Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 9 of 9

Full-Text Articles in Law

The Skeleton Of A Data Breach: The Ethical And Legal Concerns, Hilary G. Buttrick, Jason Davidson, Richard J. Mcgowan Dec 2016

The Skeleton Of A Data Breach: The Ethical And Legal Concerns, Hilary G. Buttrick, Jason Davidson, Richard J. Mcgowan

Richmond Journal of Law & Technology

After over thirty data breaches spanning the third and fourth quarter of 2012, Forbes magazine labeled the summer of 2012 as “The Summer of the Data Breach.” Four years later, businesses across multiple industries have suffered brand-image damage and paid millions of dollars in remedial expenses; we are living in the era of the mega breach. In 2014, companies such as Target, Home Depot, JP Morgan Chase, Anthem, Sony, UPS, Jimmy John’s, Kmart, Neiman Marcus, Community Health Systems, and the White House suffered data breaches. The Home Depot breach alone resulted in the loss of “56 million credit card accounts,” …


Merger And Acquisition Due Diligence Part Ii- The Devil In The Details, James A. Sherer, Taylor M. Hoffman, Kevin M. Wallace, Eugenio E. Ortiz, Trevor J. Satnick Jan 2016

Merger And Acquisition Due Diligence Part Ii- The Devil In The Details, James A. Sherer, Taylor M. Hoffman, Kevin M. Wallace, Eugenio E. Ortiz, Trevor J. Satnick

Richmond Journal of Law & Technology

Our prior scholarship examined the legal and technical challenges involved in modern Merger & Acquisition ("M&A") due diligence practices associated with transactions ("Deals"), given recent but steady advances in technology and related increases in sophistication seen in Deal participants-primarily the organizations or assets targeted (the "Targets") as part of the Deal, and the organizations that pursued and/or resulted from the Deal (the "Acquirers"). We then proposed a framework addressing five particular verticals of interest and concern: data privacy ("DP"), information security ("IS"), e-Discovery, information governance ("IG"), and the due diligence and record keeping associated with the Deal itself ("Deal Information") …


Merger And Acquisition Due Diligence: A Proposed Framework To Incorporate Data Privacy, Information Security, E-Discovery, And Information Governance Into Due Diligence Practices, James A. Sherer, Taylor M. Hoffman, Eugenio E. Ortiz Jan 2015

Merger And Acquisition Due Diligence: A Proposed Framework To Incorporate Data Privacy, Information Security, E-Discovery, And Information Governance Into Due Diligence Practices, James A. Sherer, Taylor M. Hoffman, Eugenio E. Ortiz

Richmond Journal of Law & Technology

Merger and Acquisition or “M&A” deals are both figuratively and literally big business, where the stakes for the organization are often the highest. While casual observers might expect that the importance attached to these deals makes each new deal the vanguard for incorporating metrics and practices regarding every efficiency and contingency, existing research demonstrates that this is decidedly not the case.


Virtual Currencies Bitcoin & What Now After Liberty Reserve, Silk Road, And Mt. Gox?, Lawrence Trautman Jan 2014

Virtual Currencies Bitcoin & What Now After Liberty Reserve, Silk Road, And Mt. Gox?, Lawrence Trautman

Richmond Journal of Law & Technology

During 2013, the U.S. Treasury Department evoked the first use of the 2001 Patriot Act to exclude virtual currency provider Liberty Reserve from the U.S. financial system. This article will discuss: the regulation of virtual currencies, cybercrimes and payment systems, darknets, Tor and the “deep web,” Bitcoin; Liberty Reserve, Silk Road, and Mt. Gox. Virtual currencies have quickly become a reality, gaining significant traction in a very short period of time, and are evolving rapidly.


Corporate Privacy Trend: The “Value” Of Personally Identifiable Information (“Pii”) Equals The “Value” Of Financial Assets, John T. Soma, J. Zachary Courson, John Cadkin Jan 2009

Corporate Privacy Trend: The “Value” Of Personally Identifiable Information (“Pii”) Equals The “Value” Of Financial Assets, John T. Soma, J. Zachary Courson, John Cadkin

Richmond Journal of Law & Technology

Corporate America’s increasing dependence on the electronic use of personally identifiable information (“PII”) necessitates a reexamination and expansion of the traditional conception of corporate assets. PII is now a commodity that companies trade and sell. As technological development increases, aspects of day-to-day business involving PII are performed electronically in a more cost effective and efficient manner. PII, which companies obtain at little cost, has quantifiable value that is rapidly reaching a level comparable to the value of traditional financial assets.


Digital Currencies And The Financing Of Terrorism, William Hett Jan 2008

Digital Currencies And The Financing Of Terrorism, William Hett

Richmond Journal of Law & Technology

Informal money transfers present a significant challenge to combating the financing of terrorist organizations worldwide. Although the U.S. and other governments have implemented measures to restrict terrorist financing, these measures were designed to regulate formal financial institutions. Accordingly, those seeking to avoid detection have turned to other methods of transferring money, such as commodities trades, hawala, and digital currencies. Many terrorist operations do not require large sums of money, making the detection and prevention of even modest transfers important. For example, the September 11 Commission estimated the cost of carrying out the 1998 U.S. embassy bombings, which killed 224 people …


My Reputation Always Had More Fun Than Me: The Failure Of Ebay's Feedback Model To Effectively Prevent Online Auction Fraud, Mary M. Calkins Jan 2001

My Reputation Always Had More Fun Than Me: The Failure Of Ebay's Feedback Model To Effectively Prevent Online Auction Fraud, Mary M. Calkins

Richmond Journal of Law & Technology

Online auctions for goods are currently a popular and lucrative form of e-commerce, but present special problems of trust and fraud prevention, because most deals involve buyers and sellers who do not know each other and are separated by distance. Online auctions for goods have been largely unregulated by formal laws. For that reason, trust-building and fraud prevention have primarily been accomplished through creative private regulatory models implemented by the auction houses themselves. This Comment examines one popular model, a registration and feedback system pioneered by the leading online auction company, eBay. Under this system, a user builds a public …


E-Business, E-Commerce & The Law, John F. Rudin Jan 2000

E-Business, E-Commerce & The Law, John F. Rudin

Richmond Journal of Law & Technology

Advocates argue that UCITA (Uniform Computer Information Transactions Act) provides rules of the road for the technology highway much like the Uniform Commercial Code (UCC) has done with our commerce system for several decades. However, the UCC provides a level playing field where businesses and customers are aware of the rules prior to conducting business. Among its many shortcomings, UCITA lacks the notice and disclosure features of the UCC. A simple double click of a mouse with the cursor on an icon that reads "I accept" binds the customer to a contract that has not been reviewed prior to purchase. …


The De Minimis Exemption Of Stored Value Cards From Regulation E: An Invitation To Fraud., Sean M. O'Connor Jan 1998

The De Minimis Exemption Of Stored Value Cards From Regulation E: An Invitation To Fraud., Sean M. O'Connor

Richmond Journal of Law & Technology

How valuable is $100? To a student? To a single unemployed parent? To a well-compensated professional? The Federal Reserve Board apparently believes that the potential loss of $100 is not a tremendous burden on anyone. In a recently proposed rule, the Board exempts stored value cards that contain less than $100 from the same regulations that protect consumers from most types of fraud associated with ATM, debit, and credit cards. Regulation E (Reg E) currently regulates the electronic funds transfers (EFTs) that are at the heart of ATM/debit/credit card transactions by requiring printed receipts, error resolution procedures, periodic statements, initial …