Open Access. Powered by Scholars. Published by Universities.®

Internet Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 31 - 33 of 33

Full-Text Articles in Internet Law

Breach Notification Requirements Under The European Union Legal Framework: Convergence, Conflicts, And Complexity In Compliance, 31 J. Marshall J. Info. Tech. & Privacy L. 317 (2014), Samson Esayas Jan 2014

Breach Notification Requirements Under The European Union Legal Framework: Convergence, Conflicts, And Complexity In Compliance, 31 J. Marshall J. Info. Tech. & Privacy L. 317 (2014), Samson Esayas

UIC John Marshall Journal of Information Technology & Privacy Law

The European Union (EU) legal landscape on data privacy and information security is undergoing significant changes. A prominent legislative development in recent years is the introduction of breach notification requirements within a number of regulatory instruments. In only the past two years, the Community legislator has adopted, and proposed, four different regulatory instruments containing breach notification requirements. There are also existing requirements for the telecom sector. This creates a complex mesh of regulatory frameworks for breach notification where different aspects of the same breach within the same company might have to be dealt with under different regulatory instruments, making compliance …


It Is Time For Investment Advisers To Join The Conversation About Social Media, 31 J. Marshall J. Info. Tech. & Privacy L. 423 (2014), Sarah Tanaka Jan 2014

It Is Time For Investment Advisers To Join The Conversation About Social Media, 31 J. Marshall J. Info. Tech. & Privacy L. 423 (2014), Sarah Tanaka

UIC John Marshall Journal of Information Technology & Privacy Law

Section II will detail the creation of the SEC, including key that shaped the establishment, goals, and mission of the SEC. Furthermore, it will focus on who is an investment adviser under the Investment Advisers Act of 1940, the controlling legislation on the matter. Section II will also examine the SEC‟s current guidance on investment advisers‟ use of social media and the public policy behind the new provisions. With social media revolutionizing the way individuals communicate and share information, Section III will discuss the advantages and disadvantages of the current guidance regarding investment advisers‟ use of social media. It will …


Navigating Cybersquatting Enforcement In The Expanding Internet, 13 J. Marshall Rev. Intell. Prop. L. 321 (2014), Jordan A. Arnot Jan 2014

Navigating Cybersquatting Enforcement In The Expanding Internet, 13 J. Marshall Rev. Intell. Prop. L. 321 (2014), Jordan A. Arnot

UIC Review of Intellectual Property Law

It has always been a considerable task to police something as vast at the Internet for trademark violations and abuse. As the Internet develops with the ongoing launch of hundreds of new generic Top-Level Domains, so does the host of enforcement options available to those seeking to protect the value of trademarks and other intellectual property. This article outlines seven criteria to consider when selecting a remedy, or combination of remedies. The traditional cease and desist letter is still a viable and effective option, and so, of course, is litigation. These tools were greatly enhanced in 1999 when the Internet …