Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 10 of 10

Full-Text Articles in Law

Technology Transfer Laws Governing Federally Funded Research And Development, James V. Lacy, Bradford C. Brown, Michael R. Rubin Nov 2012

Technology Transfer Laws Governing Federally Funded Research And Development, James V. Lacy, Bradford C. Brown, Michael R. Rubin

Pepperdine Law Review

No abstract provided.


Rulemaking Vs. Democracy: Judging And Nudging Public Participation That Counts , Cynthia R. Farina, Mary Newhart, Josiah Heidt, Cornell Erulemaking Initiative Sep 2012

Rulemaking Vs. Democracy: Judging And Nudging Public Participation That Counts , Cynthia R. Farina, Mary Newhart, Josiah Heidt, Cornell Erulemaking Initiative

Michigan Journal of Environmental & Administrative Law

This Article considers how open government “magical thinking” around technology has infused efforts to increase public participation in rulemaking. We propose a framework for assessing the value of technology-enabled rulemaking participation and offer specific principles of participation-system design, which are based on conceptual work and practical experience in the Regulation Room project at Cornell University. An underlying assumption of open government enthusiasts is that more public participation will lead to better government policymaking: If we use technology to give people easier opportunities to participate in public policymaking, they will use these opportunities to participate effectively. However, experience thus far with …


Duck, Duck, Bilski: Searching For A Law-Progress Equipoise, Eric Golas Salbert Jan 2012

Duck, Duck, Bilski: Searching For A Law-Progress Equipoise, Eric Golas Salbert

The Journal of Business, Entrepreneurship & the Law

Moore's Law generally asserts that the transistor capacity on a computer processing unit increases exponentially over time. To exemplify, in 1971, Intel's first microprocessor contained 2,300 transistors and was used in simple electronic pocket calculators and by 2007 Intel was manufacturing microprocessors containing 820,000,000 transistors used in personal computers capable of near-instantaneous worldwide communication over the Internet. When the framers of the Constitution drafted the empowering words, “To promote the Progress of Science and useful Arts,” could they foresee such a blistering pace of innovation? Have courts been able to maintain the balance between progress and limited monopolies? The history …


Student Intellectual Property Issues On The Entrepreneurial Campus, Bryce C. Pilz Jan 2012

Student Intellectual Property Issues On The Entrepreneurial Campus, Bryce C. Pilz

Michigan Business & Entrepreneurial Law Review

This article examines issues that are more frequently arising for universities concerning intellectual property in student inventions. It seeks to identify the issue, explain the underlying law, identify actual and proposed solutions to these issues, and explain the legal ramifications of these potential solutions.


Energy Subsidies, Market Distortion, And A Free Market Alternative, Hans Biebl Jan 2012

Energy Subsidies, Market Distortion, And A Free Market Alternative, Hans Biebl

University of Michigan Journal of Law Reform Caveat

Gas and coal are cheap. They are cheap because the U.S. government subsidizes their production. The result is that the marketplace does not recognize the true cost of fossil fuels. Without the subsidies, Americans—for the first time in nearly a hundred years—would experience the cost of unsubsidized fossil fuels. In a newly competitive marketplace, renewable sources of energy would be in a better position to compete. Without gas and coal subsidies, clean energy producers, who have not been able to compete with the low price of fossil fuels, might be more willing to invest in “clean, renewable, and more energy …


"Like" Your President: A Case For Online Voting, Jeremy Garson Jan 2012

"Like" Your President: A Case For Online Voting, Jeremy Garson

University of Michigan Journal of Law Reform Caveat

In the wake of Hurricane Sandy, New Jersey allowed displaced residents to vote in the 2012 elections by email. The option to vote online has been available to military members stationed overseas since 2009. New Jersey’s decision to open online voting to civilians raises the question of why this shift didn’t take place sooner. Assuming New Jersey’s system holds up under post-election scrutiny, why not utilize it to the fullest extent possible? Online voter registration is already permitted by eleven states, including the liberal, infrastructure-rich, population-heavy California and the conservative, sparsely populated Alaska. Extending the registration system to voting itself …


High-Frequency Trading: Should Regulators Do More, Matt Prewitt Jan 2012

High-Frequency Trading: Should Regulators Do More, Matt Prewitt

Michigan Telecommunications & Technology Law Review

High-Frequency Trading ("HFT") is a diverse set of algorithmic trading strategies characterized by fast order execution. Its importance in international markets has increased vastly in recent years. From a regulatory perspective, HFT presents difficult and partially unresolved questions. The difficulties stem partly from the fact that HFT encompasses a wide range of trading strategies, and partly from a dearth of unambiguous empirical findings about HFT's effects on markets. Yet certain important conclusions are broadly accepted. HFT can increase systemic risk by causing or exacerbating events like the "Flash Crash" of May 6, 2010. HFT can also enable market manipulators to …


No Cause Of Action: Video Surveillance In New York City, Olivia J. Greer Jan 2012

No Cause Of Action: Video Surveillance In New York City, Olivia J. Greer

Michigan Telecommunications & Technology Law Review

In 2010, New York City Police Commissioner Raymond Kelly announced a new network of video surveillance in the City. The new network would be able to prevent future terrorist attacks by identifying suspicious behavior before catastrophic events could take place. Kelly told reporters, "If we're looking for a person in a red jacket, we can call up all the red jackets filmed in the last 30 days," and "[w]e're beginning to use software that can identify suspicious objects or behaviors." Gothamist later made a witticism of Kelly's statement, remarking, "Note to terrorists: red jackets are not a good look for …


Enhancing Public Access To Online Rulemaking Information, Cary Coglianese Jan 2012

Enhancing Public Access To Online Rulemaking Information, Cary Coglianese

Michigan Journal of Environmental & Administrative Law

One of the most significant powers exercised by federal agencies is their power to make rules. Given the importance of agency rulemaking, the process by which agencies develop rules has long been subject to procedural requirements aiming to advance democratic values of openness and public participation. With the advent of the digital age, government agencies have engaged in increasing efforts to make rulemaking information available online as well as to elicit public participation via electronic means of communication. How successful are these efforts? How might they be improved? In this article, I investigate agencies’ efforts to make rulemaking information available …


Limiting The Affirmative Defense In The Digital Workplace , Daniel B. Garrie Jan 2012

Limiting The Affirmative Defense In The Digital Workplace , Daniel B. Garrie

Michigan Journal of Gender & Law

From 2009 to 2011, there were more than 30,000 sexual harassment claims filed in the United States. The ubiquitous availability of digital technology devices has facilitated many instances of sexual harassment. Such sexual harassment occurs through unprovoked and offensive e-mails, messages posted on electronic bulletin boards, and other means available on the Internet. To date, courts remain silent on this issue. Should this type of sexual harassment be treated differently from physical sexual harassment? The surprising answer is yes. This Article suggests a new judicial framework for addressing sexual harassment perpetrated through digital communications. This framework accounts for the real-world …