Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Science and Technology Law (6)
- Administrative Law (5)
- Internet Law (5)
- Legislation (5)
- Consumer Protection Law (4)
-
- Civil Law (3)
- Communications Law (3)
- Entertainment, Arts, and Sports Law (3)
- Banking and Finance Law (2)
- Business Organizations Law (2)
- Commercial Law (2)
- Criminal Law (2)
- Gaming Law (2)
- Insurance Law (2)
- Intellectual Property Law (2)
- Law and Society (2)
- Other Law (2)
- Privacy Law (2)
- Securities Law (2)
- Agency (1)
- Civil Procedure (1)
- Constitutional Law (1)
- Contracts (1)
- Energy and Utilities Law (1)
- European Law (1)
- Labor and Employment Law (1)
- Law and Economics (1)
- Law and Philosophy (1)
- Keyword
-
- Autonomous Vehicles; Toyota Motor Company; Volkswagon; General Motors; National Highway Traffic Safety Administration; Vehicle Regulation; Self-Driving Vehicles (1)
- Compliance and technology; Self-regulatory organizations (SROs); Compliance; Financial regulations; Automated information gathering; Automated surveillance; Public disclosure; Information dissemination; Recordkeeping and reporting requirements; Dodd-Frank; Financial technology; Data analytics; Marketplace risks; Real-time regulation; Prophylactic regulation; “Regulation by enforcement” model; Empirical rulemaking; Culture of compliance; Homogenization of compliance practices; Cybersecurity; Human agency in compliance; Investment advisers; Broker-dealers; Regulatory performance standards; Revolving door; Corporate governance (1)
- Compliance technology; Corporate culture; Culture of compliance; Federal Sentencing Guidelines; Big data; Compliance monitoring and audits; Employee morale; Values based compliance; Command-and control approaches; Self-regulatory approaches; Financial regulation; Criminalized compliance; Corporate policing; Ethical misconduct (1)
- Cyber-attacks; cyber-crime; information security; cybersecurity; Ponemon Institute; data sharing; data breach; Securities Exchange Commission; SEC; hacking; information technology system; phishing; Department of Justice; DOJ; cybercriminal; malware; spyware; IT; Denial of Service Attacks; DoS; DDoS; Distributed Denial of Service campaign; third-party vendor attack; Dumpster Diving; Economic Espionage; Trade Secret Misappropriation; Office of Compliance Inspections and Examinations; OCIE; Financial Industry Regulatory Authority; FINRA; broker-dealer; Risk Alert; Regulation S-P; Gramm-Leach-Bliley Act; GLBA; Computer Fraud and Abuse Act; CFAA; protected computer; United States v. Valle; Electronic Communications Privacy Act; ECPA; The Wiretap Act; The Stored Communications Act; SCA; The Pen Registry Act; Federal Trade Commission; FTC; Federal Deposit Insurance Corporation; FDIC; Federal Reserve; Economic Espionage Act; EEA; Defend Trade Secrets Act; DTSA; Huawei Technologies Co.; Cybersecurity Disclosure Act of 2017 and 2018; common law; class action; standing; Rule 23(a); 23(b)(3); negligence; breach of contract; derivative shareholder suits; Wyndham Worldwide Corporation; Regulatory Systems Compliance and Integrity; SCI; Regulation S-ID; Regulation S-P; General Disclosure Provisions; 503(c); Regulation S-K; Description of Business; financial statements; Framework for Improving Critical Infrastructure Cybersecurity; compliance; disaster plan; plaintext; ciphertext; crisis management; due diligence; The Protecting Cyber Networks Act; PCNA; National Cybersecurity Protection Advancement Act of 2015; NCPAA; The Cybersecurity Information Sharing Act; CISA; Privacy and Civil Liberties Oversight Board; Department of Homeland Security; DHS; National Cybersecurity and Communications Integration Center; NCIC; U.S. Chamber of Commerce Leadership Council; (1)
- Cybersecurity; Whistleblowers; Internal reporting; Whistleblower protections; Cybersecurity disclosure regulations; Compliance systems; Securities Regulation; Corporate Governance; Retaliation; Dodd-Frank; Corporate compliance culture; Securities and Exchange Commission (SEC) guidelines; White hat hackers/Ethical hackers; Non-binding regulation; Fraud categories; Egan v. TradingScreen (1)
-
- Data breach; data protection; small businesses; breach notification framework; cybersecurity; MyBizHomepage; cyberattack; Code Spaces; Software as a Service; SaaS; cybercriminals; data security; Great Depression; World War II; Small Business Act of 1953; SBA; Small Business Administration; Privacy Rights Clearinghouse; ChoicePoint; Personally Identifiable Information; PII; consumer credit reporting information; Protected Health Information; PHI; Gramm-Leach-Bliley Act; GLBA; Bank Holding Company Act of 1956; Health Insurance Portability and Accountability Act of 1996; HIPAA; Federal Trade Commission; FTC; Fair Credit Reporting Act; civil penalties; Commonwealth v. Haney; Massachusetts Security Breaches Law; In re Yahoo! Inc. Customer Data Security Breach Litigation; California Customer Records Act; attorney general; Community Bank of Trenton v. Schnuck Markets; In re Target Corp. Customer Data Security Breach Litigation; Personal Data Privacy and Security Act; Personal Data Privacy and Security Act; Department of Homeland Security; National Institute of Standards and Technology (NIST) Small Business Cybersecurity Act; Cybersecurity Enhancement Act of 2014; Small Business Reauthorization Act of 1997; Historically Underutilized Business Zones; HUBZone; European Union; General Data Protection Regulation; GDPR; Privacy by Design; California Consumer Privacy Act; CCPA; liability insurance; burden-shifting (1)
- Inc.; Administrative authority; Shareholder protection; Security breach; Materiality; Cyber-risk (1)
- Murphy; Murphy v. National; NCAA; Cyberdefensive; Regulation; Regulation of Sports; Sports; Betting; Sports Gambling; Online Gambling; Hackers; Cybersecurity; FTC; SEC; Sports Gambling; Gambling; PASPA; Sports Betting; Gaming Enforcement (1)
- Open Internet Order; Federal Communication Commission; Net Neutrality; Equal and Open Internet; Throttling Access; Internet; Online; Restoring Internet Freedom Order; Digital Piracy; Copyright Infringement (1)
- Privacy law; Cybersecurity; Hackers; FTC v. Wyndham Worldwide Corp.; Data breaches; Data security procedures; Self-regulatory organizations (SROs); Financial Trade Commission (FTC); Corporate privacy; Cyber Crime; Section 5 of the Federal Trade Commission Act; Deceptive or unfair business practice; Congressional inaction; Key principles of compliance; Best Practices Guidelines; Cyber risk insurance; Commercial general liability (CGL) insurance; First party cyber loss; Third party cyber liability; Technical policies and procedures; Written information security plan (WISP) (1)
- Youtube; Let's Play; Copyright; Unlicensed Copyright; Fair Use; Fair Use Doctrine; Nintendo; Let's Play videos; Copyright holders; Nintendo Creators Program; Fair use defense; contracts; contractual obligations; fan-created; recordings; video games; gamers; Twitch; user-generated; video hosting; revenue; DMCA; Content ID (1)
Articles 1 - 10 of 10
Full-Text Articles in Computer Law
The Criminal, Regulatory, And Civil Issues Surrounding Intellectual Property And Cybersecurity, Ernest Edward Badway, Christie Mcguinness
The Criminal, Regulatory, And Civil Issues Surrounding Intellectual Property And Cybersecurity, Ernest Edward Badway, Christie Mcguinness
Brooklyn Journal of Corporate, Financial & Commercial Law
Cyber-attacks have affected all organizations and individual consumers. Dissemination of relevant information and attention to strong information security practices is an important tool in fighting this cyber “pandemic.” Additionally, the legal and regulatory liability companies face from cyber-attacks as well as general strategies and practical solutions companies may implement to protect against cyber-intrusions and respond effectively in the event of an attack are considered. There are many iterations of cyber-crime, and we address the various methods cybercriminals use and the many ways cyber-attacks can take place, as well as the entities and victims affected. Moreover, the legal liability and regulatory …
Saving Small Business From The Big Impact Of Data Breach: A Tiered Federal Approach To Data Protection Law, Nadia Udeshi
Saving Small Business From The Big Impact Of Data Breach: A Tiered Federal Approach To Data Protection Law, Nadia Udeshi
Brooklyn Journal of Corporate, Financial & Commercial Law
Small businesses provide a significant positive impact on the American economy. However, the current fragmented federal and state data protection and breach notification legal scheme puts the viability of small businesses at risk. While the probability of data breaches occurring continues to increase, small businesses lack the financial and technological resources to contend with the various state and federal laws that impose different monetary penalties and remedial requirements in the event of such breaches. To preserve the viability of small businesses, Congress should enact a centralized, multi-tiered federal data protection and breach notification framework that preempts state laws, imposes minimum …
Playing Fair: Youtube, Nintendo, And The Lost Balance Of Online Fair Use, Natalie Marfo
Playing Fair: Youtube, Nintendo, And The Lost Balance Of Online Fair Use, Natalie Marfo
Brooklyn Journal of Corporate, Financial & Commercial Law
Over the past decade, YouTube saw an upsurge in the popularity of “Let’s Play” videos. While positive for YouTube, this uptick was not without controversy. Let’s Play videos use unlicensed copyrighted materials, frustrating copyright holders. YouTube attempted to curb such usages by demonetizing and removing thousands of Let’s Play videos. Let’s Play creators struck back, arguing that the fair use doctrine protects their works. An increasing number of powerful companies, like Nintendo, began exploiting the ambiguity of the fair use doctrine against the genre; forcing potentially legal works to request permission and payment for Let’s Play videos, without a determination …
On The Clock, Best Bet To Draft Cyberdefensive Linemen: Federal Regulation Of Sports Betting From A Cybersecurity Perspective, William H. Williams
On The Clock, Best Bet To Draft Cyberdefensive Linemen: Federal Regulation Of Sports Betting From A Cybersecurity Perspective, William H. Williams
Brooklyn Journal of Corporate, Financial & Commercial Law
On May 14, 2018, Justice Alito delivered the majority opinion for the United States Supreme Court in Murphy v. National Collegiate Athletic Association (NCAA). The Professional and Amateur Protection Act (PASPA), a twenty-six-year-old federal statute, was deemed unconstitutional; thus, this decision allows state legislatures to legalize sports betting within their borders. With many states independently legalizing sports gambling, the regulatory landscape throughout the country is becoming a patchwork of state statutes. Additionally, top tier sporting organizations heavily depend on data analytics to formulate game plan strategy, train efficiently, rehab player injuries, gauge team and player performance, etc. The popularity of …
Remnants Of Net Neutrality: Policing Unlawful Content Through Broadband Providers, Aaron Lerman
Remnants Of Net Neutrality: Policing Unlawful Content Through Broadband Providers, Aaron Lerman
Brooklyn Journal of Corporate, Financial & Commercial Law
The 2015 Open Internet Order, released by The Federal Communication Commission (FCC), introduced sweeping, new rules that promised to preserve an equal and open Internet to consumers. These rules, otherwise known as “Net Neutrality,” prohibited broadband and internet service providers from impairing, blocking, or throttling access to “lawful content” online. But with a new administration and agenda, the FCC’s 2017 Restoring Internet Freedom Order repealed Net Neutrality. Since then, various states have pushed back against the repeal, with some adopting their own versions of the 2015 Open Internet Order’s Net Neutrality, keeping most of the rule language intact, including the …
The Race Is On! Regulating Self-Driving Vehicles Before They Hit The Streets, Jack Liechtung
The Race Is On! Regulating Self-Driving Vehicles Before They Hit The Streets, Jack Liechtung
Brooklyn Journal of Corporate, Financial & Commercial Law
As the world braces itself for the unveiling of autonomous vehicles, the idea of regulation and oversight has gone largely undetected. Though some states have already begun enacting legislation ahead of the technology’s wide release, the regulatory landscape across the country is in disarray. It is imperative that both manufacturers and consumers be given some sort of uniform understanding as to how the automation is overseen throughout the manufacturing process and how liability will be levied in the case of inevitable mistakes on our nation’s roadways. This Note proposes that the National Highway Traffic Safety Administration be responsible for providing …
Preserving Human Agency In Automated Compliance, Onnig H. Dombalagian
Preserving Human Agency In Automated Compliance, Onnig H. Dombalagian
Brooklyn Journal of Corporate, Financial & Commercial Law
As technology transforms financial services, so too must it transform the regulation of financial markets and intermediaries. The imperative of real-time, prophylactic regulation increasingly compels reallocation of regulatory and compliance budgets to surveillance and enforcement technology. At the same time, in light of the well-known weaknesses of automated systems, securities firms (and their regulators) must temper investment in automation with efforts to augment the agency of compliance professionals. This symposium contribution considers how investment in the professional development of compliance personnel can better integrate automated tools within established compliance and supervisory structures and thereby advance regulatory and operational objectives.
The Question Concerning Technology In Compliance, Sean J. Griffith
The Question Concerning Technology In Compliance, Sean J. Griffith
Brooklyn Journal of Corporate, Financial & Commercial Law
In this symposium Essay, I apply insights from philosophy and psychology to argue that modes of achieving compliance that focus on technology undermine, and are undermined by, modes of achieving compliance that focus on culture. Insisting on both may mean succeeding at neither. How an organization resolves this apparent contradiction in program design, like the broader question of optimal corporate governance arrangements, is highly idiosyncratic. Firms should therefore be accorded maximum freedom in designing their compliance programs, rather than being forced by enforcement authorities into a set of de facto mandatory compliance structures.
The Cybersecurity Threat: Compliance And The Role Of Whistleblowers, Jennifer M. Pacella
The Cybersecurity Threat: Compliance And The Role Of Whistleblowers, Jennifer M. Pacella
Brooklyn Journal of Corporate, Financial & Commercial Law
In today’s technologically dependent world, concerns about cybersecurity, data breaches, and compromised personal information infiltrate the news almost daily. The Securities and Exchange Commission (SEC) has recently emerged as a regulator that is keenly focused on cybersecurity, specifically with respect to encouraging disclosures in this arena by regulated entities. Although the SEC has issued non-binding “guidance” to help companies navigate their reporting obligations in this sector, the agency lacks binding cybersecurity disclosure regulations as they pertain generally to public companies. Given that the SEC has already relied on such guidance in threatening enforcement actions, reporting companies are increasingly pressured for …
Like A Bad Neighbor, Hackers Are There: The Need For Data Security Legislation And Cyber Insurance In Light Of Increasing Ftc Enforcement Actions, Jennifer Gordon
Like A Bad Neighbor, Hackers Are There: The Need For Data Security Legislation And Cyber Insurance In Light Of Increasing Ftc Enforcement Actions, Jennifer Gordon
Brooklyn Journal of Corporate, Financial & Commercial Law
Privacy has come to the forefront of the technology world as third party hackers are constantly attacking companies for their customers’ data. With increasing instances of compromised customer information, the Federal Trade Commission (FTC) has been bringing suit against companies for inadequate data security procedures. The FTC’s newfound authority to bring suit regarding cybersecurity breaches, based on the Third Circuit’s decision in FTC v. Wyndham Worldwide Corp., is a result of inaction—Congress has been unable to pass sufficient cybersecurity legislation, causing the FTC to step in and fill the void in regulation. In the absence of congressional action, this self-proclaimed …