To understand how facial recognition technology interacts with a seemingly abstract standard of constitutional protection, a quick note about the Fourth Amendment is helpful.
Enhanced CFIUS review represents one of the strongest tools in the U.S. arsenal against China in the ongoing U.S.-China trade war.
The socioeconomic ramifications of a single cyber-attack are extensive. These include financial harm, government investigations, regulatory fines, public backlash, negative industry reputation, and even shareholder lawsuits.
COPPA has been described as an “‘opt-in’ privacy band-aid” that doesn’t begin to reach the level of protection provided by, for example, the European Union’s earliest internet regulations,
From a legal standpoint, open source software creates a lot of questions. Who owns the collective work? Does a developer own his or her edits?
Hyper-robust copyright protection for simple dance moves might not be ideal, but there does seem to be a cognizable harm in extracting an original dance from a community and monetizing it in the way Epic Games has with Fortnite’s emotes.
If you want to use Facebook, you do not have much choice — you must accept their use of your data or else not use the service.
Although USMCA does not appear to radically upend trade relations between the three countries, its ratification would usher in a variety of noteworthy changes.
The ambiguity surrounding the exact definition of ‘virtual currency’ and which particular digital assets qualify as virtual currencies (and therefore would be classified as commodities) could lead to a potential turf war between the SEC and CFTC.
It is possible that American officials are correct in their assessment that America and China are locked in a technological arms race, with Huawei posing a sizeable threat to the security of NATO member-states.
In recent years there has been a surge of cases aimed at forcing companies to make their websites more accessible to the visually impaired.
While most people have an aversion to the thought of their private conversations being recorded and transmitted, some might also say that they would want Siri to step if it were asked about a school shooting.
After a 40-year hiatus, in large part due to the work of the world’s best-known mouse, the United States’ lengthy copyrights will start to terminate again this year.
Should the United States go further in implementing legislation to combat fake news? And can it even do so given the protections of the First Amendment?
In order to minimize accidents by making automated vehicles that behave in safe and predictable ways, it may be necessary to program them to break the law.
Although both sides have raised valid claims against the other’s seemingly unethical behavior across their many legal disputes, the inability for Qualcomm to monitor how Apple has protected its trade-secreted source code seems especially dire.
As clients continue to demand lower billable hours and rates, firms are likely to search for ways to improve efficiency on their end.
On October 28, Lucien Greaves, co-founder of The Satanic Temple religious organization, tweeted the Temple’s intention to take legal action against Netflix for an allegedly infringing statue featured in the new show, The Chilling Adventures of Sabrina.
The results of a successful swatting are uniformly dangerous for the target, family or friends who live with the target, and the law enforcement officers themselves.
No matter who determines the FRAND rate or how it is calculated, it is likely to have a significant effect on the cost of your next smartphone.
How does one balance the rights of sovereigns residing within a greater jurisdiction with fundamental rules of fairness?
When I arrived in San Francisco early this summer, I marveled at the tech-forward presence of electric scooters all over the sidewalks. Much to my disappointment, the scooters were quickly banned.
A recent study by the University of Michigan’s C.S. Mott Children’s Hospital shows that many apps are abusing the developmental vulnerabilities of preschool-aged children to get them to watch advertisements and make in-app purchases.
Hackers can use unsecured wireless connections to hack into implanted devices. Connected medical devices can then be individually manipulated—insulin pumps can be programmed to send an excess amount of medication; pacemakers to send an extra shock to the heart.
Posts on the MTLR Blog are editorial opinion pieces written by student-editors of the Michigan Technology Law Review. The opinions expressed in these editorial posts are not espoused or endorsed by the University of Michigan or its Law School. To view scholarly Articles and Notes published by the Michigan Technology Law Review, please visit the MTLR home page.