Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 12 of 12

Full-Text Articles in Law

Governance By Proxy: Cyber Challenges To Civil Liberties, Niva Elkin-Koren, Eldar Haber Dec 2016

Governance By Proxy: Cyber Challenges To Civil Liberties, Niva Elkin-Koren, Eldar Haber

Brooklyn Law Review

No abstract provided.


Like A Bad Neighbor, Hackers Are There: The Need For Data Security Legislation And Cyber Insurance In Light Of Increasing Ftc Enforcement Actions, Jennifer Gordon Dec 2016

Like A Bad Neighbor, Hackers Are There: The Need For Data Security Legislation And Cyber Insurance In Light Of Increasing Ftc Enforcement Actions, Jennifer Gordon

Brooklyn Journal of Corporate, Financial & Commercial Law

Privacy has come to the forefront of the technology world as third party hackers are constantly attacking companies for their customers’ data. With increasing instances of compromised customer information, the Federal Trade Commission (FTC) has been bringing suit against companies for inadequate data security procedures. The FTC’s newfound authority to bring suit regarding cybersecurity breaches, based on the Third Circuit’s decision in FTC v. Wyndham Worldwide Corp., is a result of inaction—Congress has been unable to pass sufficient cybersecurity legislation, causing the FTC to step in and fill the void in regulation. In the absence of congressional action, this self-proclaimed …


“Hello…It’S Me. [Please Don’T Sue Me!]” Examining The Fcc’S Overbroad Calling Regulations Under The Tcpa, Marissa A. Potts Dec 2016

“Hello…It’S Me. [Please Don’T Sue Me!]” Examining The Fcc’S Overbroad Calling Regulations Under The Tcpa, Marissa A. Potts

Brooklyn Law Review

Americans have received unwanted telemarketing calls for decades. In response to a rapid increase in pre-recorded calls made using autodialer devices, Congress enacted the Telephone Consumer Protection Act (TCPA) in 1992. The TCPA imposes restrictions on calls made to consumers’ residences and wireless phones using autodialer devices, even if they are not telemarketing calls. Congress appointed the Federal Communications Commission (FCC) to prescribe rules and regulations to enforce the TCPA. In 2015, the FCC released an order that defined autodialer more broadly under the statute. Consequently, devices that have the potential to become autodialers in the future, even if they …


Personal Property Servitudes On The Internet Of Things, Christina Mulligan Jul 2016

Personal Property Servitudes On The Internet Of Things, Christina Mulligan

Faculty Scholarship

No abstract provided.


You(Tube), Me, And Content Id: Paving The Way For Compulsory Synchronization Licensing On User-Generated Content Platforms, Nicholas Thomas Delisa Jan 2016

You(Tube), Me, And Content Id: Paving The Way For Compulsory Synchronization Licensing On User-Generated Content Platforms, Nicholas Thomas Delisa

Brooklyn Law Review

The changing landscape of digital media technology makes it increasingly difficult for owners of copyrighted music to monitor how their works are being exploited across the Internet. This is especially true of user-generated content (UGC) platforms—websites and applications such as Facebook, YouTube, and Snapchat, where content is created or uploaded predominantly by users. These services pose a special problem to copyright owners because, instead of content being uploaded from a single source that is easily sued and has deep pockets, content is uploaded by users. Users are a troublesome group because they are innumerable, sometimes anonymous, and mostly click on …


Fashion Forward: The Need For A Proactive Approach To The Counterfeit Epidemic, Casey Tripoli Jan 2016

Fashion Forward: The Need For A Proactive Approach To The Counterfeit Epidemic, Casey Tripoli

Brooklyn Journal of International Law

In the last two decades, the overall activity of the counterfeit market has expanded and risen 10,000 percent. This dramatic shift corresponds to growth of the Internet, which has unified the fascination of obtaining cheap, illegitimate goods with the efficiency of a mouse click. With the expected continued inflation of the counterfeit market comes a host of new concerns, namely, how to determine who is responsible for the distribution of these knockoffs, and who should be ordained to limit them in the marketplace. In both the United States and the European Union, however, outdated laws produce a mélange of inadequate …


The Art Of Nailing Jell-O To The Wall: Reassessing The Political Power Of The Internet, Bryan Druzin, Jessica Li Jan 2016

The Art Of Nailing Jell-O To The Wall: Reassessing The Political Power Of The Internet, Bryan Druzin, Jessica Li

Journal of Law and Policy

Political observers commonly argue that, given the unique characteristics of the Internet, democratization is an inevitability of its widespread use. The critical role that social media played in the wave of demonstrations, protests, and revolutions that swept across the Arab world in 2011 cemented this perception in the minds of many. Yet China defies this simplistic paradigm—China has been stunningly successful at constraining the political power of its Internet. We argue that the political importance of Internet technology has been overstated, particularly with respect to China. As support for this thesis, we cite recent political events in Hong Kong known …


Standing Up For Their Data: Recognizing The True Nature Of Injuries In Data Breach Claims To Afford Plaintiffs Article Iii Standing, Andrew Braunstein Jan 2016

Standing Up For Their Data: Recognizing The True Nature Of Injuries In Data Breach Claims To Afford Plaintiffs Article Iii Standing, Andrew Braunstein

Journal of Law and Policy

Over the last several years, data breaches have become increasingly more common, due in no small part to the failures of organizations charged with storing and protecting personal data. Consumers whose data has fallen victim to these breaches are more often turning to federal courts in attempts to be made whole from the loss of their information, whether simple credit card information or, as breaches become more sophisticated, social security information, medical and financial records, and more. These consumers are often being turned away from the courthouse, however, due to a failure of many federal courts to find that the …


The Sixth Pillar Of Anti-Money Laundering Compliance: Balancing Effective Enforcement With Financial Privacy, Maria A. De Dios Jan 2016

The Sixth Pillar Of Anti-Money Laundering Compliance: Balancing Effective Enforcement With Financial Privacy, Maria A. De Dios

Brooklyn Journal of Corporate, Financial & Commercial Law

The U.S. government has responded to the increase of financial crimes, including money laundering and terrorist financing, by requiring that financial institutions implement anti-money laundering compliance programs within their institutions. Most recently, the Financial Crimes Enforcement Network exercised its regulatory powers, as authorized by the Treasury Department, by proposing regulations that now explicitly add customer due diligence to the preexisting anti-money laundering regime. The policy behind the government’s legislative and regulatory measures is clear—financial institutions must ensure that they are protected from and not aiding in the illegal efforts of criminals. The complexity and insidiousness of these financial crimes makes …


Switch Hitters: How League Involvement In Daily Fantasy Sports Could End The Prohibition Of Sports Gambling, Jordan Meddy Jan 2016

Switch Hitters: How League Involvement In Daily Fantasy Sports Could End The Prohibition Of Sports Gambling, Jordan Meddy

Brooklyn Journal of Corporate, Financial & Commercial Law

Whether in the form of lotto tickets or casino table games, gambling is legally permitted in some way in virtually every U.S. state. Yet, in all but a handful of jurisdictions, federal law prohibits wagering on sporting events or professional athletes in any form. Several economically challenged states, particularly New Jersey, have been trying to authorize sports gambling within their borders as a way to raise tax revenues and support their local gambling industries. While these attempts have thus far been unsuccessful, Daily Fantasy Sports have simultaneously experienced a meteoric rise, becoming a multi-billion dollar industry. This Note examines the …


Making The Time Fit The Crime: Clearly Defining Online Harassment Crimes And Providing Incentives For Investigating Online Threats In The Digital Age, A. Meena Seralathan Jan 2016

Making The Time Fit The Crime: Clearly Defining Online Harassment Crimes And Providing Incentives For Investigating Online Threats In The Digital Age, A. Meena Seralathan

Brooklyn Journal of International Law

This Note examines online harassment and online stalking throughout the world, including the current landscape of Internet communication, the effects of cyberharassment and cyberstalking on its victims, and both the difficulties in defining these crimes in criminal codes and the difficulties in inspiring law enforcement to investigate complex internet crimes. Specifically, this Note discusses the problems inherent in current cyberharassment and cyberstalking treaties and legislation within the United States, Canada, and Australia. For example, this Note analyzes how these jurisdictions define cyberharassment and cyberstalking, how these definitions are inadequate for dealing with current forms of cyberharassment and cyberstalking (both due …


The Need For An International Convention On Data Privacy: Taking A Cue From The Cisg, Morgan Corley Jan 2016

The Need For An International Convention On Data Privacy: Taking A Cue From The Cisg, Morgan Corley

Brooklyn Journal of International Law

In light of the invalidation of the U.S.-EU Safe Harbor, along with the increase in sales of personal data as a commodity, data privacy has become a major concern amongst different nations. The lack of harmonization of data-privacy laws around the world continues to pose obstacles to the free flow of data across national borders. The free flow of data is, nonetheless, essential the international economy. As a result, nations continue to work together to try to create mechanisms by which data can be transferred across borders in a secure manner. This Note examines the current state of data-privacy law …