Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Blockchain (2)
- Legislation (2)
- Privacy (2)
- Administrative law (1)
- Administrative state (1)
-
- Advertising (1)
- Agency rule (1)
- Block.one (1)
- Business Data processing Security measures (1)
- CCPA (1)
- COPPA (1)
- Child Welfare Law (1)
- Computer file sharing Security measures (1)
- Computer security (1)
- Congress (1)
- Consumer privacy (1)
- Crypto (1)
- Crypto-currency (1)
- Cryptocurrency (1)
- Cybersecurity (1)
- Cybersecurity and Infrastructure Security Agency (1)
- Data breach (1)
- Data collection (1)
- Data privacy (1)
- Data protection (1)
- Data protection Access control (1)
- Data security (1)
- Decentralization (1)
- Digital coin (1)
- Digital token (1)
- Publication
- Publication Type
Articles 1 - 10 of 10
Full-Text Articles in Privacy Law
Small Business Cybersecurity: A Loophole To Consumer Data, Matthew R. Espinosa
Small Business Cybersecurity: A Loophole To Consumer Data, Matthew R. Espinosa
The Scholar: St. Mary's Law Review on Race and Social Justice
Small businesses and small minority owned businesses are vital to our nation’s economy; therefore legislation, regulation, and policy has been created in order to assist them in overcoming their economic stability issues and ensure they continue to serve the communities that rely on them. However, there is not a focus on regulating nor assisting small businesses to ensure their cybersecurity standards are up to par despite them increasingly becoming a victim of cyberattacks that yield high consequences. The external oversight and assistance is necessary for small businesses due to their lack of knowledge in implementing effective cybersecurity policies, the fiscal …
Personal Data Privacy And Protective Federal Legislation: An Exploration Of Constituent Position On The Need For Legislation To Control Data Reliant Organizations Collecting And Monetizing Internet-Obtained Personal Data, Giovanni De Meo
Dissertations
In the past twenty years, the business of online personal data collection has grown at the same rapid pace as the internet itself, fostering a multibillion-dollar personal data collection and commercialization industry. Unlike many other large industries, there has been no major federal legislation enacted to monitor or control the activities of organizations dealing in this flourishing industry. The combination of these factors together with the lack of prior research encouraged this research designed to understand how much voters know about this topic and whether there is interest in seeing legislation enacted to protect individual personal data privacy.
To address …
A False Sense Of Security: How Congress And The Sec Are Dropping The Ball On Cryptocurrency, Tessa E. Shurr
A False Sense Of Security: How Congress And The Sec Are Dropping The Ball On Cryptocurrency, Tessa E. Shurr
Dickinson Law Review (2017-Present)
Today, companies use blockchain technology and digital assets for a variety of purposes. This Comment analyzes the digital token. If the Securities and Exchange Commission (SEC) views a digital token as a security, then the issuer of the digital token must comply with the registration and extensive disclosure requirements of federal securities laws.
To determine whether a digital asset is a security, the SEC relies on the test that the Supreme Court established in SEC v. W.J. Howey Co. Rather than enforcing a statute or agency rule, the SEC enforces securities laws by applying the Howey test on a fact-intensive …
What Consumers Don’T Know They’Re Giving Away (Data And Privacy Concerns), Bayleigh Reeves
What Consumers Don’T Know They’Re Giving Away (Data And Privacy Concerns), Bayleigh Reeves
Marketing Undergraduate Honors Theses
The modern world leverages technology and information captured by it in ways the inventors of these technologies likely never imagined. Phones and other devices are gathering information about consumers in the background when they do not even realize it. Pew Research Center found that about 77% of Americans own a smartphone and 88% use the internet. This mass access to technology and information tracking raises many privacy concerns. Basic demographic information is being tracked as well as more in-depth information like shopping tendencies, financial information, and information about known associates. While most of this data is being used for marketing …
Lowering Legal Barriers To Rpki Adoption, Christopher S. Yoo, David A. Wishnick
Lowering Legal Barriers To Rpki Adoption, Christopher S. Yoo, David A. Wishnick
All Faculty Scholarship
Across the Internet, mistaken and malicious routing announcements impose significant costs on users and network operators. To make routing announcements more reliable and secure, Internet coordination bodies have encouraged network operators to adopt the Resource Public Key Infrastructure (“RPKI”) framework. Despite this encouragement, RPKI’s adoption rates are low, especially in North America.
This report presents the results of a year-long investigation into the hypothesis—widespread within the network operator community—that legal issues pose barriers to RPKI adoption and are one cause of the disparities between North America and other regions of the world. On the basis of interviews and analysis of …
Blockchain Versus Data Protection, Fred H. Cate, Christopher Kuner, Orla Lynskey, Christopher Millard, Nora Ni Loideain, Dan Jerker B. Svantesson
Blockchain Versus Data Protection, Fred H. Cate, Christopher Kuner, Orla Lynskey, Christopher Millard, Nora Ni Loideain, Dan Jerker B. Svantesson
Articles by Maurer Faculty
No abstract provided.
Permissions Between Creators And Users: An Investigation Of Particulars In Privacy Policies For Mobile Apps, Abbigail Griffith
Permissions Between Creators And Users: An Investigation Of Particulars In Privacy Policies For Mobile Apps, Abbigail Griffith
Honors Theses
Mobile apps create a space for users to share information with other users and, in doing so, the creators of the applications. Generally, the greater amount of sharing information that occurs between users and creators enhances the experience of the apps for both parties. However, the extent to which mobile apps use this information can cause concerns with users about privacy due to the unknown practices of mobile apps relevant to data collection, data sharing, and data storage.
Documents, such as privacy policies, exist in attempts to moderate these concerns. Additionally, mobile apps offer in-app features for the same reasons. …
Online Privacy Policy Of The Thirty Dow Jones Corporations: Compliance With Ftc Fair Information Practice Principles And Readability Assessment, Yuanxiang Li
Theses Digitization Project
This project conducted a statistical study of online privacy to examine how well corporations comply with FIPs and assess how easy their privacy was to read.
The Eu Data Protection Directive: Implementing A Worldwide Data Protection Regime And How The U.S. Position Has Progressed, Seth P. Hobby
The Eu Data Protection Directive: Implementing A Worldwide Data Protection Regime And How The U.S. Position Has Progressed, Seth P. Hobby
Brigham Young University International Law & Management Review
No abstract provided.
Minor Distractions: Children, Privacy And E-Commerce, Anita L. Allen
Minor Distractions: Children, Privacy And E-Commerce, Anita L. Allen
All Faculty Scholarship
No abstract provided.