In order to minimize accidents by making automated vehicles that behave in safe and predictable ways, it may be necessary to program them to break the law.
Although both sides have raised valid claims against the other’s seemingly unethical behavior across their many legal disputes, the inability for Qualcomm to monitor how Apple has protected its trade-secreted source code seems especially dire.
As clients continue to demand lower billable hours and rates, firms are likely to search for ways to improve efficiency on their end.
On October 28, Lucien Greaves, co-founder of The Satanic Temple religious organization, tweeted the Temple’s intention to take legal action against Netflix for an allegedly infringing statue featured in the new show, The Chilling Adventures of Sabrina.
The results of a successful swatting are uniformly dangerous for the target, family or friends who live with the target, and the law enforcement officers themselves.
No matter who determines the FRAND rate or how it is calculated, it is likely to have a significant effect on the cost of your next smartphone.
How does one balance the rights of sovereigns residing within a greater jurisdiction with fundamental rules of fairness?
When I arrived in San Francisco early this summer, I marveled at the tech-forward presence of electric scooters all over the sidewalks. Much to my disappointment, the scooters were quickly banned.
A recent study by the University of Michigan’s C.S. Mott Children’s Hospital shows that many apps are abusing the developmental vulnerabilities of preschool-aged children to get them to watch advertisements and make in-app purchases.
Hackers can use unsecured wireless connections to hack into implanted devices. Connected medical devices can then be individually manipulated—insulin pumps can be programmed to send an excess amount of medication; pacemakers to send an extra shock to the heart.
Considering the frequency of headlines warning of recent data breaches in American companies, it is critical that company boards become familiar with cyber-risks.
The development of intelligent algorithms has firms concerned about their exposure to antitrust liability in situations where they are passive participants in cartels formed by their intelligent pricing algorithms.
The SUPPORT Act permits and encourages telemedicine programs aimed at combating opioid addition by expanding Medicare coverage to cover telehealth services for substance use disorders.
While many see the benefits of providing tablets in prisons, the race to enter the market combined with a lack of regulation is a recipe for harm to both prisoners and prison administration.
“Computerized calls are the scourge of modern civilization.” This 1991 quote by Senator Fritz Hollings is as relatable today as it was nearly thirty years ago.
Since humans are biased in hiring, making the process more objective and turning it over to machines could be the answer. Unfortunately, Amazon discontinued an experimental tool after discovering that it showed bias against women.
Exploring the need for standardized insurance requirements for UAVs.
Facebook has been sued for keeping discrimination in employment opportunities alive and well.
The mobile application market is flooded with dating apps: Tinder, OkCupid, Coffee Meets Bagel, Hinge, Bumble, and dozens more. They might make love happen, but they also risk more than just a bad date.
China’s new e-commerce law fights counterfeits and rewards incumbents.
Earlier this week, Facebook announced that 50 million user accounts had been compromised in a data breach. This is just the latest episode in a series of high profile and far-reaching data breaches in which consumers’ sensitive personal and financial information has been exposed or stolen.
How much is Darth Vader worth? This question has, in a roundabout way, caused some legislators and regulators to look at how video games make their money. The recently-released video game Star Wars Battlefront II originally had a profit model which locked large portion of the game off behind timed barriers. One estimate, for example, was that it would take roughly 40 hours to unlock the ability to play as Darth Vader. This wait could be drastically reduced by purchasing loot boxes, which had a chance of containing in-game currency. One estimate claimed that, under Battlefront II’s original pricing model, it would take, on average, over 4500 hours to unlock everything. Conversely, the loot box payout structure would have given the same result for roughly $2100. Although, as of this writing, the game’s publisher has scrapped this pricing model after a huge backlash, it brought the issue of loot boxes to the attention of the public and legislators.
Imagine that you are a journalist producing online content for ESPN at ESPN’s headquarters in Bristol, Connecticut. Your editor assigns you to cover the return of the Auburn Tigers to the top echelons of college football and how the Alabama Crimson Tide, one of the perennial powers of the sport, returned to the College Football Playoff under controversial circumstances.
Drone deliveries have already made an appearance in our online shopping experience. For example, Amazon Prime Air made its first delivery in December 2016 and has made even more ambitious journeys in the United Kingdom. Before all of our parcels are delivered that way, however, there are several regulatory hurdles. The Federal Aviation Administration UAS operational rules require a pilot to operate the drone within a visual line of sight and limits flight times to daylight and twilight hours. The FAA offers waivers for operators who could conduct flight safely; this provision is meant to allow commercial enterprises and other organizations to explore ways to make drone flight technology more safe and secure and to shape future regulations as drone use continues to expand.
Posts on the MTTLR Blog are editorial opinion pieces written by student-editors of the Michigan Telecommunications and Technology Law Review. The opinions expressed in these editorial posts are not espoused or endorsed by the University of Michigan or its Law School.
To view scholarly Articles and Notes published by the Michigan Telecommunications and Technology Law Review, please visit the MTTLR home page.