Open Access. Powered by Scholars. Published by Universities.®

Business Organizations Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Privacy

Discipline
Institution
Publication Year
Publication
Publication Type

Articles 1 - 30 of 37

Full-Text Articles in Business Organizations Law

Perlindungan Atas Privasi Konsumen Dalam Layanan Reservasi Tiket Online Dari Pt. Kereta Api Indonesia, Aprilia Susanti Jan 2023

Perlindungan Atas Privasi Konsumen Dalam Layanan Reservasi Tiket Online Dari Pt. Kereta Api Indonesia, Aprilia Susanti

"Dharmasisya” Jurnal Program Magister Hukum FHUI

The significant increase in online activities cannot be separated from the many active internet users who use mobile internet connections to carry out their daily activities, one of which is for the convenience of making ticket reservations at PT. Indonesian Railways (KAI). The purpose of this research is to find out the study of the business law of protecting consumer privacy in the online ticketing service of PT. KAI. Data collection was carried out by means of a literature study of the relationship between laws and regulations in consumer protection and the position of PT. KAI as business actors and …


Inadequate Privacy: The Necessity Of Hipaa Reform In A Post-Dobbs World, Katherine Robertson Jan 2023

Inadequate Privacy: The Necessity Of Hipaa Reform In A Post-Dobbs World, Katherine Robertson

Seattle University Law Review

Part I of this Comment will provide an overview of HIPAA and the legal impacts of Dobbs. Part II will discuss the anticipatory response to the impacts of Dobbs on PHI by addressing the response from (1) the states, (2) the Biden Administration, and (3) the medical field. Part III will discuss the loopholes that exist in HIPAA and further address the potential impacts on individuals and the medical field if reform does not occur. Finally, Part IV will argue that the reform of HIPAA is the best avenue for protecting PHI related to reproductive healthcare.


One Size Does Not Fit All: How The California Privacy Rights Act Will Not Improve Employee Data Collection And Privacy Rights, Kayla N. Bushey Jan 2023

One Size Does Not Fit All: How The California Privacy Rights Act Will Not Improve Employee Data Collection And Privacy Rights, Kayla N. Bushey

Catholic University Journal of Law and Technology

No abstract provided.


Publicizing Corporate Secrets, Christopher J. Morten Jan 2023

Publicizing Corporate Secrets, Christopher J. Morten

Faculty Scholarship

Federal regulatory agencies in the United States hold a treasure trove of valuable information essential to a functional society. Yet little of this immense and nominally “public” resource is accessible to the public. That worrying phenomenon is particularly true for the valuable information that agencies hold on powerful private actors. Corporations regularly shield vast swaths of the information they share with federal regulatory agencies from public view, claiming that the information contains legally protected trade secrets (or other proprietary “confidential commercial information”). Federal agencies themselves have largely acceded to these claims and even fueled them, by construing restrictively various doctrines …


Illusory Privacy, Thomas Haley Jan 2022

Illusory Privacy, Thomas Haley

Indiana Law Journal

For decades, regulators, consumer advocates, and privacy theorists have grappled with one of privacy’s most important questions: how to protect private information that consumers unwittingly give away with the click of an “I accept” button. Reform efforts remain mired in a morass of text, focusing on the increasing volume and complexity of firms’ terms of service and privacy policies. This Article moves beyond such existing approaches. By analyzing terms of service and privacy policies from hundreds of top websites—which this Article calls “platform terms”—this Article demonstrates that the prevailing “notice and consent” paradigm of privacy regulation cannot provide meaningful protection. …


Personal Data Privacy And Protective Federal Legislation: An Exploration Of Constituent Position On The Need For Legislation To Control Data Reliant Organizations Collecting And Monetizing Internet-Obtained Personal Data, Giovanni De Meo Aug 2021

Personal Data Privacy And Protective Federal Legislation: An Exploration Of Constituent Position On The Need For Legislation To Control Data Reliant Organizations Collecting And Monetizing Internet-Obtained Personal Data, Giovanni De Meo

Dissertations

In the past twenty years, the business of online personal data collection has grown at the same rapid pace as the internet itself, fostering a multibillion-dollar personal data collection and commercialization industry. Unlike many other large industries, there has been no major federal legislation enacted to monitor or control the activities of organizations dealing in this flourishing industry. The combination of these factors together with the lack of prior research encouraged this research designed to understand how much voters know about this topic and whether there is interest in seeing legislation enacted to protect individual personal data privacy.

To address …


The United States: Big Data, Little Regulation, Megan Valent Sep 2020

The United States: Big Data, Little Regulation, Megan Valent

University of Miami Business Law Review

In the United States today, there is no single law to address the privacy concerns associated with the collection of consumer data. Lawmakers have introduced policies that seek to address data privacy at the federal level, but Congress has not yet acted to create a comprehensive law to protect consumers. On the contrary, in 2016, the European Union passed its General Data Protection Regulation to address the dangers associated with “Big Data” and to give consumers control over their data.

Unfortunately, in the United States consumers are often unaware of how their data is being handled and what is done …


Real You Meets Virtual You: It Is Time For Consumers To Regain Power Online, Neeka Hodaie Jun 2020

Real You Meets Virtual You: It Is Time For Consumers To Regain Power Online, Neeka Hodaie

Seattle Journal for Social Justice

No abstract provided.


Law School News: Logan To Serve As Adviser On Restatement Third Of Torts 11-07-2019, Michael M. Bowden Nov 2019

Law School News: Logan To Serve As Adviser On Restatement Third Of Torts 11-07-2019, Michael M. Bowden

Life of the Law School (1993- )

No abstract provided.


The Missing Regulatory State: Monitoring Businesses In An Age Of Surveillance, Rory Van Loo Oct 2019

The Missing Regulatory State: Monitoring Businesses In An Age Of Surveillance, Rory Van Loo

Faculty Scholarship

An irony of the information age is that the companies responsible for the most extensive surveillance of individuals in history—large platforms such as Amazon, Facebook, and Google—have themselves remained unusually shielded from being monitored by government regulators. But the legal literature on state information acquisition is dominated by the privacy problems of excess collection from individuals, not businesses. There has been little sustained attention to the problem of insufficient information collection from businesses. This Article articulates the administrative state’s normative framework for monitoring businesses and shows how that framework is increasingly in tension with privacy concerns. One emerging complication is …


The Missing Regulatory State: Monitoring Businesses In An Age Of Surveillance, Rory V. Loo Oct 2019

The Missing Regulatory State: Monitoring Businesses In An Age Of Surveillance, Rory V. Loo

Vanderbilt Law Review

An irony of the information age is that the companies responsible for the most extensive surveillance of individuals in history-large platforms such as Amazon, Facebook, and Google-have themselves remained unusually shielded from being monitored by government regulators. But the legal literature on state information acquisition is dominated by the privacy problems of excess collection from individuals, not businesses. There has been little sustained attention to the problem of insufficient information collection from businesses. This Article articulates the administrative state's normative framework for monitoring businesses and shows how that framework is increasingly in tension with privacy concerns. One emerging complication is …


Law School News: Throw Out The Old Thinking 9-30-2019, Michael M. Bowden Sep 2019

Law School News: Throw Out The Old Thinking 9-30-2019, Michael M. Bowden

Life of the Law School (1993- )

No abstract provided.


Jewish Law And Socially Responsible Corporate Conduct, Steven H. Resnicoff Apr 2019

Jewish Law And Socially Responsible Corporate Conduct, Steven H. Resnicoff

Steven Resnicoff

No abstract provided.


Bytes Bite: Why Corporate Data Breaches Should Give Standing To Affected Individuals, Caden Hayes Mar 2019

Bytes Bite: Why Corporate Data Breaches Should Give Standing To Affected Individuals, Caden Hayes

Washington and Lee Journal of Civil Rights and Social Justice

High-profile data hacks are not uncommon. In fact, according to the Privacy Rights Clearinghouse, there have been at least 7,961 data breaches, exposing over 10,000,000,000 accounts in total, since 2005. These shocking numbers are not particularly surprising when taking into account the value of information stolen. For example, cell phone numbers, as exposed in a Yahoo! hack, are worth $10 a piece on the black market, meaning the hackers stood to make $30,000,000,000 from that one hack. That dollar amount does not even consider copies the hackers could make and later resell. Yet while these hackers make astronomical payoffs, the …


Cancer's Ip, Jacob S. Sherkow Jan 2018

Cancer's Ip, Jacob S. Sherkow

Articles & Chapters

The state of publicly funded science is in peril. Instead, new biomedical research efforts — in particular, the recent funding of a “Cancer Moonshot” — have focused on employing public-private partnerships, joint ventures between private industry and public agencies, as being more politically palatable. Yet, public-private partnerships like the Cancer Moonshot center on the production of public goods: scientific information. Using private incentives in this context presents numerous puzzles for both intellectual property law and information policy. This Article examines whether—and to what extent — intellectual property and information policy can be appropriately tailored to the goals of public-private partnerships. …


Standing After Snowden: Lessons On Privacy Harm From National Security Surveillance Litigation, Margot E. Kaminski Jan 2017

Standing After Snowden: Lessons On Privacy Harm From National Security Surveillance Litigation, Margot E. Kaminski

Publications

Article III standing is difficult to achieve in the context of data security and data privacy claims. Injury in fact must be "concrete," "particularized," and "actual or imminent"--all characteristics that are challenging to meet with information harms. This Article suggests looking to an unusual source for clarification on privacy and standing: recent national security surveillance litigation. There we can find significant discussions of what rises to the level of Article III injury in fact. The answers may be surprising: the interception of sensitive information; the seizure of less sensitive information and housing of it in a database for analysis; and …


The Law And Policy Of People Analytics, Matthew T. Bodie, Miriam A. Cherry, Marcia L. Mccormick, Jintong Tang Jan 2016

The Law And Policy Of People Analytics, Matthew T. Bodie, Miriam A. Cherry, Marcia L. Mccormick, Jintong Tang

All Faculty Scholarship

Leading technology companies such as Google and Facebook have been experimenting with people analytics, a new data-driven approach to human resources management. People analytics is just one example of the new phenomenon of “big data,” in which analyses of huge sets of quantitative information are used to guide decisions. Applying big data to the workplace could lead to more effective outcomes, as in the Moneyball example, where the Oakland Athletics baseball franchise used statistics to assemble a winning team on a shoestring budget. Data may help firms determine which candidates to hire, how to help workers improve job performance, and …


Newsroom: Fcc's Sohn On Consumer Protection, Roger Williams University School Of Law Sep 2015

Newsroom: Fcc's Sohn On Consumer Protection, Roger Williams University School Of Law

Life of the Law School (1993- )

No abstract provided.


Systematic Ict Surveillance By Employers: Are Your Personal Activities Private?, Arlene J. Nicholas Jul 2014

Systematic Ict Surveillance By Employers: Are Your Personal Activities Private?, Arlene J. Nicholas

Faculty and Staff - Articles & Papers

This paper reviews the various methods of information and communications technology (ICT) that is used by employers to peer into the work lives and, in some cases, private lives of employees. Some of the most common methods – such as computer and Internet monitoring, video surveillance, and global positioning systems (GPS) – have resulted in employee disciplines that have been challenged in courts. This paper provides background information on United States (U.S.) laws and court cases which, in this age of easily accessible information, mostly support the employer. Assessments regarding regulations and policies, which will need to be continually updated …


The 1 Percent Solution: Corporate Tax Returns Should Be Public (And How To Get There), Reuven S. Avi-Yonah, Ariel Siman Feb 2014

The 1 Percent Solution: Corporate Tax Returns Should Be Public (And How To Get There), Reuven S. Avi-Yonah, Ariel Siman

Articles

The justification for publishing corporate tax returns is that corporations are given immense benefits by the state that bestows upon them unlimited life and limited liability, and therefore they owe the public the information of how they treat the state that created them. Tax returns, like the financial disclosures that publicly traded corporations must file with the SEC, also provide useful information to shareholders, creditors, and the investing public.


In Quest Of The Arbitration Trifecta, Or Closed Door Litigation?: The Delaware Arbitration Program , Thomas J. Stipanowich Jan 2014

In Quest Of The Arbitration Trifecta, Or Closed Door Litigation?: The Delaware Arbitration Program , Thomas J. Stipanowich

The Journal of Business, Entrepreneurship & the Law

The Delaware Arbitration Program established a procedure by which businesses can agree to have their disputes heard in an arbitration proceeding before a sitting judge of the state’s highly regarded Chancery Court. The Program arguably offers a veritable trifecta of procedural advantages for commercial parties, including expert adjudication, efficient case management and short cycle time and, above all, a proceeding cloaked in secrecy. It also may enhance the reputation of Delaware as the forum of choice for businesses. But the Program’s ambitious intermingling of public and private forums brings into play the longstanding tug-of-war between the traditional view of court …


Policing The Social Media Water Cooler: Recent Nlrb Decisions Should Make Employers Think Twice Before Terminating An Employee For Comments Posted On Social Media Sites, Eric Raphan, Sean Kirby Jan 2014

Policing The Social Media Water Cooler: Recent Nlrb Decisions Should Make Employers Think Twice Before Terminating An Employee For Comments Posted On Social Media Sites, Eric Raphan, Sean Kirby

Journal of Business & Technology Law

No abstract provided.


Surveillance At The Source, David Thaw Jan 2014

Surveillance At The Source, David Thaw

Articles

Contemporary discussion concerning surveillance focuses predominantly on government activity. These discussions are important for a variety of reasons, but generally ignore a critical aspect of the surveillance-harm calculus – the source from which government entities derive the information they use. The source of surveillance data is the information "gathering" activity itself, which is where harms like "chilling" of speech and behavior begin.

Unlike the days where satellite imaging, communications intercepts, and other forms of information gathering were limited to advanced law enforcement, military, and intelligence activities, private corporations now play a dominant role in the collection of information about individuals' …


A Corporate Right To Privacy, Elizabeth Pollman Jan 2014

A Corporate Right To Privacy, Elizabeth Pollman

All Faculty Scholarship

The debate over the scope of constitutional protections for corporations has exploded with commentary on recent or pending Supreme Court cases, but scholars have left unexplored some of the hardest questions for the future, and the ones that offer the greatest potential for better understanding the nature of corporate rights. This Article analyzes one of those questions — whether corporations have, or should have, a constitutional right to privacy. First, the Article examines the contours of the question in Supreme Court jurisprudence and provides the first scholarly treatment of the growing body of conflicting law in the lower courts on …


Consolidated Edison Company Of New York V. Public Service Commission: Freedom Of Speech Extended To Monopolies - Is There No Escape For The Consumer?, Lynn K. Warren Feb 2013

Consolidated Edison Company Of New York V. Public Service Commission: Freedom Of Speech Extended To Monopolies - Is There No Escape For The Consumer?, Lynn K. Warren

Pepperdine Law Review

The author's focus is upon an opinion of the United States Supreme Court which silently extended first amendment freedoms to a corporate monopoly. The majority attempts a balancing of the monopoly utility's freedom of speech against the state's protection of the privacy interests of the ratepayers and finds the privacy interest not to be so compelling as to justify any restriction on freedom of speech. The author suggests that the privacy interest is so substantial as to be compelling and further agrees with the dissent, that because of the special position of the Consolidated Edison Company as a monopoly and …


Striking A Balance Between Privacy And Online Commerce, Mark Bartholomew Jan 2013

Striking A Balance Between Privacy And Online Commerce, Mark Bartholomew

Utah OnLaw: The Utah Law Review Online Supplement

It is becoming commonplace to note that privacy and online commerce are on a collision course. Corporate entities archive and monetize more and more personal information. Citizens increasingly resent the intrusive nature of such data collection and use. Just noticing this conflict, however, tells us little. In Informing and Reforming the Marketplace of Ideas: The Public-Private Model for Data Production and the First Amendment, Professor Shubha Ghosh not only notes the tension between the costs and benefits of data commercialization, but suggests three normative perspectives for balancing privacy and commercial speech. This is valuable because without a rich theoretical framework …


Executive Trade Secrets, Tom C.W. Lin Jan 2012

Executive Trade Secrets, Tom C.W. Lin

UF Law Faculty Publications

The law discriminates among a corporation’s secrets. In the eyes of the law, commercial secrets of corporations are legitimate secrets that deserve legal protection and nondisclosure, but personal secrets of executives are not as deserving of legal protection and nondisclosure. This divergent treatment of secrets has resulted in a legal landscape of perplexing, paradoxical paths for corporations and executives concerning executive disclosures — a precarious landscape that has left corporations and investors dangerously susceptible to revelations of private facts that shock market valuation and institutional stability.

This Article explores this divergent treatment of secrets in the context of public corporations …


Cloud Computing Providers And Data Security Law: Building Trust With United States Companies, Jared A. Harshbarger Esq. Nov 2011

Cloud Computing Providers And Data Security Law: Building Trust With United States Companies, Jared A. Harshbarger Esq.

Jared A. Harshbarger

Cloud computing and software-as-a-service (SaaS) models are revolutionizing the information technology industry. As these services become more prevalent, data security and privacy concerns will also rise among consumers and the companies who consider using them. Cloud computing providers must establish a sufficient level of trust with their potential customers in order to ease initial fears - and ensure certain compliance obligations will be met - at least to the extent that any such inquiring customer will feel comfortable enough to ultimately take the irreversible step of releasing their sensitive data and personal information into the cloud.


Undressing The Ceo: Disclosing Private, Material Matters Of Public Company Executives, Tom C.W. Lin Jan 2009

Undressing The Ceo: Disclosing Private, Material Matters Of Public Company Executives, Tom C.W. Lin

UF Law Faculty Publications

Disclosing material private matters of public company executives is a difficult and complex but sometimes necessary act. Advocates that favor more disclosure and advocates that favor more privacy both have many legitimate arguments and concerns. This article argues that when viewed in the context of contemporary capital markets, the enhanced role of the executive, and the modern media, additional disclosure from executives about material, private matters is desirable. In support of this argument, this article proposes a principle-based approach for executive disclosure that affords companies and executives reasonable deference on what to disclose and how to disclose it, while simultaneously …


Privacy On Planet Google: Using The Theory Of "Contextual Integrity" To Clarify The Privacy Threats Of Google's Quest For The Perfect Search Engine, Michael Zimmer Jan 2008

Privacy On Planet Google: Using The Theory Of "Contextual Integrity" To Clarify The Privacy Threats Of Google's Quest For The Perfect Search Engine, Michael Zimmer

Journal of Business & Technology Law

No abstract provided.