Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 23 of 23

Full-Text Articles in Law

Mischief With Government Information Policy, Renée M. Landers Apr 2020

Mischief With Government Information Policy, Renée M. Landers

Chicago-Kent Law Review

No abstract provided.


Administrative Truth: Comments On Cortez's Information Mischief, David Thaw Apr 2020

Administrative Truth: Comments On Cortez's Information Mischief, David Thaw

Chicago-Kent Law Review

No abstract provided.


Information Mischief Under The Trump Administration, Nathan Cortez May 2019

Information Mischief Under The Trump Administration, Nathan Cortez

Chicago-Kent Law Review

The Trump administration has used government information in more cynical ways than its predecessors. For example, it has removed certain information from the public domain, scrubbed certain terminology from government web sites, censored scientists, manipulated public data, and used “transparency” initiatives as a pretext for anti-regulatory policies, particularly environmental policy. This article attempts to tease out an emerging “information policy” for the Trump administration, explain how it departs from the information policies of predecessors, and evaluate the extent to which both legal and non-legal mechanisms might constrain executive discretion.


The Promise And Perils Of Algorithmic Lenders’ Use Of Big Data, Matthew Adam Bruckner Mar 2018

The Promise And Perils Of Algorithmic Lenders’ Use Of Big Data, Matthew Adam Bruckner

Chicago-Kent Law Review

Tens of millions of Americans lack access to traditional forms of credit and must rely on payday and pawn loans instead. “Algorithmic lending 2.0” promises to enable fintech companies to lend to those excluded from traditional forms of credit. Version 2.0 algorithmic lenders claim to use Big Data and machine learning to increase credit access by making better predictions about prospective borrowers’ creditworthiness and decreasing the cost of credit. Supporters also claim that algorithmic lending 2.0 removes human bias from the financial services sector. Detractors have cast doubt on both claims, arguing that there is scant evidence that algorithmic lending …


The Rise Of Automated Investment Advice: Can Robo-Advisors Rescue The Retail Market?, Benjamin P. Edwards Mar 2018

The Rise Of Automated Investment Advice: Can Robo-Advisors Rescue The Retail Market?, Benjamin P. Edwards

Chicago-Kent Law Review

Different types of financial advisers serve the massive and widely dispersed retail investment market. In a market riddled with conflicts of interests, many advisers exploit retail customers by pitching suboptimal products, leading to lower investment returns and lower overall growth—but also to greater profits for the financial advisers collecting kickback-style commissions. New financial technology firms, commonly known as Robo-Advisers, may disrupt this market and these exploitative practices. Still, these potentially disruptive automated investment advice firms face significant regulatory risks.


New Art For The People: Art Funds & Financial Technology, Brian L. Frye Mar 2018

New Art For The People: Art Funds & Financial Technology, Brian L. Frye

Chicago-Kent Law Review

Fine art sales have reached record levels, with the global art market achieving annual sales of over $60 billion. However, the art market is extremely risky and the most lucrative investment opportunities are typically at the high end of the market. In recent years, financial industry professionals with an interest in the art world have increasingly formed art investment funds, intended to enable smaller investors to take advantage of the opportunity to invest in the art world and diversify their portfolios. Some art funds also allow art investors to borrow against certain assets. About 45 art investment funds currently exist, …


Regtech, Compliance And Technology Judgement Rule, Nizan Geslevich Packin Mar 2018

Regtech, Compliance And Technology Judgement Rule, Nizan Geslevich Packin

Chicago-Kent Law Review

This Article focuses on the rise of Financial Technology, which revolutionized consumer financial service products, and challenged policymakers with regulating the rapidly evolving financial industry. In particular, it explores Regulatory Technology, also known as RegTech, which is the finance industry’s use of technology, especially information technology, in the context of regulatory monitoring, reporting and compliance. RegTech is designed to solve industry needs for a more effective and efficient way to automate corporate governance and compliance processes. Not only has FinTech proven to be a vital revenue source, especially in connection with lending or money transmission services, but it also helps …


Fintech's Double Edges, Christopher G. Bradley Mar 2018

Fintech's Double Edges, Christopher G. Bradley

Chicago-Kent Law Review

This symposium essay examines the double-edged nature of financial technologies in financial transactions, especially transactions involving consumers. There are both benefits and risks—often undiscovered or hidden at first—in each new round of financial technologies. A FinTech tool may benefit consumers and then, applied later or in a different context, threaten consumer interests; a tool that harms consumer interests may then lead to development of a tool that favors them. This double-edged nature is an important but unappreciated structural feature of financial technologies. From the perspective of consumer protection, then, FinTech can neither be fully embraced as friend nor restricted as …


Computer As Confidant: Digital Investment Advice And The Fiduciary Standard, Nicole G. Iannarone Mar 2018

Computer As Confidant: Digital Investment Advice And The Fiduciary Standard, Nicole G. Iannarone

Chicago-Kent Law Review

Digital investment advisers are the fastest growing segment of financial technology (fintech) and are disrupting traditional investment advisory delivery models. The computer-led investment advisory service model may be growing particularly quickly due to a confluence of social and political factors. Politicians and regulators have increasingly focused on the standards of care applicable to investment advice providers. Fewer Americans are ready for retirement and many lack access to affordable investment advice. At the same time, comfort with digital platforms have increased, with some preferring electronic interaction over human interaction. Claiming that they can democratize retirement service by pro- viding advice meeting …


Fintech: Antidote To Rent-Seeking?, Jeremy Kidd J.D., Ph.D Mar 2018

Fintech: Antidote To Rent-Seeking?, Jeremy Kidd J.D., Ph.D

Chicago-Kent Law Review

Innovations in financial technology, or Fintech, has been ongoing for decades but has recently begun to accelerate. Some observers have argued that it will soon begin to outstrip the ability of regulators to keep pace. If those predictions are accurate, what would the world look like with a financial sector that cannot be effectively regulated? One possibility—drawn from public choice economics—is that rent-seeking will be inhibited or eliminated. Rent-seeking is the distortion of law and regulation for the benefit of special interests, who expend resources to guarantee those distortions in their favor. Rent-seeking is inefficient and inhibits growth and innovation, …


Leveraging Predictive Policing Algorithms To Restore Fourth Amendment Protections In High-Crime Areas In A Post-Wardlow World, Kelly K. Koss Jan 2015

Leveraging Predictive Policing Algorithms To Restore Fourth Amendment Protections In High-Crime Areas In A Post-Wardlow World, Kelly K. Koss

Chicago-Kent Law Review

Rapid technological changes have led to an explosion in Big Data collection and analysis through complex computerized algorithms. Law enforcement has not been immune to these technological developments. Many local police departments are now using highly advanced predictive policing technologies to predict when and where crime will occur in their communities, and to allocate crime-fighting resources based on these predictions.

Although predictive policing technology has an array of the potential uses, the scope of this Note is limited to addressing how the statistical outputs from these technologies can be used to restore eroded Fourth Amendment rights in alleged high-crime areas. …


Best Practices And The State Of Information Security, Kevin Cronin Jun 2009

Best Practices And The State Of Information Security, Kevin Cronin

Chicago-Kent Law Review

The forces of globalization, together with widely available industry standards and best practices, and heightened state legislative activity, are driving the U.S. towards a more unified approach to data security. But the success of this unified approach requires more than free market efficiency and innovation. In order to maintain a state of evolutionary equilibrium in the global information economy, the U.S. must move from a fragmented approach towards data security and privacy standards, towards a more comprehensive set of standards with new penalties and effective enforcement, to better reflect the inherent value of personal data in today's global marketplace.


Patenting Cryptographic Technology, Greg Vetter Jun 2009

Patenting Cryptographic Technology, Greg Vetter

Chicago-Kent Law Review

The policy concerns intersecting patent law and cryptographic technology relate to the technology's beneficial uses in securing information in a commercial and social fabric that increasingly relies on computing and electronic communications for its makeup. The presence of patenting in a technology can impact diffusion of interoperable technology. Standardized embeddable cryptography facilitates its supply. Patent law for several decades has waxed and waned in its embrace of software implemented inventions rooted in abstract ideas such as the mathematics and mathematical algorithms underlying modern cryptography. This article documents the growth of cryptographic patenting. Then, in light of this growth and patent …


The Duty Of Care And The Data Control Systems In The Wake Of Sarbanes-Oxley, Michael R. Siebecker Jun 2009

The Duty Of Care And The Data Control Systems In The Wake Of Sarbanes-Oxley, Michael R. Siebecker

Chicago-Kent Law Review

The essay examines the wisdom of exempting small public companies from Section 404 of the Sarbanes-Oxley Act of 2002 (SOX), which requires companies to provide management assessment and external auditing of a company's internal control systems over financial data. In particular, the essay questions whether a fiduciary duty of care might require officers and directors to adopt internal control systems, perhaps substantially similar to those envisioned by SOX, even if small public companies were exempt from the ambit of the statute.


The Political Economy Of Data Protection, Peter K. Yu Jun 2009

The Political Economy Of Data Protection, Peter K. Yu

Chicago-Kent Law Review

Information is the lifeblood of a knowledge-based economy. The control of data and the ability to translate them into meaningful information is indispensable to businesspeople, policymakers, scientists, engineers, researchers, students, and consumers. Having useful, and at times exclusive, information improves productivity, advances education and training, and helps create a more informed citizenry. In the past two decades, those who collected or obtained access to a large amount of data began to explore ways to use the collected data as an income stream. Because the then-existing laws did not offer adequate protection for that particular purpose, they actively lobbied for stronger …


Data Devolution: Corporate Information Security, Consumers, And Future Of Regulation, Andrea M. Matwyshyn Jun 2009

Data Devolution: Corporate Information Security, Consumers, And Future Of Regulation, Andrea M. Matwyshyn

Chicago-Kent Law Review

No abstract provided.


Data Collection And Leakage, Philip Howard, Kris Erickson Jun 2009

Data Collection And Leakage, Philip Howard, Kris Erickson

Chicago-Kent Law Review

Every year millions of digital records containing personally identifiable information are exposed. When are malicious hackers to blame, and when is it organizational malfeasance? Which kinds of organizations—private firms, government agencies, or educational institutions—lose the most data? With over 1.9 billion records lost (on average that's 9 records per U.S. adult), a surprising number of breaches can be attributed to organizational practices.


Trade Secrets, Data Security And Employees, Elizabeth Rowe Jun 2009

Trade Secrets, Data Security And Employees, Elizabeth Rowe

Chicago-Kent Law Review

This essay argues that data security is important to the protection of trade secret information, and that trusted employees on the inside pose the biggest threat to the protection of trade secrets. While investments in technical measures such as firewalls and encryption are important, it is also necessary for companies to consider the internal threats from employees when creating corporate security programs. Ultimately, a more comprehensive approach that includes technical and human elements, as well as consideration of inside and outside threats is likely to be more effective in the battle to secure data.


Returning To A Principled Basis For Data Protection, Gus Hosein Jun 2009

Returning To A Principled Basis For Data Protection, Gus Hosein

Chicago-Kent Law Review

Society must remain conscious of both pragmatic and principle-based rationales for information security rules. The identity card debate in the United Kingdom provides an example of exactly why a governmental information security approach that is sensitive to civil liberties would be the best approach to data protection. In contrast, we should be cautious of a balancing test that places security in parity with civil liberties and, therefore, erroneously allows pragmatism to triumph over principle.


Optimal Hackback, Jay P. Kesan, Ruperto Majuca Jun 2009

Optimal Hackback, Jay P. Kesan, Ruperto Majuca

Chicago-Kent Law Review

Professor Jay Kesan from the University of Illinois College of Law, in joint work with Ruperto Majuca of the University of Illinois Department of Economics, argue in favor of legal rules that allow "hacking [data] back" in certain business circumstances. They analyze the strategic interaction between the hacker and the attacked company or individual and conclude that neither total prohibition nor unrestrained permission of hack-back is optimal. Instead, they argue that when other alternatives such as criminal enforcement and litigation are ineffective, self-defense is the best response to cybercrime because there is a high likelihood of correctly attacking the criminal, …


Information Security, Contract And Liability, Jennifer Chandler Jun 2009

Information Security, Contract And Liability, Jennifer Chandler

Chicago-Kent Law Review

Various common provisions in software end user license agreements undermine cyber security. These include anti-benchmarking provisions and broad exclusions of liability. These short comments suggest that courts and legislatures should take steps to limit the enforceability of contractual provisions that undermine cyber security.


Reasons Why We Should Amend The Constitution To Protect Privacy, Deborah Pierce Jun 2009

Reasons Why We Should Amend The Constitution To Protect Privacy, Deborah Pierce

Chicago-Kent Law Review

Threats to consumer privacy are many, and varied. Some threats come from corporate entities such as data aggregators and social networking sites; while others come from panoptics government surveillance systems such as Secure Flight. Not only can the data be compromised, but consumers may be adversely affected by incorrect information in their files. The time may be right to explicitly protect privacy via a constitutional amendment to the U.S. Constitution.


Coding Privacy, Lilian Edwards Jun 2009

Coding Privacy, Lilian Edwards

Chicago-Kent Law Review

Lawrence Lessig famously and usefully argues that cyberspace is regulated not just by law but also by norms, markets and architecture or "code." His insightful work might also lead the unwary to conclude, however, that code is inherently anti-privacy, and thus that an increasingly digital world must therefore also be increasingly devoid of privacy. This paper argues briefly that since technology is a neutral tool, code can be designed as much to fight for privacy as against it, and that what matters now is to look at what incentivizes the creation of pro- rather than anti-privacy code in the mainstream …