Open Access. Powered by Scholars. Published by Universities.®

Consumer Protection Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 8 of 8

Full-Text Articles in Consumer Protection Law

Digital Divide Older People And Online Legal Advice, Subhajit Basu, Joe Duffy, Helen Davey Jun 2009

Digital Divide Older People And Online Legal Advice, Subhajit Basu, Joe Duffy, Helen Davey

Subhajit Basu

Many older people are not aware where and when advice is available. Furthermore they may be unaware that advice is needed


Cuarto Congreso Nacional De Organismos Públicos Autónomos, Bruno L. Costantini García Jun 2009

Cuarto Congreso Nacional De Organismos Públicos Autónomos, Bruno L. Costantini García

Bruno L. Costantini García

Memorias del Cuarto Congreso Nacional de Organismos Públicos Autónomos

"El papel de los Organismos Públicos Autónomos en la Consolidación de la Democracia"


Unlocking The Wireless Safe: Opening Up The Wireless World For Consumers, Adam Clay Jun 2009

Unlocking The Wireless Safe: Opening Up The Wireless World For Consumers, Adam Clay

Federal Communications Law Journal

Facing resistance to the use of its Voice-over-Internet Protocol application on mobile phones, in February 2007, Skype Communications filed a petition with the FCC asking for application of the Carterfone standards to the wireless phone industry. This Note discusses Carterfone and the merits of Skype's petition in light of the recent auction of the C Block, which carries open network requirements, and developments in wireless technology. This Note argues that the FCC should require carriers to provide technical standards for access to their networks, whereby individuals will be able to connect any approved device and application of their choosing.


Reasons Why We Should Amend The Constitution To Protect Privacy, Deborah Pierce Jun 2009

Reasons Why We Should Amend The Constitution To Protect Privacy, Deborah Pierce

Chicago-Kent Law Review

Threats to consumer privacy are many, and varied. Some threats come from corporate entities such as data aggregators and social networking sites; while others come from panoptics government surveillance systems such as Secure Flight. Not only can the data be compromised, but consumers may be adversely affected by incorrect information in their files. The time may be right to explicitly protect privacy via a constitutional amendment to the U.S. Constitution.


Coding Privacy, Lilian Edwards Jun 2009

Coding Privacy, Lilian Edwards

Chicago-Kent Law Review

Lawrence Lessig famously and usefully argues that cyberspace is regulated not just by law but also by norms, markets and architecture or "code." His insightful work might also lead the unwary to conclude, however, that code is inherently anti-privacy, and thus that an increasingly digital world must therefore also be increasingly devoid of privacy. This paper argues briefly that since technology is a neutral tool, code can be designed as much to fight for privacy as against it, and that what matters now is to look at what incentivizes the creation of pro- rather than anti-privacy code in the mainstream …


Digital Ethics In Bridging Digital Divide, Subhajit Basu Apr 2009

Digital Ethics In Bridging Digital Divide, Subhajit Basu

Subhajit Basu

Our information society is creating parallel systems: one for those with income, education and literacy connections, giving plentiful information at low cost and high speed: the other are those without connections, blocked by high barriers of time, cost and uncertainty and dependent upon outdated information. Hence it can be expressed the DD is nothing but a reflection of social divide. The question is what is the best strategy to construct an information society that is ethically sound? Most people have the views that ICT and underlying ideologies are neutral. This Technology has become so much naturalized that it can no …


Social Networking And Blogging: The New Legal Frontier, 9 J. Marshall Rev. Intell. Prop. L. 500 (2009), Robert Newman, Liisa Thomas Jan 2009

Social Networking And Blogging: The New Legal Frontier, 9 J. Marshall Rev. Intell. Prop. L. 500 (2009), Robert Newman, Liisa Thomas

UIC Review of Intellectual Property Law

Improvements in communication technology have effectively made the world a smaller place. As businesses attempt to exploit these new technological improvements to better communicate their messages to their clients, these same improvements continue to raise new and difficult legal issues related to fair trade practices, privacy, and freedom of speech. This article identifies current legal developments related to advertising in the online world and analyzes the actions taken to resolve these new and difficult legal issues within the framework of United States federal and state law and private industry-specific self-governance.


Code, Crash, And Open Source: The Outsourcing Of Financial Regulation To Risk Models And The Global Financial Crisis, Erik F. Gerding Jan 2009

Code, Crash, And Open Source: The Outsourcing Of Financial Regulation To Risk Models And The Global Financial Crisis, Erik F. Gerding

Publications

The widespread use of computer-based risk models in the financial industry during the last two decades enabled the marketing of more complex financial products to consumers, the growth of securitization and derivatives, and the development of sophisticated risk-management strategies by financial institutions. Over this same period, regulators increasingly delegated or outsourced vast responsibility for regulating risk in both consumer finance and financial markets to these privately owned industry models. Proprietary risk models of financial institutions thus came to serve as a "new financial code" that regulated transfers of risk among consumers, financial institutions, and investors.

The spectacular failure of financial-industry …