Open Access. Powered by Scholars. Published by Universities.®

Consumer Protection Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 12 of 12

Full-Text Articles in Consumer Protection Law

The Unexamined Life In The Era Of Big Data: Toward A Udaap For Data, Sean Brian Dec 2014

The Unexamined Life In The Era Of Big Data: Toward A Udaap For Data, Sean Brian

Sean Brian

No abstract provided.


Cgmp Violations Should Not Be Used As A Basis For Fca Actions Absent Fraud, Kyle Faget Oct 2014

Cgmp Violations Should Not Be Used As A Basis For Fca Actions Absent Fraud, Kyle Faget

Seattle University Law Review

Since Congress amended the False Claims Act (FCA) in 1986, the statute has evolved into a seemingly boundless weapon for enforcing other statutes and regulations applicable to every industry that accepts any form of government funding. Use of the FCA by the Department of Justice (DOJ) and by private citizens bringing actions on behalf of the U.S. government to enforce other statutes and regulations is particularly evident in the field of health care. The FCA has been utilized in actions where the allegations include off-label promotion of drugs, kickbacks, and violations of current good manufacturing practices (cGMPs) by linking the …


Ironic Simplicity: Why Shaken Baby Syndrome Misdiagnoses Should Result In Automatic Reimbursement For The Wrongly Accused, Jay Simmons Oct 2014

Ironic Simplicity: Why Shaken Baby Syndrome Misdiagnoses Should Result In Automatic Reimbursement For The Wrongly Accused, Jay Simmons

Seattle University Law Review

Shaken baby syndrome (SBS)’s shortcomings include the debatable science behind SBS theory and diagnosis—the questioning of which has grown more vociferous—and the arguably biased, discriminatory treatment of the accused. Professor Deborah Tuerkheimer notes that the evolving SBS skepticism and contentious debate has resulted in "chaos" in many SBS adjudications and within the medical and biomechanical fields, with the same SBS proponents and opponents continually crusading for and clashing over their beliefs. The issues surrounding the medical and biomechanical components of SBS diagnoses have been repeatedly examined and discussed, and are not the focus of this Note. This Note recounts those …


The Evolution Of The Digital Millennium Copyright Act; Changing Interpretations Of The Dmca And Future Implications For Copyright Holders, Hillary A. Henderson Jan 2014

The Evolution Of The Digital Millennium Copyright Act; Changing Interpretations Of The Dmca And Future Implications For Copyright Holders, Hillary A. Henderson

Hillary A Henderson

Copyright law rewards an artificial monopoly to individual authors for their creations. This reward is based on the belief that, by granting authors the exclusive right to reproduce their works, they receive an incentive and means to create, which in turn advances the welfare of the general public by “promoting the progress of science and useful arts.” Copyright protection subsists . . . in original works of authorship fixed in any tangible medium of expression, now known or later developed, from which they can be perceived, reproduced, or otherwise communicated, either directly or with the aid of a machine or …


Now You See It, Now You Don’T . . . Or Do You?: Snapchat’S Deceptive Promotion Of Vanishing Messages Violates Federal Trade Commission Regulations, 30 J. Marshall J. Info. Tech. & Privacy L. 827 (2014), Danielle Young Jan 2014

Now You See It, Now You Don’T . . . Or Do You?: Snapchat’S Deceptive Promotion Of Vanishing Messages Violates Federal Trade Commission Regulations, 30 J. Marshall J. Info. Tech. & Privacy L. 827 (2014), Danielle Young

UIC John Marshall Journal of Information Technology & Privacy Law

This Comment will explore the recently popular application Snapchat, and discuss the ways in which the app's privacy policy has violated FTC regulations, responding to a recent complaint filed by The Electronic Privacy Center. Particularly, this Comment will focus on Snapchat's deceptive promotion of "disappearing" photographs and videos. Section II will illustrate the basic structure of Snapchat, detailing various illustrations of its use. Section II will also examine the regulations set forth by the FTC that Snapchat is required to follow. Section III will discuss possible methods that the average user can do in order to bypass the very thing …


California’S Eavesdropping Law Endangers Victims Of Domestic Violence, 31 J. Marshall J. Info. Tech. & Privacy L. 57 (2014), John E.B. Myers Jan 2014

California’S Eavesdropping Law Endangers Victims Of Domestic Violence, 31 J. Marshall J. Info. Tech. & Privacy L. 57 (2014), John E.B. Myers

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Canada’S Anti-Spam Legislation: A Constitutional Analysis, 31 J. Marshall J. Info. Tech. & Privacy L. 1 (2014), Emir Crowne, Stephanie Provato Jan 2014

Canada’S Anti-Spam Legislation: A Constitutional Analysis, 31 J. Marshall J. Info. Tech. & Privacy L. 1 (2014), Emir Crowne, Stephanie Provato

UIC John Marshall Journal of Information Technology & Privacy Law

On December 15th, 2010, the Government of Canada agreed to Bill C-28, the Fighting Internet and Wireless Spam Act, with the intent to “deter the most damaging and deceptive forms of spam… from occurring in Canada and to help to drive out spammers.” Canada‟s Anti- Spam Legislation (“CASL”) was born. Although CASL has only been in force since July 1st, 2014, we argue that the Act may not survive constitutional scrutiny as it unduly restricts freedom of speech.


The Right To Be Forgotten: Forced Amnesia In A Technological Age, 31 J. Marshall J. Info. Tech. & Privacy L. 133 (2014), Robert Bolton Jan 2014

The Right To Be Forgotten: Forced Amnesia In A Technological Age, 31 J. Marshall J. Info. Tech. & Privacy L. 133 (2014), Robert Bolton

UIC John Marshall Journal of Information Technology & Privacy Law

In the modern era, the connection between technology and one’s personal life has increased the number of moments recorded for posterity. While in many circumstances this is an ideal opportunity for fond recollection, it has the downside of displaying for others our less flattering moments. Because the Internet has such a wide scope, once something has entered its domain, it is virtually impossible to permanently remove. With a public increasingly perceiving this winnowing of privacy as a negative tendency, legislators both at home and abroad have made proposals that attempt to place restrictions on what content social media is allowed …


Facebook Messenger: Eroding User Privacy In Order To Collect, Analyze, And Sell Your Personal Information, 31 J. Marshall J. Info. Tech. & Privacy L. 393 (2014), Erica Jaeger Jan 2014

Facebook Messenger: Eroding User Privacy In Order To Collect, Analyze, And Sell Your Personal Information, 31 J. Marshall J. Info. Tech. & Privacy L. 393 (2014), Erica Jaeger

UIC John Marshall Journal of Information Technology & Privacy Law

This comment will examine Facebook‘s new standalone Facebook Messenger app, and review how the Privacy Policy, Data Use Policy, and the list of permissions violate Section 5 of the Federal Trade Commission Act. The comment will focus on Facebook Messenger‘s deceptive methods of accessing users‘ personal information and how Facebook uses that personal information. Section II will explain social networking sites and the configuration of Facebook, Facebook Messenger, and Facebook‘ s evolving policies. Section II will also discuss the Federal Trade Commission and the Federal Trade Commission Act that was created to protect consumers against unfair, deceptive, or fraudulent practices.15 …


Maryland's Social Networking Law: No "Friend" To Employers And Employees, Alexander Borman Jan 2014

Maryland's Social Networking Law: No "Friend" To Employers And Employees, Alexander Borman

Journal of Business & Technology Law

No abstract provided.


Surveillance At The Source, David Thaw Jan 2014

Surveillance At The Source, David Thaw

Articles

Contemporary discussion concerning surveillance focuses predominantly on government activity. These discussions are important for a variety of reasons, but generally ignore a critical aspect of the surveillance-harm calculus – the source from which government entities derive the information they use. The source of surveillance data is the information "gathering" activity itself, which is where harms like "chilling" of speech and behavior begin.

Unlike the days where satellite imaging, communications intercepts, and other forms of information gathering were limited to advanced law enforcement, military, and intelligence activities, private corporations now play a dominant role in the collection of information about individuals' …


Enlightened Regulatory Capture, David Thaw Jan 2014

Enlightened Regulatory Capture, David Thaw

Articles

Regulatory capture generally evokes negative images of private interests exerting excessive influence on government action to advance their own agendas at the expense of the public interest. There are some cases, however, where this conventional wisdom is exactly backwards. This Article explores the first verifiable case, taken from healthcare cybersecurity, where regulatory capture enabled regulators to harness private expertise to advance exclusively public goals. Comparing this example to other attempts at harnessing industry expertise reveals a set of characteristics under which regulatory capture can be used in the public interest. These include: 1) legislatively-mandated adoption of recommendations by an advisory …