Open Access. Powered by Scholars. Published by Universities.®

Internet Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Journal

FTC

Discipline
Institution
Publication Year
Publication

Articles 1 - 27 of 27

Full-Text Articles in Internet Law

The Freedom Of Influencing, Hannibal Travis Feb 2023

The Freedom Of Influencing, Hannibal Travis

University of Miami Law Review

Social media stars and the Federal Trade Commission (“FTC”) Act are clashing. Influencer marketing is a preferred way for entertainers, pundits, and everyday people to monetize their audiences and popularity. Manufacturers, service providers, retailers, and advertising agencies leverage influencers to reach into millions or even billions of consumer devices, capturing minutes or seconds of the market’s fleeting attention. FTC enforcement actions and private lawsuits have targeted influencers for failing to disclose the nature of a sponsorship relationship with a manufacturer, marketer, or service provider. Such a failure to disclose payments prominently is very common in Hollywood films and on radio …


No Ifs, Ands, Or Juuls About It: Why Influencers Must Be Held Accountable, Krystina Dorta Jan 2021

No Ifs, Ands, Or Juuls About It: Why Influencers Must Be Held Accountable, Krystina Dorta

Catholic University Journal of Law and Technology

This article analyzes how the FTC’s Endorsement Guide regulating the advertising of e-cigarette products should be applied to social media influencers. The struggle to regulate e-cigarettes by the FDA and the FTC has led to different advertising methods, which either comply with or neglect the FTC’s Endorsement Guide. This article evaluates the federal government’s reaction to the e-cigarette health crisis, followed by a review of the FTC’s previous actions addressing Endorsement Guide violations, along with the consequences on other companies’ marketing strategies. Finally, this article reviews influencer liability standards for Endorsement Guide violations and develops recommendations to improve those standards.


Towards Truth In Influencing: Risks And Rewards Of Disclosing Influencer Marketing In The Fashion Industry, Megan K. Bannigan, Beth Shane Jan 2020

Towards Truth In Influencing: Risks And Rewards Of Disclosing Influencer Marketing In The Fashion Industry, Megan K. Bannigan, Beth Shane

NYLS Law Review

No abstract provided.


Confiding In Con Men: U.S. Privacy Law, The Gdpr, And Information Fiduciaries, Lindsey Barrett Apr 2019

Confiding In Con Men: U.S. Privacy Law, The Gdpr, And Information Fiduciaries, Lindsey Barrett

Seattle University Law Review

In scope, ambition, and animating philosophy, U.S. privacy law and Europe’s General Data Protection Regulation are almost diametric opposites. The GDPR’s ambitious individual rights, significant prohibitions, substantive enforcement regime, and broad applicability contrast vividly with a scattershot U.S. regime that generally prioritizes facilitating commerce over protecting individuals, and which has created perverse incentives for industry through anemic enforcement of the few meaningful limitations that do exist. A privacy law that characterizes data collectors as information fiduciaries could coalesce with the commercial focus of U.S. law, while emulating the GDPR’s laudable normative objectives and fortifying U.S. consumer privacy law with a …


Influencing The Ftc To Update Disclosure Rules For The Social Media Era, Elizabeth A. Casale Jan 2019

Influencing The Ftc To Update Disclosure Rules For The Social Media Era, Elizabeth A. Casale

Mitchell Hamline Law Journal of Public Policy and Practice

No abstract provided.


Data Protection In An Increasingly Globalized World, Nicholas F. Palmieri Iii Jan 2019

Data Protection In An Increasingly Globalized World, Nicholas F. Palmieri Iii

Indiana Law Journal

With the rise of the internet in recent decades, it has become increasingly easy for various enterprises—including retailers, advertising agencies, and service providers—to acquire, use, and even share the personal details of their users. Such a trend is unlikely to decrease in the coming years; in fact, internet usage is only likely to increase as more and more people gain access to the internet. In the wakeof recent data breaches, including the now infamous breach of Equifax as well as the scandal involving Facebook and Cambridge Analytica, people are even more aware of the need for (and the risk of …


Access To Adjudication Materials On Federal Agency Websites, Daniel J. Sheffner Feb 2018

Access To Adjudication Materials On Federal Agency Websites, Daniel J. Sheffner

Akron Law Review

This Article offers recommendations and best practices for federal administrative agencies interested in improving the accessibility of orders, opinions, briefs, and other materials filed or issued in administrative adjudication proceedings on their websites and in maintaining more comprehensive online collections of such adjudication materials. Part I provides an overview of federal administrative adjudication and the laws and policies relevant to the online disclosure of adjudication materials. Part II summarizes a survey the author conducted of 24 federal agency websites and presents its results. Part III analyzes the survey’s findings, dividing the analysis into two sections. The first section discusses the …


The Tortoise And The Hare Of International Data Privacy Law: Can The United States Catch Up To Rising Global Standards?, Matthew Humerick Jan 2018

The Tortoise And The Hare Of International Data Privacy Law: Can The United States Catch Up To Rising Global Standards?, Matthew Humerick

Catholic University Journal of Law and Technology

Technological developments spur the development of big data on a global scale. The breadth of data companies collect, maintain, process, and transmit affects nearly every country and organization around the world. Inherent to big data are issues of data protection and transfers to third countries. While many jurisdictions emphasize the importance of protecting consumer data, such as the European Union, others, like the United States, do not. To circumvent this issue, the United States and European Union contracted around data privacy standard discrepancies through the Safe Harbor Agreement, which eased cross-border data transfers. However, the Court of Justice of the …


Consumer Protection In The Age Of Connected Everything, Terrell Mcsweeny Jan 2018

Consumer Protection In The Age Of Connected Everything, Terrell Mcsweeny

NYLS Law Review

No abstract provided.


“Hello…It’S Me. [Please Don’T Sue Me!]” Examining The Fcc’S Overbroad Calling Regulations Under The Tcpa, Marissa A. Potts Dec 2016

“Hello…It’S Me. [Please Don’T Sue Me!]” Examining The Fcc’S Overbroad Calling Regulations Under The Tcpa, Marissa A. Potts

Brooklyn Law Review

Americans have received unwanted telemarketing calls for decades. In response to a rapid increase in pre-recorded calls made using autodialer devices, Congress enacted the Telephone Consumer Protection Act (TCPA) in 1992. The TCPA imposes restrictions on calls made to consumers’ residences and wireless phones using autodialer devices, even if they are not telemarketing calls. Congress appointed the Federal Communications Commission (FCC) to prescribe rules and regulations to enforce the TCPA. In 2015, the FCC released an order that defined autodialer more broadly under the statute. Consequently, devices that have the potential to become autodialers in the future, even if they …


A Litigator's Guide To The Internet Of Things, Antigone Peyton Jan 2016

A Litigator's Guide To The Internet Of Things, Antigone Peyton

Richmond Journal of Law & Technology

Maybe you've heard about the Internet of Things (loT). It's the network of physical objects (or "things") that connect to the Internet and each other and have the ability to collect and exchange data. It includes a variety of devices with sensors, vehicles, buildings, and other items that contain electronics, software, and sensors. Some loT objects have "embedded intelligence," which allows them to detect and react to changes in their physical state. Though there is no specific definition of loT, the concept focuses on how computers, sensors, and objects interact with each other and collect information relating to their surroundings.


Beyond Technophobia: Lawyers’ Ethical And Legal Obligations To Monitor Evolving Technology And Security Risks, Timothy J. Toohey Jan 2015

Beyond Technophobia: Lawyers’ Ethical And Legal Obligations To Monitor Evolving Technology And Security Risks, Timothy J. Toohey

Richmond Journal of Law & Technology

Lawyers and technology have an uneasy relationship. Although some lawyers are early adapters, others take pride in ignoring technology because they believe it is alien to the practice of law. As Jody R. Westby observed, lawyers confronted with technology and security issues tend to have their “eyes glaze over” and “want to call in their ‘IT guy’ and go back to work.” But this technophobic attitude may no longer just be harmless conservatism. In the world of growing security risks, ignorance of technology may lead to violations of lawyers’ fundamental ethical duties of competence and confidentiality.


The Internet Of Things And Wearable Technology: Addressing Privacy And Security Concerns Without Derailing Innovation, Adam D. Thierer Jan 2015

The Internet Of Things And Wearable Technology: Addressing Privacy And Security Concerns Without Derailing Innovation, Adam D. Thierer

Richmond Journal of Law & Technology

The next great wave of Internet-enabled innovation has arrived, and it is poised to revolutionize the way humans interact with the world around them. This paper highlights some of the opportunities presented by the rise of the so-called Internet of Things (IoT) in general and wearable technology in particular and encourages policymakers to allow these technologies to develop in a relatively unabated fashion.


The Tangled Web: A Case Against New Generic Top-Level Domains, Joseph P. Smith Iii Jan 2014

The Tangled Web: A Case Against New Generic Top-Level Domains, Joseph P. Smith Iii

Richmond Journal of Law & Technology

If we had a reliable way to label our toys good and bad, it would be easy to regulate technology wisely. But we can rarely see far enough ahead to know which road leads to damnation.


Drawing The Line Between Competing Interests: Strengthening Online Data Privacy Protection In An Increasingly Networked World, Lori Chiu Mar 2013

Drawing The Line Between Competing Interests: Strengthening Online Data Privacy Protection In An Increasingly Networked World, Lori Chiu

San Diego International Law Journal

This article seeks to elucidate these issues and provide a roadmap for the U.S. government to create unified federal laws to provide the private sector with specific protocols regarding use and dissemination of consumer personal information. First, this article will provide an explanation of the U.S.’s current sector-by-sector approach to regulating personally identifying information and will provide a case study of the Federal Trade Commission’s (“FTC”) enforcement action against a social networking site in 2011 as one example of the FTC’s recent efforts at regulating online privacy. Next, this article will analyze the U.S.’s current challenge of judicial enforcement of …


Behavioral Advertising: The Cryptic Hunter And Gatherer Of The Internet, Joanna Penn May 2012

Behavioral Advertising: The Cryptic Hunter And Gatherer Of The Internet, Joanna Penn

Federal Communications Law Journal

In an era where three out of every four Americans have Internet access, the term "surfing" has transformed from riding waves into running the risk of having private information gathered, stored, and disseminated-all without the user's knowledge or permission. This new found online practice, known as "behavioral advertising," is a veritable goldmine for those companies that know the game. But will the FTC or Congress soon make new rules concerning how to play? This Note begins by explaining the differences between behavioral targeting and retargeting and the techniques that the two methods use to collect data. This Note then explores …


Better Late Than Never: How The Online Advertising Industry’S Response To Proposed Privacy Legislation Eliminates The Need For Regulation, Catherine Schmierer Jan 2011

Better Late Than Never: How The Online Advertising Industry’S Response To Proposed Privacy Legislation Eliminates The Need For Regulation, Catherine Schmierer

Richmond Journal of Law & Technology

Although Julie Matlin liked the shoes she saw on Zappos.com, she ultimately left the site without purchasing them. However, it was not the last time she would see that pair of shoes. For the next several days, the shoes followed Ms. Matlin to numerous other websites. “It was as if Zappos had unleashed a persistent salesmen who wouldn’t take no for an answer.” Understandably, Ms. Matlin found this “online stalking” disturbing, but she was more troubled when ads for her online dieting service started following her as well. She stated, “They are still following me around, and it makes me …


Busting Blocks: Revisiting 47 U.S.C. § 230 To Address The Lack Of Effective Legal Recourse For Wrongful Inclusion In Spam Filters, Jonathan I. Ezor Jan 2011

Busting Blocks: Revisiting 47 U.S.C. § 230 To Address The Lack Of Effective Legal Recourse For Wrongful Inclusion In Spam Filters, Jonathan I. Ezor

Richmond Journal of Law & Technology

Consider a company that uses e-mail to conduct a majority of its business, including customer and vendor communication, marketing, and filing official documents. After conducting business in this manner for several years, one day the company discovers that its most recent e-mails were not delivered to recipients using a major Internet Service Provider (“ISP”) because the company was recently listed on an automated block list as a sender of unwanted bulk commercial e-mail (“spam”).


Future Imperfect: Googling For Principles In Online Behavioral Advertising, Brian Stallworth Apr 2010

Future Imperfect: Googling For Principles In Online Behavioral Advertising, Brian Stallworth

Federal Communications Law Journal

In a remarkably short time, Google, Inc. has grown from two people working in a rented garage to a pervasive Internet force. Much of Google's unprecedented success stems from online advertising sales which employ behavioral advertising techniques-techniques that track consumer behavior--thereby increasing relevance and decreasing the cost of reaching a targeted audience. In the same span that saw Google's inception and explosive online dominance, the Federal Trade Commission has struggled to define not only the privacy issues involved in online behavioral advertising, but also the practice of behavioral advertising itself. Freed from the restraints of comprehensive federal laws and restrictive …


Corporate Privacy Trend: The “Value” Of Personally Identifiable Information (“Pii”) Equals The “Value” Of Financial Assets, John T. Soma, J. Zachary Courson, John Cadkin Jan 2009

Corporate Privacy Trend: The “Value” Of Personally Identifiable Information (“Pii”) Equals The “Value” Of Financial Assets, John T. Soma, J. Zachary Courson, John Cadkin

Richmond Journal of Law & Technology

Corporate America’s increasing dependence on the electronic use of personally identifiable information (“PII”) necessitates a reexamination and expansion of the traditional conception of corporate assets. PII is now a commodity that companies trade and sell. As technological development increases, aspects of day-to-day business involving PII are performed electronically in a more cost effective and efficient manner. PII, which companies obtain at little cost, has quantifiable value that is rapidly reaching a level comparable to the value of traditional financial assets.


“Medical” Monitoring For Non-Medical Harms: Evaluating The Reasonable Necessity Of Measures To Avoid Identity Fraud After A Data Breach, James Graves Jan 2009

“Medical” Monitoring For Non-Medical Harms: Evaluating The Reasonable Necessity Of Measures To Avoid Identity Fraud After A Data Breach, James Graves

Richmond Journal of Law & Technology

In July 2005, “reformed” hacker Albert Gonzalez noticed an insecure wireless network at a Marshalls department store in Miami. After exploiting the vulnerability, Gonzalez and his accomplices installed programs that captured credit card numbers. They stored the credit card numbers on servers in Latvia and Ukraine, created ATM cards using some of the numbers, and used those cards to withdraw hundreds of thousands of dollars in cash. Fifteen months later, Marshalls’ parent company, TJX, announced that forty-five million of its customers’ credit card numbers had been exposed to the thieves.


E-Commerce: Legal Issues Of The Online Retailer In Virginia, Jonathan D. Frieden, Sean Patrick Roche Jan 2006

E-Commerce: Legal Issues Of The Online Retailer In Virginia, Jonathan D. Frieden, Sean Patrick Roche

Richmond Journal of Law & Technology

The popularity and growth of online retailing, now in its tenth year, has shattered experts’ expectations. “Online sales in the United States grew twenty-four percent last year, to about $90 billion, and online retailing now accounts for nearly five percent of all retail sales.”


Unleashing “Instant Messaging” From Regulatory Oversight, Fernando R. Laguarda Jan 2004

Unleashing “Instant Messaging” From Regulatory Oversight, Fernando R. Laguarda

Richmond Journal of Law & Technology

America Online, Inc. (“AOL”) and Time Warner Inc. announced their intention to merge on January 10, 2000. At that time, there was a great deal of excitement about combining these two companies and harnessing the power of an increasingly broadband Internet. In addition to the Federal Trade Commission (“FTC”) and Federal Communications Commission (“FCC”), more than one thousand local communities conducted their own reviews of the merger. The FTC identified “open access” to the Time Warner Cable platform as an issue meriting specific relief.


Cyberian Signals, Steven A. Hetcher Jan 2002

Cyberian Signals, Steven A. Hetcher

University of Richmond Law Review

In Law and Social Norms, Eric Posner offers an original and important theory of the emergence of norms. According to Posner, norms are collections of signals. He develops his signaling account in a variety of contexts, including criminal law, family law, political participation, and racial discrimination. This article extends Posner's theory to cyberspace, a domain of social organization not touched on in Posner's book. In particular, I will test Posner's theory by examining how well it explains the emergence of Web site privacy norms. Part One will examine signaling theory. Part Two will explore privacy norms in some detail, and …


Online Auction Fraud: Are The Auction Houses Doing All They Should Or Could To Stop Online Fraud?, James M. Snyder Mar 2000

Online Auction Fraud: Are The Auction Houses Doing All They Should Or Could To Stop Online Fraud?, James M. Snyder

Federal Communications Law Journal

In April 1998, the FTC released a consumer alert pertaining to the increasing problem of online auction fraud. As the number of online auction participants increased, online auction fraud was becoming more prevalent. The FTC requested comments regarding methods that would be appropriate for curbing the increase in consumer deception. Many in the online auction industry proposed voluntary self-regulation. This Note exposes the inadequacy of industry self-regulation by analogizing online auction abuse with the misuse and near downfall of the 900-number industry. This Note proposes that only a regime of strict industry guidelines that the FTC initiates will halt online …


Consumer Privacy On The Internet, Andrew Shen Jan 2000

Consumer Privacy On The Internet, Andrew Shen

Richmond Journal of Law & Technology

If we do not bear the loss of this privacy then the prices would be passed along to consumers anyway. We're between a rock and a hard place there's nowhere that we can go. But I think we can be more optimistic than that and I think we can preserve privacy and I think we can further growth of electronic commerce. So let me begin with the consumer perspective. I would like to start with a trend that Mike has already done a good job of starting us out on, and that is the current popularity of personalization and customization. …


Who Leads At Halftime?: Three Conflicting Visions Of Internet Privacy Policy, Karl D. Belgum Jan 1999

Who Leads At Halftime?: Three Conflicting Visions Of Internet Privacy Policy, Karl D. Belgum

Richmond Journal of Law & Technology

Concern about privacy on the Internet runs high, but the prescriptions for treatment vary widely. Privacy advocates seek different goals when formulating policy proposals. Some seek to protect individuals and society from the effects of loss of privacy, including the loss of human dignity. Others seek to encourage the development of online markets in personal information, so that consumers can profit from their own information, rather than giving it away. Still, others seek primarily to promote the growth of e-commerce, and see privacy fears as a threat to that goal. These goals are fundamentally inconsistent, and that inconsistency is obscured …