Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Publication Type
Articles 1 - 13 of 13
Full-Text Articles in Consumer Protection Law
Nsfw: An Empirical Study Of Scandalous Trademarks, Megan M. Carpenter
Nsfw: An Empirical Study Of Scandalous Trademarks, Megan M. Carpenter
Megan M Carpenter
This project is an empirical analysis of trademarks that have received rejections based on the judgment that they are “scandalous." It is the first of its kind. The Lanham Act bars registration for trademarks that are “scandalous” and “immoral.” While much has been written on the morality provisions in the Lanham Act generally, this piece is the first scholarly project that engages an empirical analysis of 2(a) rejections based on scandalousness; it contains a look behind the scenes at how the morality provisions are applied throughout the trademark registration process. We study which marks are being rejected, what evidence is …
E-Commerce And Electronic Payment System Risks: Lessons From Paypal, Lawrence J. Trautman
E-Commerce And Electronic Payment System Risks: Lessons From Paypal, Lawrence J. Trautman
Lawrence J. Trautman Sr.
What are the major risks perceived by those engaged in e-commerce and electronic payment systems? What development risks, if they become reality, may cause substantial increases in operating costs or threaten the very survival of the enterprise? This article utilizes the relevant annual report disclosures from eBay (parent of PayPal), along with other eBay and PayPal documents, as a potentially powerful teaching device. Most of the descriptive language to follow is excerpted directly from eBay’s regulatory filings. My additions include weaving these materials into a logical presentation and providing supplemental sources for those who desire a deeper look (usually in …
Flawed Transparency: Shared Data Collection And Disclosure Challenges For Google Glass And Similar Technologies, Jonathan I. Ezor
Flawed Transparency: Shared Data Collection And Disclosure Challenges For Google Glass And Similar Technologies, Jonathan I. Ezor
Jonathan I. Ezor
Current privacy law and best practices assume that the party collecting the data is able to describe and disclose its practices to those from and about whom the data are collected. With emerging technologies such as Google Glass, the information being collected by the wearer may be automatically shared to one or more third parties whose use may be substantially different from that of the wearer. Often, the wearer may not even know what information is being uploaded, and how it may be used. This paper will analyze the current state of U.S. law and compliance regarding personal information collection …
Privacy, Transparency & Google's Blurred Glass, Jonathan I. Ezor
Privacy, Transparency & Google's Blurred Glass, Jonathan I. Ezor
Jonathan I. Ezor
No matter the context or jurisdiction, one concept underlies every view of the best practices in data privacy: transparency. The mandate to disclose what personal information is collected, how it is used, and with whom and for what purpose it is shared, is essential to enable informed consent to the collection, along with the other user rights that constitute privacy best practices. Google, which claims to support and offer transparency, is increasingly opaque about its many products and services and the information they collect for it, posing a significant privacy concern.
Privacy And Data Protection In Business: Laws And Practices (Sample Chapters), Jonathan I. Ezor
Privacy And Data Protection In Business: Laws And Practices (Sample Chapters), Jonathan I. Ezor
Jonathan I. Ezor
In the fields of digital privacy and data protection in the business world, effective compliance and risk management require not only knowledge of applicable laws and regulations, but at least a basic understanding of relevant technologies and the processes of the company or other organization that is collecting and/or using the personal information or monitoring behavior. This book is structured to provide a framework for law and other students to both learn the law and place it in the necessary technological and practical context, divided into topic areas such as children’s privacy, health information, governmental requirements, employee data and more. …
Private Copyright: Digital Rights Management Systems And The Consumer, Victor Nicholas Knipe
Private Copyright: Digital Rights Management Systems And The Consumer, Victor Nicholas Knipe
ExpressO
Digital Rights Managements (DRM) systems impact the digital content and software marketplace on several levels. The issues include copyright law, contract law, privacy, antitrust, and consumer protection. This paper examines how DRM systems affect the consumer and what changes can be made to bring about a more sensible and transparent market in the United States.
A Complete Property Right Amendment, John H. Ryskamp
A Complete Property Right Amendment, John H. Ryskamp
ExpressO
The trend of the eminent domain reform and "Kelo plus" initiatives is toward a comprehensive Constitutional property right incorporating the elements of level of review, nature of government action, and extent of compensation. This article contains a draft amendment which reflects these concerns.
Technoconsen(T)Sus, Andrea M. Matwyshyn
Technoconsen(T)Sus, Andrea M. Matwyshyn
ExpressO
Law is contributing to an information security paradox. Consumers are regularly “consenting” to the installation of computer code that makes them more vulnerable to harms such as identity theft. In particular, digital rights management technology accompanying digital music has recently left a wake of compromised user machines. Using the case study of security-invasive digital rights management technology, this article argues that a fundamental tension exists among intellectual property law, computer intrusion law and contract law regarding meaningful consumer consent in digital contexts. This article proposes to ease the noise in consent doctrine through creating an objective “reasonable digital consumer” standard …
Are Patented Research Tools Still Valuable? Use, Intent, And A Rebuttable Presumption: A Proposed Modification For Analyzing The Exemption From Patent Infringement Under 35 Usc 271 (E) (1), Vihar R. Patel
ExpressO
Briefly, the article proposes to have courts focus on the nature of an individual's use and apply the "UART" (Use As a Research Tool) factors to determine if a patented invention is being used as a research tool. If a patented invention is being used as a research tool, then the court is to presume that the activities are not covered by the FDA exemption. However, this presumption can be rebutted by a researcher's demonstration of the research tool owner using his patent to block efforts to develop a competing product. If the presumption is rebutted, then the court applies …
Bond Repudiation, Tax Codes, The Appropriations Process And Restitution Post-Eminent Domain Reform, John H. Ryskamp
Bond Repudiation, Tax Codes, The Appropriations Process And Restitution Post-Eminent Domain Reform, John H. Ryskamp
ExpressO
This brief comment suggests where the anti-eminent domain movement might be heading next.
Breaking The Bank: Revisiting Central Bank Of Denver After Enron And Sarbanes-Oxley, Celia Taylor
Breaking The Bank: Revisiting Central Bank Of Denver After Enron And Sarbanes-Oxley, Celia Taylor
ExpressO
No abstract provided.
Intellectual Property Rights In Digital Media: A Comparative Analysis Of Legal Protection, Technological Measures And New Business Models Under E.U. And U.S. Law, Nicola Lucchi
ExpressO
The production of digital content is a phenomenon which has completely changed the conditions of access to knowledge. Within this framework it becomes even more important to find and to formulate a new settlement for intellectual property rights balancing contrasted rights. Owners of the old technology and policy makers have found two different solutions and remedies for intellectual property rights: legal and technological. When both remedies work together any rights that a consumer may have under copyright law could be replaced by a unilaterally defined contractual term and condition. To balance this inequity this article analyses different solutions under U.S. …
Material Vulnerabilities: Data Privacy, Corporate Information Security And Securities Regulation, Andrea M. Matwyshyn
Material Vulnerabilities: Data Privacy, Corporate Information Security And Securities Regulation, Andrea M. Matwyshyn
ExpressO
This article undertakes a normative and empirical legal inquiry into the manner information security vulnerabilities are being addressed through law and in the marketplace. Specifically, this article questions the current legislative paradigm for information security regulation by presenting a critique grounded in information security and cryptography theory. Consequently, this article advocates shifting our regulatory approach to a process-based security paradigm that focuses on improving security of our system as a whole. Finally, this article argues that in order to accomplish this shift with least disruption to current legal and economic processes, expanding an existing set of well-functioning legal structures is …