Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Arrest; Aut Dedere Aut Judicare; Call Center; Caller ID; Con Artist; Concurrent Jurisdiction; Conviction; COVID-19; Cryptocurrency; Customary International Law; Cybercrime; Employment; Extradition; Extraterritoriality; Financial Crime; Fraud; Government Imposter; Immigration; International Covenant on Civil and Political Rights; Internet; INTERPOL; Investment Scam; Jurisdiction; Law Enforcement; Lottery Scam; Mutual Legal Assistance Treaty; Passive Personality Principle; Phone Call; Prosecution; Robocalls; Scam; Scarcity Principle; Sovereignty; Tax Fraud Scam; Technical Support; Technical Support; Scam; Telephone Calls; Territoriality Principle; Utilitarianism; Victim; Voice Over Internet Protocol (1)
- Artificial Intelligence; Intellectual Property; Patent Law; Copyright Law; DABUS; Stephen Thaler; Innovation; Generative AI; Federal Circuit; United States Patent and Trademark Office; United States Copyright Office; Congress; Digiwork; Patent; Copyright; IP; Authorship (1)
- Autodial (1)
- Autodialer (1)
- Autonomous Vehicles; Toyota Motor Company; Volkswagon; General Motors; National Highway Traffic Safety Administration; Vehicle Regulation; Self-Driving Vehicles (1)
-
- Call (1)
- Calling (1)
- Capacity (1)
- Class action (1)
- Compliance and technology; Self-regulatory organizations (SROs); Compliance; Financial regulations; Automated information gathering; Automated surveillance; Public disclosure; Information dissemination; Recordkeeping and reporting requirements; Dodd-Frank; Financial technology; Data analytics; Marketplace risks; Real-time regulation; Prophylactic regulation; “Regulation by enforcement” model; Empirical rulemaking; Culture of compliance; Homogenization of compliance practices; Cybersecurity; Human agency in compliance; Investment advisers; Broker-dealers; Regulatory performance standards; Revolving door; Corporate governance (1)
- Compliance technology; Corporate culture; Culture of compliance; Federal Sentencing Guidelines; Big data; Compliance monitoring and audits; Employee morale; Values based compliance; Command-and control approaches; Self-regulatory approaches; Financial regulation; Criminalized compliance; Corporate policing; Ethical misconduct (1)
- Computer Fraud and Abuse Act; CFAA; exceeds authorized access; Gilberto Valle; cannibal cop; United States v. Valle; Second Circuit; usage restrictions; quasi-strict liability (1)
- Computer; fiduciary; hacking; insider trading; securities; Securities Exchange Act; hacker-seller; 10b-5 (1)
- Consumers (1)
- Data breach; data protection; small businesses; breach notification framework; cybersecurity; MyBizHomepage; cyberattack; Code Spaces; Software as a Service; SaaS; cybercriminals; data security; Great Depression; World War II; Small Business Act of 1953; SBA; Small Business Administration; Privacy Rights Clearinghouse; ChoicePoint; Personally Identifiable Information; PII; consumer credit reporting information; Protected Health Information; PHI; Gramm-Leach-Bliley Act; GLBA; Bank Holding Company Act of 1956; Health Insurance Portability and Accountability Act of 1996; HIPAA; Federal Trade Commission; FTC; Fair Credit Reporting Act; civil penalties; Commonwealth v. Haney; Massachusetts Security Breaches Law; In re Yahoo! Inc. Customer Data Security Breach Litigation; California Customer Records Act; attorney general; Community Bank of Trenton v. Schnuck Markets; In re Target Corp. Customer Data Security Breach Litigation; Personal Data Privacy and Security Act; Personal Data Privacy and Security Act; Department of Homeland Security; National Institute of Standards and Technology (NIST) Small Business Cybersecurity Act; Cybersecurity Enhancement Act of 2014; Small Business Reauthorization Act of 1997; Historically Underutilized Business Zones; HUBZone; European Union; General Data Protection Regulation; GDPR; Privacy by Design; California Consumer Privacy Act; CCPA; liability insurance; burden-shifting (1)
- European Union; EU; Brazil; GDPR; General Data Protection Regulation; LGPD; privacy regulation (1)
- FCC (1)
- FTC (1)
- Federal Communications Commission (1)
- Federal Trade Commission (1)
- Lei Geral de Proteção de Dados Pessoais; Michel Temer; data privacy; data privacy protection; data privacy law; ANDP; Autoridade Nacional de Proteção de Dados; privacy law; Brazilian Constitution; Consumer Code of Protection and Defense; CDC; Marco Civil Law of the Internet; enforcement mechanism; Latin America (1)
- Prerecorded voice message (1)
- Privacy law; Cybersecurity; Hackers; FTC v. Wyndham Worldwide Corp.; Data breaches; Data security procedures; Self-regulatory organizations (SROs); Financial Trade Commission (FTC); Corporate privacy; Cyber Crime; Section 5 of the Federal Trade Commission Act; Deceptive or unfair business practice; Congressional inaction; Key principles of compliance; Best Practices Guidelines; Cyber risk insurance; Commercial general liability (CGL) insurance; First party cyber loss; Third party cyber liability; Technical policies and procedures; Written information security plan (WISP) (1)
- Robocall (1)
- Smartphone (1)
- TCPA (1)
- Telemarketer (1)
- Telemarketing (1)
- Telephone Consumer Protection Act (1)
- Text (1)
Articles 1 - 11 of 11
Full-Text Articles in Computer Law
Rise Of The Machines: The Future Of Intellectual Property Rights In The Age Of Artificial Intelligence, Sofia Vescovo
Rise Of The Machines: The Future Of Intellectual Property Rights In The Age Of Artificial Intelligence, Sofia Vescovo
Brooklyn Law Review
Artificial intelligence (AI) is not new to generating outputs considered suitable for intellectual property (IP) protection. However, recent technological advancements have made it possible for AI to transform from a mere tool used to assist in developing IP to the mind behind novel artistic works and inventions. One particular AI, DABUS, has done just so. Yet, while technology has advanced, IP law has not. This note sets out to provide a solution to the legal concerns raised by AI in IP law, specifically in the context of AI authorship and inventorship. The DABUS test case offers a model framework for …
Prosecuting The Phone Scammer When Extradition Fails And Concurrent Jurisdiction Exists, Michelle Lepkofker
Prosecuting The Phone Scammer When Extradition Fails And Concurrent Jurisdiction Exists, Michelle Lepkofker
Brooklyn Journal of International Law
Advancements in technology allow people to place phone calls half a world away via the internet. This technology has made it easier and cheaper for consumers to communicate, but it has also made it easier for scammers to reach more unsuspecting victims. In 2020, TrueCaller, an app designed to block scam phone calls, successfully blocked, and identified 31.3 billion spam calls in 20 countries. In the same year, Americans alone lost a total of USD $ 29.8 billion to scam calls. This Note argues that phone scams continue to be lucrative, in part, because criminal prosecutions of transnational crimes are …
Saving Small Business From The Big Impact Of Data Breach: A Tiered Federal Approach To Data Protection Law, Nadia Udeshi
Saving Small Business From The Big Impact Of Data Breach: A Tiered Federal Approach To Data Protection Law, Nadia Udeshi
Brooklyn Journal of Corporate, Financial & Commercial Law
Small businesses provide a significant positive impact on the American economy. However, the current fragmented federal and state data protection and breach notification legal scheme puts the viability of small businesses at risk. While the probability of data breaches occurring continues to increase, small businesses lack the financial and technological resources to contend with the various state and federal laws that impose different monetary penalties and remedial requirements in the event of such breaches. To preserve the viability of small businesses, Congress should enact a centralized, multi-tiered federal data protection and breach notification framework that preempts state laws, imposes minimum …
Comparative Analysis Of The Eu’S Gdpr And Brazil’S Lgpd: Enforcement Challenges With The Lgpd, Abigayle Erickson
Comparative Analysis Of The Eu’S Gdpr And Brazil’S Lgpd: Enforcement Challenges With The Lgpd, Abigayle Erickson
Brooklyn Journal of International Law
In the wake of the adoption of the European Union’s General Data Protection Regulation (GDPR) in May 2018, other countries and jurisdictions have contemplated personal data privacy legislation. In August 2018, the former president of Brazil, Michel Temer, signed the country’s comprehensive data privacy regulation, Lei Geral de Proteção de Dados Pessoais (LGPD), into law. Temer, however, vetoed many of the enforcement provisions. Shortly before leaving office, Temer signed an executive order creating a regulatory agency as the bill initially called for, but situated the agency under executive control instead of creating a wholly independent agency. This Note provides a …
The Race Is On! Regulating Self-Driving Vehicles Before They Hit The Streets, Jack Liechtung
The Race Is On! Regulating Self-Driving Vehicles Before They Hit The Streets, Jack Liechtung
Brooklyn Journal of Corporate, Financial & Commercial Law
As the world braces itself for the unveiling of autonomous vehicles, the idea of regulation and oversight has gone largely undetected. Though some states have already begun enacting legislation ahead of the technology’s wide release, the regulatory landscape across the country is in disarray. It is imperative that both manufacturers and consumers be given some sort of uniform understanding as to how the automation is overseen throughout the manufacturing process and how liability will be levied in the case of inevitable mistakes on our nation’s roadways. This Note proposes that the National Highway Traffic Safety Administration be responsible for providing …
Clicks And Tricks: How Computer Hackers Avoid 10b-5 Liability, Ryan H. Gilinson
Clicks And Tricks: How Computer Hackers Avoid 10b-5 Liability, Ryan H. Gilinson
Brooklyn Law Review
This note argues that computer hackers who sell inside information instead of trading on it themselves, referred to in the note as hacker-sellers, avoid liability under Section 10(b) of the Securities Exchange Act and SEC Rule 10b-5. Rule 10b-5 criminalizes the use of a manipulative or deceptive device “in connection with the purchase or sale of any security.” Hacker-sellers fall outside the scope of this rule for two reasons. First, the type of hacking employed by hacker-sellers is not always “deceptive,” and only the forms of hacking which deceive the computer into thinking an authorized user is seeking access are …
Cannibal Cop Out: The Computer Fraud And Abuse Act, Lenity, Quasi-Strict Liability, Draconian Punishment And A Surgical Solution, Charles S. Wood
Cannibal Cop Out: The Computer Fraud And Abuse Act, Lenity, Quasi-Strict Liability, Draconian Punishment And A Surgical Solution, Charles S. Wood
Brooklyn Law Review
The Second Circuit has recently joined in a longstanding circuit split regarding the interpretation of the phrase “exceeds authorized access” under the Computer Fraud and Abuse Act (CFAA). The split centers around whether an otherwise authorized computer user who violates usage restrictions has exceeded authorized access. In United States v. Valle, the Second Circuit answered the question in the negative. Upon finding the phrase to be ambiguous, the Second Circuit invoked lenity, and therefore narrowly construed their interpretation in the defendant’s favor. This note argues that the Second Circuit was correct to apply lenity as the plain meaning of the …
Preserving Human Agency In Automated Compliance, Onnig H. Dombalagian
Preserving Human Agency In Automated Compliance, Onnig H. Dombalagian
Brooklyn Journal of Corporate, Financial & Commercial Law
As technology transforms financial services, so too must it transform the regulation of financial markets and intermediaries. The imperative of real-time, prophylactic regulation increasingly compels reallocation of regulatory and compliance budgets to surveillance and enforcement technology. At the same time, in light of the well-known weaknesses of automated systems, securities firms (and their regulators) must temper investment in automation with efforts to augment the agency of compliance professionals. This symposium contribution considers how investment in the professional development of compliance personnel can better integrate automated tools within established compliance and supervisory structures and thereby advance regulatory and operational objectives.
“Hello…It’S Me. [Please Don’T Sue Me!]” Examining The Fcc’S Overbroad Calling Regulations Under The Tcpa, Marissa A. Potts
“Hello…It’S Me. [Please Don’T Sue Me!]” Examining The Fcc’S Overbroad Calling Regulations Under The Tcpa, Marissa A. Potts
Brooklyn Law Review
Americans have received unwanted telemarketing calls for decades. In response to a rapid increase in pre-recorded calls made using autodialer devices, Congress enacted the Telephone Consumer Protection Act (TCPA) in 1992. The TCPA imposes restrictions on calls made to consumers’ residences and wireless phones using autodialer devices, even if they are not telemarketing calls. Congress appointed the Federal Communications Commission (FCC) to prescribe rules and regulations to enforce the TCPA. In 2015, the FCC released an order that defined autodialer more broadly under the statute. Consequently, devices that have the potential to become autodialers in the future, even if they …
The Question Concerning Technology In Compliance, Sean J. Griffith
The Question Concerning Technology In Compliance, Sean J. Griffith
Brooklyn Journal of Corporate, Financial & Commercial Law
In this symposium Essay, I apply insights from philosophy and psychology to argue that modes of achieving compliance that focus on technology undermine, and are undermined by, modes of achieving compliance that focus on culture. Insisting on both may mean succeeding at neither. How an organization resolves this apparent contradiction in program design, like the broader question of optimal corporate governance arrangements, is highly idiosyncratic. Firms should therefore be accorded maximum freedom in designing their compliance programs, rather than being forced by enforcement authorities into a set of de facto mandatory compliance structures.
Like A Bad Neighbor, Hackers Are There: The Need For Data Security Legislation And Cyber Insurance In Light Of Increasing Ftc Enforcement Actions, Jennifer Gordon
Like A Bad Neighbor, Hackers Are There: The Need For Data Security Legislation And Cyber Insurance In Light Of Increasing Ftc Enforcement Actions, Jennifer Gordon
Brooklyn Journal of Corporate, Financial & Commercial Law
Privacy has come to the forefront of the technology world as third party hackers are constantly attacking companies for their customers’ data. With increasing instances of compromised customer information, the Federal Trade Commission (FTC) has been bringing suit against companies for inadequate data security procedures. The FTC’s newfound authority to bring suit regarding cybersecurity breaches, based on the Third Circuit’s decision in FTC v. Wyndham Worldwide Corp., is a result of inaction—Congress has been unable to pass sufficient cybersecurity legislation, causing the FTC to step in and fill the void in regulation. In the absence of congressional action, this self-proclaimed …