Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Consumers (2)
- 2nd Circuit US Circuit Court of Appeals; 9th Circuit; 9th US Circuit Court of Appeals; Ape; Art; Authentication; Authenticity; BAYC; Birkin; Bitcoin; Bitcoin Blockchain; Blockchain; Blockchain Technology; Bored Ape Yacht Club; Brand Identity; Branding; Brand Protection; Business; Businesses; California; Central District of California; Civil Law; Classification; Collectibles; Commerce; Common Law; Consumer Confusion; Crypto; Cryptocurrency; CryptoPunk; CryptoPunks; Digital; Digital Age; Digital Assets; Digital Database; Digital Collectibles; Double Identity; Ethereum; Ethereum Blockchain; EU; EUIPO; Europe; European Union; European Union Intellectual Property Office; European Union Trade Mark; European Union Trade Mark Regulation; EUTM; EUTMR; Fair Competition; Federal Court; First Amendment; First to use; First to file; Global; Globalization; Hermes; Infringement; Innovation; Intellectual Property; Intent-to-Use; Internet; IP; Lanham; Lanham Act; Likelihood of Confusion; Litigation; Madrid Agreement; Madrid Protocol; Mark; Mason Rothschild; Metadata; MetaBirkin; MetaBirkins; Metaverse; Mint; Minted; Minting; New York; NFT; NFTs; Nice Classification; Nike; Non-Fungible Token; Non-Fungible Tokens; Ownership; Paris Convention; PFP; PFP NFT; Registered Marks; Regulation (EU) 2017/100; Regulation 2017/1001; Rothschild; RR/BAYC; Ryder Ripps; Satoshi Nakamoto; SDNY; Smart Contract; Sneaker; Southern District of New York; StockX; Technology; TM; TMs; Token; Tokens; Tokenization; Token ID; Trade; Trade-Related Aspect of Intellectual Property Rights Agreement; Trademark; Trademark Act; Trademark Cases; Trademark Infringement; Trademark Registration; TRIPS; TRIPS Agreement; United States; United States Patent and Trademark Office; Unregistered Marks; US; USPTO; Vault NFT; Virtual goods; WIPO; World Intellectual Property Organization; Yuga; Yuga Labs (1)
- Amazon (1)
- Arrest; Aut Dedere Aut Judicare; Call Center; Caller ID; Con Artist; Concurrent Jurisdiction; Conviction; COVID-19; Cryptocurrency; Customary International Law; Cybercrime; Employment; Extradition; Extraterritoriality; Financial Crime; Fraud; Government Imposter; Immigration; International Covenant on Civil and Political Rights; Internet; INTERPOL; Investment Scam; Jurisdiction; Law Enforcement; Lottery Scam; Mutual Legal Assistance Treaty; Passive Personality Principle; Phone Call; Prosecution; Robocalls; Scam; Scarcity Principle; Sovereignty; Tax Fraud Scam; Technical Support; Technical Support; Scam; Telephone Calls; Territoriality Principle; Utilitarianism; Victim; Voice Over Internet Protocol (1)
- Autodial (1)
-
- Autodialer (1)
- CFAA; Computer Fraud and Abuse Act; right to privacy; civil action; equitable relief; personal privacy; federal civil litigation (1)
- Call (1)
- Calling (1)
- Capacity (1)
- Cartier International AG v. British Sky Broad (1)
- Clarifying Lawful Overseas Use of Data Act; CLOUD Act; CLOUD Act agreements; data privacy; data protection; technology; cloud; direct access; data sharing; data protection; lawful data use; production orders; overseas production orders; international production orders; stored communications; SCA; overseas data; privacy; digital privacy; digital privacy rights; European Convention on Human Rights; international cooperation; international law; ECHR; law enforcement; international law enforcement; constitutional law; privacy; Fourth Amendment; Article 8; Article 1; criminal investigation; mutual legal assistance; mutual legal assistance treaties; mla; mlat; third country persons; us uk agreements; service provider; Verdugo-Urquidez; Microsoft Ireland; Al-Skeini; extraterritorial; extraterritoriality; territorial; territoriality; cross-border; law enforcement cooperation; comparative law; transnational law (1)
- Class action (1)
- Counterfeit (1)
- Counterfeit Goods (1)
- Counterfeit Market (1)
- Cryptocurrency taxation; cryptocurrency; IRS Notice 2014-21; cryptocurrency mining; property method; currency method; currency volatility; digital wallet; internal revenue service; property basis; straddles; tax avoidance (1)
- Cyber security; trespass (1)
- Data breach; data protection; small businesses; breach notification framework; cybersecurity; MyBizHomepage; cyberattack; Code Spaces; Software as a Service; SaaS; cybercriminals; data security; Great Depression; World War II; Small Business Act of 1953; SBA; Small Business Administration; Privacy Rights Clearinghouse; ChoicePoint; Personally Identifiable Information; PII; consumer credit reporting information; Protected Health Information; PHI; Gramm-Leach-Bliley Act; GLBA; Bank Holding Company Act of 1956; Health Insurance Portability and Accountability Act of 1996; HIPAA; Federal Trade Commission; FTC; Fair Credit Reporting Act; civil penalties; Commonwealth v. Haney; Massachusetts Security Breaches Law; In re Yahoo! Inc. Customer Data Security Breach Litigation; California Customer Records Act; attorney general; Community Bank of Trenton v. Schnuck Markets; In re Target Corp. Customer Data Security Breach Litigation; Personal Data Privacy and Security Act; Personal Data Privacy and Security Act; Department of Homeland Security; National Institute of Standards and Technology (NIST) Small Business Cybersecurity Act; Cybersecurity Enhancement Act of 2014; Small Business Reauthorization Act of 1997; Historically Underutilized Business Zones; HUBZone; European Union; General Data Protection Regulation; GDPR; Privacy by Design; California Consumer Privacy Act; CCPA; liability insurance; burden-shifting (1)
- Data breach; standing; data breach litigation; hacking; personal information; data theft; personally identifiable information; data breach notification; cybersecurity; law; policy; third party cyber liability (1)
- E-Commerce (1)
- EBay (1)
- European Union (1)
- European Union; EU; Brazil; GDPR; General Data Protection Regulation; LGPD; privacy regulation (1)
- FCC (1)
- FTC (1)
- Fashion (1)
- Federal Communications Commission (1)
- Federal Trade Commission (1)
- Google (1)
Articles 1 - 22 of 22
Full-Text Articles in Computer Law
Trademark Infringement: The Likelihood Of Confusion Of Nfts In The Us And Eu, Sara Sachs
Trademark Infringement: The Likelihood Of Confusion Of Nfts In The Us And Eu, Sara Sachs
Brooklyn Journal of International Law
The immutability of non-fungible tokens has made it an invaluable tool for asset ownership and authentication across a variety of industries. With the proliferation of NFTs comes the need to protect trademarks and prevent consumer confusion in the digital age. This Note explores the existing legal framework for trademark law in the United States and European Union. This Note argues for a new trademark standard that reflects the interconnected nature of a global digital society.
The "Worst Law In Technology": How The Computer Fraud And Abuse Act Allows Big Businesses To Collect And Sell Your Personal Information, Alicia Nakhjavan
The "Worst Law In Technology": How The Computer Fraud And Abuse Act Allows Big Businesses To Collect And Sell Your Personal Information, Alicia Nakhjavan
Brooklyn Law Review
For years, big businesses have been collecting and selling users’ personal information without permission. In attempts at preventing this practice, users have brought civil actions under the Computer Fraud and Abuse Act (CFAA), alleging a loss of personal privacy. As currently enacted, “personal privacy” is not included in the statutory definition of loss. Further, courts have been reluctant to interpret the CFAA broadly to cover loss of personal privacy claims. This note proposes that an amendment to the CFAA is necessary to close this gap in the statute’s coverage and better protect users’ right to privacy.
From The Golden Gate To London: Bridging The Gap Between Data Privacy And The Right Of Publicity, Kristin Kuraishi
From The Golden Gate To London: Bridging The Gap Between Data Privacy And The Right Of Publicity, Kristin Kuraishi
Brooklyn Journal of International Law
Currently, there is no global standard or recognition for the right of publicity. Even within the United States, the recognition, scope, and protections vary by state. As the world becomes increasingly reliant on social media for news, information, communication, and recommendations, micro-influencers and non-celebrities require a way to control their developed and curated name, image, and likeness from unauthorized commercial uses by others. Advertising is occurring more frequently online, and brands recognize the power that micro-influencers have on commerce. Some countries, like the United Kingdom, do not recognize the right of publicity, potentially leaving many individuals without recourse for the …
Digital Privacy Rights And Cloud Act Agreements, Tim Cochrane
Digital Privacy Rights And Cloud Act Agreements, Tim Cochrane
Brooklyn Journal of International Law
The United States (US) and United Kingdom (UK) will soon bring into force a new international law enforcement data sharing ‘CLOUD Act agreement’ (US-UK Agreement), the first of its kind under the Clarifying Lawful Overseas Use of Data Act 2018 (CLOUD Act). These agreements enable law enforcement in one state to directly request data from service providers based in the other state. They respond to long-standing concerns with the main mechanism for obtaining overseas data, mutual legal assistance (MLA). The US and UK claim the US-UK Agreement will significantly speed up data access relative to MLA while “respecting privacy and …
Prosecuting The Phone Scammer When Extradition Fails And Concurrent Jurisdiction Exists, Michelle Lepkofker
Prosecuting The Phone Scammer When Extradition Fails And Concurrent Jurisdiction Exists, Michelle Lepkofker
Brooklyn Journal of International Law
Advancements in technology allow people to place phone calls half a world away via the internet. This technology has made it easier and cheaper for consumers to communicate, but it has also made it easier for scammers to reach more unsuspecting victims. In 2020, TrueCaller, an app designed to block scam phone calls, successfully blocked, and identified 31.3 billion spam calls in 20 countries. In the same year, Americans alone lost a total of USD $ 29.8 billion to scam calls. This Note argues that phone scams continue to be lucrative, in part, because criminal prosecutions of transnational crimes are …
Data Governance And The Elasticity Of Sovereignty, Roxana Vatanparast
Data Governance And The Elasticity Of Sovereignty, Roxana Vatanparast
Brooklyn Journal of International Law
Traditionally, the world map and territorially bounded spaces have dominated the ways in which we imagine how states govern, make laws, and exercise their authority. Under this conception, reflected in traditional international law principles of territorial sovereignty, each state would have exclusive authority to govern and make laws over everything concerning the land within its borders. Yet developments like the proliferation of data flows, which are based on divisible, mobile, and interconnected components of data, are not territorially bounded. This presents a challenge to the traditional bases for territorial sovereignty and jurisdiction under international law, which some scholars claim is …
Easing The Burdens Of A Patchwork Approach To Data Privacy Regulation In Favor Of A Singular Comprehensive International Solution—The International Data Privacy Agreement, Scott Resnick
Brooklyn Journal of International Law
Data privacy has become one of the premier hot-button issues in today’s increasingly digital human experience. Legislatures around the globe have attempted to act swiftly in an effort to safeguard the highly coveted personal information of their citizens and combat misuse at the hands of international businesses operating with an online presence. Since the European Union’s enactment of the General Data Protection Regulation (GDPR) in 2018, countries around the globe have been grappling with how best to replicate the EU’s leading data privacy regulation while providing the same or greater level of transparency into data collection practices. While a mere …
Debugging Irs Notice 2014-21: Creating A Viable Cryptocurrency Taxation Plan, Alex Ankier
Debugging Irs Notice 2014-21: Creating A Viable Cryptocurrency Taxation Plan, Alex Ankier
Brooklyn Law Review
In 2014, the Internal Revenue Service (IRS) issued Notice 2014-21 in an attempt to address issues with cryptocurrency taxation, essentially reaching the conclusion that cryptocurrency must be treated like property for purposes of taxation. In the time since the IRS pronouncement, several academics have called for an alternative treatment known as “currency treatment.” Each treatment inadequately addresses the comprehensive issues surrounding cryptocurrency because they offer wholesale treatment to nuanced issues with valid concerns from each side. To truly allow this emerging industry to flourish and gain societal acceptance, artful policymaking is required. This note provides an example of such policymaking. …
Saving Small Business From The Big Impact Of Data Breach: A Tiered Federal Approach To Data Protection Law, Nadia Udeshi
Saving Small Business From The Big Impact Of Data Breach: A Tiered Federal Approach To Data Protection Law, Nadia Udeshi
Brooklyn Journal of Corporate, Financial & Commercial Law
Small businesses provide a significant positive impact on the American economy. However, the current fragmented federal and state data protection and breach notification legal scheme puts the viability of small businesses at risk. While the probability of data breaches occurring continues to increase, small businesses lack the financial and technological resources to contend with the various state and federal laws that impose different monetary penalties and remedial requirements in the event of such breaches. To preserve the viability of small businesses, Congress should enact a centralized, multi-tiered federal data protection and breach notification framework that preempts state laws, imposes minimum …
The Common Law Of Cyber Trespass, Michael J. O'Connor
The Common Law Of Cyber Trespass, Michael J. O'Connor
Brooklyn Law Review
Right now, if executives in California and Virginia each bribe a competitor’s disloyal employee to steal a trade secret from the competitor’s servers, under the federal Computer Fraud and Abuse Act (CFAA), the Government can charge one executive but not the other. Courts decide these cases differently due to the widening circuit split over the CFAA term “without authorization.” Neither the Supreme Court nor Congress has shown interest in resolving the split over authorization. Even more concerning is the suggestion that they can’t resolve it; the statute addresses too many potential scenarios for a single definition to end all debate. …
Increasing Lapses In Data Security: The Need For A Common Answer To What Constitutes Standing In A Data Breach Context, Aaron Benjamin Edelman
Increasing Lapses In Data Security: The Need For A Common Answer To What Constitutes Standing In A Data Breach Context, Aaron Benjamin Edelman
Journal of Law and Policy
As the number of data breaches continues to rise in the United States, so does the amount of data breach litigation. Many potential plaintiffs who suffered as victims of data breaches, however, find themselves in limbo regarding the issue of standing before a court because of a significant split on standing determinations amongst the federal circuit courts. Thus, while victims of data breaches oftentimes have their personal information fall into the hands of nefarious characters who intend to use the information to a victim’s detriment, that may not be enough to provide victims a right to sue in federal court …
The Need For A Shared Responsibility Regime Between State And Non-State Actors To Prevent Human Rights Violations Caused By Cyber-Surveillance Spyware, Anna W. Chan
Brooklyn Journal of International Law
Technology has undoubtedly contributed to the field of human rights. Internet connection and a smartphone has enabled activists to call out political leaders, shine light on human atrocities and organize mass protests through social media platforms. This has resulted in many authoritarian governments spending large amounts of their resources to purchase cyber-surveillance spyware systems from multi-national corporations to closely monitor and track their citizens for any signs of dissidence. Such technology has enabled authoritarian regimes to commit human right violations ranging from invasion of privacy, arbitrary arrest, arbitrary detention, torture and even murder. Despite the uncovering of such questionable transactions …
Comparative Analysis Of The Eu’S Gdpr And Brazil’S Lgpd: Enforcement Challenges With The Lgpd, Abigayle Erickson
Comparative Analysis Of The Eu’S Gdpr And Brazil’S Lgpd: Enforcement Challenges With The Lgpd, Abigayle Erickson
Brooklyn Journal of International Law
In the wake of the adoption of the European Union’s General Data Protection Regulation (GDPR) in May 2018, other countries and jurisdictions have contemplated personal data privacy legislation. In August 2018, the former president of Brazil, Michel Temer, signed the country’s comprehensive data privacy regulation, Lei Geral de Proteção de Dados Pessoais (LGPD), into law. Temer, however, vetoed many of the enforcement provisions. Shortly before leaving office, Temer signed an executive order creating a regulatory agency as the bill initially called for, but situated the agency under executive control instead of creating a wholly independent agency. This Note provides a …
Playing Fair: Youtube, Nintendo, And The Lost Balance Of Online Fair Use, Natalie Marfo
Playing Fair: Youtube, Nintendo, And The Lost Balance Of Online Fair Use, Natalie Marfo
Brooklyn Journal of Corporate, Financial & Commercial Law
Over the past decade, YouTube saw an upsurge in the popularity of “Let’s Play” videos. While positive for YouTube, this uptick was not without controversy. Let’s Play videos use unlicensed copyrighted materials, frustrating copyright holders. YouTube attempted to curb such usages by demonetizing and removing thousands of Let’s Play videos. Let’s Play creators struck back, arguing that the fair use doctrine protects their works. An increasing number of powerful companies, like Nintendo, began exploiting the ambiguity of the fair use doctrine against the genre; forcing potentially legal works to request permission and payment for Let’s Play videos, without a determination …
On The Clock, Best Bet To Draft Cyberdefensive Linemen: Federal Regulation Of Sports Betting From A Cybersecurity Perspective, William H. Williams
On The Clock, Best Bet To Draft Cyberdefensive Linemen: Federal Regulation Of Sports Betting From A Cybersecurity Perspective, William H. Williams
Brooklyn Journal of Corporate, Financial & Commercial Law
On May 14, 2018, Justice Alito delivered the majority opinion for the United States Supreme Court in Murphy v. National Collegiate Athletic Association (NCAA). The Professional and Amateur Protection Act (PASPA), a twenty-six-year-old federal statute, was deemed unconstitutional; thus, this decision allows state legislatures to legalize sports betting within their borders. With many states independently legalizing sports gambling, the regulatory landscape throughout the country is becoming a patchwork of state statutes. Additionally, top tier sporting organizations heavily depend on data analytics to formulate game plan strategy, train efficiently, rehab player injuries, gauge team and player performance, etc. The popularity of …
Better Left Forgotten: An Argument Against Treating Some Social Media And Digital Assets As Inheritance In An Era Of Platform Power, Shelly Kreiczer-Levy, Ronit Donyets-Kedar
Better Left Forgotten: An Argument Against Treating Some Social Media And Digital Assets As Inheritance In An Era Of Platform Power, Shelly Kreiczer-Levy, Ronit Donyets-Kedar
Brooklyn Law Review
Restraining technological platforms’ power has become one of the main concerns of our era. The control over cyberspace and data ownership are among the key issues addressed in the literature. Yet, the ongoing vigorous debate surrounding the inheritance of digital assets remains surprisingly oblivious of the platform’s involvement in shaping memory and continuity. Current legal scholarship and legislation ask whether social network profiles are inheritable property; they balance the user’s privacy and wishes against family members’ interests, without addressing or even considering the corporate power at play. This article argues that we are constantly asking the wrong questions. Instead of …
Remnants Of Net Neutrality: Policing Unlawful Content Through Broadband Providers, Aaron Lerman
Remnants Of Net Neutrality: Policing Unlawful Content Through Broadband Providers, Aaron Lerman
Brooklyn Journal of Corporate, Financial & Commercial Law
The 2015 Open Internet Order, released by The Federal Communication Commission (FCC), introduced sweeping, new rules that promised to preserve an equal and open Internet to consumers. These rules, otherwise known as “Net Neutrality,” prohibited broadband and internet service providers from impairing, blocking, or throttling access to “lawful content” online. But with a new administration and agenda, the FCC’s 2017 Restoring Internet Freedom Order repealed Net Neutrality. Since then, various states have pushed back against the repeal, with some adopting their own versions of the 2015 Open Internet Order’s Net Neutrality, keeping most of the rule language intact, including the …
Like A Bad Neighbor, Hackers Are There: The Need For Data Security Legislation And Cyber Insurance In Light Of Increasing Ftc Enforcement Actions, Jennifer Gordon
Like A Bad Neighbor, Hackers Are There: The Need For Data Security Legislation And Cyber Insurance In Light Of Increasing Ftc Enforcement Actions, Jennifer Gordon
Brooklyn Journal of Corporate, Financial & Commercial Law
Privacy has come to the forefront of the technology world as third party hackers are constantly attacking companies for their customers’ data. With increasing instances of compromised customer information, the Federal Trade Commission (FTC) has been bringing suit against companies for inadequate data security procedures. The FTC’s newfound authority to bring suit regarding cybersecurity breaches, based on the Third Circuit’s decision in FTC v. Wyndham Worldwide Corp., is a result of inaction—Congress has been unable to pass sufficient cybersecurity legislation, causing the FTC to step in and fill the void in regulation. In the absence of congressional action, this self-proclaimed …
“Hello…It’S Me. [Please Don’T Sue Me!]” Examining The Fcc’S Overbroad Calling Regulations Under The Tcpa, Marissa A. Potts
“Hello…It’S Me. [Please Don’T Sue Me!]” Examining The Fcc’S Overbroad Calling Regulations Under The Tcpa, Marissa A. Potts
Brooklyn Law Review
Americans have received unwanted telemarketing calls for decades. In response to a rapid increase in pre-recorded calls made using autodialer devices, Congress enacted the Telephone Consumer Protection Act (TCPA) in 1992. The TCPA imposes restrictions on calls made to consumers’ residences and wireless phones using autodialer devices, even if they are not telemarketing calls. Congress appointed the Federal Communications Commission (FCC) to prescribe rules and regulations to enforce the TCPA. In 2015, the FCC released an order that defined autodialer more broadly under the statute. Consequently, devices that have the potential to become autodialers in the future, even if they …
Fashion Forward: The Need For A Proactive Approach To The Counterfeit Epidemic, Casey Tripoli
Fashion Forward: The Need For A Proactive Approach To The Counterfeit Epidemic, Casey Tripoli
Brooklyn Journal of International Law
In the last two decades, the overall activity of the counterfeit market has expanded and risen 10,000 percent. This dramatic shift corresponds to growth of the Internet, which has unified the fascination of obtaining cheap, illegitimate goods with the efficiency of a mouse click. With the expected continued inflation of the counterfeit market comes a host of new concerns, namely, how to determine who is responsible for the distribution of these knockoffs, and who should be ordained to limit them in the marketplace. In both the United States and the European Union, however, outdated laws produce a mélange of inadequate …
The Art Of Nailing Jell-O To The Wall: Reassessing The Political Power Of The Internet, Bryan Druzin, Jessica Li
The Art Of Nailing Jell-O To The Wall: Reassessing The Political Power Of The Internet, Bryan Druzin, Jessica Li
Journal of Law and Policy
Political observers commonly argue that, given the unique characteristics of the Internet, democratization is an inevitability of its widespread use. The critical role that social media played in the wave of demonstrations, protests, and revolutions that swept across the Arab world in 2011 cemented this perception in the minds of many. Yet China defies this simplistic paradigm—China has been stunningly successful at constraining the political power of its Internet. We argue that the political importance of Internet technology has been overstated, particularly with respect to China. As support for this thesis, we cite recent political events in Hong Kong known …
Standing Up For Their Data: Recognizing The True Nature Of Injuries In Data Breach Claims To Afford Plaintiffs Article Iii Standing, Andrew Braunstein
Standing Up For Their Data: Recognizing The True Nature Of Injuries In Data Breach Claims To Afford Plaintiffs Article Iii Standing, Andrew Braunstein
Journal of Law and Policy
Over the last several years, data breaches have become increasingly more common, due in no small part to the failures of organizations charged with storing and protecting personal data. Consumers whose data has fallen victim to these breaches are more often turning to federal courts in attempts to be made whole from the loss of their information, whether simple credit card information or, as breaches become more sophisticated, social security information, medical and financial records, and more. These consumers are often being turned away from the courthouse, however, due to a failure of many federal courts to find that the …