Blog

Who is behind your screen(s)?

One of the most important privacy cases this decade is currently in front of the Supreme Court: Carpenter v. United States. This decision will define how law enforcement interprets the Fourth Amendment regarding an individual’s cellphone. The decision hinges on whether law enforcement can use “third-party” doctrine dating from the 70s, which states that disclosing information to a third party does away with any expectation of privacy. We’ve already seen this doctrine in action. It allows law enforcement to compel cell-service providers to give historical cell-site records, without a warrant, to track down a serial cell phone thief. If SCOTUS upholds the current doctrine, then police would have free reign to monitor individuals’ cell phone location with little to no oversight.

The Controversial Genome-Editing Technique CRISPR-Cas9

On February 15, 2017, the Patent Trial and Appeal Board (PTAB) of the United States Patent and Trademark Office (USPTO) issued a ruling on a patent dispute about a genome-editing technique called CRISPR-Cas9.  The Regents of the University of California, University of Vienna, and a scientist named Emmanuelle Charpentier (collectively “UC”) initiated this legal proceeding, called an interference, against the Broad Institute, Inc., Massachusetts Institute of Technology, and President and Fellows of Harvard College (collectively “Broad”). The three-judge panel unanimously sided with Broad concluding, although temporarily, a legal battle closely watched by scientists, legal professionals and the biotechnology industry. On April 12, 2017, UC filed an appeal to the United States Court of Appeals for the Federal Circuit.

Blame it on the Robot?

Google-owned artificial intelligence company DeepMind recently succeeded at designing a program capable of defeating some of the world’s best players of Chinese strategy game Go.  While this may not appear groundbreaking, the real triumph comes from the fact that while the programmers laid the ground rules, it was the program itself, AlphaGo, that taught itself to play.

Fake News in the News Yet Again

On January 11, 2017, the term “fake news” entered the mainstream discourse when Donald Trump, during his first press conference as President-elect, refused to take a question from CNN reporter Jim Acosta and told him, “You are fake news.”  The source of that outburst can apparently be traced to a 35-page unverified document based primarily on memos complied by a former British intelligence operative that CNN had publicized.  President-elect Trump immediately blasted the report through his favorite medium of communication, tweeting, “FAKE NEWS – A TOTAL POLITICAL WITCH HUNT!”

Should Lawyers be Afraid of Artificial Intelligence?

There is a 3.5 percent chance that lawyers’ jobs will be automated. That statistic seems appealing to those of us in the profession—especially relative to the chances for other “skilled” professions like financial advisers (58 percent of automation) and accountants (94 percent). However, this figure does not stand for the proposition that lawyer’ jobs will remain unchanged as the tendrils of artificial intelligence (AI) wind their way into jobs once thought too complex to be done by machines.

Health-Apps: Increasing Danger for Data Privacy

Wearable fitness trackers and wellness app technology use innovation to let consumers quantify and track their health. One burgeoning trend is the smartwatch. Smartwatches are equipped to track exercise, heart rate, GPS location of the wearer, and just about anything else. … Amidst market competition and growing consumer interest in tracking individual health, the market for wearable smartwatches has grown almost 70% in 2017. This increased interest and flourishing market for health insights, has consequently inspired scientific innovators to turn their attention to fashioning technology that can track actual medical conditions — such as asthma — and that can diagnose diseases. While this innovation introduces much needed preventative healthcare apps that can be accessible to a high volume of the population, it also raises serious questions about data privacy and fraud that must be considered.

Equifax and What It Means for Cybersecurity

On September 7, 2017 Equifax announced a data breach that compromised the personal data of over 143 million Americans. Despite this breach occurring in May, Equifax did not find out about it until July, after which it waited until August to report it to the FBI and September to report it to the public. To make matters worse, Equifax had been alerted about a potential vulnerability in its system by the Department of Homeland Security in March of that year, yet took no steps toward implementing the suggested fix. As a result, millions of people have been put at risk of identity theft.

Tesla Unlocks Extra Range for Irma Evacuees: No Good Deed Goes Unpunished.

As Hurricane Irma headed toward Florida, thousands of people evacuated. Electric car owners were no exception, and some Tesla owners received an unexpected boon: a software update that unlocked the full range of battery power available on their vehicles, giving owners additional mileage in order to flee the coming storm. But Tesla’s actions also drew the eye, and the ire, of the internet community.

“I See You ICO”: The SEC Regulates Tokens

As a decentralized ledger, blockchain enables users to exchange digital assets — called tokens — without a middleman. The earliest tokens functioned as currency.  No entity issued this currency; instead, the algorithm underlying blockchain dispersed tokens to miners, compensating them for processing blocks.  As cryptocurrencies have proliferated, tokens have found broader uses. Now entities issue tokens to fund projects.

Should Domain Registrars Ban Hate Speech?

Although hate groups have organized online since the beginning of the internet, there has been an increased awareness of their activities since the deadly “Unite the Right” protest earlier this month in Charlottesville, Virginia. One of the most prominent of these “white nationalist” websites calls itself the Daily Stormer, and was a home for neo-Nazis, white supremacists, and other “alt-right” groups online.  Groups like the Southern Poverty Law Center and Anti-Defamation League had been pressuring domain registrar GoDaddy.com to drop the Daily Stormer as a customer.

The Looming Liability of ISPs

Internet service providers (ISPs) are traditionally protected under the Digital Millennium Copyright Act’s (DMCA) section 230 safe harbor for most copyright infringements committed by a user of their service. There are several stipulations that ISPs have to follow in order to get the safe harbor, one of which is to have a “repeat infringer” policy. This policy encourages ISPs to terminate services to users who use the services to repeatedly infringe another’s copyright. The statute lacks a definition of “repeat infringer,” and it is unclear exactly who decides when services should be terminated.

Can the FTC Protect Us From Fake News?

In September 2016, the Second Circuit handed down its decision in FTC v. LeadClick Media, LLC, holding the operator of an affiliate-marketing network liable for the fake news published by its affiliates. This case could serve as a tool in combatting fake news stories that have plagued social media and caused real-world problems (like Pizzagate) in recent years. While this Second Circuit decision is unlikely to solve the problem of fake news stories on social media, it is a step in that direction.

A New Dimension to the Gun Control Debate

During the recent election, the issue of gun control predictably served as a point of contention between the two candidates. Hillary Clinton advocated for “commonsense” regulations on gun ownership such as closing the gun show loophole. As expected, Donald Trump boasted of his NRA endorsement and asserted that he will protect gun ownership rights under the Second Amendment.

Streaming Video Without an Open Internet

On February 26, 2015, The Federal Communications Commission voted 3-2 to enact a series of “Open Internet” protections. The three central rules prohibited Internet Service Providers (ISPs) from blocking access to legal content, slowing internet speeds to certain websites, and favoring certain types of internet traffic over others. The 3-2 Commissioner vote was split along party lines; 3 Democrats voting to approve and 2 Republicans voting to reject.

Patent Agent Privilege

Should attorney-client privilege extend to communications between clients and patent agents? In March earlier this year, a split decision by the Federal Circuit answered this question in the affirmative. This is a unique extension of the attorney-client privilege due to the nature of the patent agent profession.

Getty Images v. the Public Domain: Who Really Wins?

The public domain offers teachers, graphic designers, and anyone trying to design a website on a budget the opportunity to use millions upon millions of images without fear of infringing on the original author’s copyright. The images can be reused in their entirety or be remodeled into something new.

Make the Internet Great Again

Donald Trump will become President Trump in less than one week. For some, that’s a terrifying reality. For others, that’s a cause for celebration. For all, however, that means radical change is on the horizon.

Now, what will change? Who knows—like all politicians, Trump (likely) made more promises than he can keep. His 100-day agenda, for example, is devoid of several policies that he championed during his campaign such as the wall and the Muslim ban. But, based on Trump’s FCC landing team (and 2014 tweet), at least one thing seems certain: Net neutrality will be on the chopping block.

Federal Labor Law Protections in the Age of Social Media

Websites like Facebook and Twitter have given millions of people a chance to publicly express thoughts and opinions they otherwise would have kept private. Social media also leaves a record of the views its users express. Some of these views are benign, but others are controversial.

Unsurprisingly, many people use their social media profiles to discuss work. Many people are unhappy in their work life, and it should come as no surprise that these are often the topics of social media activities. This has required courts and federal agencies like the National Labor Relations Board (NLRB) to determine how well-established standards in labor and employment law apply to the era of social media.

The Most Tech-savvy Government in the World

Estonia, a small country on the Baltic Sea, has faced subjection by larger, more powerful countries throughout its history. Following decades of occupation by the Soviet Union, the country emerged free and independent at the end of the Cold War. Since its independence in 1991, the country has embarked on a major efforts to change the way governments and citizens interact through technology.

Political Conversations in the Age of the Unfollow Button

During the Second World War, Americana artist Norman Rockwell created a painting entitled Freedom of Speech. The painting, which depicts a man standing to speak at a town meeting, was based on a 1941 speech by President Franklin D. Roosevelt, where he presented four fundamental freedoms that should be enjoyed by all, the first being freedom of speech.

Heavy Baggage: Liability and Risk in the Space Tourism Industry

As private space companies continue to grow, monetized space travel is becoming a booming industry. So far, much of the economic activity associated with the private space industry has involved the transportation of telecommunications satellites into orbit. Increasingly, however, these companies are eager to begin launching even more valuable cargo in orbit: thrill seeking tourists willing to pay top dollar for a chance to spend a few days in space.

Posts on the MTTLR Blog are editorial opinion pieces written by student-editors of the Michigan Telecommunications and Technology Law Review. The opinions expressed in these editorial posts are not espoused or endorsed by the University of Michigan or its Law School.

To view scholarly Articles and Notes published by the Michigan Telecommunications and Technology Law Review, please visit the MTTLR home page.