Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Law

Law School News: Logan To Serve As Adviser On Restatement Third Of Torts 11-07-2019, Michael M. Bowden Nov 2019

Law School News: Logan To Serve As Adviser On Restatement Third Of Torts 11-07-2019, Michael M. Bowden

Life of the Law School (1993- )

No abstract provided.


Promoting Predictability In Business: Solutions For Overlapping Liability In International Anti-Corruption Enforcement, Andrew T. Bulovsky May 2019

Promoting Predictability In Business: Solutions For Overlapping Liability In International Anti-Corruption Enforcement, Andrew T. Bulovsky

Michigan Journal of International Law

This Note evaluates solutions to the problems of overlapping liability in general and multi-jurisdictional disgorgement in particular. Part I traces the origins of international anti-corruption efforts and provides an overview of the Foreign Corrupt Practices Act (the “FCPA”). It then discusses the two most significant international anti-corruption conventions: the OECD’s Convention on Combatting Bribery of Foreign Officials in International Business Transactions (the “OECD Convention”) and the United Nations Convention Against Corruption (“UNCAC”). Part II lays out the problems created by the lack of a formal mechanism to prevent overlapping liability— a phenomenon that violates the common law concept known as …


Bytes Bite: Why Corporate Data Breaches Should Give Standing To Affected Individuals, Caden Hayes Mar 2019

Bytes Bite: Why Corporate Data Breaches Should Give Standing To Affected Individuals, Caden Hayes

Washington and Lee Journal of Civil Rights and Social Justice

High-profile data hacks are not uncommon. In fact, according to the Privacy Rights Clearinghouse, there have been at least 7,961 data breaches, exposing over 10,000,000,000 accounts in total, since 2005. These shocking numbers are not particularly surprising when taking into account the value of information stolen. For example, cell phone numbers, as exposed in a Yahoo! hack, are worth $10 a piece on the black market, meaning the hackers stood to make $30,000,000,000 from that one hack. That dollar amount does not even consider copies the hackers could make and later resell. Yet while these hackers make astronomical payoffs, the …