Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Americans With Disabilities Act; ADA; Title III; website accessibility; place of public accommodation; public accommodation; circuit split; predatory litigation; WCAG (1)
- Consumer Reporting Agencies; CRA; circuit split; consumer; fraud; Federal Bureau of Investigation; Fair Credit Reporting Act; FCRA; credit reporting; debt collector; consumer report; identity theft; e-OSCAR; fraudent behavior; dispute resolution; Pennsylvania Higher Education Agency Services; PHEAA; Experian; Equifax; hacker; hacking; financing; credit; banking; Consumer Credit Reporting Reform Act of 1996; Automated Consumer Dispute Verification; ACDV; duty of care; cause of action; remedy; private information; Fair and Accurate Credit Transactions Act; FACTA; fraud alert; Consumer Financial Protection Bureau; CFPB; Cushman v. Trans Union Corp.; Brill v. Trans Union; Seventh Circuit; Third Circuit; jury; Henson v. CSC Credit Services; Blackwell v. Chex Systems; furnisher; consumer debt; creditor's tradelines; DeAndrade v. Trans Union LLC; Carvalho v. Equifax Information Services; Ninth Circuit; Bailey v. SCANA Energy Marketing; harmonization; harmonize; (1)
- Cryptocurrency taxation; cryptocurrency; IRS Notice 2014-21; cryptocurrency mining; property method; currency method; currency volatility; digital wallet; internal revenue service; property basis; straddles; tax avoidance (1)
- Data breach; data protection; small businesses; breach notification framework; cybersecurity; MyBizHomepage; cyberattack; Code Spaces; Software as a Service; SaaS; cybercriminals; data security; Great Depression; World War II; Small Business Act of 1953; SBA; Small Business Administration; Privacy Rights Clearinghouse; ChoicePoint; Personally Identifiable Information; PII; consumer credit reporting information; Protected Health Information; PHI; Gramm-Leach-Bliley Act; GLBA; Bank Holding Company Act of 1956; Health Insurance Portability and Accountability Act of 1996; HIPAA; Federal Trade Commission; FTC; Fair Credit Reporting Act; civil penalties; Commonwealth v. Haney; Massachusetts Security Breaches Law; In re Yahoo! Inc. Customer Data Security Breach Litigation; California Customer Records Act; attorney general; Community Bank of Trenton v. Schnuck Markets; In re Target Corp. Customer Data Security Breach Litigation; Personal Data Privacy and Security Act; Personal Data Privacy and Security Act; Department of Homeland Security; National Institute of Standards and Technology (NIST) Small Business Cybersecurity Act; Cybersecurity Enhancement Act of 2014; Small Business Reauthorization Act of 1997; Historically Underutilized Business Zones; HUBZone; European Union; General Data Protection Regulation; GDPR; Privacy by Design; California Consumer Privacy Act; CCPA; liability insurance; burden-shifting (1)
- Drug importation; drug prices; online pharmacies; international regulatory harmonization; FDA; EMA (1)
-
- Estonia; blockchain; corporate governance; shareholders; New York; Delaware; cyber security; voting; government services; E-Estonia; encryption; Nasdaq; e-Residency; proxy; annual meeting; securities; ledger; permissioned; unpermissioned; tokens; vote coins; wallet; corporation laws; board of directors; Depository Trust Company; DTC; 14a-13; Exchange Act; NOBO; SEC; derivative; shareholder activism; Procter & Gamble; Nelson Peltz (1)
- Federal Trade Commission; FTC; Teami; CSGOLotto; social media; influencer; disclosure; fraud; deception; deceptive practices; Facebook; Instagram; Twitter; YouTube; Endorsement Guides; Section 5(a); Telomerase; reasonable consumer; Machinima; Creaxion; consumer protection; consumer law; Lunada; Lord & Taylor (1)
- Privacy law; Cybersecurity; Hackers; FTC v. Wyndham Worldwide Corp.; Data breaches; Data security procedures; Self-regulatory organizations (SROs); Financial Trade Commission (FTC); Corporate privacy; Cyber Crime; Section 5 of the Federal Trade Commission Act; Deceptive or unfair business practice; Congressional inaction; Key principles of compliance; Best Practices Guidelines; Cyber risk insurance; Commercial general liability (CGL) insurance; First party cyber loss; Third party cyber liability; Technical policies and procedures; Written information security plan (WISP) (1)
- Scammers; fraud; phone calls; scam calls; Securities Law; SHAKEN/STIR; personal information; Telephone Consumer Protection Act; TCPA; Federal Trade Commission; FTC; National Do Not Call Registry; Voice over IP; VoIP; Internet Protocol; robocalls; spoofing; Federal Communications Commission; FCC; caller ID; Truth in Caller ID Act; telecommunication; T-Mobile; Verizon; Sprint; AT&T; Scam ID; Scam Block; Call Filter; telemarketers; robocalls; Bolstering Online Transparency Act; BOT Act; Stopping Bad Robocalls Act; SBR; Internet Service Providers; ISPs; spam; Telephone Robocall Abuse Criminal Enforcement and Deterrence Act; TRACED Act; digital signature; Subscriber Identification Module (1)
- Technology; Internet; European Union; EU Digital Services Act; Democracy; Deliberative Democracy; Public sphere; Marketplace of Ideas; Freedom of Speech; Bubble effect; Filter bubble; Echo Chamber; Age of Communication; Polarization; Recommender systems; Personalized Experiences; Social networks; Search engines; Principle of Proportionality; Media Literacy; Profiling (1)
- Trian Fund Management; In Re Dole Food Company; single-step merger; Delaware Blockchain Initiative; UCC; Ethereum; BitLicense; virtual currency; New York Stock Exchange; (1)
Articles 1 - 10 of 10
Full-Text Articles in Administrative Law
How (Not) To Deal With The Bubble Effect In Cyberspace: The Case Of The Eu And Digital Services Act, João Tornada
How (Not) To Deal With The Bubble Effect In Cyberspace: The Case Of The Eu And Digital Services Act, João Tornada
Brooklyn Journal of International Law
Deliberative democracies are based on an ideal process of speech and dialogue that fosters an “uninhibited, robust, and wide-open” public discourse sphere. In cyberspace, social networks and search engine platforms largely operate with recommender systems that tailor content according to the users' interests and online behavior (“profiling”), thus segregating them from different points of view (“bubble effect”). While this personalization of content is particularly efficient to promote commercial goods and services, when it comes to information of common interest, especially on political matters, it undermines consensus-building dialogue and threatens democratic ideals. The theory of a free “marketplace of ideas” justifies …
Enough Excuses On Drug Importation: A New Transnational Paradigm For Fda Regulation And Lower Us Drug Prices, Gabriel Levitt
Enough Excuses On Drug Importation: A New Transnational Paradigm For Fda Regulation And Lower Us Drug Prices, Gabriel Levitt
Brooklyn Journal of International Law
The US Food and Drug Administration (FDA), which enforces drug safety laws, asserts that under most circumstances the importation of prescription drugs is illegal. Yet because of high drug prices in the United States, over the past couple of decades, tens of millions of Americans have imported prescription drugs for personal use. For many, this was their only way to afford them. A unique array of federal laws, regulations, and policies, including the de facto decriminalization of the practice of personal drug importation, have in effect permitted personal drug importation. The same exceptions, however, are not available for commercial drug …
The Rise Of Ada Title Iii: How Congress And The Department Of Justice Can Solve Predatory Litigation, Sarah E. Zehentner
The Rise Of Ada Title Iii: How Congress And The Department Of Justice Can Solve Predatory Litigation, Sarah E. Zehentner
Brooklyn Law Review
The Americans with Disabilities Act (ADA) was enacted in 1990 to afford equal opportunities for individuals with disabilities. Title III of the ADA, specifically, was enacted to afford disabled individuals equal access to places of public accommodation. When the ADA was enacted, the internet was still in its infancy and Congress did not contemplate the need for governing accessibility to websites of public accommodations. Today, the internet has become embedded in virtually every aspect of our lives, yet there are still millions of disabled individuals who are unable to equally access the websites of American businesses. With the ADA being …
Throw The Book At Them: Why The Ftc Needs To Get Tough With Influencers, Christopher Terry, Eliezer Joseph Silberberg, Stephen Schmitz
Throw The Book At Them: Why The Ftc Needs To Get Tough With Influencers, Christopher Terry, Eliezer Joseph Silberberg, Stephen Schmitz
Journal of Law and Policy
The Federal Trade Commission is an administrative agency that has traditionally been aggressive when deploying its delegated authority. At the core of these actions is the FTC’s interpretive definition of deception as based upon a reasonable consumer standard. Specifically, the commission has regularly used Section 5(a) of the FTC Act, in tandem with its interpretive definition of deception, as a sword in a variety of contexts, including enforcement actions for deceptive advertising, endorsements, and claim substantiation against a range of industries. These include successfully brought actions or consent decrees obtained in enforcement proceedings against powerful economic entities, including Google and …
Door Shut And Ears Plugged: How Consumer Reporting Casts Identity Theft Victims Out Of Financial Society And How The Law Can Be Harmonized To Bring Them Back In, Ryan Bolger
Brooklyn Journal of Corporate, Financial & Commercial Law
Consumer Reporting Agencies (CRAs) are the gatekeepers to the American economy. As the chief informants for prospective lenders, landlords, and employers, they exert immense power over the day-to-day decisions of who gets what. Despite these high stakes, the CRAs run consumer reporting as an automated electronic process that causes a lot of reporting errors, disqualifying consumers from essential goods, services, and opportunities. This is painfully true in the context of identity theft, where perverse incentives pollute the integrity of consumer reporting, piling undue harm onto identity theft victims. The law provides a remedy for this problem, but circuit courts are …
Debugging Irs Notice 2014-21: Creating A Viable Cryptocurrency Taxation Plan, Alex Ankier
Debugging Irs Notice 2014-21: Creating A Viable Cryptocurrency Taxation Plan, Alex Ankier
Brooklyn Law Review
In 2014, the Internal Revenue Service (IRS) issued Notice 2014-21 in an attempt to address issues with cryptocurrency taxation, essentially reaching the conclusion that cryptocurrency must be treated like property for purposes of taxation. In the time since the IRS pronouncement, several academics have called for an alternative treatment known as “currency treatment.” Each treatment inadequately addresses the comprehensive issues surrounding cryptocurrency because they offer wholesale treatment to nuanced issues with valid concerns from each side. To truly allow this emerging industry to flourish and gain societal acceptance, artful policymaking is required. This note provides an example of such policymaking. …
“Estonia’S Gift To The World”: The Implementation Of A Blockchain Protocol For Corporate Governance In New York, Sydney Lauren Abualy
“Estonia’S Gift To The World”: The Implementation Of A Blockchain Protocol For Corporate Governance In New York, Sydney Lauren Abualy
Brooklyn Journal of Corporate, Financial & Commercial Law
The traditional procedures of corporate governance are not designed to resolve issues related to close outcomes of corporate votes, empty voting practices, the proxy voting protocol, verification of shareholder identities, and access to corporate records. Blockchain technology allows all corporate shareholders to participate in corporate governance more conveniently, with increased transparency, on a secure network. Estonia sought to revolutionize corporate governance by facilitating the development of a blockchain based e-voting protocol for shareholders of companies listed on the Tallinn Stock Exchange to vote in shareholder meetings. After unsuccessful attempts, New York stands well behind other states, such as Delaware, in …
Unmasking The Villain: Exposing Scammers’ Identities To Defeat Harmful Calls, Katherine Teng
Unmasking The Villain: Exposing Scammers’ Identities To Defeat Harmful Calls, Katherine Teng
Brooklyn Journal of Corporate, Financial & Commercial Law
Since 1991, Congress has attempted to limit unwanted phone calls through legislative efforts. However, past and current laws remain ineffective as scam call complaints continue to increase while the harm of these calls remains severe. Currently, the laws affecting telecommunication regulation focus on reactive measures rather than preventative solutions. Most recently, Congress has passed the Telephone Robocall Abuse Criminal Enforcement and Deterrence Act, which will require telecommunication companies to implement SHAKEN/STIR technology to end scam calls before they reach consumers. While this is the most progressive legislation addressing scam calls, this Note will suggest that phone numbers be registered to …
Saving Small Business From The Big Impact Of Data Breach: A Tiered Federal Approach To Data Protection Law, Nadia Udeshi
Saving Small Business From The Big Impact Of Data Breach: A Tiered Federal Approach To Data Protection Law, Nadia Udeshi
Brooklyn Journal of Corporate, Financial & Commercial Law
Small businesses provide a significant positive impact on the American economy. However, the current fragmented federal and state data protection and breach notification legal scheme puts the viability of small businesses at risk. While the probability of data breaches occurring continues to increase, small businesses lack the financial and technological resources to contend with the various state and federal laws that impose different monetary penalties and remedial requirements in the event of such breaches. To preserve the viability of small businesses, Congress should enact a centralized, multi-tiered federal data protection and breach notification framework that preempts state laws, imposes minimum …
Like A Bad Neighbor, Hackers Are There: The Need For Data Security Legislation And Cyber Insurance In Light Of Increasing Ftc Enforcement Actions, Jennifer Gordon
Like A Bad Neighbor, Hackers Are There: The Need For Data Security Legislation And Cyber Insurance In Light Of Increasing Ftc Enforcement Actions, Jennifer Gordon
Brooklyn Journal of Corporate, Financial & Commercial Law
Privacy has come to the forefront of the technology world as third party hackers are constantly attacking companies for their customers’ data. With increasing instances of compromised customer information, the Federal Trade Commission (FTC) has been bringing suit against companies for inadequate data security procedures. The FTC’s newfound authority to bring suit regarding cybersecurity breaches, based on the Third Circuit’s decision in FTC v. Wyndham Worldwide Corp., is a result of inaction—Congress has been unable to pass sufficient cybersecurity legislation, causing the FTC to step in and fill the void in regulation. In the absence of congressional action, this self-proclaimed …