Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 3 of 3
Full-Text Articles in Law
A Textual Analysis Of Whistleblower Protections Under The Dodd-Frank Act, Brent T. Murphy
A Textual Analysis Of Whistleblower Protections Under The Dodd-Frank Act, Brent T. Murphy
Notre Dame Law Review
This Note endorses the reasoning of the Fifth Circuit in Asadi v. G.E. Energy (USA), L.L.C., and argues that the plain language of Dodd-Frank limits its whistleblower protections to individuals who provide information to the SEC. This Note argues that the reasoning of the Second Circuit in Berman v. Neo@Ogilvy LLC relying on the Supreme Court’s decision in King v. Burwell is inapposite, and that the Second Circuit introduced ambiguity where no ambiguity previously existed and improperly extended Chevron deference to the SEC.
"Major Questions" As Major Opportunities, Riley T. Svikhart
"Major Questions" As Major Opportunities, Riley T. Svikhart
Notre Dame Law Review
The future of the major question exception is a live question in the wake of King v. Burwell. This Note calls on federal courts to embrace the exception, for where a toothless nondelegation doctrine has failed to curtail the ceaseless growth of executive power experienced over the past century, a more aggressively applied major question exception can succeed in ensuring that policy questions of the deepest “economic and political significance” are left exclusively to the people’s representatives in Congress. In declining to defer to an executive agency’s interpretation of an ambiguous statute, federal courts must themselves assume “the task [of] …
Data Breaches, Identity Theft, And Article Iii Standing: Will The Supreme Court Resolve The Split In The Circuits?, Bradford C. Mank
Data Breaches, Identity Theft, And Article Iii Standing: Will The Supreme Court Resolve The Split In The Circuits?, Bradford C. Mank
Notre Dame Law Review
In data breach cases, the plaintiff typically alleges that the defendant used inadequate computer security to protect the plaintiff’s personal data. In most, but not all cases, the plaintiff cannot prove that a hacker or thief has actually used or sold the data to the plaintiff’s detriment. In most cases, a plaintiff alleges that the defendant’s failure to protect his personal data has caused him damages by increasing his risk of suffering actual identity theft in the future and therefore imposed costs on the plaintiff when he reasonably takes measures to prevent future unauthorized third-party data access by purchasing credit …