Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 84

Full-Text Articles in Law

Nft For Eternity, Hadar Y. Jabotinsky, Michal Lavi Apr 2023

Nft For Eternity, Hadar Y. Jabotinsky, Michal Lavi

University of Michigan Journal of Law Reform

Non-fungible tokens (NFTs) are unique tokens stored on a digital ledger – the blockchain. They are meant to represent unique, non-interchangeable digital assets, as there is only one token with that exact data. Moreover, the information attached to the token cannot be altered as on a regular database. While copies of these digital items are available to all, NFTs are tracked on blockchains to provide the owner with proof of ownership. This possibility of buying and owning digital assets can be attractive to many individuals.

NFTs are presently at the stage of early adoption and their uses are expanding. In …


How The Blockchain Undermined Digital Ownership, Aaron Perzanowski Jan 2023

How The Blockchain Undermined Digital Ownership, Aaron Perzanowski

Articles

The shift from a market built around the sale of tangible goods to one premised on the licensing of digital content and services has done significant and lasting damage to the notion of individual ownership. The emergence of blockchain technology, while certainly not necessary to reverse these trends, promised an opportunity to attract investment and demonstrate consumer demand for marketplaces that recognize meaningful digital ownership. Simultaneously, it offered an avenue for alleviating worries about hypothetical widespread reproduction and unchecked distribution of copyrighted works. Instead, many of the most visible blockchain projects in recent years—the proliferation of new cryptocurrencies and the …


Unfair Collection: Reclaiming Control Of Publicly Available Personal Information From Data Scrapers, Andrew M. Parks Mar 2022

Unfair Collection: Reclaiming Control Of Publicly Available Personal Information From Data Scrapers, Andrew M. Parks

Michigan Law Review

Rising enthusiasm for consumer data protection in the United States has resulted in several states advancing legislation to protect the privacy of their residents’ personal information. But even the newly enacted California Privacy Rights Act (CPRA)—the most comprehensive data privacy law in the country— leaves a wide-open gap for internet data scrapers to extract, share, and monetize consumers’ personal information while circumventing regulation. Allowing scrapers to evade privacy regulations comes with potentially disastrous consequences for individuals and society at large.

This Note argues that even publicly available personal information should be protected from bulk collection and misappropriation by data scrapers. …


The Promise And Limits Of Lawfulness: Inequality, Law, And The Techlash, Salomé Viljoen Sep 2021

The Promise And Limits Of Lawfulness: Inequality, Law, And The Techlash, Salomé Viljoen

Articles

In response to widespread skepticism about the recent rise of “tech ethics”, many critics have called for legal reform instead. In contrast with the “ethics response”, critics consider the “lawfulness response” more capable of disciplining the excesses of the technology industry. In fact, both are simultaneously vulnerable to industry capture and capable of advancing a more democratic egalitarian agenda for the information economy. Both ethics and law offer a terrain of contestation, rather than a predetermined set of commitments by which to achieve more democratic and egalitarian technological production. In advancing this argument, the essay focuses on two misunderstandings common …


Natural Language Processing For Lawyers And Judges, Frank Fagan Apr 2021

Natural Language Processing For Lawyers And Judges, Frank Fagan

Michigan Law Review

A Review of Law as Data: Computation, Text, & the Future of Legal Analysis. Edited by Michael A. Livermore and Daniel N. Rockmore.


Clearing Opacity Through Machine Learning, W. Nicholson Price Ii, Arti K. Rai Jan 2021

Clearing Opacity Through Machine Learning, W. Nicholson Price Ii, Arti K. Rai

Articles

Artificial intelligence and machine learning represent powerful tools in many fields, ranging from criminal justice to human biology to climate change. Part of the power of these tools arises from their ability to make predictions and glean useful information about complex real-world systems without the need to understand the workings of those systems.


Persuasion About/Without International Law: The Case Of Cybersecurity Norms, Steven R. Ratner Jan 2021

Persuasion About/Without International Law: The Case Of Cybersecurity Norms, Steven R. Ratner

Book Chapters

International law on cybersecurity is characterized by at best a thin consensus on the existence of rules, their meaning, and the desirability and content of new rules. This legal landscape results in a unique pattern of argumentation and persuasion by states and non-state actors both in advocating for a regulatory scheme for cyber activity and in reacting to malicious cyber acts. By examining argumentation in the absence of a generally agreed legal framework, this chapter seeks to provide new insights into the motivations for and effects of international legal argumentation in shaping debates and behavior. After describing the legal landscape …


Exploring Lawful Hacking As A Possible Answer To The "Going Dark" Debate, Carlos Liguori May 2020

Exploring Lawful Hacking As A Possible Answer To The "Going Dark" Debate, Carlos Liguori

Michigan Technology Law Review

The debate on government access to encrypted data, popularly known as the “going dark” debate, has intensified over the years. On the one hand, law enforcement authorities have been pushing for mandatory exceptional access mechanisms on encryption systems in order to enable criminal investigations of both data in transit and at rest. On the other hand, both technical and industry experts argue that this solution compromises the security of encrypted systems and, thus, the privacy of their users. Some claim that other means of investigation could provide the information authorities seek without weakening encryption, with lawful hacking being one of …


An Agent-Based Model Of Financial Benchmark Manipulation, Gabriel Virgil Rauterberg, Megan Shearer, Michael Wellman Jun 2019

An Agent-Based Model Of Financial Benchmark Manipulation, Gabriel Virgil Rauterberg, Megan Shearer, Michael Wellman

Articles

Financial benchmarks estimate market values or reference rates used in a wide variety of contexts, but are often calculated from data generated by parties who have incentives to manipulate these benchmarks. Since the the London Interbank Offered Rate (LIBOR) scandal in 2011, market participants, scholars, and regulators have scrutinized financial benchmarks and the ability of traders to manipulate them. We study the impact on market quality and microstructure of manipulating transaction-based benchmarks in a simulated market environment. Our market consists of a single benchmark manipulator with external holdings dependent on the benchmark, and numerous background traders unaffected by the benchmark. …


Symbols, Systems, And Software As Intellectual Property: Time For Contu, Part Ii?, Timothy K. Armstrong May 2018

Symbols, Systems, And Software As Intellectual Property: Time For Contu, Part Ii?, Timothy K. Armstrong

Michigan Telecommunications & Technology Law Review

The functional nature of computer software underlies two propositions that were, until recently, fairly well settled in intellectual property law: first, that software, like other utilitarian articles, may qualify for patent protection; and second, that the scope of copyright protection for software is comparatively limited. Both propositions have become considerably shakier as a result of recent court decisions. Following Alice Corp. v. CLS Bank Int’l, 134 S. Ct. 2347 (2014), the lower courts have invalidated many software patents as unprotectable subject matter. Meanwhile, Oracle America v. Google Inc., 750 F.3d 1339 (Fed. Cir. 2014) extended far more expansive copyright protection …


Accessible Reliable Tax Advice, Emily Cauble Apr 2018

Accessible Reliable Tax Advice, Emily Cauble

University of Michigan Journal of Law Reform

Unsophisticated taxpayers who lack financial resources are disadvantaged by a shortage of adequate tax advice. The IRS does not have the resources to answer all questions asked, and the IRS’s informal advice comes with no guarantee as to its accuracy and offers the taxpayer no protection when it is mistaken. Furthermore, non-IRS sources of advice have not sufficiently filled the void left by a lack of satisfactory IRS guidance. These biases against unsophisticated taxpayers have been noted by existing literature. This Article contributes to existing literature by proposing several novel reform measures to assist unsophisticated taxpayers.

First, with respect to …


Regulating Black-Box Medicine, W. Nicholson Price Ii Dec 2017

Regulating Black-Box Medicine, W. Nicholson Price Ii

Michigan Law Review

Data drive modern medicine. And our tools to analyze those data are growing ever more powerful. As health data are collected in greater and greater amounts, sophisticated algorithms based on those data can drive medical innovation, improve the process of care, and increase efficiency. Those algorithms, however, vary widely in quality. Some are accurate and powerful, while others may be riddled with errors or based on faulty science. When an opaque algorithm recommends an insulin dose to a diabetic patient, how do we know that dose is correct? Patients, providers, and insurers face substantial difficulties in identifying high-quality algorithms; they …


Artificial Intelligence In Health Care: Applications And Legal Implications, W. Nicholson Price Ii Nov 2017

Artificial Intelligence In Health Care: Applications And Legal Implications, W. Nicholson Price Ii

Articles

Artificial intelligence (AI) is rapidly moving to change the healthcare system. Driven by the juxtaposition of big data and powerful machine learning techniques—terms I will explain momentarily—innovators have begun to develop tools to improve the process of clinical care, to advance medical research, and to improve efficiency. These tools rely on algorithms, programs created from healthcare data that can make predictions or recommendations. However, the algorithms themselves are often too complex for their reasoning to be understood or even stated explicitly. Such algorithms may be best described as “black-box.” This article briefly describes the concept of AI in medicine, including …


The Oversimplification Of Deregulation: A Case Study On Clinical Decision Support Software, Deeva V. Shah Nov 2017

The Oversimplification Of Deregulation: A Case Study On Clinical Decision Support Software, Deeva V. Shah

Michigan Telecommunications & Technology Law Review

Until the December 2016 passage of the Cures Act, the FDA had regulatory power over clinical decision support (CDS) software; however, the Act removed a large group of CDS software from the FDA’s statutory authority. Congressional intent was to increase innovation by removing regulatory blockades—such as device testing and certification—from the FDA’s purview. This note argues that the enactment of this specific provision of the Act will instead stymie innovation and overlook the unfortunate safety consequences inherent in its deregulation. CDS software is a burgeoning field ripe for innovation; however, rapid innovation can often lead to a slew of mistakes—mistakes …


The Racist Algorithm?, Anupam Chander Apr 2017

The Racist Algorithm?, Anupam Chander

Michigan Law Review

Review of The Black Box Society: The Secret Algorithms That Control Money and Information by Frank Pasquale.


Making Democracy Harder To Hack, Scott Shackelford, Bruce Schneier, Michael Sulmeyer, Anne Boustead, Ben Buchanan, Amanda N. Craig Deckard, Trey Herr, Jessica Malekos Smith Jan 2017

Making Democracy Harder To Hack, Scott Shackelford, Bruce Schneier, Michael Sulmeyer, Anne Boustead, Ben Buchanan, Amanda N. Craig Deckard, Trey Herr, Jessica Malekos Smith

University of Michigan Journal of Law Reform

With the Russian government hack of the Democratic National Convention email servers and related leaks, the drama of the 2016 U.S. presidential race highlights an important point: nefarious hackers do not just pose a risk to vulnerable companies; cyber attacks can potentially impact the trajectory of democracies. Yet a consensus has been slow to emerge as to the desirability and feasibility of reclassifying elections—in particular, voting machines—as critical infrastructure, due in part to the long history of local and state control of voting procedures. This Article takes on the debate—focusing on policy options beyond former Department of Homeland Security Secretary …


Fetishizing Copies, Jessica Litman Jan 2017

Fetishizing Copies, Jessica Litman

Book Chapters

Our copyright laws encourage authors to create new works and communicate them to the public, because we hope that people will read the books, listen to the music, see the art, watch the films, run the software, and build and inhabit the buildings. That is the way that copyright promotes the Progress of Science. Recently, that not-very-controversial principle has collided with copyright owners’ conviction that they should be able to control, or at least collect royalties from, all uses of their works. A particularly ill-considered manifestation of this conviction is what I have decided to call copy-fetish. This is the …


Shedding Light On The "Going Dark" Problem And The Encryption Debate, John Mylan Traylor Sep 2016

Shedding Light On The "Going Dark" Problem And The Encryption Debate, John Mylan Traylor

University of Michigan Journal of Law Reform

In an effort to protect the enormous volume of sensitive and valuable data that travels across the Internet and is stored on personal devices, private companies have created encryption software to secure data from criminals, hackers, and terrorists who wish to steal it. The greatest benefit of encryption also creates the biggest problem: Encryption software has become so secure that often not even the government can bypass it. The “Going Dark” problem—a scenario in which the government has obtained the legal authority to search a suspected criminal’s encrypted device but lacks the technical ability to do so—is becoming increasingly common. …


Protecting Personal Information: Achieving A Balance Between User Privacy And Behavioral Targeting, Patrick Myers Jan 2016

Protecting Personal Information: Achieving A Balance Between User Privacy And Behavioral Targeting, Patrick Myers

University of Michigan Journal of Law Reform

Websites and mobile applications provide immeasurable benefits to both users and companies. These services often collect vast amounts of personal information from the individuals that use them, including sensitive details such as Social Security numbers, credit card information, and physical location. Personal data collection and dissemination leave users vulnerable to various threats that arise from the invasion of their privacy, particularly because users are often ignorant of the existence or extent of these practices. Current privacy law does not provide users with adequate protection from the risks attendant to the collection and dissemination of their personal information. This Note advocates …


Installation Failure: How The Predominant Purpose Test Has Perpetuated Software’S Uncertain Legal Status Under The Uniform Commercial Code, Spencer Gottlieb Mar 2015

Installation Failure: How The Predominant Purpose Test Has Perpetuated Software’S Uncertain Legal Status Under The Uniform Commercial Code, Spencer Gottlieb

Michigan Law Review

Courts have struggled to uniformly classify software as a good or a service and have consequently failed to apply a consistent body of law in that domain. Instead, courts have relied on the predominant purpose test to determine whether the Uniform Commercial Code (“UCC”) or common law should apply to a given software contract. This test, designed for traditional goods and services that do not share software’s complexity or rapid advancement, has perpetuated the uncertainty surrounding software’s legal status. This Note proposes that courts adopt the substantial software test as an alternative to the predominant purpose test. Under this proposal, …


Aftermarketfailure: Windows Xp's End Of Support, Andrew Tutt Apr 2014

Aftermarketfailure: Windows Xp's End Of Support, Andrew Tutt

Michigan Law Review First Impressions

After 12 years, support for Windows XP will end on April 8, 2014. So proclaims a Microsoft website with a helpful clock counting down the days. "What does this mean?" the website asks. "It means you should take action." You should "migrate to a current supported operating system - such as Windows 8.1 - so you can receive regular security updates to protect [your] computer from malicious attacks." The costs of mass migration will be immense. About 30% of all desktop PCs are running Windows XP right now. An estimated 10% of the U.S. government's computers run Windows XP, including …


Structure From Nothing And Claims For Free: Using A Whole-System View Of The Patent System To Improve Notice And Predictability For Software Patents, Holly K. Victorson Jan 2014

Structure From Nothing And Claims For Free: Using A Whole-System View Of The Patent System To Improve Notice And Predictability For Software Patents, Holly K. Victorson

Michigan Telecommunications & Technology Law Review

No uniform or customary method of disclosure for software patents is currently employed by inventors. This Note examines the issues that develop from software patent claims disclosed at various levels of abstraction, and the difficulties encountered by courts and the public when investigating the contours of the software patent space. While the courts have placed some restrictions on the manner in which software inventions are claimed, they are easily bypassed by clever patent applicants who desire to claim the maximum scope of their inventions. In the long run, however, a large “patent thicket” of overlapping and potentially overbroad inventions will …


Cyberattacks And The Covert Action Statute: Toward A Domestic Legal Framework For Offensive Cyberoperations, Aaron P. Brecher Dec 2012

Cyberattacks And The Covert Action Statute: Toward A Domestic Legal Framework For Offensive Cyberoperations, Aaron P. Brecher

Michigan Law Review

Cyberattacks are capable of penetrating and disabling vital national infrastructure, causing catastrophic economic harms, and approximating the effects of war, all from remote locations and without the use of conventional weapons. They can be nearly impossible to attribute definitively to their sources and require relatively few resources to launch. The United States is vulnerable to cyberattacks but also uniquely capable of carrying out cyberattacks of its own. To do so effectively, the United States requires a legal regime that is well suited to cyberattacks' unique attributes and that preserves executive discretion while inducing the executive branch to coordinate with Congress. …


Property As Control: The Case Of Information, Jane B. Baron Jan 2012

Property As Control: The Case Of Information, Jane B. Baron

Michigan Telecommunications & Technology Law Review

If heath policy makers' wishes come true, by the end of the current decade the paper charts in which most of our medical information is currently recorded will be replaced by networked electronic health records ("EHRs").[...] Like all computerized records, networked EHRs are difficult to secure, and the information in EHRs is both particularly sensitive and particularly valuable for commercial purposes. Sadly, the existing federal statute meant to address this problem, the Health Insurance Portability and Accountability Act of 1996 ("HIPAA"), is probably inadequate to the task.[...] Health law, privacy, and intellectual property scholars have all suggested that the river …


Search Neutrality As An Antitrust Principle, Daniel A. Crane Jan 2012

Search Neutrality As An Antitrust Principle, Daniel A. Crane

Articles

Given the Internet's designation as "the great equalizer,"' it is unsurprising that nondiscrimination has emerged as a central aspiration of web governance.2 But, of course, bias, discrimination, and neutrality are among the slipperiest of regulatory principles. One person's bias is another person's prioritization. Fresh on the heels of its initial success in advocating a net neutrality principle,' Google is in the uncomfortable position of trying to stave off a corollary principle of search neutrality.' Search neutrality has not yet coalesced into a generally understood principle, but at its heart is some idea that Internet search engines ought not to prefer …


Databases And Dynamism, Michal Shur-Ofry Feb 2011

Databases And Dynamism, Michal Shur-Ofry

University of Michigan Journal of Law Reform

Databases are generally perceived in legal scholarship as static warehouses, storing up valuable facts and information. Accordingly, scholarship on copyright protection of databases typically concentrates on the social need to access their content. This Article seeks to shift the focus of the debate, arguing that the copyrightdatabases debate is not merely a static "access to information" story. Instead, it is a dynamic story of relations, hierarchies, and interactions between pieces of information, determined by database creators. It is also a story of patterns, categories, selections, and taxonomies that are often invisible to the naked eye, but that influence our perceptions …


Make Your Life Easier: Free Online Productivity Tools And Resources, Kincaid C. Brown Jan 2011

Make Your Life Easier: Free Online Productivity Tools And Resources, Kincaid C. Brown

Law Librarian Scholarship

CiteGenie works primarily for caselaw and Internet resource research but is experimenting with the ability to add citations for statutes and regulations. CiteGenie provides a number of formatting options and allows you to choose citation rules for a particular state, use parallel citations, remove star-pagination marks from quoted texts, and personalize abbreviations. This tool is easy to use; when researching in Firefox, select CiteGenie from the right-click menu and a pop-up displays the copied text and citation to be pasted.


Will Quants Rule The (Legal) World?, Edward K. Cheng Apr 2009

Will Quants Rule The (Legal) World?, Edward K. Cheng

Michigan Law Review

The quants are coming! And they are here to stay-so argues Professor Ian Ayres' in his new book, Super Crunchers, which details the brave new world of statistical prediction and how it has already begun to affect our lives. For years, academic researchers have known about the considerable and at times surprising advantages of statistical models over the considered judgments of experienced clinicians and experts. Today, these models are emerging all over the landscape. Whether the field is wine, baseball, medicine, or consumer relations, they are vying against traditional experts for control over how we make decisions. To be …


Agency, Code, Or Contract: Determining Employees' Authorization Under The Computer Fraud And Abuse Act, Katherine Mesenbring Field Mar 2009

Agency, Code, Or Contract: Determining Employees' Authorization Under The Computer Fraud And Abuse Act, Katherine Mesenbring Field

Michigan Law Review

The federal Computer Fraud and Abuse Act ("CFAA ") provides for civil remedies against individuals who have accessed a protected computer without authorization or in excess of their authorization. With increasing numbers of employees using computers at work, employers have turned to the CFAA in situations where disloyal employees have pilfered company information from the employer's computer system. The vague language of the CFAA, however, has led courts to develop three different interpretations of "authorization" in these CFAA employment cases, with the result that factually similar cases in different courts can generate opposite outcomes in terms of employee liability under …


The General Public License Version 3.0: Making Or Breaking The Foss Movement, Clark D. Asay Jan 2008

The General Public License Version 3.0: Making Or Breaking The Foss Movement, Clark D. Asay

Michigan Telecommunications & Technology Law Review

Free and open source software (FOSS) is a big deal. FOSS has become an undeniably important element for businesses and the global economy in general, as companies increasingly use it internally and attempt to monetize it. Governments have even gotten into the act, as a recent study notes that FOSS plays a critical role in the US Department of Defense's systems. Others have pushed for the adoption of FOSS to help third-world countries develop. Given many of its technological and developmental advantages, FOSS's use, adoption, and development are only projected to grow.[...] The FSF created the most popular version of …