Open Access. Powered by Scholars. Published by Universities.®

Consumer Protection Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 189

Full-Text Articles in Consumer Protection Law

Regulating Glamour: A Quantitative Analysis Of The Health And Safety Training Of Appearance Professionals, 54 Uic J. Marshall L. Rev. 123 (2021), Daniel Greenberg Jan 2021

Regulating Glamour: A Quantitative Analysis Of The Health And Safety Training Of Appearance Professionals, 54 Uic J. Marshall L. Rev. 123 (2021), Daniel Greenberg

UIC Law Review

No abstract provided.


Blocking Ad Blockers, 16 J. Marshall Rev. Intell. Prop. L. 272 (2017), Tyler Barbacovi Jan 2017

Blocking Ad Blockers, 16 J. Marshall Rev. Intell. Prop. L. 272 (2017), Tyler Barbacovi

UIC Review of Intellectual Property Law

The prevalence of ad blocking software (software that prevents the loading of web based advertisements) is a growing problem for website owners and content creators who rely on advertising revenue to earn money. While the number of ad block users continues to increase, there has thus far been no significant legal challenge to ad blocking in the United States. This comment examines how a website owner, through a combination of technological improvements and the anti-circumvention provisions of the Digital Millennium Copyright Act, could successfully raise a legal challenge against the purveyors of ad blocking software.


Commercial Creations: The Role Of End User License Agreements In Controlling The Exploitation Of User Generated Content, 16 J. Marshall Rev. Intell. Prop. L. 382 (2017), Neha Ahuja Jan 2017

Commercial Creations: The Role Of End User License Agreements In Controlling The Exploitation Of User Generated Content, 16 J. Marshall Rev. Intell. Prop. L. 382 (2017), Neha Ahuja

UIC Review of Intellectual Property Law

This article considers the current licensing regime used to control the exploitation of copyright protected works within the online interactive entertainment sector—particularly virtual worlds including multiplayer online games—to further author new copyrightable works. This article aims to identify the gaps that have arisen on account of the nature of these subsequently authored works and the potential for their exploitation under the said licensing regime. Users and the proprietors of virtual worlds often end up in conflict over the monetization and commercialization of user generated content on account of contradictory yet overlapping rights created by copyright law when controlled by contract …


Health Information And Data Security Safeguards, 32 J. Marshall J. Info. Tech. & Privacy L. 133 (2016), Jane Kim, David Zakson Jan 2016

Health Information And Data Security Safeguards, 32 J. Marshall J. Info. Tech. & Privacy L. 133 (2016), Jane Kim, David Zakson

UIC John Marshall Journal of Information Technology & Privacy Law

The healthcare industry possesses information coveted by cyber criminals. Unfortunately, healthcare providers are also among the most vulnerable and unprepared to deal with cyber attacks. The Introduction sets the background of this paper with cyber security statistics of the healthcare sector. Part A of this paper will discuss how new Russian law impacts global data security. Part B takes a broad look at data security safeguards. Part C focuses on U.S. attempts at safeguarding data through NIST and its Presidential Policy Directive. In Part D, the paper explores in greater detail causes that precipitate security breaches and specific security defenses …


Smart Washers May Clean Your Clothes, But Hacks Can Clean Out Your Privacy, And Underdeveloped Regulations Could Leave You Hanging On A Line, 32 J. Marshall J. Info. Tech. & Privacy L. 259 (2016), Nikole Davenport Jan 2016

Smart Washers May Clean Your Clothes, But Hacks Can Clean Out Your Privacy, And Underdeveloped Regulations Could Leave You Hanging On A Line, 32 J. Marshall J. Info. Tech. & Privacy L. 259 (2016), Nikole Davenport

UIC John Marshall Journal of Information Technology & Privacy Law

A house is equipped with a smart clothes washer, an intelligent HVAC system and a video enabled home security system, all running through the home network - it reduces the noise by doing laundry when no one is at home, saves energy costs by automatically changing the temperature depending who is in a room, lets the owner remotely see the kids walk in the door after school, and keeps the house safe - the owner is maximizing the use of the Internet of Things (“IoT”) devices (i.e. a network of everyday objects connected to the Internet and to each other). …


The Presumption Of Injury: Giving Data Breach Victims "A Leg To Stand On," 32 J. Marshall J. Info. Tech. & Privacy L. 301 (2016), Corey Varma Jan 2016

The Presumption Of Injury: Giving Data Breach Victims "A Leg To Stand On," 32 J. Marshall J. Info. Tech. & Privacy L. 301 (2016), Corey Varma

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Protecting The Brave: Why Congress Should Amend The Dodd-Frank Act To Better Protect Fcpa Whistleblowers, 49 J. Marshall L. Rev. 829 (2016), Jeffrey Mathis Jan 2016

Protecting The Brave: Why Congress Should Amend The Dodd-Frank Act To Better Protect Fcpa Whistleblowers, 49 J. Marshall L. Rev. 829 (2016), Jeffrey Mathis

UIC Law Review

No abstract provided.


Student Loan Debt For The Millennial Generation And Ineffectiveness Of The Federal Student Loan Program, 50 J. Marshall L. Rev. 139 (2016), Chris Ciciora Jan 2016

Student Loan Debt For The Millennial Generation And Ineffectiveness Of The Federal Student Loan Program, 50 J. Marshall L. Rev. 139 (2016), Chris Ciciora

UIC Law Review

No abstract provided.


Selected State Laws Governing The Safeguarding And Disposing Of Personal Information, 31 J. Marshall J. Info. Tech. & Privacy L. 487 (2015), Bruce Radke, Michael Waters Jan 2015

Selected State Laws Governing The Safeguarding And Disposing Of Personal Information, 31 J. Marshall J. Info. Tech. & Privacy L. 487 (2015), Bruce Radke, Michael Waters

UIC John Marshall Journal of Information Technology & Privacy Law

Numerous states have adopted laws mandating the protection and disposal of personal information. Under those laws, businesses are required to implement and maintain reasonable security procedures and practices appropriate to the nature of the information in order to protect the personal information from unauthorized access, destruction, use, modification, or disclosure. Although the definition of “personal information” varies from state to state, “personal information” is generally defined as an individual’s first name or initial and last name in combination with any one or more of the following data elements, when either the name or the data elements are not encrypted or …


Legal Problems In Data Management: Ethics Of Big Data Analytics And The Importance Of Disclosure, 31 J. Marshall J. Info. Tech. & Privacy L. 641 (2015) Jan 2015

Legal Problems In Data Management: Ethics Of Big Data Analytics And The Importance Of Disclosure, 31 J. Marshall J. Info. Tech. & Privacy L. 641 (2015)

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Industry Self-Regulation Of Consumer Data Privacy And Security, 32 J. Marshall J. Info. Tech. & Privacy L. 15 (2015), Siona Listokin Jan 2015

Industry Self-Regulation Of Consumer Data Privacy And Security, 32 J. Marshall J. Info. Tech. & Privacy L. 15 (2015), Siona Listokin

UIC John Marshall Journal of Information Technology & Privacy Law

Industry self-regulation of consumer data privacy and security has been proposed as a flexible alternative and compliment to traditional government regulation. This study analyzes whether different types of existing industry-led standards improve online privacy and security. This paper examines which types of firms join voluntary standards and whether there is a difference in outcomes between trade association memberships (like the Digital Advertising Alliance) and certification programs (like TRUSTe). Results suggest that more trafficked websites are more likely to adopt standards, and that trade association member-ship does not have an effect on privacy and security performance. This article highlights the need …


‘The Greatest Wealth Is Health’: Patient Protected Health Information In The Hands Of Hackers, 31 J. Marshall J. Info. Tech. & Privacy L. 657 (2015), Samantha Singer Jan 2015

‘The Greatest Wealth Is Health’: Patient Protected Health Information In The Hands Of Hackers, 31 J. Marshall J. Info. Tech. & Privacy L. 657 (2015), Samantha Singer

UIC John Marshall Journal of Information Technology & Privacy Law

This comment will analyze the specific requirements and stages that EPs/EHs must comply with in order to receive its Medicare and Medicaid incentives, how EHR technologies are being implemented, how EHR technologies are affecting patients' privacy with regard to hacking a patient‟s PHI, and what EHR technology vendors and EPs/EHs should be doing to improve patient privacy and security to prevent hacking and other breaches.

Part I of this comment will address hacking of PHI. Part II will analyze the security measures that EHR vendors must currently incorporate into EHR technology and how the lack of required security measures impacts …


The Truth Behind Data Collection And Analysis, 32 J. Marshall J. Info. Tech. & Privacy L. 33 (2015), Morgan Hochheiser Jan 2015

The Truth Behind Data Collection And Analysis, 32 J. Marshall J. Info. Tech. & Privacy L. 33 (2015), Morgan Hochheiser

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Troubleshooting Legal Malfunction: Lexmark And Consumer Standing Under The Lanham Act, 48 J. Marshall L. Rev. 453 (2015), Jeremy Rovinsky Jan 2015

Troubleshooting Legal Malfunction: Lexmark And Consumer Standing Under The Lanham Act, 48 J. Marshall L. Rev. 453 (2015), Jeremy Rovinsky

UIC Law Review

This article suggests that the recent Lexmark decision, while resolving the confusion relating to Lanham Act standing requirements, does nothing to protect those most vulnerable—the consumers. Congress must explicitly declare that consumers have standing under the Lanham Act when they have been damaged by purchasing falsely represented goods or services. Section I provides a history of the Lanham Act and illustrates how different courts initially allowed and then precluded consumers from bringing claims under Section 43(a)’s “any person” language. Section II critiques the opinions that have found no consumer standing, including the Supreme Court’s recent Lexmark decision. Section III highlights …


Taming The Wild West Of Wall Street: Regulating Credit Default Swaps After Dodd-Frank, 48 J. Marshall L. Rev. 565 (2015), Benjamin O’Connor Jan 2015

Taming The Wild West Of Wall Street: Regulating Credit Default Swaps After Dodd-Frank, 48 J. Marshall L. Rev. 565 (2015), Benjamin O’Connor

UIC Law Review

No abstract provided.


Complex Decision-Making And Cognitive Aging Call For Enhanced Protection Of Seniors Contemplating Reverse Mortgages, 46 Ariz. St. L.J. 299 (2014), Debra Pogrund Stark, Jessica M. Choplin, Joseph Mikels, Amber Schonbrun Mcdonnell Mar 2014

Complex Decision-Making And Cognitive Aging Call For Enhanced Protection Of Seniors Contemplating Reverse Mortgages, 46 Ariz. St. L.J. 299 (2014), Debra Pogrund Stark, Jessica M. Choplin, Joseph Mikels, Amber Schonbrun Mcdonnell

UIC Law Open Access Faculty Scholarship

This article analyzes the factors that affect the effectiveness of the current rules and counseling protocol in enabling seniors to make well-informed decisions on whether to enter into a proposed reverse mortgage in light of the cognitive barriers that consumers in general, and seniors in particular, face. The article then proposes further changes to these rules and the counseling protocol to better enable seniors to determine whether entering into reverse mortgages is in their best interest in light of their specific financial situations and goals. Section I provides an overview of the current status of the law relating to reverse …


Dodd-Frank 2.0: Creating Interactive Home-Loan Disclosures To Enable Shrewd Consumer Decision-Making, 27 Loy. Consumer L. Rev. 95 (2014), Debra Pogrund Stark, Jessica M. Choplin, Mark A. Leboeuf, Andrew Pizor Jan 2014

Dodd-Frank 2.0: Creating Interactive Home-Loan Disclosures To Enable Shrewd Consumer Decision-Making, 27 Loy. Consumer L. Rev. 95 (2014), Debra Pogrund Stark, Jessica M. Choplin, Mark A. Leboeuf, Andrew Pizor

UIC Law Open Access Faculty Scholarship

In Section I, we summarize and analyze the Dodd-Frank laws that were enacted to regulate home loan terms and the key changes made to the home loan disclosure rules and forms, critiquing in particular the changes made to the APR component of the new CFPB disclosure form. In Section II, we detail and report on the methods and results from two APR Experiments we conducted (one using eyetracking technology to see which areas of the disclosure form participants were looking at and for how long); we also report on the low level of financial literacy of the participants reflected in …


Now You See It, Now You Don’T . . . Or Do You?: Snapchat’S Deceptive Promotion Of Vanishing Messages Violates Federal Trade Commission Regulations, 30 J. Marshall J. Info. Tech. & Privacy L. 827 (2014), Danielle Young Jan 2014

Now You See It, Now You Don’T . . . Or Do You?: Snapchat’S Deceptive Promotion Of Vanishing Messages Violates Federal Trade Commission Regulations, 30 J. Marshall J. Info. Tech. & Privacy L. 827 (2014), Danielle Young

UIC John Marshall Journal of Information Technology & Privacy Law

This Comment will explore the recently popular application Snapchat, and discuss the ways in which the app's privacy policy has violated FTC regulations, responding to a recent complaint filed by The Electronic Privacy Center. Particularly, this Comment will focus on Snapchat's deceptive promotion of "disappearing" photographs and videos. Section II will illustrate the basic structure of Snapchat, detailing various illustrations of its use. Section II will also examine the regulations set forth by the FTC that Snapchat is required to follow. Section III will discuss possible methods that the average user can do in order to bypass the very thing …


California’S Eavesdropping Law Endangers Victims Of Domestic Violence, 31 J. Marshall J. Info. Tech. & Privacy L. 57 (2014), John E.B. Myers Jan 2014

California’S Eavesdropping Law Endangers Victims Of Domestic Violence, 31 J. Marshall J. Info. Tech. & Privacy L. 57 (2014), John E.B. Myers

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Canada’S Anti-Spam Legislation: A Constitutional Analysis, 31 J. Marshall J. Info. Tech. & Privacy L. 1 (2014), Emir Crowne, Stephanie Provato Jan 2014

Canada’S Anti-Spam Legislation: A Constitutional Analysis, 31 J. Marshall J. Info. Tech. & Privacy L. 1 (2014), Emir Crowne, Stephanie Provato

UIC John Marshall Journal of Information Technology & Privacy Law

On December 15th, 2010, the Government of Canada agreed to Bill C-28, the Fighting Internet and Wireless Spam Act, with the intent to “deter the most damaging and deceptive forms of spam… from occurring in Canada and to help to drive out spammers.” Canada‟s Anti- Spam Legislation (“CASL”) was born. Although CASL has only been in force since July 1st, 2014, we argue that the Act may not survive constitutional scrutiny as it unduly restricts freedom of speech.


The Right To Be Forgotten: Forced Amnesia In A Technological Age, 31 J. Marshall J. Info. Tech. & Privacy L. 133 (2014), Robert Bolton Jan 2014

The Right To Be Forgotten: Forced Amnesia In A Technological Age, 31 J. Marshall J. Info. Tech. & Privacy L. 133 (2014), Robert Bolton

UIC John Marshall Journal of Information Technology & Privacy Law

In the modern era, the connection between technology and one’s personal life has increased the number of moments recorded for posterity. While in many circumstances this is an ideal opportunity for fond recollection, it has the downside of displaying for others our less flattering moments. Because the Internet has such a wide scope, once something has entered its domain, it is virtually impossible to permanently remove. With a public increasingly perceiving this winnowing of privacy as a negative tendency, legislators both at home and abroad have made proposals that attempt to place restrictions on what content social media is allowed …


Facebook Messenger: Eroding User Privacy In Order To Collect, Analyze, And Sell Your Personal Information, 31 J. Marshall J. Info. Tech. & Privacy L. 393 (2014), Erica Jaeger Jan 2014

Facebook Messenger: Eroding User Privacy In Order To Collect, Analyze, And Sell Your Personal Information, 31 J. Marshall J. Info. Tech. & Privacy L. 393 (2014), Erica Jaeger

UIC John Marshall Journal of Information Technology & Privacy Law

This comment will examine Facebook‘s new standalone Facebook Messenger app, and review how the Privacy Policy, Data Use Policy, and the list of permissions violate Section 5 of the Federal Trade Commission Act. The comment will focus on Facebook Messenger‘s deceptive methods of accessing users‘ personal information and how Facebook uses that personal information. Section II will explain social networking sites and the configuration of Facebook, Facebook Messenger, and Facebook‘ s evolving policies. Section II will also discuss the Federal Trade Commission and the Federal Trade Commission Act that was created to protect consumers against unfair, deceptive, or fraudulent practices.15 …


Class Actions A Thing Of The Past … Or Are They? A Look At The Circuit Courts' Application Of Comcast V. Behrend, 48 J. Marshall L. Rev. 335 (2014), Christine Frymire Jan 2014

Class Actions A Thing Of The Past … Or Are They? A Look At The Circuit Courts' Application Of Comcast V. Behrend, 48 J. Marshall L. Rev. 335 (2014), Christine Frymire

UIC Law Review

This Comment addresses recent developments in the law of class action waivers and certification. Specifically, it looks at three cases—Comcast, Concepcion, and Wal-Mart—in which the Supreme Court limited class action litigation and class arbitration. This Comment also addresses how the circuit courts are hesitant to follow the Supreme Court’s precedent.


Dysfunctional Contracts And The Laws And Practices That Enable Them: An Empirical Analysis, 46 Ind. L. Rev. 797 (2013), Debra Pogrund Stark, Jessica M. Choplin, Eileen Linnabery Jan 2013

Dysfunctional Contracts And The Laws And Practices That Enable Them: An Empirical Analysis, 46 Ind. L. Rev. 797 (2013), Debra Pogrund Stark, Jessica M. Choplin, Eileen Linnabery

UIC Law Open Access Faculty Scholarship

While many courts refuse to strike down these clauses under the unconscionability test, this Article argues that the results from the Remedies Experiment should lead courts to adopt a different set of tests for ruling on the enforceability of limitation-of-remedy clauses in home purchase contracts. Part I of this Article highlights the relevant results from two empirical studies Professor Stark conducted regarding major problems with the fairness of purchase agreement forms used by residential real estate developers in Illinois. Part I also discusses the lack of home purchaser understanding of key relevant laws and legal documents examined in an empirical …


Checking Out Of The Exception To 3-104: Why Parties Should Be Able To Negotiate Whether Checks Should Be Payable On Demand, 3 Colum. J. Race & L. 73 (2013), Linda R. Crane Jan 2013

Checking Out Of The Exception To 3-104: Why Parties Should Be Able To Negotiate Whether Checks Should Be Payable On Demand, 3 Colum. J. Race & L. 73 (2013), Linda R. Crane

UIC Law Open Access Faculty Scholarship

Many aspects of American society, including its legal system, operate to the disadvantage of minorities. Obvious examples include inequities in our criminal/justice system and in school funding. Much has been written on those and other topics. This article focuses on another example, specifically on how a sweeping change to an obscure banking rule regulating the check collection process has negatively affected consumers in general, and minority groups in particular.

U.S. check collections require a complex system comprised of a variety of institutions including commercial banks, savings and loans, savings banks, and credit unions, as well as the customers who rely …


My Iphone Is My Castle: One Aspect Of Protecting Privacy In A Digital Age, 30 J. Marshall J. Info. Tech. & Privacy L. 1 (2013), Joan Catherine Bohl Jan 2013

My Iphone Is My Castle: One Aspect Of Protecting Privacy In A Digital Age, 30 J. Marshall J. Info. Tech. & Privacy L. 1 (2013), Joan Catherine Bohl

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


How Far Can The Government’S Hand Reach Inside Your Personal Inbox?: Problems With The Sca, 30 J. Marshall J. Info. Tech. & Privacy L.75 (2013), Dana T. Benedetti Jan 2013

How Far Can The Government’S Hand Reach Inside Your Personal Inbox?: Problems With The Sca, 30 J. Marshall J. Info. Tech. & Privacy L.75 (2013), Dana T. Benedetti

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Sometimes I Feel Like Somebody’S Watching Me . . . Read?: A Comment On The Need For Heightened Privacy Rights For Consumers Of Ebooks, 30 J. Marshall J. Info. Tech. & Privacy L. 281 (2013), Meredith Mays Espino Jan 2013

Sometimes I Feel Like Somebody’S Watching Me . . . Read?: A Comment On The Need For Heightened Privacy Rights For Consumers Of Ebooks, 30 J. Marshall J. Info. Tech. & Privacy L. 281 (2013), Meredith Mays Espino

UIC John Marshall Journal of Information Technology & Privacy Law

.


Public Policy And Consumer Disclosure For The Income Annuity Market, 46 J. Marshall L. Rev. 795 (2013), Kelli Hueler, Paula Hogan, Anna Rappaport Jan 2013

Public Policy And Consumer Disclosure For The Income Annuity Market, 46 J. Marshall L. Rev. 795 (2013), Kelli Hueler, Paula Hogan, Anna Rappaport

UIC Law Review

No abstract provided.


Lien-Stripping In The Absence Of A Discharge: Bankruptcy's Answer To The Destruction Caused By Excessive Home Equity Extraction, 46 J. Marshall L. Rev. 915 (2013), Gregory Guest Jan 2013

Lien-Stripping In The Absence Of A Discharge: Bankruptcy's Answer To The Destruction Caused By Excessive Home Equity Extraction, 46 J. Marshall L. Rev. 915 (2013), Gregory Guest

UIC Law Review

No abstract provided.