Open Access. Powered by Scholars. Published by Universities.®

Consumer Protection Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 15 of 15

Full-Text Articles in Consumer Protection Law

Like A Bad Neighbor, Hackers Are There: The Need For Data Security Legislation And Cyber Insurance In Light Of Increasing Ftc Enforcement Actions, Jennifer Gordon Dec 2016

Like A Bad Neighbor, Hackers Are There: The Need For Data Security Legislation And Cyber Insurance In Light Of Increasing Ftc Enforcement Actions, Jennifer Gordon

Brooklyn Journal of Corporate, Financial & Commercial Law

Privacy has come to the forefront of the technology world as third party hackers are constantly attacking companies for their customers’ data. With increasing instances of compromised customer information, the Federal Trade Commission (FTC) has been bringing suit against companies for inadequate data security procedures. The FTC’s newfound authority to bring suit regarding cybersecurity breaches, based on the Third Circuit’s decision in FTC v. Wyndham Worldwide Corp., is a result of inaction—Congress has been unable to pass sufficient cybersecurity legislation, causing the FTC to step in and fill the void in regulation. In the absence of congressional action, this self-proclaimed …


“Hello…It’S Me. [Please Don’T Sue Me!]” Examining The Fcc’S Overbroad Calling Regulations Under The Tcpa, Marissa A. Potts Dec 2016

“Hello…It’S Me. [Please Don’T Sue Me!]” Examining The Fcc’S Overbroad Calling Regulations Under The Tcpa, Marissa A. Potts

Brooklyn Law Review

Americans have received unwanted telemarketing calls for decades. In response to a rapid increase in pre-recorded calls made using autodialer devices, Congress enacted the Telephone Consumer Protection Act (TCPA) in 1992. The TCPA imposes restrictions on calls made to consumers’ residences and wireless phones using autodialer devices, even if they are not telemarketing calls. Congress appointed the Federal Communications Commission (FCC) to prescribe rules and regulations to enforce the TCPA. In 2015, the FCC released an order that defined autodialer more broadly under the statute. Consequently, devices that have the potential to become autodialers in the future, even if they …


Exporting Internet Law Through International Trade Agreements: Recalibrating U.S. Trade Policy In The Digital Age, Markham C. Erickson, Sarah K. Leggin May 2016

Exporting Internet Law Through International Trade Agreements: Recalibrating U.S. Trade Policy In The Digital Age, Markham C. Erickson, Sarah K. Leggin

Catholic University Journal of Law and Technology

No abstract provided.


Wearable Devices As Admissible Evidence: Technology Is Killing Our Opportunity To Lie, Nicole Chauriye May 2016

Wearable Devices As Admissible Evidence: Technology Is Killing Our Opportunity To Lie, Nicole Chauriye

Catholic University Journal of Law and Technology

No abstract provided.


Cybersecurity, Data Breaches, And The Economic Loss Doctrine In The Payment Card Industry, David W. Opderbeck May 2016

Cybersecurity, Data Breaches, And The Economic Loss Doctrine In The Payment Card Industry, David W. Opderbeck

Maryland Law Review

Data breaches are pervasive and costly. Recent civil data breach cases have centered on the consumer credit card payment chain in the retail industry. An important issue in such cases is whether the economic loss doctrine should bar negligence claims for purely pecuniary losses suffered by a non-negligent party, such as an issuing bank or a federal credit union that must incur costs to reimburse cardholders for the fraudulent use of stolen card numbers.

The economic loss doctrine should not bar these claims. Large-scale data networks, such as consumer credit card networks, often entail significant network externalities. These include externalities …


Cybersecurity On My Mind: Protecting Georgia Consumers From Data Breaches, Maggie L. Mcmichael Jan 2016

Cybersecurity On My Mind: Protecting Georgia Consumers From Data Breaches, Maggie L. Mcmichael

Georgia Law Review

In a world where vast amounts of personal information
are obtained and stored by countless organizations and
businesses in the public and private sector, data breaches,

due to negligence or nefarious hacking, are a far too
common occurrence. The results of a data breach can be
serious and widespread, from public humiliation to
identity theft and national security crises. In an effort to
protect consumers from the potentially devastating effects
of data breaches, the Federal Trade Commission has
begun to take enforcement action against businesses whose
data security practices are alleged to be unfair and
deceptive. Theoretically, states can take …


Health Information And Data Security Safeguards, 32 J. Marshall J. Info. Tech. & Privacy L. 133 (2016), Jane Kim, David Zakson Jan 2016

Health Information And Data Security Safeguards, 32 J. Marshall J. Info. Tech. & Privacy L. 133 (2016), Jane Kim, David Zakson

UIC John Marshall Journal of Information Technology & Privacy Law

The healthcare industry possesses information coveted by cyber criminals. Unfortunately, healthcare providers are also among the most vulnerable and unprepared to deal with cyber attacks. The Introduction sets the background of this paper with cyber security statistics of the healthcare sector. Part A of this paper will discuss how new Russian law impacts global data security. Part B takes a broad look at data security safeguards. Part C focuses on U.S. attempts at safeguarding data through NIST and its Presidential Policy Directive. In Part D, the paper explores in greater detail causes that precipitate security breaches and specific security defenses …


Smart Washers May Clean Your Clothes, But Hacks Can Clean Out Your Privacy, And Underdeveloped Regulations Could Leave You Hanging On A Line, 32 J. Marshall J. Info. Tech. & Privacy L. 259 (2016), Nikole Davenport Jan 2016

Smart Washers May Clean Your Clothes, But Hacks Can Clean Out Your Privacy, And Underdeveloped Regulations Could Leave You Hanging On A Line, 32 J. Marshall J. Info. Tech. & Privacy L. 259 (2016), Nikole Davenport

UIC John Marshall Journal of Information Technology & Privacy Law

A house is equipped with a smart clothes washer, an intelligent HVAC system and a video enabled home security system, all running through the home network - it reduces the noise by doing laundry when no one is at home, saves energy costs by automatically changing the temperature depending who is in a room, lets the owner remotely see the kids walk in the door after school, and keeps the house safe - the owner is maximizing the use of the Internet of Things (“IoT”) devices (i.e. a network of everyday objects connected to the Internet and to each other). …


The Presumption Of Injury: Giving Data Breach Victims "A Leg To Stand On," 32 J. Marshall J. Info. Tech. & Privacy L. 301 (2016), Corey Varma Jan 2016

The Presumption Of Injury: Giving Data Breach Victims "A Leg To Stand On," 32 J. Marshall J. Info. Tech. & Privacy L. 301 (2016), Corey Varma

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The Secession Of The Successful: The Rise Of Amazon As Private Global Consumer Protection Regulator, Jane K. Winn Jan 2016

The Secession Of The Successful: The Rise Of Amazon As Private Global Consumer Protection Regulator, Jane K. Winn

Articles

In 2005, the Americans for Fair Electronic Commerce Transactions (“AFFECT”) coalition issued a list of 12 principles it hoped would contribute to a new consensus about what constitutes fairness in online consumer transactions. A decade later, a cursory review of different jurisdictions indicates that, while there has been little discernable progress in the direction of the principles in the United States, other jurisdictions such as the European Union have made more progress.

However, the one jurisdiction in the world that comes closest to implementing all 12 principles across the full spectrum of consumer transactions is not a government at all, …


The Sixth Pillar Of Anti-Money Laundering Compliance: Balancing Effective Enforcement With Financial Privacy, Maria A. De Dios Jan 2016

The Sixth Pillar Of Anti-Money Laundering Compliance: Balancing Effective Enforcement With Financial Privacy, Maria A. De Dios

Brooklyn Journal of Corporate, Financial & Commercial Law

The U.S. government has responded to the increase of financial crimes, including money laundering and terrorist financing, by requiring that financial institutions implement anti-money laundering compliance programs within their institutions. Most recently, the Financial Crimes Enforcement Network exercised its regulatory powers, as authorized by the Treasury Department, by proposing regulations that now explicitly add customer due diligence to the preexisting anti-money laundering regime. The policy behind the government’s legislative and regulatory measures is clear—financial institutions must ensure that they are protected from and not aiding in the illegal efforts of criminals. The complexity and insidiousness of these financial crimes makes …


Switch Hitters: How League Involvement In Daily Fantasy Sports Could End The Prohibition Of Sports Gambling, Jordan Meddy Jan 2016

Switch Hitters: How League Involvement In Daily Fantasy Sports Could End The Prohibition Of Sports Gambling, Jordan Meddy

Brooklyn Journal of Corporate, Financial & Commercial Law

Whether in the form of lotto tickets or casino table games, gambling is legally permitted in some way in virtually every U.S. state. Yet, in all but a handful of jurisdictions, federal law prohibits wagering on sporting events or professional athletes in any form. Several economically challenged states, particularly New Jersey, have been trying to authorize sports gambling within their borders as a way to raise tax revenues and support their local gambling industries. While these attempts have thus far been unsuccessful, Daily Fantasy Sports have simultaneously experienced a meteoric rise, becoming a multi-billion dollar industry. This Note examines the …


The Notion And Practice Of Reputation And Professional Identity In Social Networking: From K-12 Through Law School, Roberta Bobbie Studwell Jan 2016

The Notion And Practice Of Reputation And Professional Identity In Social Networking: From K-12 Through Law School, Roberta Bobbie Studwell

Faculty Scholarship

No abstract provided.


Personal Property Servitudes On The Internet Of Things, Christina Mulligan Jan 2016

Personal Property Servitudes On The Internet Of Things, Christina Mulligan

Georgia Law Review

Small appliances such as thermostats, watches, jewelry, and eyewear are now being made available with networking capability. These networked objects make up the growing Internet of Things-pieces of personal property that run software and connect to the global Internet. These products are typically governed by terms of service or end-user license agreements that create restrictions on how products can be used or transferred- restrictions which would be unenforceable if the inside of the product consisted of gears rather than processing chips. This Article explores the question of when use and transfer restrictions should be enforceable on networked appliances and other …


When The Default Is No Penalty: Negotiating Privacy At The Ntia, Margot E. Kaminski Jan 2016

When The Default Is No Penalty: Negotiating Privacy At The Ntia, Margot E. Kaminski

Publications

Consumer privacy protection is largely within the purview of the Federal Trade Commission. In recent years, however, the National Telecommunications and Information Administration (NTIA) at the Department of Commerce has hosted multistakeholder negotiations on consumer privacy issues. The NTIA process has addressed mobile apps, facial recognition, and most recently, drones. It is meant to serve as a venue for industry self-regulation. Drawing on the literature on co-regulation and on penalty defaults, I suggest that the NTIA process struggles to successfully extract industry expertise and participation against a dearth of federal data privacy law and enforcement. This problem is most exacerbated …