Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 29 of 29

Full-Text Articles in Law

The Freedom Of Influencing, Hannibal Travis Feb 2023

The Freedom Of Influencing, Hannibal Travis

University of Miami Law Review

Social media stars and the Federal Trade Commission (“FTC”) Act are clashing. Influencer marketing is a preferred way for entertainers, pundits, and everyday people to monetize their audiences and popularity. Manufacturers, service providers, retailers, and advertising agencies leverage influencers to reach into millions or even billions of consumer devices, capturing minutes or seconds of the market’s fleeting attention. FTC enforcement actions and private lawsuits have targeted influencers for failing to disclose the nature of a sponsorship relationship with a manufacturer, marketer, or service provider. Such a failure to disclose payments prominently is very common in Hollywood films and on radio …


Influencing The Ftc To Update Disclosure Rules For The Social Media Era, Elizabeth A. Casale Jan 2019

Influencing The Ftc To Update Disclosure Rules For The Social Media Era, Elizabeth A. Casale

Mitchell Hamline Law Journal of Public Policy and Practice

No abstract provided.


Data Protection In An Increasingly Globalized World, Nicholas F. Palmieri Iii Jan 2019

Data Protection In An Increasingly Globalized World, Nicholas F. Palmieri Iii

Indiana Law Journal

With the rise of the internet in recent decades, it has become increasingly easy for various enterprises—including retailers, advertising agencies, and service providers—to acquire, use, and even share the personal details of their users. Such a trend is unlikely to decrease in the coming years; in fact, internet usage is only likely to increase as more and more people gain access to the internet. In the wakeof recent data breaches, including the now infamous breach of Equifax as well as the scandal involving Facebook and Cambridge Analytica, people are even more aware of the need for (and the risk of …


The Tortoise And The Hare Of International Data Privacy Law: Can The United States Catch Up To Rising Global Standards?, Matthew Humerick Jan 2018

The Tortoise And The Hare Of International Data Privacy Law: Can The United States Catch Up To Rising Global Standards?, Matthew Humerick

Catholic University Journal of Law and Technology

Technological developments spur the development of big data on a global scale. The breadth of data companies collect, maintain, process, and transmit affects nearly every country and organization around the world. Inherent to big data are issues of data protection and transfers to third countries. While many jurisdictions emphasize the importance of protecting consumer data, such as the European Union, others, like the United States, do not. To circumvent this issue, the United States and European Union contracted around data privacy standard discrepancies through the Safe Harbor Agreement, which eased cross-border data transfers. However, the Court of Justice of the …


The Times They Are A-Changin': Innovation In The Modern Music Festival, Molly R. Madonia Jan 2018

The Times They Are A-Changin': Innovation In The Modern Music Festival, Molly R. Madonia

Marquette Intellectual Property Law Review

Musical festivals are, and have always been, a way for friends and families to gather together to celebrate the latest and greatest in music, food, and entertainment. From large festivals in major metropolitan cities to small, intimate shows, music festivals have long been a source of enjoyment to music fans and a source of inspiration to up-and-coming musicians. This Article will explore innovation within the modern music festival, including legal, political, and operational changes that affect festivals across the country. So, as Emerson, Lake, and Palmer so eloquently expressed, “Welcome back my friends to the show that never ends, we’re …


“Hello…It’S Me. [Please Don’T Sue Me!]” Examining The Fcc’S Overbroad Calling Regulations Under The Tcpa, Marissa A. Potts Dec 2016

“Hello…It’S Me. [Please Don’T Sue Me!]” Examining The Fcc’S Overbroad Calling Regulations Under The Tcpa, Marissa A. Potts

Brooklyn Law Review

Americans have received unwanted telemarketing calls for decades. In response to a rapid increase in pre-recorded calls made using autodialer devices, Congress enacted the Telephone Consumer Protection Act (TCPA) in 1992. The TCPA imposes restrictions on calls made to consumers’ residences and wireless phones using autodialer devices, even if they are not telemarketing calls. Congress appointed the Federal Communications Commission (FCC) to prescribe rules and regulations to enforce the TCPA. In 2015, the FCC released an order that defined autodialer more broadly under the statute. Consequently, devices that have the potential to become autodialers in the future, even if they …


Need For Informed Consent In The Age Of Ubiquitous Human Testing, Caitlyn Kuhs Jan 2016

Need For Informed Consent In The Age Of Ubiquitous Human Testing, Caitlyn Kuhs

Loyola of Los Angeles Law Review

No abstract provided.


The Need For An International Convention On Data Privacy: Taking A Cue From The Cisg, Morgan Corley Jan 2016

The Need For An International Convention On Data Privacy: Taking A Cue From The Cisg, Morgan Corley

Brooklyn Journal of International Law

In light of the invalidation of the U.S.-EU Safe Harbor, along with the increase in sales of personal data as a commodity, data privacy has become a major concern amongst different nations. The lack of harmonization of data-privacy laws around the world continues to pose obstacles to the free flow of data across national borders. The free flow of data is, nonetheless, essential the international economy. As a result, nations continue to work together to try to create mechanisms by which data can be transferred across borders in a secure manner. This Note examines the current state of data-privacy law …


Pole Position: National Cable & Telecommunications Ass'n V. Gulf Power Co. And The Implications Of The Fcc's Pole Attachments Act Reading Higher Ground, Darci Deltoro Jul 2015

Pole Position: National Cable & Telecommunications Ass'n V. Gulf Power Co. And The Implications Of The Fcc's Pole Attachments Act Reading Higher Ground, Darci Deltoro

Akron Law Review

Both high-speed Internet access via commingled cables and wireless communications are complex and cutting edge topics in today’s world of ever changing information technology. This Note examines how these issues were addressed recently in Nat’l Cable & Telecomms. Ass’n, Inc. v. Gulf Power Co. (Gulf Power). Part II of this Note provides a review of the Pole Attachments Act, focusing particularly on using the purpose behind the Act to establish the minimum and maximum limitations of its coverage. Part III discusses the factual and procedural history of the Gulf Power case, first addressing the Court of Appeals for the Eleventh …


Beyond Technophobia: Lawyers’ Ethical And Legal Obligations To Monitor Evolving Technology And Security Risks, Timothy J. Toohey Jan 2015

Beyond Technophobia: Lawyers’ Ethical And Legal Obligations To Monitor Evolving Technology And Security Risks, Timothy J. Toohey

Richmond Journal of Law & Technology

Lawyers and technology have an uneasy relationship. Although some lawyers are early adapters, others take pride in ignoring technology because they believe it is alien to the practice of law. As Jody R. Westby observed, lawyers confronted with technology and security issues tend to have their “eyes glaze over” and “want to call in their ‘IT guy’ and go back to work.” But this technophobic attitude may no longer just be harmless conservatism. In the world of growing security risks, ignorance of technology may lead to violations of lawyers’ fundamental ethical duties of competence and confidentiality.


The Tangled Web: A Case Against New Generic Top-Level Domains, Joseph P. Smith Iii Jan 2014

The Tangled Web: A Case Against New Generic Top-Level Domains, Joseph P. Smith Iii

Richmond Journal of Law & Technology

If we had a reliable way to label our toys good and bad, it would be easy to regulate technology wisely. But we can rarely see far enough ahead to know which road leads to damnation.


Drawing The Line Between Competing Interests: Strengthening Online Data Privacy Protection In An Increasingly Networked World, Lori Chiu Mar 2013

Drawing The Line Between Competing Interests: Strengthening Online Data Privacy Protection In An Increasingly Networked World, Lori Chiu

San Diego International Law Journal

This article seeks to elucidate these issues and provide a roadmap for the U.S. government to create unified federal laws to provide the private sector with specific protocols regarding use and dissemination of consumer personal information. First, this article will provide an explanation of the U.S.’s current sector-by-sector approach to regulating personally identifying information and will provide a case study of the Federal Trade Commission’s (“FTC”) enforcement action against a social networking site in 2011 as one example of the FTC’s recent efforts at regulating online privacy. Next, this article will analyze the U.S.’s current challenge of judicial enforcement of …


Buy My Vote: Online Reviews For Sale, Kendall L. Short Jan 2013

Buy My Vote: Online Reviews For Sale, Kendall L. Short

Vanderbilt Journal of Entertainment & Technology Law

The Internet has granted consumers access to a wealth of information to use in researching products and services. A substantial portion of this information consists of online consumer reviews, which hold great influence over consumers' purchasing decisions due to their perceived honesty and independence from the company. The problem with relying on these reviews, however, is that real consumers may not be the authors; instead, companies often hire writers to fabricate reviews, known as "opinion spam," which can either be positive for the hiring company or negative toward an innocent competitor. Because these fake reviews are difficult to detect, both …


Behavioral Advertising: The Cryptic Hunter And Gatherer Of The Internet, Joanna Penn May 2012

Behavioral Advertising: The Cryptic Hunter And Gatherer Of The Internet, Joanna Penn

Federal Communications Law Journal

In an era where three out of every four Americans have Internet access, the term "surfing" has transformed from riding waves into running the risk of having private information gathered, stored, and disseminated-all without the user's knowledge or permission. This new found online practice, known as "behavioral advertising," is a veritable goldmine for those companies that know the game. But will the FTC or Congress soon make new rules concerning how to play? This Note begins by explaining the differences between behavioral targeting and retargeting and the techniques that the two methods use to collect data. This Note then explores …


Privacy Policies, Terms Of Service, And Ftc Enforcement: Broadening Unfairness Regulation For A New Era, G. S. Hans Jan 2012

Privacy Policies, Terms Of Service, And Ftc Enforcement: Broadening Unfairness Regulation For A New Era, G. S. Hans

Michigan Telecommunications & Technology Law Review

This Note examines website privacy policies in the context of FTC regulation. The relevant portion of Section 5 of the Federal Trade Commission Act, 15 U.S.C. § 45(a), uses the following language to define the scope of the agency's regulatory authority: "Unfair methods of competition in or affecting commerce, and unfair or deceptive acts or practices in or affecting commerce, are hereby declared unlawful." Specifically, this Note analyzes the FTC's power to regulate unfair practices (referred to as the FTC's "unfairness power") granted by Section 5, and also discusses the deception prong of Section 5, which allows the agency to …


A Path Toward User Control Of Online Profiling, Tracy A. Steindel Jan 2011

A Path Toward User Control Of Online Profiling, Tracy A. Steindel

Michigan Telecommunications & Technology Law Review

Online profiling is "the practice of tracking information about consumers' interests by monitoring their movements online." A primary purpose of online profiling is to "deliver advertising tailored to the individual's interests," a practice known as online behavioral advertising (OBA). In order to accomplish this, publishers and advertisers track a individual's online behavior using cookies and other means. Publishers and advertisers aggregate the information, often compile it with information from offline sources, and sort individuals into groups based on characteristics such as age, income, and hobbies. Advertisers can then purchase access to these consumer groups, controlling their selections with such specificity …


Better Late Than Never: How The Online Advertising Industry’S Response To Proposed Privacy Legislation Eliminates The Need For Regulation, Catherine Schmierer Jan 2011

Better Late Than Never: How The Online Advertising Industry’S Response To Proposed Privacy Legislation Eliminates The Need For Regulation, Catherine Schmierer

Richmond Journal of Law & Technology

Although Julie Matlin liked the shoes she saw on Zappos.com, she ultimately left the site without purchasing them. However, it was not the last time she would see that pair of shoes. For the next several days, the shoes followed Ms. Matlin to numerous other websites. “It was as if Zappos had unleashed a persistent salesmen who wouldn’t take no for an answer.” Understandably, Ms. Matlin found this “online stalking” disturbing, but she was more troubled when ads for her online dieting service started following her as well. She stated, “They are still following me around, and it makes me …


Busting Blocks: Revisiting 47 U.S.C. § 230 To Address The Lack Of Effective Legal Recourse For Wrongful Inclusion In Spam Filters, Jonathan I. Ezor Jan 2011

Busting Blocks: Revisiting 47 U.S.C. § 230 To Address The Lack Of Effective Legal Recourse For Wrongful Inclusion In Spam Filters, Jonathan I. Ezor

Richmond Journal of Law & Technology

Consider a company that uses e-mail to conduct a majority of its business, including customer and vendor communication, marketing, and filing official documents. After conducting business in this manner for several years, one day the company discovers that its most recent e-mails were not delivered to recipients using a major Internet Service Provider (“ISP”) because the company was recently listed on an automated block list as a sender of unwanted bulk commercial e-mail (“spam”).


Silence Of The Spam: Improving The Can-Spam Act By Including An Expanded Private Cause Of Action, David J. Rutenberg Jan 2011

Silence Of The Spam: Improving The Can-Spam Act By Including An Expanded Private Cause Of Action, David J. Rutenberg

Vanderbilt Journal of Entertainment & Technology Law

In the last decade, email spam has become more than just an annoyance for email users. Unsolicited messages now comprise more than 95 percent of all email sent worldwide. This costs US businesses billions of dollars in lost productivity each year. The US Congress passed the CAN-SPAM Act of 2003 to regulate the spam industry. Unfortunately, data show that spam only increased since the Act's passage. Part of the reason for this failure is that the Act only authorizes the Federal Trade Commission, state attorneys general, and Internet Service Providers to bring action under its provisions. Each of these authorized …


Future Imperfect: Googling For Principles In Online Behavioral Advertising, Brian Stallworth Apr 2010

Future Imperfect: Googling For Principles In Online Behavioral Advertising, Brian Stallworth

Federal Communications Law Journal

In a remarkably short time, Google, Inc. has grown from two people working in a rented garage to a pervasive Internet force. Much of Google's unprecedented success stems from online advertising sales which employ behavioral advertising techniques-techniques that track consumer behavior--thereby increasing relevance and decreasing the cost of reaching a targeted audience. In the same span that saw Google's inception and explosive online dominance, the Federal Trade Commission has struggled to define not only the privacy issues involved in online behavioral advertising, but also the practice of behavioral advertising itself. Freed from the restraints of comprehensive federal laws and restrictive …


Corporate Privacy Trend: The “Value” Of Personally Identifiable Information (“Pii”) Equals The “Value” Of Financial Assets, John T. Soma, J. Zachary Courson, John Cadkin Jan 2009

Corporate Privacy Trend: The “Value” Of Personally Identifiable Information (“Pii”) Equals The “Value” Of Financial Assets, John T. Soma, J. Zachary Courson, John Cadkin

Richmond Journal of Law & Technology

Corporate America’s increasing dependence on the electronic use of personally identifiable information (“PII”) necessitates a reexamination and expansion of the traditional conception of corporate assets. PII is now a commodity that companies trade and sell. As technological development increases, aspects of day-to-day business involving PII are performed electronically in a more cost effective and efficient manner. PII, which companies obtain at little cost, has quantifiable value that is rapidly reaching a level comparable to the value of traditional financial assets.


“Medical” Monitoring For Non-Medical Harms: Evaluating The Reasonable Necessity Of Measures To Avoid Identity Fraud After A Data Breach, James Graves Jan 2009

“Medical” Monitoring For Non-Medical Harms: Evaluating The Reasonable Necessity Of Measures To Avoid Identity Fraud After A Data Breach, James Graves

Richmond Journal of Law & Technology

In July 2005, “reformed” hacker Albert Gonzalez noticed an insecure wireless network at a Marshalls department store in Miami. After exploiting the vulnerability, Gonzalez and his accomplices installed programs that captured credit card numbers. They stored the credit card numbers on servers in Latvia and Ukraine, created ATM cards using some of the numbers, and used those cards to withdraw hundreds of thousands of dollars in cash. Fifteen months later, Marshalls’ parent company, TJX, announced that forty-five million of its customers’ credit card numbers had been exposed to the thieves.


E-Commerce: Legal Issues Of The Online Retailer In Virginia, Jonathan D. Frieden, Sean Patrick Roche Jan 2006

E-Commerce: Legal Issues Of The Online Retailer In Virginia, Jonathan D. Frieden, Sean Patrick Roche

Richmond Journal of Law & Technology

The popularity and growth of online retailing, now in its tenth year, has shattered experts’ expectations. “Online sales in the United States grew twenty-four percent last year, to about $90 billion, and online retailing now accounts for nearly five percent of all retail sales.”


Unleashing “Instant Messaging” From Regulatory Oversight, Fernando R. Laguarda Jan 2004

Unleashing “Instant Messaging” From Regulatory Oversight, Fernando R. Laguarda

Richmond Journal of Law & Technology

America Online, Inc. (“AOL”) and Time Warner Inc. announced their intention to merge on January 10, 2000. At that time, there was a great deal of excitement about combining these two companies and harnessing the power of an increasingly broadband Internet. In addition to the Federal Trade Commission (“FTC”) and Federal Communications Commission (“FCC”), more than one thousand local communities conducted their own reviews of the merger. The FTC identified “open access” to the Time Warner Cable platform as an issue meriting specific relief.


Cyberian Signals, Steven A. Hetcher Jan 2002

Cyberian Signals, Steven A. Hetcher

University of Richmond Law Review

In Law and Social Norms, Eric Posner offers an original and important theory of the emergence of norms. According to Posner, norms are collections of signals. He develops his signaling account in a variety of contexts, including criminal law, family law, political participation, and racial discrimination. This article extends Posner's theory to cyberspace, a domain of social organization not touched on in Posner's book. In particular, I will test Posner's theory by examining how well it explains the emergence of Web site privacy norms. Part One will examine signaling theory. Part Two will explore privacy norms in some detail, and …


Cyberjacking, Mouse Trapping, And The Ftc Act: Are Federal Consumer Protection Laws Helping Or Hurting Online Consumers?, Kenneth Sanney Jan 2001

Cyberjacking, Mouse Trapping, And The Ftc Act: Are Federal Consumer Protection Laws Helping Or Hurting Online Consumers?, Kenneth Sanney

Vanderbilt Journal of Entertainment & Technology Law

Only the Federal Trade Commission (FTC) can bring a federal cause of action against a company whose business practices or actions deceive consumers. However, the FTC's power is limited; it can intervene on behalf of consumers only when there is a pattern of misconduct by the business that threatens the public interest. But where the scams themselves are difficult to spot, patterns may be virtually impossible to establish. Moreover, even successful FTC actions may yield little in the way of preventative or compensatory benefit for the individual user.

My aim in this Note, therefore, is to offer one possible means …


Online Auction Fraud: Are The Auction Houses Doing All They Should Or Could To Stop Online Fraud?, James M. Snyder Mar 2000

Online Auction Fraud: Are The Auction Houses Doing All They Should Or Could To Stop Online Fraud?, James M. Snyder

Federal Communications Law Journal

In April 1998, the FTC released a consumer alert pertaining to the increasing problem of online auction fraud. As the number of online auction participants increased, online auction fraud was becoming more prevalent. The FTC requested comments regarding methods that would be appropriate for curbing the increase in consumer deception. Many in the online auction industry proposed voluntary self-regulation. This Note exposes the inadequacy of industry self-regulation by analogizing online auction abuse with the misuse and near downfall of the 900-number industry. This Note proposes that only a regime of strict industry guidelines that the FTC initiates will halt online …


Consumer Privacy On The Internet, Andrew Shen Jan 2000

Consumer Privacy On The Internet, Andrew Shen

Richmond Journal of Law & Technology

If we do not bear the loss of this privacy then the prices would be passed along to consumers anyway. We're between a rock and a hard place there's nowhere that we can go. But I think we can be more optimistic than that and I think we can preserve privacy and I think we can further growth of electronic commerce. So let me begin with the consumer perspective. I would like to start with a trend that Mike has already done a good job of starting us out on, and that is the current popularity of personalization and customization. …


Who Leads At Halftime?: Three Conflicting Visions Of Internet Privacy Policy, Karl D. Belgum Jan 1999

Who Leads At Halftime?: Three Conflicting Visions Of Internet Privacy Policy, Karl D. Belgum

Richmond Journal of Law & Technology

Concern about privacy on the Internet runs high, but the prescriptions for treatment vary widely. Privacy advocates seek different goals when formulating policy proposals. Some seek to protect individuals and society from the effects of loss of privacy, including the loss of human dignity. Others seek to encourage the development of online markets in personal information, so that consumers can profit from their own information, rather than giving it away. Still, others seek primarily to promote the growth of e-commerce, and see privacy fears as a threat to that goal. These goals are fundamentally inconsistent, and that inconsistency is obscured …