Open Access. Powered by Scholars. Published by Universities.®

Administrative Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Internet Law

Brooklyn Law School

Keyword
Publication Year
Publication

Articles 1 - 10 of 10

Full-Text Articles in Administrative Law

How (Not) To Deal With The Bubble Effect In Cyberspace: The Case Of The Eu And Digital Services Act, João Tornada Dec 2023

How (Not) To Deal With The Bubble Effect In Cyberspace: The Case Of The Eu And Digital Services Act, João Tornada

Brooklyn Journal of International Law

Deliberative democracies are based on an ideal process of speech and dialogue that fosters an “uninhibited, robust, and wide-open” public discourse sphere. In cyberspace, social networks and search engine platforms largely operate with recommender systems that tailor content according to the users' interests and online behavior (“profiling”), thus segregating them from different points of view (“bubble effect”). While this personalization of content is particularly efficient to promote commercial goods and services, when it comes to information of common interest, especially on political matters, it undermines consensus-building dialogue and threatens democratic ideals. The theory of a free “marketplace of ideas” justifies …


Enough Excuses On Drug Importation: A New Transnational Paradigm For Fda Regulation And Lower Us Drug Prices, Gabriel Levitt Dec 2023

Enough Excuses On Drug Importation: A New Transnational Paradigm For Fda Regulation And Lower Us Drug Prices, Gabriel Levitt

Brooklyn Journal of International Law

The US Food and Drug Administration (FDA), which enforces drug safety laws, asserts that under most circumstances the importation of prescription drugs is illegal. Yet because of high drug prices in the United States, over the past couple of decades, tens of millions of Americans have imported prescription drugs for personal use. For many, this was their only way to afford them. A unique array of federal laws, regulations, and policies, including the de facto decriminalization of the practice of personal drug importation, have in effect permitted personal drug importation. The same exceptions, however, are not available for commercial drug …


The Rise Of Ada Title Iii: How Congress And The Department Of Justice Can Solve Predatory Litigation, Sarah E. Zehentner Sep 2021

The Rise Of Ada Title Iii: How Congress And The Department Of Justice Can Solve Predatory Litigation, Sarah E. Zehentner

Brooklyn Law Review

The Americans with Disabilities Act (ADA) was enacted in 1990 to afford equal opportunities for individuals with disabilities. Title III of the ADA, specifically, was enacted to afford disabled individuals equal access to places of public accommodation. When the ADA was enacted, the internet was still in its infancy and Congress did not contemplate the need for governing accessibility to websites of public accommodations. Today, the internet has become embedded in virtually every aspect of our lives, yet there are still millions of disabled individuals who are unable to equally access the websites of American businesses. With the ADA being …


Throw The Book At Them: Why The Ftc Needs To Get Tough With Influencers, Christopher Terry, Eliezer Joseph Silberberg, Stephen Schmitz Jun 2021

Throw The Book At Them: Why The Ftc Needs To Get Tough With Influencers, Christopher Terry, Eliezer Joseph Silberberg, Stephen Schmitz

Journal of Law and Policy

The Federal Trade Commission is an administrative agency that has traditionally been aggressive when deploying its delegated authority. At the core of these actions is the FTC’s interpretive definition of deception as based upon a reasonable consumer standard. Specifically, the commission has regularly used Section 5(a) of the FTC Act, in tandem with its interpretive definition of deception, as a sword in a variety of contexts, including enforcement actions for deceptive advertising, endorsements, and claim substantiation against a range of industries. These include successfully brought actions or consent decrees obtained in enforcement proceedings against powerful economic entities, including Google and …


Door Shut And Ears Plugged: How Consumer Reporting Casts Identity Theft Victims Out Of Financial Society And How The Law Can Be Harmonized To Bring Them Back In, Ryan Bolger Dec 2020

Door Shut And Ears Plugged: How Consumer Reporting Casts Identity Theft Victims Out Of Financial Society And How The Law Can Be Harmonized To Bring Them Back In, Ryan Bolger

Brooklyn Journal of Corporate, Financial & Commercial Law

Consumer Reporting Agencies (CRAs) are the gatekeepers to the American economy. As the chief informants for prospective lenders, landlords, and employers, they exert immense power over the day-to-day decisions of who gets what. Despite these high stakes, the CRAs run consumer reporting as an automated electronic process that causes a lot of reporting errors, disqualifying consumers from essential goods, services, and opportunities. This is painfully true in the context of identity theft, where perverse incentives pollute the integrity of consumer reporting, piling undue harm onto identity theft victims. The law provides a remedy for this problem, but circuit courts are …


Debugging Irs Notice 2014-21: Creating A Viable Cryptocurrency Taxation Plan, Alex Ankier Jun 2020

Debugging Irs Notice 2014-21: Creating A Viable Cryptocurrency Taxation Plan, Alex Ankier

Brooklyn Law Review

In 2014, the Internal Revenue Service (IRS) issued Notice 2014-21 in an attempt to address issues with cryptocurrency taxation, essentially reaching the conclusion that cryptocurrency must be treated like property for purposes of taxation. In the time since the IRS pronouncement, several academics have called for an alternative treatment known as “currency treatment.” Each treatment inadequately addresses the comprehensive issues surrounding cryptocurrency because they offer wholesale treatment to nuanced issues with valid concerns from each side. To truly allow this emerging industry to flourish and gain societal acceptance, artful policymaking is required. This note provides an example of such policymaking. …


“Estonia’S Gift To The World”: The Implementation Of A Blockchain Protocol For Corporate Governance In New York, Sydney Lauren Abualy Jun 2020

“Estonia’S Gift To The World”: The Implementation Of A Blockchain Protocol For Corporate Governance In New York, Sydney Lauren Abualy

Brooklyn Journal of Corporate, Financial & Commercial Law

The traditional procedures of corporate governance are not designed to resolve issues related to close outcomes of corporate votes, empty voting practices, the proxy voting protocol, verification of shareholder identities, and access to corporate records. Blockchain technology allows all corporate shareholders to participate in corporate governance more conveniently, with increased transparency, on a secure network. Estonia sought to revolutionize corporate governance by facilitating the development of a blockchain based e-voting protocol for shareholders of companies listed on the Tallinn Stock Exchange to vote in shareholder meetings. After unsuccessful attempts, New York stands well behind other states, such as Delaware, in …


Unmasking The Villain: Exposing Scammers’ Identities To Defeat Harmful Calls, Katherine Teng Jun 2020

Unmasking The Villain: Exposing Scammers’ Identities To Defeat Harmful Calls, Katherine Teng

Brooklyn Journal of Corporate, Financial & Commercial Law

Since 1991, Congress has attempted to limit unwanted phone calls through legislative efforts. However, past and current laws remain ineffective as scam call complaints continue to increase while the harm of these calls remains severe. Currently, the laws affecting telecommunication regulation focus on reactive measures rather than preventative solutions. Most recently, Congress has passed the Telephone Robocall Abuse Criminal Enforcement and Deterrence Act, which will require telecommunication companies to implement SHAKEN/STIR technology to end scam calls before they reach consumers. While this is the most progressive legislation addressing scam calls, this Note will suggest that phone numbers be registered to …


Saving Small Business From The Big Impact Of Data Breach: A Tiered Federal Approach To Data Protection Law, Nadia Udeshi Jun 2020

Saving Small Business From The Big Impact Of Data Breach: A Tiered Federal Approach To Data Protection Law, Nadia Udeshi

Brooklyn Journal of Corporate, Financial & Commercial Law

Small businesses provide a significant positive impact on the American economy. However, the current fragmented federal and state data protection and breach notification legal scheme puts the viability of small businesses at risk. While the probability of data breaches occurring continues to increase, small businesses lack the financial and technological resources to contend with the various state and federal laws that impose different monetary penalties and remedial requirements in the event of such breaches. To preserve the viability of small businesses, Congress should enact a centralized, multi-tiered federal data protection and breach notification framework that preempts state laws, imposes minimum …


Like A Bad Neighbor, Hackers Are There: The Need For Data Security Legislation And Cyber Insurance In Light Of Increasing Ftc Enforcement Actions, Jennifer Gordon Dec 2016

Like A Bad Neighbor, Hackers Are There: The Need For Data Security Legislation And Cyber Insurance In Light Of Increasing Ftc Enforcement Actions, Jennifer Gordon

Brooklyn Journal of Corporate, Financial & Commercial Law

Privacy has come to the forefront of the technology world as third party hackers are constantly attacking companies for their customers’ data. With increasing instances of compromised customer information, the Federal Trade Commission (FTC) has been bringing suit against companies for inadequate data security procedures. The FTC’s newfound authority to bring suit regarding cybersecurity breaches, based on the Third Circuit’s decision in FTC v. Wyndham Worldwide Corp., is a result of inaction—Congress has been unable to pass sufficient cybersecurity legislation, causing the FTC to step in and fill the void in regulation. In the absence of congressional action, this self-proclaimed …