Hashtags are additions to social media posts that contain meta-data. For example, a couple may create a hashtag for their wedding. This allows people using social network websites, like Twitter, to easily upload and find posts and photos about the wedding.
One interesting question is whether hashtags can be trademarks.
Google-owned artificial intelligence company DeepMind recently succeeded at designing a program capable of defeating some of the world’s best players of Chinese strategy game Go. While this may not appear groundbreaking, the real triumph comes from the fact that while the programmers laid the ground rules, it was the program itself, AlphaGo, that taught itself to play.
On January 11, 2017, the term “fake news” entered the mainstream discourse when Donald Trump, during his first press conference as President-elect, refused to take a question from CNN reporter Jim Acosta and told him, “You are fake news.” The source of that outburst can apparently be traced to a 35-page unverified document based primarily on memos complied by a former British intelligence operative that CNN had publicized. President-elect Trump immediately blasted the report through his favorite medium of communication, tweeting, “FAKE NEWS – A TOTAL POLITICAL WITCH HUNT!”
There’s a worrying trend occurring in the world of patents. As Electronic Frontier Foundation’s Daniel Nazer points out, more and more patents are being filed for the application of relatively “fundamental machine-learning techniques” to new areas, such as food consumption.
There is a 3.5 percent chance that lawyers’ jobs will be automated. That statistic seems appealing to those of us in the profession—especially relative to the chances for other “skilled” professions like financial advisers (58 percent of automation) and accountants (94 percent). However, this figure does not stand for the proposition that lawyer’ jobs will remain unchanged as the tendrils of artificial intelligence (AI) wind their way into jobs once thought too complex to be done by machines.
Wearable fitness trackers and wellness app technology use innovation to let consumers quantify and track their health. One burgeoning trend is the smartwatch. Smartwatches are equipped to track exercise, heart rate, GPS location of the wearer, and just about anything else. … Amidst market competition and growing consumer interest in tracking individual health, the market for wearable smartwatches has grown almost 70% in 2017. This increased interest and flourishing market for health insights, has consequently inspired scientific innovators to turn their attention to fashioning technology that can track actual medical conditions — such as asthma — and that can diagnose diseases. While this innovation introduces much needed preventative healthcare apps that can be accessible to a high volume of the population, it also raises serious questions about data privacy and fraud that must be considered.
On September 7, 2017 Equifax announced a data breach that compromised the personal data of over 143 million Americans. Despite this breach occurring in May, Equifax did not find out about it until July, after which it waited until August to report it to the FBI and September to report it to the public. To make matters worse, Equifax had been alerted about a potential vulnerability in its system by the Department of Homeland Security in March of that year, yet took no steps toward implementing the suggested fix. As a result, millions of people have been put at risk of identity theft.
As Hurricane Irma headed toward Florida, thousands of people evacuated. Electric car owners were no exception, and some Tesla owners received an unexpected boon: a software update that unlocked the full range of battery power available on their vehicles, giving owners additional mileage in order to flee the coming storm. But Tesla’s actions also drew the eye, and the ire, of the internet community.
As a decentralized ledger, blockchain enables users to exchange digital assets — called tokens — without a middleman. The earliest tokens functioned as currency. No entity issued this currency; instead, the algorithm underlying blockchain dispersed tokens to miners, compensating them for processing blocks. As cryptocurrencies have proliferated, tokens have found broader uses. Now entities issue tokens to fund projects.
Although hate groups have organized online since the beginning of the internet, there has been an increased awareness of their activities since the deadly “Unite the Right” protest earlier this month in Charlottesville, Virginia. One of the most prominent of these “white nationalist” websites calls itself the Daily Stormer, and was a home for neo-Nazis, white supremacists, and other “alt-right” groups online. Groups like the Southern Poverty Law Center and Anti-Defamation League had been pressuring domain registrar GoDaddy.com to drop the Daily Stormer as a customer.
Internet service providers (ISPs) are traditionally protected under the Digital Millennium Copyright Act’s (DMCA) section 230 safe harbor for most copyright infringements committed by a user of their service. There are several stipulations that ISPs have to follow in order to get the safe harbor, one of which is to have a “repeat infringer” policy. This policy encourages ISPs to terminate services to users who use the services to repeatedly infringe another’s copyright. The statute lacks a definition of “repeat infringer,” and it is unclear exactly who decides when services should be terminated.
In September 2016, the Second Circuit handed down its decision in FTC v. LeadClick Media, LLC, holding the operator of an affiliate-marketing network liable for the fake news published by its affiliates. This case could serve as a tool in combatting fake news stories that have plagued social media and caused real-world problems (like Pizzagate) in recent years. While this Second Circuit decision is unlikely to solve the problem of fake news stories on social media, it is a step in that direction.
During the recent election, the issue of gun control predictably served as a point of contention between the two candidates. Hillary Clinton advocated for “commonsense” regulations on gun ownership such as closing the gun show loophole. As expected, Donald Trump boasted of his NRA endorsement and asserted that he will protect gun ownership rights under the Second Amendment.
On February 26, 2015, The Federal Communications Commission voted 3-2 to enact a series of “Open Internet” protections. The three central rules prohibited Internet Service Providers (ISPs) from blocking access to legal content, slowing internet speeds to certain websites, and favoring certain types of internet traffic over others. The 3-2 Commissioner vote was split along party lines; 3 Democrats voting to approve and 2 Republicans voting to reject.
Should attorney-client privilege extend to communications between clients and patent agents? In March earlier this year, a split decision by the Federal Circuit answered this question in the affirmative. This is a unique extension of the attorney-client privilege due to the nature of the patent agent profession.
The public domain offers teachers, graphic designers, and anyone trying to design a website on a budget the opportunity to use millions upon millions of images without fear of infringing on the original author’s copyright. The images can be reused in their entirety or be remodeled into something new.
Donald Trump will become President Trump in less than one week. For some, that’s a terrifying reality. For others, that’s a cause for celebration. For all, however, that means radical change is on the horizon.
Now, what will change? Who knows—like all politicians, Trump (likely) made more promises than he can keep. His 100-day agenda, for example, is devoid of several policies that he championed during his campaign such as the wall and the Muslim ban. But, based on Trump’s FCC landing team (and 2014 tweet), at least one thing seems certain: Net neutrality will be on the chopping block.
Websites like Facebook and Twitter have given millions of people a chance to publicly express thoughts and opinions they otherwise would have kept private. Social media also leaves a record of the views its users express. Some of these views are benign, but others are controversial.
Unsurprisingly, many people use their social media profiles to discuss work. Many people are unhappy in their work life, and it should come as no surprise that these are often the topics of social media activities. This has required courts and federal agencies like the National Labor Relations Board (NLRB) to determine how well-established standards in labor and employment law apply to the era of social media.
Estonia, a small country on the Baltic Sea, has faced subjection by larger, more powerful countries throughout its history. Following decades of occupation by the Soviet Union, the country emerged free and independent at the end of the Cold War. Since its independence in 1991, the country has embarked on a major efforts to change the way governments and citizens interact through technology.
During the Second World War, Americana artist Norman Rockwell created a painting entitled Freedom of Speech. The painting, which depicts a man standing to speak at a town meeting, was based on a 1941 speech by President Franklin D. Roosevelt, where he presented four fundamental freedoms that should be enjoyed by all, the first being freedom of speech.
As private space companies continue to grow, monetized space travel is becoming a booming industry. So far, much of the economic activity associated with the private space industry has involved the transportation of telecommunications satellites into orbit. Increasingly, however, these companies are eager to begin launching even more valuable cargo in orbit: thrill seeking tourists willing to pay top dollar for a chance to spend a few days in space.
As machine learning (also called data mining) becomes a more integral part of technology everywhere, it will become increasingly important for lawyers and businessmen to be able to relate to and understand how it works.
In 2014 the European Union’s highest court held that EU citizens had the “right to be forgotten,” or in other words, the right to request that a search engine remove from its results materials that are “inaccurate, inadequate, irrelevant or excessive.”
No Man’s Sky, a highly anticipated video game released this summer, allows players to explore a massive game world consisting of eighteen quintillion planets. Creating this much content would have been impossible for human game designers, so Hello Games used a technique called procedural generation.
Posts on the MTLR Blog are editorial opinion pieces written by student-editors of the Michigan Technology Law Review. The opinions expressed in these editorial posts are not espoused or endorsed by the University of Michigan or its Law School. To view scholarly Articles and Notes published by the Michigan Technology Law Review, please visit the MTLR home page.