Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- FTC (2)
- Federal Trade Commission (2)
- M&A (2)
- PII (2)
- ALI (1)
-
- AOL (1)
- ATM (1)
- American Law Institute (1)
- Aqoba (1)
- Arps (1)
- BSA (1)
- BYOD (1)
- BYOS (1)
- Bank Secrecy Act (1)
- Bitcoin (1)
- Blumenthal (1)
- Brand (1)
- Breach (1)
- Bring Your Own Software (1)
- Bring your own device (1)
- COPPA (1)
- Children’s Online Privacy Protection Act of 1998 (1)
- Concerns (1)
- DP (1)
- DaaS (1)
- Damage (1)
- Data (1)
- Data breach (1)
- E-Discovery (1)
- EBay (1)
Articles 1 - 9 of 9
Full-Text Articles in Law
The Skeleton Of A Data Breach: The Ethical And Legal Concerns, Hilary G. Buttrick, Jason Davidson, Richard J. Mcgowan
The Skeleton Of A Data Breach: The Ethical And Legal Concerns, Hilary G. Buttrick, Jason Davidson, Richard J. Mcgowan
Richmond Journal of Law & Technology
After over thirty data breaches spanning the third and fourth quarter of 2012, Forbes magazine labeled the summer of 2012 as “The Summer of the Data Breach.” Four years later, businesses across multiple industries have suffered brand-image damage and paid millions of dollars in remedial expenses; we are living in the era of the mega breach. In 2014, companies such as Target, Home Depot, JP Morgan Chase, Anthem, Sony, UPS, Jimmy John’s, Kmart, Neiman Marcus, Community Health Systems, and the White House suffered data breaches. The Home Depot breach alone resulted in the loss of “56 million credit card accounts,” …
Merger And Acquisition Due Diligence Part Ii- The Devil In The Details, James A. Sherer, Taylor M. Hoffman, Kevin M. Wallace, Eugenio E. Ortiz, Trevor J. Satnick
Merger And Acquisition Due Diligence Part Ii- The Devil In The Details, James A. Sherer, Taylor M. Hoffman, Kevin M. Wallace, Eugenio E. Ortiz, Trevor J. Satnick
Richmond Journal of Law & Technology
Our prior scholarship examined the legal and technical challenges involved in modern Merger & Acquisition ("M&A") due diligence practices associated with transactions ("Deals"), given recent but steady advances in technology and related increases in sophistication seen in Deal participants-primarily the organizations or assets targeted (the "Targets") as part of the Deal, and the organizations that pursued and/or resulted from the Deal (the "Acquirers"). We then proposed a framework addressing five particular verticals of interest and concern: data privacy ("DP"), information security ("IS"), e-Discovery, information governance ("IG"), and the due diligence and record keeping associated with the Deal itself ("Deal Information") …
Merger And Acquisition Due Diligence: A Proposed Framework To Incorporate Data Privacy, Information Security, E-Discovery, And Information Governance Into Due Diligence Practices, James A. Sherer, Taylor M. Hoffman, Eugenio E. Ortiz
Merger And Acquisition Due Diligence: A Proposed Framework To Incorporate Data Privacy, Information Security, E-Discovery, And Information Governance Into Due Diligence Practices, James A. Sherer, Taylor M. Hoffman, Eugenio E. Ortiz
Richmond Journal of Law & Technology
Merger and Acquisition or “M&A” deals are both figuratively and literally big business, where the stakes for the organization are often the highest. While casual observers might expect that the importance attached to these deals makes each new deal the vanguard for incorporating metrics and practices regarding every efficiency and contingency, existing research demonstrates that this is decidedly not the case.
Virtual Currencies Bitcoin & What Now After Liberty Reserve, Silk Road, And Mt. Gox?, Lawrence Trautman
Virtual Currencies Bitcoin & What Now After Liberty Reserve, Silk Road, And Mt. Gox?, Lawrence Trautman
Richmond Journal of Law & Technology
During 2013, the U.S. Treasury Department evoked the first use of the 2001 Patriot Act to exclude virtual currency provider Liberty Reserve from the U.S. financial system. This article will discuss: the regulation of virtual currencies, cybercrimes and payment systems, darknets, Tor and the “deep web,” Bitcoin; Liberty Reserve, Silk Road, and Mt. Gox. Virtual currencies have quickly become a reality, gaining significant traction in a very short period of time, and are evolving rapidly.
Corporate Privacy Trend: The “Value” Of Personally Identifiable Information (“Pii”) Equals The “Value” Of Financial Assets, John T. Soma, J. Zachary Courson, John Cadkin
Corporate Privacy Trend: The “Value” Of Personally Identifiable Information (“Pii”) Equals The “Value” Of Financial Assets, John T. Soma, J. Zachary Courson, John Cadkin
Richmond Journal of Law & Technology
Corporate America’s increasing dependence on the electronic use of personally identifiable information (“PII”) necessitates a reexamination and expansion of the traditional conception of corporate assets. PII is now a commodity that companies trade and sell. As technological development increases, aspects of day-to-day business involving PII are performed electronically in a more cost effective and efficient manner. PII, which companies obtain at little cost, has quantifiable value that is rapidly reaching a level comparable to the value of traditional financial assets.
Digital Currencies And The Financing Of Terrorism, William Hett
Digital Currencies And The Financing Of Terrorism, William Hett
Richmond Journal of Law & Technology
Informal money transfers present a significant challenge to combating the financing of terrorist organizations worldwide. Although the U.S. and other governments have implemented measures to restrict terrorist financing, these measures were designed to regulate formal financial institutions. Accordingly, those seeking to avoid detection have turned to other methods of transferring money, such as commodities trades, hawala, and digital currencies. Many terrorist operations do not require large sums of money, making the detection and prevention of even modest transfers important. For example, the September 11 Commission estimated the cost of carrying out the 1998 U.S. embassy bombings, which killed 224 people …
My Reputation Always Had More Fun Than Me: The Failure Of Ebay's Feedback Model To Effectively Prevent Online Auction Fraud, Mary M. Calkins
My Reputation Always Had More Fun Than Me: The Failure Of Ebay's Feedback Model To Effectively Prevent Online Auction Fraud, Mary M. Calkins
Richmond Journal of Law & Technology
Online auctions for goods are currently a popular and lucrative form of e-commerce, but present special problems of trust and fraud prevention, because most deals involve buyers and sellers who do not know each other and are separated by distance. Online auctions for goods have been largely unregulated by formal laws. For that reason, trust-building and fraud prevention have primarily been accomplished through creative private regulatory models implemented by the auction houses themselves. This Comment examines one popular model, a registration and feedback system pioneered by the leading online auction company, eBay. Under this system, a user builds a public …
E-Business, E-Commerce & The Law, John F. Rudin
E-Business, E-Commerce & The Law, John F. Rudin
Richmond Journal of Law & Technology
Advocates argue that UCITA (Uniform Computer Information Transactions Act) provides rules of the road for the technology highway much like the Uniform Commercial Code (UCC) has done with our commerce system for several decades. However, the UCC provides a level playing field where businesses and customers are aware of the rules prior to conducting business. Among its many shortcomings, UCITA lacks the notice and disclosure features of the UCC. A simple double click of a mouse with the cursor on an icon that reads "I accept" binds the customer to a contract that has not been reviewed prior to purchase. …
The De Minimis Exemption Of Stored Value Cards From Regulation E: An Invitation To Fraud., Sean M. O'Connor
The De Minimis Exemption Of Stored Value Cards From Regulation E: An Invitation To Fraud., Sean M. O'Connor
Richmond Journal of Law & Technology
How valuable is $100? To a student? To a single unemployed parent? To a well-compensated professional? The Federal Reserve Board apparently believes that the potential loss of $100 is not a tremendous burden on anyone. In a recently proposed rule, the Board exempts stored value cards that contain less than $100 from the same regulations that protect consumers from most types of fraud associated with ATM, debit, and credit cards. Regulation E (Reg E) currently regulates the electronic funds transfers (EFTs) that are at the heart of ATM/debit/credit card transactions by requiring printed receipts, error resolution procedures, periodic statements, initial …