Open Access. Powered by Scholars. Published by Universities.®

Business Administration, Management, and Operations Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Business Administration, Management, and Operations

Small Business Cybersecurity: A Loophole To Consumer Data, Matthew R. Espinosa May 2022

Small Business Cybersecurity: A Loophole To Consumer Data, Matthew R. Espinosa

The Scholar: St. Mary's Law Review on Race and Social Justice

Small businesses and small minority owned businesses are vital to our nation’s economy; therefore legislation, regulation, and policy has been created in order to assist them in overcoming their economic stability issues and ensure they continue to serve the communities that rely on them. However, there is not a focus on regulating nor assisting small businesses to ensure their cybersecurity standards are up to par despite them increasingly becoming a victim of cyberattacks that yield high consequences. The external oversight and assistance is necessary for small businesses due to their lack of knowledge in implementing effective cybersecurity policies, the fiscal …


It's Time For A Good Hard Look In The Mirror: The Corporate Law Example, John A. Barrett, Jr. Jan 2012

It's Time For A Good Hard Look In The Mirror: The Corporate Law Example, John A. Barrett, Jr.

Fordham Journal of Corporate & Financial Law

This Article asserts that the move from the industrial age to the

information age represents a fundamental change to our society on

such a widespread basis that the legal order must reexamine the

premises about how our society functions, assessing whether

foundational elements of U.S. Common Law remain valid. This

Article first confronts briefly the continuing acceptance of certain

foundational premises in contract and intellectual property law,

illustrating that such premises are no longer supported by the

realities of modern society. With fundamental change challenging

multiple areas of law in the information age, this problem is worthy

of widespread inquiry …