Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Amazon; Second Restatement of Torts; distribution chain; product defects; injury; consumers; sellers; Section 402a; marketplace; insolvency; internet; product liability; Oberdorf v. Amazon.com; Communications Decency Act; Third Circuit; Third-party sellers; Fullfillment by Amazon; FBA; Business Solutions Agreement; BSA; price parity; third-party vendors; sponsorship; Amazon's choice; Best Seller; Prime; keyword bids; supply chain; Buy Box; FDA; Food and Drug Administration (1)
- Cyber-attacks; cyber-crime; information security; cybersecurity; Ponemon Institute; data sharing; data breach; Securities Exchange Commission; SEC; hacking; information technology system; phishing; Department of Justice; DOJ; cybercriminal; malware; spyware; IT; Denial of Service Attacks; DoS; DDoS; Distributed Denial of Service campaign; third-party vendor attack; Dumpster Diving; Economic Espionage; Trade Secret Misappropriation; Office of Compliance Inspections and Examinations; OCIE; Financial Industry Regulatory Authority; FINRA; broker-dealer; Risk Alert; Regulation S-P; Gramm-Leach-Bliley Act; GLBA; Computer Fraud and Abuse Act; CFAA; protected computer; United States v. Valle; Electronic Communications Privacy Act; ECPA; The Wiretap Act; The Stored Communications Act; SCA; The Pen Registry Act; Federal Trade Commission; FTC; Federal Deposit Insurance Corporation; FDIC; Federal Reserve; Economic Espionage Act; EEA; Defend Trade Secrets Act; DTSA; Huawei Technologies Co.; Cybersecurity Disclosure Act of 2017 and 2018; common law; class action; standing; Rule 23(a); 23(b)(3); negligence; breach of contract; derivative shareholder suits; Wyndham Worldwide Corporation; Regulatory Systems Compliance and Integrity; SCI; Regulation S-ID; Regulation S-P; General Disclosure Provisions; 503(c); Regulation S-K; Description of Business; financial statements; Framework for Improving Critical Infrastructure Cybersecurity; compliance; disaster plan; plaintext; ciphertext; crisis management; due diligence; The Protecting Cyber Networks Act; PCNA; National Cybersecurity Protection Advancement Act of 2015; NCPAA; The Cybersecurity Information Sharing Act; CISA; Privacy and Civil Liberties Oversight Board; Department of Homeland Security; DHS; National Cybersecurity and Communications Integration Center; NCIC; U.S. Chamber of Commerce Leadership Council; (1)
- Data breach; data protection; small businesses; breach notification framework; cybersecurity; MyBizHomepage; cyberattack; Code Spaces; Software as a Service; SaaS; cybercriminals; data security; Great Depression; World War II; Small Business Act of 1953; SBA; Small Business Administration; Privacy Rights Clearinghouse; ChoicePoint; Personally Identifiable Information; PII; consumer credit reporting information; Protected Health Information; PHI; Gramm-Leach-Bliley Act; GLBA; Bank Holding Company Act of 1956; Health Insurance Portability and Accountability Act of 1996; HIPAA; Federal Trade Commission; FTC; Fair Credit Reporting Act; civil penalties; Commonwealth v. Haney; Massachusetts Security Breaches Law; In re Yahoo! Inc. Customer Data Security Breach Litigation; California Customer Records Act; attorney general; Community Bank of Trenton v. Schnuck Markets; In re Target Corp. Customer Data Security Breach Litigation; Personal Data Privacy and Security Act; Personal Data Privacy and Security Act; Department of Homeland Security; National Institute of Standards and Technology (NIST) Small Business Cybersecurity Act; Cybersecurity Enhancement Act of 2014; Small Business Reauthorization Act of 1997; Historically Underutilized Business Zones; HUBZone; European Union; General Data Protection Regulation; GDPR; Privacy by Design; California Consumer Privacy Act; CCPA; liability insurance; burden-shifting (1)
- Estonia; blockchain; corporate governance; shareholders; New York; Delaware; cyber security; voting; government services; E-Estonia; encryption; Nasdaq; e-Residency; proxy; annual meeting; securities; ledger; permissioned; unpermissioned; tokens; vote coins; wallet; corporation laws; board of directors; Depository Trust Company; DTC; 14a-13; Exchange Act; NOBO; SEC; derivative; shareholder activism; Procter & Gamble; Nelson Peltz (1)
- Patent; Section 101; subject matter eligibility; subject matter eligibility guidance; 2019 guidance; natural phenomena; judicial exceptions; abstract ideas; laws of nature (1)
-
- Patents; trade secrets; intellectual property; medical device; data; information; innovation; commercialization; biotechnology; entrepreneurship; investment (1)
- Scammers; fraud; phone calls; scam calls; Securities Law; SHAKEN/STIR; personal information; Telephone Consumer Protection Act; TCPA; Federal Trade Commission; FTC; National Do Not Call Registry; Voice over IP; VoIP; Internet Protocol; robocalls; spoofing; Federal Communications Commission; FCC; caller ID; Truth in Caller ID Act; telecommunication; T-Mobile; Verizon; Sprint; AT&T; Scam ID; Scam Block; Call Filter; telemarketers; robocalls; Bolstering Online Transparency Act; BOT Act; Stopping Bad Robocalls Act; SBR; Internet Service Providers; ISPs; spam; Telephone Robocall Abuse Criminal Enforcement and Deterrence Act; TRACED Act; digital signature; Subscriber Identification Module (1)
- Securities exchange commission; SEC; DOJ; Department of Justice; cryptocurrency; enforcement; investors; ponzi scheme; prosecution; defendant; section 5(a); Section 5(c); Securities Act of 1933; Facebook; Libra; banking; bitcoin; Federal Trade Commission; FTC; Department of the Treasury; dark web; futures; CME Group; Intercontinental exchange; New York Stock Exchange; blockchain; Warren Buffet; United States v. Ulbricht; Silk Road; Dread Pirate Roberts; Internal Revenue Service; Securities and Exchange Commission; SEC; Initial Coin Offerings; ICO; SEC v. W.J. Howey Co.; Howey test; Jump-Start Our Business Startups Act; JOBS Act; penny stocks; SEC v. Blockvest LLC; Blockchain Exchange Commission; United States v. McDonnell; wire fraud; SEC v. Natural Diamonds Investment Co.; mining; United States v. Fowler; DAO Report; Ether; Securities and Exchange Act of 1934; FBI; U.S. Attorney; Section 17(a); Section 10(b); Titanium Blockchain; Exchange Traded Fund; ETF; Regulation A+; foreign issuer; Division of Corporate Finance; bad actor; Rule 262; Winklevoss; Coinbase; Financial Action Task Force; FATF; FINRA; Financial Industry Regulatory Authority; SRO; self-regulatory organization (1)
- Sovereignty; jurisdiction; territoriality; data; technology; international law; state; border; elasticity; cross-border; transfer; regulations; privacy; China; European Union; United States; governance; conceptualization; theory; extraterritoriality; globalization; boundaries; GDPR; protection; digital; MLAT; internet; server; controller; processor; comparative; analysis; Cybersecurity Law; location; localization; infrastructure; network; transnational; CJEU; electronic evidence; provider; communication; CLOUD Act; SCA; DPD; reterritorization; representative; scope; mechanism; approach; dimension; cyberspace; Balkanization; fragmentation; conception; configuration; information; authority; political (1)
- Trian Fund Management; In Re Dole Food Company; single-step merger; Delaware Blockchain Initiative; UCC; Ethereum; BitLicense; virtual currency; New York Stock Exchange; (1)
- Publication
- Publication Type
Articles 1 - 10 of 10
Full-Text Articles in Law
Data Governance And The Elasticity Of Sovereignty, Roxana Vatanparast
Data Governance And The Elasticity Of Sovereignty, Roxana Vatanparast
Brooklyn Journal of International Law
Traditionally, the world map and territorially bounded spaces have dominated the ways in which we imagine how states govern, make laws, and exercise their authority. Under this conception, reflected in traditional international law principles of territorial sovereignty, each state would have exclusive authority to govern and make laws over everything concerning the land within its borders. Yet developments like the proliferation of data flows, which are based on divisible, mobile, and interconnected components of data, are not territorially bounded. This presents a challenge to the traditional bases for territorial sovereignty and jurisdiction under international law, which some scholars claim is …
Patents, Information, And Innovation, Brenda M. Simon
Patents, Information, And Innovation, Brenda M. Simon
Brooklyn Law Review
Inventors and commercialization partners often rely on patents to facilitate the exchange of sensitive information. Most scholarship in this area has focused on the areas of software and biotechnology. To provide a richer description of the role of patents in the innovative process, this project evaluates the existing literature and sets forth examples drawn from a series of interviews with professionals from the largely-overlooked medical device industry. The limited analysis of the medical device industry has focused on the largest few dozen firms—as publicly-traded entities, a great deal of data about them is readily available. Small medical device companies are …
A Taxonomy Of Cryptocurrency Enforcement Actions, Peter J. Henning
A Taxonomy Of Cryptocurrency Enforcement Actions, Peter J. Henning
Brooklyn Journal of Corporate, Financial & Commercial Law
This article looks at how the Securities and Exchange Commission (SEC) and the Department of Justice (DOJ) have pursued cases involving cryptocurrencies. A number of prosecutions have been brought against defendants who misled investors into believing that they were obtaining cryptocurrencies when in fact there were simply false statements and schemes to defraud, such as Ponzi schemes. When a company has attempted to issue a cryptocurrency to investors, the SEC has relied on Section 5(a) and 5(c) of the Securities Act of 1933 to require that issuers file a registration statement with the Commission. This is not an easy process …
The Criminal, Regulatory, And Civil Issues Surrounding Intellectual Property And Cybersecurity, Ernest Edward Badway, Christie Mcguinness
The Criminal, Regulatory, And Civil Issues Surrounding Intellectual Property And Cybersecurity, Ernest Edward Badway, Christie Mcguinness
Brooklyn Journal of Corporate, Financial & Commercial Law
Cyber-attacks have affected all organizations and individual consumers. Dissemination of relevant information and attention to strong information security practices is an important tool in fighting this cyber “pandemic.” Additionally, the legal and regulatory liability companies face from cyber-attacks as well as general strategies and practical solutions companies may implement to protect against cyber-intrusions and respond effectively in the event of an attack are considered. There are many iterations of cyber-crime, and we address the various methods cybercriminals use and the many ways cyber-attacks can take place, as well as the entities and victims affected. Moreover, the legal liability and regulatory …
The Heavy Hand Of Amazon: A Seller Not A Neutral Platform, Edward J. Janger, Aaron D. Twerski
The Heavy Hand Of Amazon: A Seller Not A Neutral Platform, Edward J. Janger, Aaron D. Twerski
Brooklyn Journal of Corporate, Financial & Commercial Law
Since the adoption of Section 402A of the Second Restatement of Torts, every party in a product’s distribution chain has been potentially liable for injuries caused by product defects. Consumers who buy from reputable sellers are almost always guaranteed to have a solvent defendant if injured by a product defect. Amazon, though responsible for a vast number of retail sales, has sought to avoid liability by claiming that it is not a seller but a neutral platform that merely facilitates third-party sales to consumers. With two significant exceptions, most courts have sided with Amazon and concluded that Amazon is not …
“Estonia’S Gift To The World”: The Implementation Of A Blockchain Protocol For Corporate Governance In New York, Sydney Lauren Abualy
“Estonia’S Gift To The World”: The Implementation Of A Blockchain Protocol For Corporate Governance In New York, Sydney Lauren Abualy
Brooklyn Journal of Corporate, Financial & Commercial Law
The traditional procedures of corporate governance are not designed to resolve issues related to close outcomes of corporate votes, empty voting practices, the proxy voting protocol, verification of shareholder identities, and access to corporate records. Blockchain technology allows all corporate shareholders to participate in corporate governance more conveniently, with increased transparency, on a secure network. Estonia sought to revolutionize corporate governance by facilitating the development of a blockchain based e-voting protocol for shareholders of companies listed on the Tallinn Stock Exchange to vote in shareholder meetings. After unsuccessful attempts, New York stands well behind other states, such as Delaware, in …
Unmasking The Villain: Exposing Scammers’ Identities To Defeat Harmful Calls, Katherine Teng
Unmasking The Villain: Exposing Scammers’ Identities To Defeat Harmful Calls, Katherine Teng
Brooklyn Journal of Corporate, Financial & Commercial Law
Since 1991, Congress has attempted to limit unwanted phone calls through legislative efforts. However, past and current laws remain ineffective as scam call complaints continue to increase while the harm of these calls remains severe. Currently, the laws affecting telecommunication regulation focus on reactive measures rather than preventative solutions. Most recently, Congress has passed the Telephone Robocall Abuse Criminal Enforcement and Deterrence Act, which will require telecommunication companies to implement SHAKEN/STIR technology to end scam calls before they reach consumers. While this is the most progressive legislation addressing scam calls, this Note will suggest that phone numbers be registered to …
Saving Small Business From The Big Impact Of Data Breach: A Tiered Federal Approach To Data Protection Law, Nadia Udeshi
Saving Small Business From The Big Impact Of Data Breach: A Tiered Federal Approach To Data Protection Law, Nadia Udeshi
Brooklyn Journal of Corporate, Financial & Commercial Law
Small businesses provide a significant positive impact on the American economy. However, the current fragmented federal and state data protection and breach notification legal scheme puts the viability of small businesses at risk. While the probability of data breaches occurring continues to increase, small businesses lack the financial and technological resources to contend with the various state and federal laws that impose different monetary penalties and remedial requirements in the event of such breaches. To preserve the viability of small businesses, Congress should enact a centralized, multi-tiered federal data protection and breach notification framework that preempts state laws, imposes minimum …
A Logical And Lawful Application Of § 101 Jurisprudence: The Uspto’S 2019 Subject Matter Eligibility Guidance, Dustin Luettgen
A Logical And Lawful Application Of § 101 Jurisprudence: The Uspto’S 2019 Subject Matter Eligibility Guidance, Dustin Luettgen
Journal of Law and Policy
In recent years, 35 U.S.C. § 101 has been a topic of great concern within the patent bar due to uncertainty surrounding the patentability of inventions drawn to the three judicial exceptions to patent-eligible subject matter: abstract ideas, natural phenomena, and laws of nature. In response to this lingering uncertainty and in an effort to provide for the lawful and consistent application of patent law, the United States Patent and Trademark Office released guidance as to the subject matter eligibility of claims drawn to judicial exceptions. This Article provides a review of § 101 jurisprudence, summarizes the USPTO Guidance, and …
Why We (Probably) Must Deliberately Infect, Adam J. Kolber
Why We (Probably) Must Deliberately Infect, Adam J. Kolber
Faculty Scholarship
No abstract provided.