Open Access. Powered by Scholars. Published by Universities.®

Consumer Protection Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 23 of 23

Full-Text Articles in Consumer Protection Law

“Hello…It’S Me. [Please Don’T Sue Me!]” Examining The Fcc’S Overbroad Calling Regulations Under The Tcpa, Marissa A. Potts Dec 2016

“Hello…It’S Me. [Please Don’T Sue Me!]” Examining The Fcc’S Overbroad Calling Regulations Under The Tcpa, Marissa A. Potts

Brooklyn Law Review

Americans have received unwanted telemarketing calls for decades. In response to a rapid increase in pre-recorded calls made using autodialer devices, Congress enacted the Telephone Consumer Protection Act (TCPA) in 1992. The TCPA imposes restrictions on calls made to consumers’ residences and wireless phones using autodialer devices, even if they are not telemarketing calls. Congress appointed the Federal Communications Commission (FCC) to prescribe rules and regulations to enforce the TCPA. In 2015, the FCC released an order that defined autodialer more broadly under the statute. Consequently, devices that have the potential to become autodialers in the future, even if they …


Like A Bad Neighbor, Hackers Are There: The Need For Data Security Legislation And Cyber Insurance In Light Of Increasing Ftc Enforcement Actions, Jennifer Gordon Dec 2016

Like A Bad Neighbor, Hackers Are There: The Need For Data Security Legislation And Cyber Insurance In Light Of Increasing Ftc Enforcement Actions, Jennifer Gordon

Brooklyn Journal of Corporate, Financial & Commercial Law

Privacy has come to the forefront of the technology world as third party hackers are constantly attacking companies for their customers’ data. With increasing instances of compromised customer information, the Federal Trade Commission (FTC) has been bringing suit against companies for inadequate data security procedures. The FTC’s newfound authority to bring suit regarding cybersecurity breaches, based on the Third Circuit’s decision in FTC v. Wyndham Worldwide Corp., is a result of inaction—Congress has been unable to pass sufficient cybersecurity legislation, causing the FTC to step in and fill the void in regulation. In the absence of congressional action, this self-proclaimed …


Exporting Internet Law Through International Trade Agreements: Recalibrating U.S. Trade Policy In The Digital Age, Markham C. Erickson, Sarah K. Leggin May 2016

Exporting Internet Law Through International Trade Agreements: Recalibrating U.S. Trade Policy In The Digital Age, Markham C. Erickson, Sarah K. Leggin

Catholic University Journal of Law and Technology

No abstract provided.


Wearable Devices As Admissible Evidence: Technology Is Killing Our Opportunity To Lie, Nicole Chauriye May 2016

Wearable Devices As Admissible Evidence: Technology Is Killing Our Opportunity To Lie, Nicole Chauriye

Catholic University Journal of Law and Technology

No abstract provided.


His Feminist Facade: The Neoliberal Co-Option Of The Feminist Movement, Anjilee Dodge, Myani Gilbert Apr 2016

His Feminist Facade: The Neoliberal Co-Option Of The Feminist Movement, Anjilee Dodge, Myani Gilbert

Seattle Journal for Social Justice

No abstract provided.


Prostitution Policy: Legalization, Decriminalization And The Nordic Model, Ane Mathieson, Easton Branam, Anya Noble Apr 2016

Prostitution Policy: Legalization, Decriminalization And The Nordic Model, Ane Mathieson, Easton Branam, Anya Noble

Seattle Journal for Social Justice

No abstract provided.


Don’T Risk It; Wait Until She’S Sober, Patrick John White Apr 2016

Don’T Risk It; Wait Until She’S Sober, Patrick John White

Seattle Journal for Social Justice

No abstract provided.


Let’S Talk About Sex: A Call For Guardianship Reform In Washington State, Sage Graves Apr 2016

Let’S Talk About Sex: A Call For Guardianship Reform In Washington State, Sage Graves

Seattle Journal for Social Justice

No abstract provided.


Let’S Invest In People, Not Prisons: How Washington State Should Address Its Ex-Offender Unemployment Rate, Sara Taboada Apr 2016

Let’S Invest In People, Not Prisons: How Washington State Should Address Its Ex-Offender Unemployment Rate, Sara Taboada

Seattle Journal for Social Justice

No abstract provided.


In Her Words: Recognizing And Preventing Abusive Litigation Against Domestic Violence Survivors, David Ward Apr 2016

In Her Words: Recognizing And Preventing Abusive Litigation Against Domestic Violence Survivors, David Ward

Seattle Journal for Social Justice

No abstract provided.


Living Under The Boot: Militarization And Peaceful Protest, Charlotte Guerra Apr 2016

Living Under The Boot: Militarization And Peaceful Protest, Charlotte Guerra

Seattle Journal for Social Justice

No abstract provided.


Persistence And Resistance: Women’S Leadership And Ending Gender-Based Violence In Guatemala, Serena Cosgrove, Kristi Lee Apr 2016

Persistence And Resistance: Women’S Leadership And Ending Gender-Based Violence In Guatemala, Serena Cosgrove, Kristi Lee

Seattle Journal for Social Justice

No abstract provided.


Newsroom: Freedman On Credit Reports 02-12-2016, Roger Williams University School Of Law Feb 2016

Newsroom: Freedman On Credit Reports 02-12-2016, Roger Williams University School Of Law

Life of the Law School (1993- )

No abstract provided.


Health Information And Data Security Safeguards, 32 J. Marshall J. Info. Tech. & Privacy L. 133 (2016), Jane Kim, David Zakson Jan 2016

Health Information And Data Security Safeguards, 32 J. Marshall J. Info. Tech. & Privacy L. 133 (2016), Jane Kim, David Zakson

UIC John Marshall Journal of Information Technology & Privacy Law

The healthcare industry possesses information coveted by cyber criminals. Unfortunately, healthcare providers are also among the most vulnerable and unprepared to deal with cyber attacks. The Introduction sets the background of this paper with cyber security statistics of the healthcare sector. Part A of this paper will discuss how new Russian law impacts global data security. Part B takes a broad look at data security safeguards. Part C focuses on U.S. attempts at safeguarding data through NIST and its Presidential Policy Directive. In Part D, the paper explores in greater detail causes that precipitate security breaches and specific security defenses …


Smart Washers May Clean Your Clothes, But Hacks Can Clean Out Your Privacy, And Underdeveloped Regulations Could Leave You Hanging On A Line, 32 J. Marshall J. Info. Tech. & Privacy L. 259 (2016), Nikole Davenport Jan 2016

Smart Washers May Clean Your Clothes, But Hacks Can Clean Out Your Privacy, And Underdeveloped Regulations Could Leave You Hanging On A Line, 32 J. Marshall J. Info. Tech. & Privacy L. 259 (2016), Nikole Davenport

UIC John Marshall Journal of Information Technology & Privacy Law

A house is equipped with a smart clothes washer, an intelligent HVAC system and a video enabled home security system, all running through the home network - it reduces the noise by doing laundry when no one is at home, saves energy costs by automatically changing the temperature depending who is in a room, lets the owner remotely see the kids walk in the door after school, and keeps the house safe - the owner is maximizing the use of the Internet of Things (“IoT”) devices (i.e. a network of everyday objects connected to the Internet and to each other). …


The Presumption Of Injury: Giving Data Breach Victims "A Leg To Stand On," 32 J. Marshall J. Info. Tech. & Privacy L. 301 (2016), Corey Varma Jan 2016

The Presumption Of Injury: Giving Data Breach Victims "A Leg To Stand On," 32 J. Marshall J. Info. Tech. & Privacy L. 301 (2016), Corey Varma

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The Sixth Pillar Of Anti-Money Laundering Compliance: Balancing Effective Enforcement With Financial Privacy, Maria A. De Dios Jan 2016

The Sixth Pillar Of Anti-Money Laundering Compliance: Balancing Effective Enforcement With Financial Privacy, Maria A. De Dios

Brooklyn Journal of Corporate, Financial & Commercial Law

The U.S. government has responded to the increase of financial crimes, including money laundering and terrorist financing, by requiring that financial institutions implement anti-money laundering compliance programs within their institutions. Most recently, the Financial Crimes Enforcement Network exercised its regulatory powers, as authorized by the Treasury Department, by proposing regulations that now explicitly add customer due diligence to the preexisting anti-money laundering regime. The policy behind the government’s legislative and regulatory measures is clear—financial institutions must ensure that they are protected from and not aiding in the illegal efforts of criminals. The complexity and insidiousness of these financial crimes makes …


Use Of Facial Recognition Technology For Medical Purposes: Balancing Privacy With Innovation, Seema Mohapatra Jan 2016

Use Of Facial Recognition Technology For Medical Purposes: Balancing Privacy With Innovation, Seema Mohapatra

Faculty Scholarship

No abstract provided.


The Notion And Practice Of Reputation And Professional Identity In Social Networking: From K-12 Through Law School, Roberta Bobbie Studwell Jan 2016

The Notion And Practice Of Reputation And Professional Identity In Social Networking: From K-12 Through Law School, Roberta Bobbie Studwell

Faculty Scholarship

No abstract provided.


Fighting Spam. How Stringent Is The Canadian Legal Arsenal. An Analysis In The Light Of The U.S. Can-Spam Act, Serge Kablan Jan 2016

Fighting Spam. How Stringent Is The Canadian Legal Arsenal. An Analysis In The Light Of The U.S. Can-Spam Act, Serge Kablan

Canadian Journal of Law and Technology

Following several countries, Canada recently passed Canada’s Anti-Spam Legislation (CASL), in an attempt to tackle spam. The law aims to ‘‘protect Canadians while ensuring that businesses can continue to compete in the global marketplace”. For this purpose, CASL prohibits not only the sending of commercial electronic messages without consent, but also any alteration of transmission data in the course of a commercial activity. Moreover, the Act disallows the installation of a computer program on another person’s computer system and the sending of commercial electronic messages following the installation. These three activities are prohibited unless the author or initiator has obtained …


Legitimate Invasions: What Ontario Can Learn From The History Of The Consumer Reporting Act, Eliie Marshall Jan 2016

Legitimate Invasions: What Ontario Can Learn From The History Of The Consumer Reporting Act, Eliie Marshall

Canadian Journal of Law and Technology

The growth of modern surveillance has attracted great public and scholarly interest. As Justice Abella recently noted in Douez v. Facebook, the Internet has transformed the potential harms flowing from an unjustified invasion of one’s personal information. Most analyses of the associated risks, however, imply that the techniques and motivations for surveillance are new. In fact, tactics for collecting and exchanging information about individuals to gain power over those individuals are well documented since time immemorial. From William the Conquerer’s Domesday Book to IBM’s first census tabulating machine, the advantage gained through data sharing has greatly benefited the state. The …


Personal Property Servitudes On The Internet Of Things, Christina Mulligan Jan 2016

Personal Property Servitudes On The Internet Of Things, Christina Mulligan

Georgia Law Review

Small appliances such as thermostats, watches, jewelry, and eyewear are now being made available with networking capability. These networked objects make up the growing Internet of Things-pieces of personal property that run software and connect to the global Internet. These products are typically governed by terms of service or end-user license agreements that create restrictions on how products can be used or transferred- restrictions which would be unenforceable if the inside of the product consisted of gears rather than processing chips. This Article explores the question of when use and transfer restrictions should be enforceable on networked appliances and other …


When The Default Is No Penalty: Negotiating Privacy At The Ntia, Margot E. Kaminski Jan 2016

When The Default Is No Penalty: Negotiating Privacy At The Ntia, Margot E. Kaminski

Publications

Consumer privacy protection is largely within the purview of the Federal Trade Commission. In recent years, however, the National Telecommunications and Information Administration (NTIA) at the Department of Commerce has hosted multistakeholder negotiations on consumer privacy issues. The NTIA process has addressed mobile apps, facial recognition, and most recently, drones. It is meant to serve as a venue for industry self-regulation. Drawing on the literature on co-regulation and on penalty defaults, I suggest that the NTIA process struggles to successfully extract industry expertise and participation against a dearth of federal data privacy law and enforcement. This problem is most exacerbated …