Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

2020

Brooklyn Law School

Computer Law

Keyword
Publication

Articles 1 - 7 of 7

Full-Text Articles in Law

Data Governance And The Elasticity Of Sovereignty, Roxana Vatanparast Dec 2020

Data Governance And The Elasticity Of Sovereignty, Roxana Vatanparast

Brooklyn Journal of International Law

Traditionally, the world map and territorially bounded spaces have dominated the ways in which we imagine how states govern, make laws, and exercise their authority. Under this conception, reflected in traditional international law principles of territorial sovereignty, each state would have exclusive authority to govern and make laws over everything concerning the land within its borders. Yet developments like the proliferation of data flows, which are based on divisible, mobile, and interconnected components of data, are not territorially bounded. This presents a challenge to the traditional bases for territorial sovereignty and jurisdiction under international law, which some scholars claim is …


Easing The Burdens Of A Patchwork Approach To Data Privacy Regulation In Favor Of A Singular Comprehensive International Solution—The International Data Privacy Agreement, Scott Resnick Dec 2020

Easing The Burdens Of A Patchwork Approach To Data Privacy Regulation In Favor Of A Singular Comprehensive International Solution—The International Data Privacy Agreement, Scott Resnick

Brooklyn Journal of International Law

Data privacy has become one of the premier hot-button issues in today’s increasingly digital human experience. Legislatures around the globe have attempted to act swiftly in an effort to safeguard the highly coveted personal information of their citizens and combat misuse at the hands of international businesses operating with an online presence. Since the European Union’s enactment of the General Data Protection Regulation (GDPR) in 2018, countries around the globe have been grappling with how best to replicate the EU’s leading data privacy regulation while providing the same or greater level of transparency into data collection practices. While a mere …


The Abraham L. Pomerantz Lecture: Investor Protection In The Digital Age, Kara M. Stein Jun 2020

The Abraham L. Pomerantz Lecture: Investor Protection In The Digital Age, Kara M. Stein

Brooklyn Law Review

On September 24, 2019, Kara M. Stein delivered the following keynote address at the 17th annual Abraham L. Pomerantz Lecture at Brooklyn Law School. The Pomerantz Lecture is sponsored by the Brooklyn Law Review and the Center for the Study of Business Law and Regulation at Brooklyn Law School. Kara M. Stein served as Commissioner of the U.S. Securities and Exchange Commission (SEC) from August 9, 2013 until January 2, 2019. Commissioner Stein was appointed by President Barack Obama and confirmed unanimously by the U.S. Senate.


Debugging Irs Notice 2014-21: Creating A Viable Cryptocurrency Taxation Plan, Alex Ankier Jun 2020

Debugging Irs Notice 2014-21: Creating A Viable Cryptocurrency Taxation Plan, Alex Ankier

Brooklyn Law Review

In 2014, the Internal Revenue Service (IRS) issued Notice 2014-21 in an attempt to address issues with cryptocurrency taxation, essentially reaching the conclusion that cryptocurrency must be treated like property for purposes of taxation. In the time since the IRS pronouncement, several academics have called for an alternative treatment known as “currency treatment.” Each treatment inadequately addresses the comprehensive issues surrounding cryptocurrency because they offer wholesale treatment to nuanced issues with valid concerns from each side. To truly allow this emerging industry to flourish and gain societal acceptance, artful policymaking is required. This note provides an example of such policymaking. …


The Criminal, Regulatory, And Civil Issues Surrounding Intellectual Property And Cybersecurity, Ernest Edward Badway, Christie Mcguinness Jun 2020

The Criminal, Regulatory, And Civil Issues Surrounding Intellectual Property And Cybersecurity, Ernest Edward Badway, Christie Mcguinness

Brooklyn Journal of Corporate, Financial & Commercial Law

Cyber-attacks have affected all organizations and individual consumers. Dissemination of relevant information and attention to strong information security practices is an important tool in fighting this cyber “pandemic.” Additionally, the legal and regulatory liability companies face from cyber-attacks as well as general strategies and practical solutions companies may implement to protect against cyber-intrusions and respond effectively in the event of an attack are considered. There are many iterations of cyber-crime, and we address the various methods cybercriminals use and the many ways cyber-attacks can take place, as well as the entities and victims affected. Moreover, the legal liability and regulatory …


Saving Small Business From The Big Impact Of Data Breach: A Tiered Federal Approach To Data Protection Law, Nadia Udeshi Jun 2020

Saving Small Business From The Big Impact Of Data Breach: A Tiered Federal Approach To Data Protection Law, Nadia Udeshi

Brooklyn Journal of Corporate, Financial & Commercial Law

Small businesses provide a significant positive impact on the American economy. However, the current fragmented federal and state data protection and breach notification legal scheme puts the viability of small businesses at risk. While the probability of data breaches occurring continues to increase, small businesses lack the financial and technological resources to contend with the various state and federal laws that impose different monetary penalties and remedial requirements in the event of such breaches. To preserve the viability of small businesses, Congress should enact a centralized, multi-tiered federal data protection and breach notification framework that preempts state laws, imposes minimum …


The Common Law Of Cyber Trespass, Michael J. O'Connor Apr 2020

The Common Law Of Cyber Trespass, Michael J. O'Connor

Brooklyn Law Review

Right now, if executives in California and Virginia each bribe a competitor’s disloyal employee to steal a trade secret from the competitor’s servers, under the federal Computer Fraud and Abuse Act (CFAA), the Government can charge one executive but not the other. Courts decide these cases differently due to the widening circuit split over the CFAA term “without authorization.” Neither the Supreme Court nor Congress has shown interest in resolving the split over authorization. Even more concerning is the suggestion that they can’t resolve it; the statute addresses too many potential scenarios for a single definition to end all debate. …