Open Access. Powered by Scholars. Published by Universities.®

Consumer Protection Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 11 of 11

Full-Text Articles in Consumer Protection Law

Increasing Lapses In Data Security: The Need For A Common Answer To What Constitutes Standing In A Data Breach Context, Aaron Benjamin Edelman Dec 2019

Increasing Lapses In Data Security: The Need For A Common Answer To What Constitutes Standing In A Data Breach Context, Aaron Benjamin Edelman

Journal of Law and Policy

As the number of data breaches continues to rise in the United States, so does the amount of data breach litigation. Many potential plaintiffs who suffered as victims of data breaches, however, find themselves in limbo regarding the issue of standing before a court because of a significant split on standing determinations amongst the federal circuit courts. Thus, while victims of data breaches oftentimes have their personal information fall into the hands of nefarious characters who intend to use the information to a victim’s detriment, that may not be enough to provide victims a right to sue in federal court …


It's Nothing Personal: Why Existing State Laws On Point-Of-Sale Consumer Data Collection Should Be Replaced With A Federal Standard, Kate Mirino Oct 2019

It's Nothing Personal: Why Existing State Laws On Point-Of-Sale Consumer Data Collection Should Be Replaced With A Federal Standard, Kate Mirino

St. John's Law Review

(Excerpt)

Accordingly, this Note proposes a contemporary-minded federal solution to preempt and standardize the various, outmoded state approaches in this field. Part I engages in a historical overview of the development of information privacy law in the United States. Part II provides a summary and comparison of the existing state rules at play. Part III discusses the negative consequences—both to consumers and to businesses—of inconsistent regulation in this area, and explains why a federal solution is necessary. Part IV outlines the parameters of the federal regulation proposed by this Note.


Table Of Contents, Seattle University Law Review Sep 2019

Table Of Contents, Seattle University Law Review

Seattle University Law Review

No abstract provided.


The Equifax Data Breach: An Opportunity To Improve Consumer Protection And Cybersecurity Efforts In America, Gregory S. Gaglione Jr. Aug 2019

The Equifax Data Breach: An Opportunity To Improve Consumer Protection And Cybersecurity Efforts In America, Gregory S. Gaglione Jr.

Buffalo Law Review

No abstract provided.


Identities Lost: Enacting Federal Law Mandating Disclosure & Notice After A Data Security Breach, John Ogle Jul 2019

Identities Lost: Enacting Federal Law Mandating Disclosure & Notice After A Data Security Breach, John Ogle

Arkansas Law Review

Identity theft is real, it’s here, and consumers need protection. Over the past five years hackers have stolen billions of consumers’ sensitive information like social security numbers, addresses, and bank routing numbers from companies that have neglected their security measures. Most of the time these security breaches are easily preventable. Companies sometimes wait weeks, months, or even years to inform the customers whose information was stolen because there is no federal law that requires disclosure. As of 2018, all 50 states have adopted security breach notification laws that require companies to inform consumers that their information may have been stolen …


Privacy And Connected Objects, Nicolas Karsenti Jun 2019

Privacy And Connected Objects, Nicolas Karsenti

Canadian Journal of Law and Technology

Our society perennially seeks to multiply its connectivity in the name of greater efficiency. Over the past few years, several devices that had previously been quite basic have been made ‘‘smarter” in order to facilitate a consumer’s life. A recent study highlights that some of the most common reasons for using ‘‘smart” objects are home automation and remote control. Thus, convenience is driving companies, particularly appliance makers, to connect their devices to the internet in order to make them ‘‘smart”. These range from intelligent thermostats, smart fridges, connected pacemakers, smart watches and personal assistants (PAs) such as Alexa, Siri or …


The Right Way To Protect Privacy Throughout The Internet Ecosystem, Daniel A. Lyons Apr 2019

The Right Way To Protect Privacy Throughout The Internet Ecosystem, Daniel A. Lyons

Daniel Lyons

No abstract provided.


Table Of Contents, Seattle University Law Review Feb 2019

Table Of Contents, Seattle University Law Review

Seattle University Law Review

No abstract provided.


Genetic Data Privacy Solutions In The Gdpr, Kristi Harbord Jan 2019

Genetic Data Privacy Solutions In The Gdpr, Kristi Harbord

Texas A&M Law Review

The intersection of healthcare and technology is a rapidly growing area. One thriving field at this intersection involves obtaining, processing, and storing genetic data. While the benefits have been great, genetic information can reveal a great deal about individuals and their families. And the information that can be conveyed from genetic data appears limitless and is constantly growing and changing. Many entities have begun storing, processing, and sharing genetic data on a very large scale. This creates many privacy concerns that the current regulatory framework does not account for. The line between patient data and consumer data is blurred; many …


Privacy's Law Of Design, Ari Ezra Waldman Jan 2019

Privacy's Law Of Design, Ari Ezra Waldman

Articles & Chapters

Privacy by design is about making privacy part of the conception and development of new data collection tools. But how should we interpret “privacy by design” as a legal mandate? As it transitions from an academic buzzword into binding law, privacy by design will, for the first time, impose real responsibilities on real people to do specific things at specific times. And yet, there remains significant disagreement about what privacy by design actually means in practice: we have yet to define its who, what, when, why, and how. Different approaches to privacy by design have tried to answer those questions …


Identities In Critical Condition: The Urgent Need To Reevaluate The Investigation And Resolution Of Claims Of Medical Identity Theft, Stephanie Lindgren Jan 2019

Identities In Critical Condition: The Urgent Need To Reevaluate The Investigation And Resolution Of Claims Of Medical Identity Theft, Stephanie Lindgren

Mitchell Hamline Law Review

No abstract provided.