Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 8 of 8

Full-Text Articles in Law

Privacy’S Commodification And The Limits Of Antitrust, Jeffrey L. Vagle May 2024

Privacy’S Commodification And The Limits Of Antitrust, Jeffrey L. Vagle

Arkansas Law Review

This Article argues that the buying and selling of personal data forms what Debra Satz calls a “noxious market,” and, thus, any regulation of information privacy should not accept or depend upon its commodification but should stand on its own. This Article proceeds in three parts. Part I first lays out the history and effects of data commodification, arguing that the market created by this commodification is noxious and undesirable. Part II examines the renewal of antitrust’s purpose as a regulatory tool, especially in the context of its use in the regulation of large technology firms. Finally, Part III argues …


The Data Heist: Protecting Consumers And Their Information Through Opt-In Consent, John A. Hudson Feb 2024

The Data Heist: Protecting Consumers And Their Information Through Opt-In Consent, John A. Hudson

Arkansas Law Review

This Comment will: (1) compare and contrast the data privacy laws in the United States and the European Union; (2) demonstrate the significant risk American consumers are subject to under the United States’ current laws and regulations; and (3) address the protections provided by the European Union’s explicit opt-in consent requirement that would ensure safer conditions for American consumers.


When Taint Teams Go Awry: Laundering Unconstitutional Violations Of The Fourth Amendment, Edward S. Adams, William C. Price Jr. Feb 2023

When Taint Teams Go Awry: Laundering Unconstitutional Violations Of The Fourth Amendment, Edward S. Adams, William C. Price Jr.

Arkansas Law Review

In this Article, we examine the legal landscape in which taint teams operate, why taint teams are constitutionally problematic, and propose a solution to protect the attorney-client privilege. In Part I, we will first describe what taint teams are supposed to protect—attorney-client privilege. Next, we review how a taint team gets its documents to review, namely the doctrine surrounding (secret) search warrants. Part I ends with a non exhaustive summary of remedies available when attorney-client privilege is violated during searches. In Part II, we explain the current policies and practices surrounding taint teams, including sources of procedure for taint teams …


Recent Developments, Silas Heffley Feb 2022

Recent Developments, Silas Heffley

Arkansas Law Review

In a case involving a Missouri televangelist, a purported COVID-19 cure, and state officials from Arkansas and California, the Eighth Circuit Court of Appeals affirmed the lower court’s dismissal for lack of personal jurisdiction.


The Jones Trespass Doctrine And The Need For A Reasonable Solution To Unreasonable Protection, Geoffrey Corn Dec 2020

The Jones Trespass Doctrine And The Need For A Reasonable Solution To Unreasonable Protection, Geoffrey Corn

Arkansas Law Review

Each day that Houston drivers exit from Interstate 45 to drive to downtown Houston, they pass an odd sight. Nestled within some bushes is an encampment of tents. This encampment is very clearly located on public property adjacent to the interstate highway, and equally clearly populated by homeless individuals. While local police ostensibly tolerate this presence, at least temporarily, the sight frequently evokes an image in my mind of a police search of those tents. This thought is especially prominent on the days I am driving to my law school, South Texas College of Law Houston, to teach my federal …


Wire(Less) Tapping: Protecting Arkansans' Fourth Amendment Right In The Era Of The Cloud, Erin James Aug 2020

Wire(Less) Tapping: Protecting Arkansans' Fourth Amendment Right In The Era Of The Cloud, Erin James

Arkansas Law Review

Every day we surround ourselves with dozens of devices that monitor our every move, every request, all connecting with one another and sending massive amounts of data back to the device manufacturers. The idea of the prosecution placing the little black cylinder of your Amazon Alexa on the witness stand and asking Alexa to testify against you seems like something pulled from an Orwellian nightmare. But, in reality, it is already occurring.


Identities Lost: Enacting Federal Law Mandating Disclosure & Notice After A Data Security Breach, John Ogle Jul 2019

Identities Lost: Enacting Federal Law Mandating Disclosure & Notice After A Data Security Breach, John Ogle

Arkansas Law Review

Identity theft is real, it’s here, and consumers need protection. Over the past five years hackers have stolen billions of consumers’ sensitive information like social security numbers, addresses, and bank routing numbers from companies that have neglected their security measures. Most of the time these security breaches are easily preventable. Companies sometimes wait weeks, months, or even years to inform the customers whose information was stolen because there is no federal law that requires disclosure. As of 2018, all 50 states have adopted security breach notification laws that require companies to inform consumers that their information may have been stolen …


Civil Society And Cybersurveillance, Andrew Mccanse Wright Jan 2018

Civil Society And Cybersurveillance, Andrew Mccanse Wright

Arkansas Law Review

There is no such thing as benign surveillance. It always comes with costs because of the chill it visits upon conduct, education, associations, and expression. Government surveillance has been magnified by cybersurveillance in the Digital Age to a degree unimaginable by the Founders of the United States of America.