "Attacks" Under International Humanitarian Law, Ido Kilovaty
Michigan Telecommunications & Technology Law Review
Power outages, manipulations of data, and interruptions of Internet access are all possible effects of cyber operations. Unfortunately, recent efforts to address and regulate cyberspace operations under international law often emphasize the uncommon, though severe, cyber-attacks that cause deaths, injuries, or physical destruction. This paper deals with cyber operations during armed conflicts that cause major disruption or interruption effects – as opposed to deaths, injuries, or physical destruction. The purpose of this paper is to explore the consequences of these cyber operations that cause major disruption or interruption effects, and to argue that they might still constitute “acts of violence,” …
Privacy And Accountability In Black-Box Medicine, Roger Allan Ford, W. Nicholson Price Ii
Privacy And Accountability In Black-Box Medicine, Roger Allan Ford, W. Nicholson Price Ii
Michigan Telecommunications & Technology Law Review
Black-box medicine—the use of big data and sophisticated machine-learning techniques for health-care applications—could be the future of personalized medicine. Black-box medicine promises to make it easier to diagnose rare diseases and conditions, identify the most promising treatments, and allocate scarce resources among different patients. But to succeed, it must overcome two separate, but related, problems: patient privacy and algorithmic accountability. Privacy is a problem because researchers need access to huge amounts of patient health information to generate useful medical predictions. And accountability is a problem because black-box algorithms must be verified by outsiders to ensure they are accurate and unbiased, …
Valuing Spectrum Allocations, Thomas W. Hazlett, Michael Honig
Valuing Spectrum Allocations, Thomas W. Hazlett, Michael Honig
Michigan Telecommunications & Technology Law Review
Observing trends in which Wi-Fi and Bluetooth have become widely popular, some argue that unlicensed allocations hosting such wireless technologies are increasingly valuable and that administrative spectrum allocations should shift accordingly. We challenge that policy conclusion. A core issue is that the social value of a given spectrum allocation is widely assumed to equal the gains of the applications it is likely to host. This thinking is faulty, as vividly seen in what we deem the Broadcast TV Spectrum Valuation Fallacy – the idea that because wireless video, or broadcast network programs are popular, TV channels are efficiently defined. This …
Network Neutrality And The First Amendment, Andrew Patrick, Eric Scharphorn
Network Neutrality And The First Amendment, Andrew Patrick, Eric Scharphorn
Michigan Telecommunications & Technology Law Review
The First Amendment reflects the conviction that the widest possible dissemination of information from diverse and antagonistic sources is essential to public welfare. Like the printing press, the Internet has dramatically transformed the marketplace of ideas by providing unprecedented opportunities for individuals to communicate. Though its growth continues to be phenomenal, broadband service providers— acting as Internet gatekeepers—have developed the ability to discriminate against specific content and applications. First, these gatekeepers intercept and inspect data transferred over public networks, then selectively block or slow it. This practice has the potential to stifle the Internet’s value as a speech platform by …
The Cost Of Confusion: The Paradox Of Trademarked Pharmaceuticals, Hannah Brennan
The Cost Of Confusion: The Paradox Of Trademarked Pharmaceuticals, Hannah Brennan
Michigan Telecommunications & Technology Law Review
The United States spends nearly $1,000 per person annually on drugs—forty percent more than the next highest spender, Canada, and more than twice the amount France and Germany spend. Although myriad factors contribute to high drug spending in the United States, intellectual property law plays a crucial and well-documented role in inhibiting access to cheaper, generic medications. Yet, for the most part, the discussion of the relationship between intellectual property law and drug spending has centered on patent protection. Recently, however, a few researchers have turned their attention to a different avenue of exclusivity—trademark law. New studies suggest that pharmaceutical …
Regulating To Achieve Stability In The Domain Of High-Frequency Trading, Lindsey C. Crump
Regulating To Achieve Stability In The Domain Of High-Frequency Trading, Lindsey C. Crump
Michigan Telecommunications & Technology Law Review
High-frequency trading has become a darling of capital markets debate. This debate thrives because the true and long-lasting effects of high-frequency trading are still unknown. On one hand, high-frequency trading evidences recent and powerful advances in trading technology; on the other, it is said to harness speed at the expense of fairness, prudence, and stability. In part because of this duality, the regulation of high-frequency trading in the United States has been slow to develop. Other nations, however, have been quicker to react and to promulgate laws that directly, or indirectly, affect high-frequency trading. This Note explores the legal responses …
Loopholes For Circumventing The Constitution: Unrestrained Bulk Surveillance On Americans By Collecting Network Traffic Abroad, Axel Arnbak, Sharon Goldberg
Loopholes For Circumventing The Constitution: Unrestrained Bulk Surveillance On Americans By Collecting Network Traffic Abroad, Axel Arnbak, Sharon Goldberg
Michigan Telecommunications & Technology Law Review
This Article reveals interdependent legal and technical loopholes that the US intelligence community could use to circumvent constitutional and statutory safeguards for Americans. These loopholes involve the collection of Internet traffic on foreign territory, and leave Americans as unprotected as foreigners by current United States (US) surveillance laws. This Article will also describe how modern Internet protocols can be manipulated to deliberately divert American’s traffic abroad, where traffic can then be collected under a more permissive legal regime (Executive Order 12333) that is overseen solely by the executive branch of the US government. Although the media has reported on some …
Voluntary Disclosure Of Information As A Proposed Standard For The Fourth Amendment's Third-Party Doctrine, Margaret E. Twomey
Voluntary Disclosure Of Information As A Proposed Standard For The Fourth Amendment's Third-Party Doctrine, Margaret E. Twomey
Michigan Telecommunications & Technology Law Review
The third-party doctrine is a long-standing tenant of Fourth Amendment law that allows law enforcement officers to utilize information that was released to a third party without the probable cause required for a traditional search warrant. This has allowed law enforcement agents to use confidential informants, undercover agents, and access bank records of suspected criminals. However, in a digital age where exponentially more information is shared with Internet Service Providers, e-mail hosts, and social media “friends,” the traditional thirdparty doctrine ideas allow law enforcement officers access to a cache of personal information and data with a standard below probable cause. …
No More Shortcuts: Protect Cell Site Location Data With A Warrant Requirement, Lauren E. Babst
No More Shortcuts: Protect Cell Site Location Data With A Warrant Requirement, Lauren E. Babst
Michigan Telecommunications & Technology Law Review
In modern society, the cell phone has become a virtual extension of most Americans, managing all kinds of personal and business matters. Modern cell tower technology allows cell service providers to accumulate a wealth of individuals’ location information while they use their cell phones, and such data is available for law enforcement to obtain without a warrant. This is problematic under the Fourth Amendment, which protects reasonable expectations of privacy. Under the Katz two-prong test, (1) individuals have an actual, subjective expectation of privacy in their cell site location data, and (2) society is prepared to acknowledge that expectation as …
More Than Bric-A-Brac: Testing Chinese Exceptionalism In Patenting Behavior Using Comparative Empirical Analysis, Jay P. Kesan, Alan Marco, Richard Miller
More Than Bric-A-Brac: Testing Chinese Exceptionalism In Patenting Behavior Using Comparative Empirical Analysis, Jay P. Kesan, Alan Marco, Richard Miller
Michigan Telecommunications & Technology Law Review
Although many developing economies are increasingly influencing the global economy, China’s influence has been the greatest of these by far. Once hindered from competition by political and economic restrictions, China is now a major economic player. As China’s economic might has grown, so too has the demand for intellectual property protection for technologies originating from China. In this article, we present a detailed empirical study of Chinese patenting trends in the United States and the implications of these trends for the global economy. We compare these trends to patenting trends from earlier decades. Specifically, we compare Chinese patenting trends to …
Holding Up And Holding Out, Colleen V. Chien
Holding Up And Holding Out, Colleen V. Chien
Michigan Telecommunications & Technology Law Review
Patent “hold-up” and patent “hold-out” present important, alternative theories for what ails the patent system. Patent “hold-up” occurs when a patent owner sues a company when it is most vulnerable—after it has implemented a technology—and is able wrest a settlement because it is too late for the company to change course. Patent “hold-out” is the practice of companies routinely ignoring patents and resisting patent owner demands because the odds of getting caught are small. Hold-up has arguably predicted the current patent crises, and the ex ante assertion of technology patents whether in the smartphone war, standards, or patent “troll” context. …
After Myriad: Reconsidering The Incentives For Innovation In The Biotech Industry, Daniel K. Yarbrough
After Myriad: Reconsidering The Incentives For Innovation In The Biotech Industry, Daniel K. Yarbrough
Michigan Telecommunications & Technology Law Review
35 U.S.C. § 101 allows a patent for “any new and useful process, machine, manufacture, or composition of matter, or any new and useful improvement thereof.” Recently, the Supreme Court issued several key decisions affecting the doctrine of patentable subject matter under § 101. Starting with Bilski v. Kappos (2011), and continuing with Mayo Collaborative Services, Inc. v. Prometheus Laboratories (2012), Association for Molecular Pathology v. Myriad Genetics (2013) and, most recently, Alice Corporation Pty. Ltd. v. CLS Bank International (2014), every year has brought another major change to the way in which the Court assesses patentability. In Myriad, the …
District Courts Versus The Usitc: Considering Exclusionary Relief For F/Rand-Encumbered Standard-Essential Patents, Helen H. Ji
District Courts Versus The Usitc: Considering Exclusionary Relief For F/Rand-Encumbered Standard-Essential Patents, Helen H. Ji
Michigan Telecommunications & Technology Law Review
Technological standards allow manufacturers and consumers to rely upon these agreed-upon basic systems to facilitate sales and further invention. However, where these standards involved patented technology, the process of standard-setting raises many concerns at the intersection of antitrust and patent law. As patent holders advocate for their patents to become part of technological standards, how should courts police this activity to prevent patent holdup and other anti-competitive practices? This Note explores the differing approaches to remedies employed by the United States International Trade Commission and the United States District Courts where standard-essential patents are infringed. This Note further proposes that …
Wireless Localism: Beyond The Shroud Of Objectivity In Federal Spectrum Administration, Olivier Sylvain
Wireless Localism: Beyond The Shroud Of Objectivity In Federal Spectrum Administration, Olivier Sylvain
Michigan Telecommunications & Technology Law Review
Recent innovations in mobile wireless technology have instigated a debate between two camps of legal scholars about federal administration of the electromagnetic spectrum. The first camp argues that the Federal Communications Commission (“FCC”) should define spectrum use rights more clearly and give spectrum licensees broad property rights in frequencies. The second camp argues that, rather than award exclusive licenses to the highest bidder, the FCC ought to open much, if not most, of the spectrum to unlicensed use by smartphones and tablets equipped with the newest spectrum administration technology. First, this Article shows that both of these camps comprise a …
Geographically Restricted Streaming Content And Evasion Of Geolocation: The Applicability Of The Copyright Anticircumvention Rules, Jerusha Burnett
Geographically Restricted Streaming Content And Evasion Of Geolocation: The Applicability Of The Copyright Anticircumvention Rules, Jerusha Burnett
Michigan Telecommunications & Technology Law Review
A number of methods currently exist or are being developed to determine where Internet users are located geographically when they access a particular webpage. Yet regardless of the precautions taken by website operators to limit the locations from which they allow access, it is likely that users will find ways to gain access to restricted content. Should the evasion of geolocation constitute circumvention of access controls so that § 1201 of the Digital Millennium Copyright Act ("DMCA") applies? Because location data can properly be considered personally identifiable information ("PII"), this Note argues that § 1201 should not apply absent a …
Whose Social Network Account: A Trade Secret Approach To Allocating Rights, Zoe Argento
Whose Social Network Account: A Trade Secret Approach To Allocating Rights, Zoe Argento
Michigan Telecommunications & Technology Law Review
Who has the superior right to a social network account? This is the question in a growing number of disputes between employers and workers over social network accounts. The problem has no clear legal precedent. Although the disputes implicate rights under trademark, copyright, and privacy law, these legal paradigms fail to address the core issue. At base, disputes over social network accounts are disputes over the right to access the people, sometimes numbering in the tens of thousands, who follow an account. This Article evaluates the problem from the perspective of the public interest in social network use, particularly the …
High-Frequency Trading: Should Regulators Do More, Matt Prewitt
High-Frequency Trading: Should Regulators Do More, Matt Prewitt
Michigan Telecommunications & Technology Law Review
High-Frequency Trading ("HFT") is a diverse set of algorithmic trading strategies characterized by fast order execution. Its importance in international markets has increased vastly in recent years. From a regulatory perspective, HFT presents difficult and partially unresolved questions. The difficulties stem partly from the fact that HFT encompasses a wide range of trading strategies, and partly from a dearth of unambiguous empirical findings about HFT's effects on markets. Yet certain important conclusions are broadly accepted. HFT can increase systemic risk by causing or exacerbating events like the "Flash Crash" of May 6, 2010. HFT can also enable market manipulators to …
Patents V. Statutory Exclusivities In Biological Pharmaceuticals - Do We Really Need Both, Yaniv Heled
Patents V. Statutory Exclusivities In Biological Pharmaceuticals - Do We Really Need Both, Yaniv Heled
Michigan Telecommunications & Technology Law Review
Over the past decade or so, the United States has been the arena of a boisterous debate regarding the creation of a new regulatory framework for the approval of generic versions of biologics-based pharmaceutical products (also known as "biological products" and "biologics")--an important and increasingly growing class of drugs. The basic purpose of such a framework is to create a fast and less-costly route to FDA approval for biologics that would be similar or identical to already-approved biological products--typically ones that are sold on the market at monopoly rates--thereby allowing cheaper versions of such medicines to enter the market. One …
No Cause Of Action: Video Surveillance In New York City, Olivia J. Greer
No Cause Of Action: Video Surveillance In New York City, Olivia J. Greer
Michigan Telecommunications & Technology Law Review
In 2010, New York City Police Commissioner Raymond Kelly announced a new network of video surveillance in the City. The new network would be able to prevent future terrorist attacks by identifying suspicious behavior before catastrophic events could take place. Kelly told reporters, "If we're looking for a person in a red jacket, we can call up all the red jackets filmed in the last 30 days," and "[w]e're beginning to use software that can identify suspicious objects or behaviors." Gothamist later made a witticism of Kelly's statement, remarking, "Note to terrorists: red jackets are not a good look for …
Res Or Rules - Patents And The (Uncertain) Rules Of The Game, Emily Michiko Morris
Res Or Rules - Patents And The (Uncertain) Rules Of The Game, Emily Michiko Morris
Michigan Telecommunications & Technology Law Review
The Article proceeds as follows. Part I reviews the basics of patent claiming, the traditional view of claims as real property deeds, and why uncertainty as to the boundaries of those deeds is considered undesirable. Part II critiques the analogy between real property deeds and patent claims, highlighting in particular the requisite novelty and conceptual nature of the patent res, the differences between the purposes of the patent system and real property regimes, and the effect of these different purposes on the expected predictability of patent boundaries. Part III then changes the analogy from patent claims as property deeds to …