Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Amazon; Second Restatement of Torts; distribution chain; product defects; injury; consumers; sellers; Section 402a; marketplace; insolvency; internet; product liability; Oberdorf v. Amazon.com; Communications Decency Act; Third Circuit; Third-party sellers; Fullfillment by Amazon; FBA; Business Solutions Agreement; BSA; price parity; third-party vendors; sponsorship; Amazon's choice; Best Seller; Prime; keyword bids; supply chain; Buy Box; FDA; Food and Drug Administration (1)
- Autonomous Vehicles; Toyota Motor Company; Volkswagon; General Motors; National Highway Traffic Safety Administration; Vehicle Regulation; Self-Driving Vehicles (1)
- Choice of law (1)
- Civil damages (1)
- Compliance and technology; Self-regulatory organizations (SROs); Compliance; Financial regulations; Automated information gathering; Automated surveillance; Public disclosure; Information dissemination; Recordkeeping and reporting requirements; Dodd-Frank; Financial technology; Data analytics; Marketplace risks; Real-time regulation; Prophylactic regulation; “Regulation by enforcement” model; Empirical rulemaking; Culture of compliance; Homogenization of compliance practices; Cybersecurity; Human agency in compliance; Investment advisers; Broker-dealers; Regulatory performance standards; Revolving door; Corporate governance (1)
-
- Compliance technology; Corporate culture; Culture of compliance; Federal Sentencing Guidelines; Big data; Compliance monitoring and audits; Employee morale; Values based compliance; Command-and control approaches; Self-regulatory approaches; Financial regulation; Criminalized compliance; Corporate policing; Ethical misconduct (1)
- Corporation (1)
- Cyber-attacks; cyber-crime; information security; cybersecurity; Ponemon Institute; data sharing; data breach; Securities Exchange Commission; SEC; hacking; information technology system; phishing; Department of Justice; DOJ; cybercriminal; malware; spyware; IT; Denial of Service Attacks; DoS; DDoS; Distributed Denial of Service campaign; third-party vendor attack; Dumpster Diving; Economic Espionage; Trade Secret Misappropriation; Office of Compliance Inspections and Examinations; OCIE; Financial Industry Regulatory Authority; FINRA; broker-dealer; Risk Alert; Regulation S-P; Gramm-Leach-Bliley Act; GLBA; Computer Fraud and Abuse Act; CFAA; protected computer; United States v. Valle; Electronic Communications Privacy Act; ECPA; The Wiretap Act; The Stored Communications Act; SCA; The Pen Registry Act; Federal Trade Commission; FTC; Federal Deposit Insurance Corporation; FDIC; Federal Reserve; Economic Espionage Act; EEA; Defend Trade Secrets Act; DTSA; Huawei Technologies Co.; Cybersecurity Disclosure Act of 2017 and 2018; common law; class action; standing; Rule 23(a); 23(b)(3); negligence; breach of contract; derivative shareholder suits; Wyndham Worldwide Corporation; Regulatory Systems Compliance and Integrity; SCI; Regulation S-ID; Regulation S-P; General Disclosure Provisions; 503(c); Regulation S-K; Description of Business; financial statements; Framework for Improving Critical Infrastructure Cybersecurity; compliance; disaster plan; plaintext; ciphertext; crisis management; due diligence; The Protecting Cyber Networks Act; PCNA; National Cybersecurity Protection Advancement Act of 2015; NCPAA; The Cybersecurity Information Sharing Act; CISA; Privacy and Civil Liberties Oversight Board; Department of Homeland Security; DHS; National Cybersecurity and Communications Integration Center; NCIC; U.S. Chamber of Commerce Leadership Council; (1)
- Data breach; data protection; small businesses; breach notification framework; cybersecurity; MyBizHomepage; cyberattack; Code Spaces; Software as a Service; SaaS; cybercriminals; data security; Great Depression; World War II; Small Business Act of 1953; SBA; Small Business Administration; Privacy Rights Clearinghouse; ChoicePoint; Personally Identifiable Information; PII; consumer credit reporting information; Protected Health Information; PHI; Gramm-Leach-Bliley Act; GLBA; Bank Holding Company Act of 1956; Health Insurance Portability and Accountability Act of 1996; HIPAA; Federal Trade Commission; FTC; Fair Credit Reporting Act; civil penalties; Commonwealth v. Haney; Massachusetts Security Breaches Law; In re Yahoo! Inc. Customer Data Security Breach Litigation; California Customer Records Act; attorney general; Community Bank of Trenton v. Schnuck Markets; In re Target Corp. Customer Data Security Breach Litigation; Personal Data Privacy and Security Act; Personal Data Privacy and Security Act; Department of Homeland Security; National Institute of Standards and Technology (NIST) Small Business Cybersecurity Act; Cybersecurity Enhancement Act of 2014; Small Business Reauthorization Act of 1997; Historically Underutilized Business Zones; HUBZone; European Union; General Data Protection Regulation; GDPR; Privacy by Design; California Consumer Privacy Act; CCPA; liability insurance; burden-shifting (1)
- EEA (1)
- Eastman Dillon & Co. (1)
- Economic Espionage Act (1)
- Economic loss (1)
- Economics (1)
- Estonia; blockchain; corporate governance; shareholders; New York; Delaware; cyber security; voting; government services; E-Estonia; encryption; Nasdaq; e-Residency; proxy; annual meeting; securities; ledger; permissioned; unpermissioned; tokens; vote coins; wallet; corporation laws; board of directors; Depository Trust Company; DTC; 14a-13; Exchange Act; NOBO; SEC; derivative; shareholder activism; Procter & Gamble; Nelson Peltz (1)
- Federal civil statute (1)
- Federal courts (1)
- Federal statute (1)
- Financial regulation; Compliance technology; Cybersecurity; Agency problems; Risk analysis; Financial accidents; Systemic risks; “Too linked to fail”; “Too fast to save”; Hackers; Cybercriminals; Corporate governance; Risk management; Human agency; Artificial intelligence (1)
- Fitness; COVID-19; technology; music; licenses (1)
- Inc. v. Makor Issues & Rights (1)
- Inc.; Tellabs (1)
- Intangible property (1)
- Interstate commerce (1)
- Ltd. (1)
- Misappropriation (1)
- NSPA (1)
- National Stolen Property Act (1)
- Personal data; California Consumper Privacy Act; CCPA; consumer data; data privacy; anti-discrimination provision; financial incentives exception; ambiguity; legislation; legislative intent; internet; data marketplace; Gramm-Leach-Bliley Act; Securities and Exchange Act; Federal Trade Commission Act; Consumer Financial Protection; Federal Trade Commission; FTC; FTC v. Wyndham Worldwide; hacking; Cambridge Analytica; data mining; scandal; Donald Trump; Facebook; business regulation; compliance; reasonable relationship; corporate finance; disclosure; (1)
- Privacy law; Cybersecurity; Hackers; FTC v. Wyndham Worldwide Corp.; Data breaches; Data security procedures; Self-regulatory organizations (SROs); Financial Trade Commission (FTC); Corporate privacy; Cyber Crime; Section 5 of the Federal Trade Commission Act; Deceptive or unfair business practice; Congressional inaction; Key principles of compliance; Best Practices Guidelines; Cyber risk insurance; Commercial general liability (CGL) insurance; First party cyber loss; Third party cyber liability; Technical policies and procedures; Written information security plan (WISP) (1)
Articles 1 - 18 of 18
Full-Text Articles in Law
Running From Blanket Licensing: How Fitness Platforms Do Not Sync With Current Music Licensing Procedure, Kathryn Defranco
Running From Blanket Licensing: How Fitness Platforms Do Not Sync With Current Music Licensing Procedure, Kathryn Defranco
Brooklyn Journal of Corporate, Financial & Commercial Law
Online Fitness Platforms, like Peloton, have become ubiquitous in a modern post-Covid world. Fitness classes are catered to the musical interests of their users, increasing user satisfaction. Although technology has advanced to accommodate the remote fitness industry, the legal structures in place for synchronization licenses have not. Such platforms have a unique need to clear music on a quick and consistent basis that does not break the bank. Downtown Music Publishing LLC v. Peloton Interactive, Inc., highlights the necessity for a federal statutory scheme similar to those used for other music licenses. A solution that protects competition but does not …
Using Express Federal Preemption To Avoid A Costly State-By-State Regulatory Landscape For Social Media Platform, Benjamin Summers-Berger
Using Express Federal Preemption To Avoid A Costly State-By-State Regulatory Landscape For Social Media Platform, Benjamin Summers-Berger
Brooklyn Journal of Corporate, Financial & Commercial Law
Over the last five years, the federal government has been slow to respond to the growing number of calls for social media regulation. Social media has a massive impact on American life, fostering connections among people and amplifying information. The companies that own and operate these platforms enjoy a power to disseminate information that has been likened to that of the Catholic Church in the Middle Ages. Yet, there is no substantive regulation of these companies by the federal government. Instead, state governments are attempting to fill the regulatory void left by the federal government. As seen with gerrymandering, if …
Reconsidering Scienter With Social Media: Adapting Rule 10b-5 In The Age Of Elon Musk Tweets, John Madigan
Reconsidering Scienter With Social Media: Adapting Rule 10b-5 In The Age Of Elon Musk Tweets, John Madigan
Brooklyn Journal of Corporate, Financial & Commercial Law
Over the last twenty years, the rise of social media has dramatically changed how the world communicates. One such transformation is the use of social media platforms to disseminate information regarding the financial markets, aiding investors in their trading decisions. While increased access to financial information has democratized retail consumers’ access to capital markets, it has also introduced a level of instability. Furthermore, social media enables individuals with mass followings to disseminate their thoughts, opinions, or information, potentially influencing investors’ behavior and creating an environment conducive to securities fraud. Since its promulgation, the United States Securities and Exchange Commission (SEC) …
Full Of Questions And Wonder: Roberta Karmel's Legacy, Alan R. Palmiter
Full Of Questions And Wonder: Roberta Karmel's Legacy, Alan R. Palmiter
Brooklyn Journal of Corporate, Financial & Commercial Law
Roberta Karmel has been perhaps the keenest observer and commentator on the securities industry and its regulation for the past five decades. Her observations about securities regulation—during the SEC’s precocious adolescence and into its young adulthood—have framed the academic inquiry of all of us who have written on the subject during this period. But more valuable to us than her observations have been her questions, full of wonder and penetrating insight. We securities academics, the enterprise of securities regulation, and especially market capitalism, all owe an enormous debt of gratitude to Professor Karmel.
The Commodification Of Personal Data And The Road To Consumer Autonomy Through The Ccpa, Blaire Rose
The Commodification Of Personal Data And The Road To Consumer Autonomy Through The Ccpa, Blaire Rose
Brooklyn Journal of Corporate, Financial & Commercial Law
The internet has transformed into a museum of personal information collected through the digital footprint we leave behind after each act performed on the web. Businesses have monetized this collection of personal data in various ways. For instance, many companies analyze this information through predicting analytics and data profiling to identify consumer interests that they can exploit as a means to generate revenue. Though user data promotes many benefits for businesses and consumers alike, the recent data breaches of massive companies, coupled with hazy privacy disclosures that beget consent disputes, have left both users and businesses perturbed and exposed to …
The Heavy Hand Of Amazon: A Seller Not A Neutral Platform, Edward J. Janger, Aaron D. Twerski
The Heavy Hand Of Amazon: A Seller Not A Neutral Platform, Edward J. Janger, Aaron D. Twerski
Brooklyn Journal of Corporate, Financial & Commercial Law
Since the adoption of Section 402A of the Second Restatement of Torts, every party in a product’s distribution chain has been potentially liable for injuries caused by product defects. Consumers who buy from reputable sellers are almost always guaranteed to have a solvent defendant if injured by a product defect. Amazon, though responsible for a vast number of retail sales, has sought to avoid liability by claiming that it is not a seller but a neutral platform that merely facilitates third-party sales to consumers. With two significant exceptions, most courts have sided with Amazon and concluded that Amazon is not …
“Estonia’S Gift To The World”: The Implementation Of A Blockchain Protocol For Corporate Governance In New York, Sydney Lauren Abualy
“Estonia’S Gift To The World”: The Implementation Of A Blockchain Protocol For Corporate Governance In New York, Sydney Lauren Abualy
Brooklyn Journal of Corporate, Financial & Commercial Law
The traditional procedures of corporate governance are not designed to resolve issues related to close outcomes of corporate votes, empty voting practices, the proxy voting protocol, verification of shareholder identities, and access to corporate records. Blockchain technology allows all corporate shareholders to participate in corporate governance more conveniently, with increased transparency, on a secure network. Estonia sought to revolutionize corporate governance by facilitating the development of a blockchain based e-voting protocol for shareholders of companies listed on the Tallinn Stock Exchange to vote in shareholder meetings. After unsuccessful attempts, New York stands well behind other states, such as Delaware, in …
Unmasking The Villain: Exposing Scammers’ Identities To Defeat Harmful Calls, Katherine Teng
Unmasking The Villain: Exposing Scammers’ Identities To Defeat Harmful Calls, Katherine Teng
Brooklyn Journal of Corporate, Financial & Commercial Law
Since 1991, Congress has attempted to limit unwanted phone calls through legislative efforts. However, past and current laws remain ineffective as scam call complaints continue to increase while the harm of these calls remains severe. Currently, the laws affecting telecommunication regulation focus on reactive measures rather than preventative solutions. Most recently, Congress has passed the Telephone Robocall Abuse Criminal Enforcement and Deterrence Act, which will require telecommunication companies to implement SHAKEN/STIR technology to end scam calls before they reach consumers. While this is the most progressive legislation addressing scam calls, this Note will suggest that phone numbers be registered to …
Saving Small Business From The Big Impact Of Data Breach: A Tiered Federal Approach To Data Protection Law, Nadia Udeshi
Saving Small Business From The Big Impact Of Data Breach: A Tiered Federal Approach To Data Protection Law, Nadia Udeshi
Brooklyn Journal of Corporate, Financial & Commercial Law
Small businesses provide a significant positive impact on the American economy. However, the current fragmented federal and state data protection and breach notification legal scheme puts the viability of small businesses at risk. While the probability of data breaches occurring continues to increase, small businesses lack the financial and technological resources to contend with the various state and federal laws that impose different monetary penalties and remedial requirements in the event of such breaches. To preserve the viability of small businesses, Congress should enact a centralized, multi-tiered federal data protection and breach notification framework that preempts state laws, imposes minimum …
The Criminal, Regulatory, And Civil Issues Surrounding Intellectual Property And Cybersecurity, Ernest Edward Badway, Christie Mcguinness
The Criminal, Regulatory, And Civil Issues Surrounding Intellectual Property And Cybersecurity, Ernest Edward Badway, Christie Mcguinness
Brooklyn Journal of Corporate, Financial & Commercial Law
Cyber-attacks have affected all organizations and individual consumers. Dissemination of relevant information and attention to strong information security practices is an important tool in fighting this cyber “pandemic.” Additionally, the legal and regulatory liability companies face from cyber-attacks as well as general strategies and practical solutions companies may implement to protect against cyber-intrusions and respond effectively in the event of an attack are considered. There are many iterations of cyber-crime, and we address the various methods cybercriminals use and the many ways cyber-attacks can take place, as well as the entities and victims affected. Moreover, the legal liability and regulatory …
A Taxonomy Of Cryptocurrency Enforcement Actions, Peter J. Henning
A Taxonomy Of Cryptocurrency Enforcement Actions, Peter J. Henning
Brooklyn Journal of Corporate, Financial & Commercial Law
This article looks at how the Securities and Exchange Commission (SEC) and the Department of Justice (DOJ) have pursued cases involving cryptocurrencies. A number of prosecutions have been brought against defendants who misled investors into believing that they were obtaining cryptocurrencies when in fact there were simply false statements and schemes to defraud, such as Ponzi schemes. When a company has attempted to issue a cryptocurrency to investors, the SEC has relied on Section 5(a) and 5(c) of the Securities Act of 1933 to require that issuers file a registration statement with the Commission. This is not an easy process …
Artificial Intelligence & Artificial Prices: Safeguarding Securities Markets From Manipulation By Non-Human Actors, Daniel W. Slemmer
Artificial Intelligence & Artificial Prices: Safeguarding Securities Markets From Manipulation By Non-Human Actors, Daniel W. Slemmer
Brooklyn Journal of Corporate, Financial & Commercial Law
Securities traders are currently competing to use Artificial Intelligence (A.I.) in order to make more profitable decisions in the marketplace. While A.I. provides superior abilities in recognizing market patterns, its complexity can obscure its decision-making process beyond human comprehension. Problematically, the current securities laws prohibiting manipulation of securities prices rest liability for violations on a trader’s intent. In order to prepare for A.I. market participants, both courts and regulators need to accept that human concepts of decision-making will be inadequate in regulating A.I. behavior. However, the wealth of case law in the market manipulation doctrine need not be cast aside. …
The Race Is On! Regulating Self-Driving Vehicles Before They Hit The Streets, Jack Liechtung
The Race Is On! Regulating Self-Driving Vehicles Before They Hit The Streets, Jack Liechtung
Brooklyn Journal of Corporate, Financial & Commercial Law
As the world braces itself for the unveiling of autonomous vehicles, the idea of regulation and oversight has gone largely undetected. Though some states have already begun enacting legislation ahead of the technology’s wide release, the regulatory landscape across the country is in disarray. It is imperative that both manufacturers and consumers be given some sort of uniform understanding as to how the automation is overseen throughout the manufacturing process and how liability will be levied in the case of inevitable mistakes on our nation’s roadways. This Note proposes that the National Highway Traffic Safety Administration be responsible for providing …
Preserving Human Agency In Automated Compliance, Onnig H. Dombalagian
Preserving Human Agency In Automated Compliance, Onnig H. Dombalagian
Brooklyn Journal of Corporate, Financial & Commercial Law
As technology transforms financial services, so too must it transform the regulation of financial markets and intermediaries. The imperative of real-time, prophylactic regulation increasingly compels reallocation of regulatory and compliance budgets to surveillance and enforcement technology. At the same time, in light of the well-known weaknesses of automated systems, securities firms (and their regulators) must temper investment in automation with efforts to augment the agency of compliance professionals. This symposium contribution considers how investment in the professional development of compliance personnel can better integrate automated tools within established compliance and supervisory structures and thereby advance regulatory and operational objectives.
The Question Concerning Technology In Compliance, Sean J. Griffith
The Question Concerning Technology In Compliance, Sean J. Griffith
Brooklyn Journal of Corporate, Financial & Commercial Law
In this symposium Essay, I apply insights from philosophy and psychology to argue that modes of achieving compliance that focus on technology undermine, and are undermined by, modes of achieving compliance that focus on culture. Insisting on both may mean succeeding at neither. How an organization resolves this apparent contradiction in program design, like the broader question of optimal corporate governance arrangements, is highly idiosyncratic. Firms should therefore be accorded maximum freedom in designing their compliance programs, rather than being forced by enforcement authorities into a set of de facto mandatory compliance structures.
Compliance, Technology, And Modern Finance, Tom C.W. Lin
Compliance, Technology, And Modern Finance, Tom C.W. Lin
Brooklyn Journal of Corporate, Financial & Commercial Law
An important transformation is happening in the financial industry. The rise of new technology and compliance has dramatically altered many of the key functions and functionaries of modern finance. Artificial intelligence, algorithmic programs, and supercomputers, instead of human actors, now constitute the core of many financial operations. Compliance officers have become just as critical to financial institutions as traders, bankers, and analysts. Finance as we knew it has changed and continues to change. This symposium Article offers a studied commentary on these unfolding changes, the crosscutting developments in compliance, technology, and modern finance. It examines the concurrent and intersecting ascents …
Like A Bad Neighbor, Hackers Are There: The Need For Data Security Legislation And Cyber Insurance In Light Of Increasing Ftc Enforcement Actions, Jennifer Gordon
Like A Bad Neighbor, Hackers Are There: The Need For Data Security Legislation And Cyber Insurance In Light Of Increasing Ftc Enforcement Actions, Jennifer Gordon
Brooklyn Journal of Corporate, Financial & Commercial Law
Privacy has come to the forefront of the technology world as third party hackers are constantly attacking companies for their customers’ data. With increasing instances of compromised customer information, the Federal Trade Commission (FTC) has been bringing suit against companies for inadequate data security procedures. The FTC’s newfound authority to bring suit regarding cybersecurity breaches, based on the Third Circuit’s decision in FTC v. Wyndham Worldwide Corp., is a result of inaction—Congress has been unable to pass sufficient cybersecurity legislation, causing the FTC to step in and fill the void in regulation. In the absence of congressional action, this self-proclaimed …
Another Bite At The Apple For Trade Secret Protection: Why Stronger Federal Laws Are Needed To Protect A Corporation's Most Valuable Property, Alissa Cardillo
Another Bite At The Apple For Trade Secret Protection: Why Stronger Federal Laws Are Needed To Protect A Corporation's Most Valuable Property, Alissa Cardillo
Brooklyn Journal of Corporate, Financial & Commercial Law
Trade secrets are one of a corporation’s most valuable assets. However, they lack adequate protection under federal law, leaving them vulnerable to theft and misappropriation. As technology advances, it becomes easier and less time consuming for individuals and entities to access and steal trade secrets to a corporation’s detriment. Most often these thefts involve stealing trade secrets in an intangible form. Current legislation fails to adequately protect intangible trade secrets, leaving them vulnerable to theft. An amendment to the National Stolen Property Act that encompasses intangible trade secrets would close a loophole that currently exists relating to intangible assets, allowing …