I first learned of CAR-T cell therapy in 2015 while working in an immunology lab. It immediately caught my attention as a brilliant, unconventional cancer treatment: it modifies a patient’s own T cells and enlists them to fight cancer. T cells can recognize non-self antigens presented on a cell’s surface, label those cells exogenous, and eliminate them. Scientists have developed CAR-T cell therapy by utilizing these unique characteristics of T cells.
Virtual reality is more lifelike than ever before — not only can users see and hear the virtual world, but they can now feel and smell it too. Two major industries embracing this technology are gaming and mental health treatment.
When the term blockchain is thrown around, most people think about Bitcoin, Ethereum, and other cryptocurrencies that often populate headlines. While blockchain technology gained popularity and recognition in the area of cryptocurrencies and financial transactions, at its core, the technology has applications far beyond this narrow subset.
Did Apple hack users’ devices? That is the allegation in a class action lawsuit filed late last year. Specifically, the plaintiffs in In re Apple Inc. Device Performance Litig., 347 F. Supp. 3d 434, 451 (N.D. Cal. 2018) allege that Apple’s battery-slowing iOS updates violated a federal hacking statute, the Computer Fraud and Abuse Act (CFAA). This is the latest effort to stretch a broad, vague, and inconsistently-enforced law to cover new circumstances. This case illustrates the urgent need to write a statute that reflects today’s technological reality.
The patent law system currently has an interesting parallel track open for those seeking to oppose a patent. That parallel track runs through both litigation in the district courts and Inter Partes Review [IPR] at the Patent Trial and Appeals Board [PTAB], a part of the Patent and Trademark Office [PTO]. A little under one year ago, the Supreme Court decided Oil States Energy, in which it stated that IPRs were not unconstitutional.
To understand how facial recognition technology interacts with a seemingly abstract standard of constitutional protection, a quick note about the Fourth Amendment is helpful.
Enhanced CFIUS review represents one of the strongest tools in the U.S. arsenal against China in the ongoing U.S.-China trade war.
The socioeconomic ramifications of a single cyber-attack are extensive. These include financial harm, government investigations, regulatory fines, public backlash, negative industry reputation, and even shareholder lawsuits.
COPPA has been described as an “‘opt-in’ privacy band-aid” that doesn’t begin to reach the level of protection provided by, for example, the European Union’s earliest internet regulations,
From a legal standpoint, open source software creates a lot of questions. Who owns the collective work? Does a developer own his or her edits?
Hyper-robust copyright protection for simple dance moves might not be ideal, but there does seem to be a cognizable harm in extracting an original dance from a community and monetizing it in the way Epic Games has with Fortnite’s emotes.
If you want to use Facebook, you do not have much choice — you must accept their use of your data or else not use the service.
Although USMCA does not appear to radically upend trade relations between the three countries, its ratification would usher in a variety of noteworthy changes.
The ambiguity surrounding the exact definition of ‘virtual currency’ and which particular digital assets qualify as virtual currencies (and therefore would be classified as commodities) could lead to a potential turf war between the SEC and CFTC.
It is possible that American officials are correct in their assessment that America and China are locked in a technological arms race, with Huawei posing a sizeable threat to the security of NATO member-states.
In recent years there has been a surge of cases aimed at forcing companies to make their websites more accessible to the visually impaired.
While most people have an aversion to the thought of their private conversations being recorded and transmitted, some might also say that they would want Siri to step if it were asked about a school shooting.
After a 40-year hiatus, in large part due to the work of the world’s best-known mouse, the United States’ lengthy copyrights will start to terminate again this year.
Should the United States go further in implementing legislation to combat fake news? And can it even do so given the protections of the First Amendment?
In order to minimize accidents by making automated vehicles that behave in safe and predictable ways, it may be necessary to program them to break the law.
Although both sides have raised valid claims against the other’s seemingly unethical behavior across their many legal disputes, the inability for Qualcomm to monitor how Apple has protected its trade-secreted source code seems especially dire.
As clients continue to demand lower billable hours and rates, firms are likely to search for ways to improve efficiency on their end.
On October 28, Lucien Greaves, co-founder of The Satanic Temple religious organization, tweeted the Temple’s intention to take legal action against Netflix for an allegedly infringing statue featured in the new show, The Chilling Adventures of Sabrina.
The results of a successful swatting are uniformly dangerous for the target, family or friends who live with the target, and the law enforcement officers themselves.
Posts on the MTLR Blog are editorial opinion pieces written by student-editors of the Michigan Technology Law Review. The opinions expressed in these editorial posts are not espoused or endorsed by the University of Michigan or its Law School. To view scholarly Articles and Notes published by the Michigan Technology Law Review, please visit the MTLR home page.