Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Internet law (2)
- Administrative law (1)
- Administrative state (1)
- Agency rule (1)
- Anti-discrimination law (1)
-
- Antitrust (1)
- Artificial intelligence (1)
- Block.one (1)
- Blockchain (1)
- CCPA (1)
- California (1)
- California Consumer Privacy Act (1)
- Circumvention (1)
- Compulsory Licensing (1)
- Confusion (1)
- Congress (1)
- Consumer privacy (1)
- Consumer protection (1)
- Copyright (1)
- Copyright law (1)
- Crypto (1)
- Cryptocurrency (1)
- Data (1)
- Data breach (1)
- Data for good (1)
- Data privacy (1)
- Decentralization (1)
- Digital coin (1)
- Digital token (1)
- Disability law (1)
- Publication
- Publication Type
Articles 1 - 14 of 14
Full-Text Articles in Consumer Protection Law
Easing The Burdens Of A Patchwork Approach To Data Privacy Regulation In Favor Of A Singular Comprehensive International Solution—The International Data Privacy Agreement, Scott Resnick
Brooklyn Journal of International Law
Data privacy has become one of the premier hot-button issues in today’s increasingly digital human experience. Legislatures around the globe have attempted to act swiftly in an effort to safeguard the highly coveted personal information of their citizens and combat misuse at the hands of international businesses operating with an online presence. Since the European Union’s enactment of the General Data Protection Regulation (GDPR) in 2018, countries around the globe have been grappling with how best to replicate the EU’s leading data privacy regulation while providing the same or greater level of transparency into data collection practices. While a mere …
Can David Really Beat Goliath? A Look Into The Anti-Competitive Restrictions Of Apple Inc. And Google, Llc, Emily Feeley
Can David Really Beat Goliath? A Look Into The Anti-Competitive Restrictions Of Apple Inc. And Google, Llc, Emily Feeley
The University of Cincinnati Intellectual Property and Computer Law Journal
No abstract provided.
Symposium: The California Consumer Privacy Act, Margot Kaminski, Jacob Snow, Felix Wu, Justin Hughes
Symposium: The California Consumer Privacy Act, Margot Kaminski, Jacob Snow, Felix Wu, Justin Hughes
Loyola of Los Angeles Law Review
Loyola of Los Angeles Law Review is pleased to publish the third “symposium discussion” series in which leading experts are invited to engage in an evening symposium on a new or emerging area of law. The subject of our second evening symposium was the California Consumer Privacy Act (CCPA), a statute signed into state law by then- Governor Jerry Brown on June 28, 2018 and effective as of January 1, 2020.
As with most new law, there are many unsettled issues, disagreements about the likely impact of the law, and much to be developed as regulations are established and the …
Fan Films And Fanworks In The Age Of Social Media: How Copyright Owners Are Relying On Private Ordering To Avoid Angering Fans, Kagen Despain
Fan Films And Fanworks In The Age Of Social Media: How Copyright Owners Are Relying On Private Ordering To Avoid Angering Fans, Kagen Despain
BYU Law Review
Fandoms active in creating “fanworks” are increasingly able to leverage social media to coordinate and respond to owners of large media franchises who attempt to limit the creation and distribution of fan films. The resulting friction between these groups can be more efficiently addressed through private ordering rather than through formal legal reform.
Preservation Requests And The Fourth Amendment, Armin Tadayon
Preservation Requests And The Fourth Amendment, Armin Tadayon
Seattle University Law Review
Every day, Facebook, Twitter, Google, Amazon, ridesharing companies, and numerous other service providers copy users’ account information upon receiving a preservation request from the government. These requests are authorized under a relatively obscure subsection of the Stored Communications Act (SCA). The SCA is the federal statute that governs the disclosure of communications stored by third party service providers. Section 2703(f) of this statute authorizes the use of “f” or “preservation” letters, which enable the government to request that a service provider “take all necessary steps to preserve records and other evidence in its possession” while investigators seek valid legal process. …
Enough Is As Good As A Feast, Noah C. Chauvin
Enough Is As Good As A Feast, Noah C. Chauvin
Seattle University Law Review
Ipse Dixit, the podcast on legal scholarship, provides a valuable service to the legal community and particularly to the legal academy. The podcast’s hosts skillfully interview guests about their legal and law-related scholarship, helping those guests communicate their ideas clearly and concisely. In this review essay, I argue that Ipse Dixit has made a major contribution to legal scholarship by demonstrating in its interview episodes that law review articles are neither the only nor the best way of communicating scholarly ideas. This contribution should be considered “scholarship,” because one of the primary goals of scholarship is to communicate new ideas.
A False Sense Of Security: How Congress And The Sec Are Dropping The Ball On Cryptocurrency, Tessa E. Shurr
A False Sense Of Security: How Congress And The Sec Are Dropping The Ball On Cryptocurrency, Tessa E. Shurr
Dickinson Law Review (2017-Present)
Today, companies use blockchain technology and digital assets for a variety of purposes. This Comment analyzes the digital token. If the Securities and Exchange Commission (SEC) views a digital token as a security, then the issuer of the digital token must comply with the registration and extensive disclosure requirements of federal securities laws.
To determine whether a digital asset is a security, the SEC relies on the test that the Supreme Court established in SEC v. W.J. Howey Co. Rather than enforcing a statute or agency rule, the SEC enforces securities laws by applying the Howey test on a fact-intensive …
Table Of Contents, Seattle University Law Review
Table Of Contents, Seattle University Law Review
Seattle University Law Review
Table of Contents
Tech Policy And Legal Theory Syllabus, Yafit Lev-Aretz, Nizan Packin
Tech Policy And Legal Theory Syllabus, Yafit Lev-Aretz, Nizan Packin
Open Educational Resources
Technology has changed dramatically over the last couple of decades. Currently, virtually all business industries are powered by large quantities of data. The potential as well as actual uses of business data, which oftentimes includes personal user data, raise complex issues of informed consent and data protection. This course will explore many of these complex issues, with the goal of guiding students into thinking about tech policy from a broad ethical perspective as well as preparing students to responsibly conduct themselves in different areas and industries in a world growingly dominated by technology.
Placebo Marks, Jake Linford
Placebo Marks, Jake Linford
Pepperdine Law Review
Scholars often complain that sellers use trademarks to manipulate consumer perception. This manipulation ostensibly harms consumers by limiting their ability to make informed choices. For example, holding other things constant, consumers spend more money on goods with a high-performance reputation. Critics characterize that result as wasteful, if not anticompetitive. But recent marketing research shows that trademarks with a high-performance reputation may sometimes influence perception to the benefit of the consumer. A trademark with a high-performance reputation can deliver a performance-enhancing placebo effect. Research subjects perform better at physical and mental tasks when they prepare or play with a product bearing …
Unscrewing The Future: The Right To Repair And The Circumvention Of Software Tpms In The Eu, Anthony D. Rosborough
Unscrewing The Future: The Right To Repair And The Circumvention Of Software Tpms In The Eu, Anthony D. Rosborough
Articles, Book Chapters, & Popular Press
This analysis examines the impact of software technological protection measures (“TPMs”) in the European Union which inhibit the repair and maintenance of products. Using John Deere tractors as a case study, this analysis addresses the growing number of products which incorporate computerisation and TPMprotected software into their design and function. In utilising software integration and TPMs, many product designs now allow manufacturers to retain considerable control over the manner of repair and choice of technician. In response, consumers and lawmakers are calling for legal reforms to make self-repair and servicing easier. Both the competition law and moral implications of this …
In Memory Of Professor James E. Bond, Janet Ainsworth
In Memory Of Professor James E. Bond, Janet Ainsworth
Seattle University Law Review
Janet Ainsworth, Professor of Law at Seattle University School of Law: In Memory of Professor James E. Bond.
Table Of Contents, Seattle University Law Review
Table Of Contents, Seattle University Law Review
Seattle University Law Review
Table of Contents
Internet Architecture And Disability, Blake E. Reid
Internet Architecture And Disability, Blake E. Reid
Publications
The Internet is essential for education, employment, information, and cultural and democratic participation. For tens of millions of people with disabilities in the United States, barriers to accessing the Internet—including the visual presentation of information to people who are blind or visually impaired, the aural presentation of information to people who are deaf or hard of hearing, and the persistence of Internet technology, interfaces, and content without regard to prohibitive cognitive load for people with cognitive and intellectual disabilities—collectively pose one of the most significant civil rights issues of the information age. Yet disability law lacks a comprehensive theoretical approach …