Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Communications Law (2)
- Computer Law (2)
- Consumer Protection Law (2)
- Medical (2)
- Privacy (2)
-
- Science and Technology (2)
- Surveillance (2)
- Administrative Law (1)
- Arts (1)
- Arts and Entertainment (1)
- Babies (1)
- Baby (1)
- Big Data (1)
- Bill Clinton (1)
- Biography (1)
- Biomedical (1)
- CGMP (1)
- Child (1)
- Children (1)
- Civil Law (1)
- Comparative and Foreign Law (1)
- Comstic (1)
- Conflict of Laws (1)
- Congress (1)
- Constitutional Law (1)
- Consumer Protection (1)
- Contracts (1)
- Copyright (1)
- Corporations (1)
- Courts (1)
- Publication
- Publication Type
Articles 1 - 13 of 13
Full-Text Articles in Consumer Protection Law
The Unexamined Life In The Era Of Big Data: Toward A Udaap For Data, Sean Brian
The Unexamined Life In The Era Of Big Data: Toward A Udaap For Data, Sean Brian
Sean Brian
No abstract provided.
Cgmp Violations Should Not Be Used As A Basis For Fca Actions Absent Fraud, Kyle Faget
Cgmp Violations Should Not Be Used As A Basis For Fca Actions Absent Fraud, Kyle Faget
Seattle University Law Review
Since Congress amended the False Claims Act (FCA) in 1986, the statute has evolved into a seemingly boundless weapon for enforcing other statutes and regulations applicable to every industry that accepts any form of government funding. Use of the FCA by the Department of Justice (DOJ) and by private citizens bringing actions on behalf of the U.S. government to enforce other statutes and regulations is particularly evident in the field of health care. The FCA has been utilized in actions where the allegations include off-label promotion of drugs, kickbacks, and violations of current good manufacturing practices (cGMPs) by linking the …
Ironic Simplicity: Why Shaken Baby Syndrome Misdiagnoses Should Result In Automatic Reimbursement For The Wrongly Accused, Jay Simmons
Seattle University Law Review
Shaken baby syndrome (SBS)’s shortcomings include the debatable science behind SBS theory and diagnosis—the questioning of which has grown more vociferous—and the arguably biased, discriminatory treatment of the accused. Professor Deborah Tuerkheimer notes that the evolving SBS skepticism and contentious debate has resulted in "chaos" in many SBS adjudications and within the medical and biomechanical fields, with the same SBS proponents and opponents continually crusading for and clashing over their beliefs. The issues surrounding the medical and biomechanical components of SBS diagnoses have been repeatedly examined and discussed, and are not the focus of this Note. This Note recounts those …
The Evolution Of The Digital Millennium Copyright Act; Changing Interpretations Of The Dmca And Future Implications For Copyright Holders, Hillary A. Henderson
The Evolution Of The Digital Millennium Copyright Act; Changing Interpretations Of The Dmca And Future Implications For Copyright Holders, Hillary A. Henderson
Hillary A Henderson
Copyright law rewards an artificial monopoly to individual authors for their creations. This reward is based on the belief that, by granting authors the exclusive right to reproduce their works, they receive an incentive and means to create, which in turn advances the welfare of the general public by “promoting the progress of science and useful arts.” Copyright protection subsists . . . in original works of authorship fixed in any tangible medium of expression, now known or later developed, from which they can be perceived, reproduced, or otherwise communicated, either directly or with the aid of a machine or …
Now You See It, Now You Don’T . . . Or Do You?: Snapchat’S Deceptive Promotion Of Vanishing Messages Violates Federal Trade Commission Regulations, 30 J. Marshall J. Info. Tech. & Privacy L. 827 (2014), Danielle Young
UIC John Marshall Journal of Information Technology & Privacy Law
This Comment will explore the recently popular application Snapchat, and discuss the ways in which the app's privacy policy has violated FTC regulations, responding to a recent complaint filed by The Electronic Privacy Center. Particularly, this Comment will focus on Snapchat's deceptive promotion of "disappearing" photographs and videos. Section II will illustrate the basic structure of Snapchat, detailing various illustrations of its use. Section II will also examine the regulations set forth by the FTC that Snapchat is required to follow. Section III will discuss possible methods that the average user can do in order to bypass the very thing …
California’S Eavesdropping Law Endangers Victims Of Domestic Violence, 31 J. Marshall J. Info. Tech. & Privacy L. 57 (2014), John E.B. Myers
California’S Eavesdropping Law Endangers Victims Of Domestic Violence, 31 J. Marshall J. Info. Tech. & Privacy L. 57 (2014), John E.B. Myers
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
The Right To Be Forgotten: Forced Amnesia In A Technological Age, 31 J. Marshall J. Info. Tech. & Privacy L. 133 (2014), Robert Bolton
The Right To Be Forgotten: Forced Amnesia In A Technological Age, 31 J. Marshall J. Info. Tech. & Privacy L. 133 (2014), Robert Bolton
UIC John Marshall Journal of Information Technology & Privacy Law
In the modern era, the connection between technology and one’s personal life has increased the number of moments recorded for posterity. While in many circumstances this is an ideal opportunity for fond recollection, it has the downside of displaying for others our less flattering moments. Because the Internet has such a wide scope, once something has entered its domain, it is virtually impossible to permanently remove. With a public increasingly perceiving this winnowing of privacy as a negative tendency, legislators both at home and abroad have made proposals that attempt to place restrictions on what content social media is allowed …
Facebook Messenger: Eroding User Privacy In Order To Collect, Analyze, And Sell Your Personal Information, 31 J. Marshall J. Info. Tech. & Privacy L. 393 (2014), Erica Jaeger
UIC John Marshall Journal of Information Technology & Privacy Law
This comment will examine Facebook‘s new standalone Facebook Messenger app, and review how the Privacy Policy, Data Use Policy, and the list of permissions violate Section 5 of the Federal Trade Commission Act. The comment will focus on Facebook Messenger‘s deceptive methods of accessing users‘ personal information and how Facebook uses that personal information. Section II will explain social networking sites and the configuration of Facebook, Facebook Messenger, and Facebook‘ s evolving policies. Section II will also discuss the Federal Trade Commission and the Federal Trade Commission Act that was created to protect consumers against unfair, deceptive, or fraudulent practices.15 …
Canada’S Anti-Spam Legislation: A Constitutional Analysis, 31 J. Marshall J. Info. Tech. & Privacy L. 1 (2014), Emir Crowne, Stephanie Provato
Canada’S Anti-Spam Legislation: A Constitutional Analysis, 31 J. Marshall J. Info. Tech. & Privacy L. 1 (2014), Emir Crowne, Stephanie Provato
UIC John Marshall Journal of Information Technology & Privacy Law
On December 15th, 2010, the Government of Canada agreed to Bill C-28, the Fighting Internet and Wireless Spam Act, with the intent to “deter the most damaging and deceptive forms of spam… from occurring in Canada and to help to drive out spammers.” Canada‟s Anti- Spam Legislation (“CASL”) was born. Although CASL has only been in force since July 1st, 2014, we argue that the Act may not survive constitutional scrutiny as it unduly restricts freedom of speech.
Maryland's Social Networking Law: No "Friend" To Employers And Employees, Alexander Borman
Maryland's Social Networking Law: No "Friend" To Employers And Employees, Alexander Borman
Journal of Business & Technology Law
No abstract provided.
Watching The Watchers, Neil M. Richards
Watching The Watchers, Neil M. Richards
Scholarship@WashULaw
In this essay from Wired Magazine (UK)'s special edition, The Wired World in 2014, Prof. Richards argues that sousveillance–watching the watchers–is an important development that will be on the rise in 2014.
Enlightened Regulatory Capture, David Thaw
Enlightened Regulatory Capture, David Thaw
Articles
Regulatory capture generally evokes negative images of private interests exerting excessive influence on government action to advance their own agendas at the expense of the public interest. There are some cases, however, where this conventional wisdom is exactly backwards. This Article explores the first verifiable case, taken from healthcare cybersecurity, where regulatory capture enabled regulators to harness private expertise to advance exclusively public goals. Comparing this example to other attempts at harnessing industry expertise reveals a set of characteristics under which regulatory capture can be used in the public interest. These include: 1) legislatively-mandated adoption of recommendations by an advisory …
Surveillance At The Source, David Thaw
Surveillance At The Source, David Thaw
Articles
Contemporary discussion concerning surveillance focuses predominantly on government activity. These discussions are important for a variety of reasons, but generally ignore a critical aspect of the surveillance-harm calculus – the source from which government entities derive the information they use. The source of surveillance data is the information "gathering" activity itself, which is where harms like "chilling" of speech and behavior begin.
Unlike the days where satellite imaging, communications intercepts, and other forms of information gathering were limited to advanced law enforcement, military, and intelligence activities, private corporations now play a dominant role in the collection of information about individuals' …