Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Consumer protection (3)
- Robotics (2)
- Airbnb (1)
- Akerlof (1)
- Arts and Entertainment (1)
-
- Asymmetric information (1)
- Breach notification (1)
- Collaborative economy (1)
- Consumer Protection (1)
- Consumer Protection Law (1)
- CyberCrime (1)
- Cybersecurity (1)
- Data breach (1)
- Data security (1)
- E-commerce (1)
- Empirical (1)
- Entrepreneurship (1)
- FTC (1)
- Federal Trade Commission (1)
- First Amendment (1)
- Health apps (1)
- Health care regulation (1)
- Immoral (1)
- Intellectual Property Law (1)
- Intellectual property (1)
- Internet innovation (1)
- Lanham act (1)
- Law and Society (1)
- Law and Technology (1)
- Lemon law (1)
- Publication
- Publication Type
Articles 1 - 13 of 13
Full-Text Articles in Consumer Protection Law
Symposium: Regulatory Capture And Technological Entrepreneurship: Protecting Consumer Interests?, Robert Anderson, John G. Shearer, Christopher Koopman, Makan Delrahim, Erik Syverson, Babbette Boliek
Symposium: Regulatory Capture And Technological Entrepreneurship: Protecting Consumer Interests?, Robert Anderson, John G. Shearer, Christopher Koopman, Makan Delrahim, Erik Syverson, Babbette Boliek
The Journal of Business, Entrepreneurship & the Law
No abstract provided.
The Sharing Economy And Consumer Protection Regulation: The Case For Policy Change, Christopher Koopman, Matthew Mitchell, Adam Thierer
The Sharing Economy And Consumer Protection Regulation: The Case For Policy Change, Christopher Koopman, Matthew Mitchell, Adam Thierer
The Journal of Business, Entrepreneurship & the Law
In this Paper, we discuss the central benefit of the sharing economy thus far: it has overcome market imperfections without recourse to regulatory bodies prone to capture by entrenched firms. As an introduction to the various issues surrounding this ongoing debate, we begin with an explanation of the sharing economy. Then we review the traditional “consumer protection” rationales for economic regulation and explain why many regulations persist even though their initial justifications are no longer valid. We argue continued application of these outmoded regulatory regimes is likely to harm consumers. In the last section, we explain how the Internet and …
Unfair And Deceptive Robots, Woodrow Hartzog
Unfair And Deceptive Robots, Woodrow Hartzog
Maryland Law Review
No abstract provided.
The Fda, Congress, And Mobile Health Apps: Lessons From Dshea And The Regulation Of Dietary Supplements, Natalie R. Bilbrough
The Fda, Congress, And Mobile Health Apps: Lessons From Dshea And The Regulation Of Dietary Supplements, Natalie R. Bilbrough
Maryland Law Review
No abstract provided.
Making Paypal Pay: Regulation E And Its Application To Alternative Payment Services, Eric Pacifici
Making Paypal Pay: Regulation E And Its Application To Alternative Payment Services, Eric Pacifici
Duke Law & Technology Review
In light of the growth of data breaches in both occurrence and scale, it is more important than ever for consumers to be aware of the protections afforded to them under the law regarding electronic fund transfers and alternative payment services. Additionally, it is important that agencies like the Consumer Financial Protection Bureau (“CFPB”), charged with the protection of unsuspecting and often defenseless consumers, are carefully monitoring these protections to ensure they keep pace with the technological evolution of the payment services they regulate. Alternative payment services, such as PayPal, are conducting an enormous number of payments and providing an …
Nsfw: An Empirical Study Of Scandalous Trademarks, Megan M. Carpenter
Nsfw: An Empirical Study Of Scandalous Trademarks, Megan M. Carpenter
Megan M Carpenter
This project is an empirical analysis of trademarks that have received rejections based on the judgment that they are “scandalous." It is the first of its kind. The Lanham Act bars registration for trademarks that are “scandalous” and “immoral.” While much has been written on the morality provisions in the Lanham Act generally, this piece is the first scholarly project that engages an empirical analysis of 2(a) rejections based on scandalousness; it contains a look behind the scenes at how the morality provisions are applied throughout the trademark registration process. We study which marks are being rejected, what evidence is …
Selected State Laws Governing The Safeguarding And Disposing Of Personal Information, 31 J. Marshall J. Info. Tech. & Privacy L. 487 (2015), Bruce Radke, Michael Waters
Selected State Laws Governing The Safeguarding And Disposing Of Personal Information, 31 J. Marshall J. Info. Tech. & Privacy L. 487 (2015), Bruce Radke, Michael Waters
UIC John Marshall Journal of Information Technology & Privacy Law
Numerous states have adopted laws mandating the protection and disposal of personal information. Under those laws, businesses are required to implement and maintain reasonable security procedures and practices appropriate to the nature of the information in order to protect the personal information from unauthorized access, destruction, use, modification, or disclosure. Although the definition of “personal information” varies from state to state, “personal information” is generally defined as an individual’s first name or initial and last name in combination with any one or more of the following data elements, when either the name or the data elements are not encrypted or …
Legal Problems In Data Management: Ethics Of Big Data Analytics And The Importance Of Disclosure, 31 J. Marshall J. Info. Tech. & Privacy L. 641 (2015)
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Industry Self-Regulation Of Consumer Data Privacy And Security, 32 J. Marshall J. Info. Tech. & Privacy L. 15 (2015), Siona Listokin
Industry Self-Regulation Of Consumer Data Privacy And Security, 32 J. Marshall J. Info. Tech. & Privacy L. 15 (2015), Siona Listokin
UIC John Marshall Journal of Information Technology & Privacy Law
Industry self-regulation of consumer data privacy and security has been proposed as a flexible alternative and compliment to traditional government regulation. This study analyzes whether different types of existing industry-led standards improve online privacy and security. This paper examines which types of firms join voluntary standards and whether there is a difference in outcomes between trade association memberships (like the Digital Advertising Alliance) and certification programs (like TRUSTe). Results suggest that more trafficked websites are more likely to adopt standards, and that trade association member-ship does not have an effect on privacy and security performance. This article highlights the need …
‘The Greatest Wealth Is Health’: Patient Protected Health Information In The Hands Of Hackers, 31 J. Marshall J. Info. Tech. & Privacy L. 657 (2015), Samantha Singer
‘The Greatest Wealth Is Health’: Patient Protected Health Information In The Hands Of Hackers, 31 J. Marshall J. Info. Tech. & Privacy L. 657 (2015), Samantha Singer
UIC John Marshall Journal of Information Technology & Privacy Law
This comment will analyze the specific requirements and stages that EPs/EHs must comply with in order to receive its Medicare and Medicaid incentives, how EHR technologies are being implemented, how EHR technologies are affecting patients' privacy with regard to hacking a patient‟s PHI, and what EHR technology vendors and EPs/EHs should be doing to improve patient privacy and security to prevent hacking and other breaches.
Part I of this comment will address hacking of PHI. Part II will analyze the security measures that EHR vendors must currently incorporate into EHR technology and how the lack of required security measures impacts …
The Truth Behind Data Collection And Analysis, 32 J. Marshall J. Info. Tech. & Privacy L. 33 (2015), Morgan Hochheiser
The Truth Behind Data Collection And Analysis, 32 J. Marshall J. Info. Tech. & Privacy L. 33 (2015), Morgan Hochheiser
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Who Regulates The Robots, Margot Kaminski
Data Breach (Regulatory) Effects, David Thaw