Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Internet Law (22)
- Other Law (16)
- Computer Law (15)
- International Law (14)
- Consumer Protection Law (13)
-
- Science and Technology Law (13)
- Constitutional Law (12)
- Comparative and Foreign Law (11)
- Communications Law (10)
- First Amendment (9)
- Litigation (9)
- European Law (8)
- Intellectual Property Law (8)
- Legislation (8)
- National Security Law (8)
- Transnational Law (8)
- Human Rights Law (7)
- Commercial Law (6)
- Family Law (6)
- Administrative Law (5)
- Civil Law (5)
- Fourth Amendment (5)
- Law and Society (5)
- Legal Remedies (5)
- Civil Procedure (4)
- Courts (4)
- Criminal Law (4)
- Law and Politics (4)
- Keyword
-
- Federal Trade Commission (2)
- General Data Protection Regulation (2)
- Privacy (2)
- AML (1)
- Adoption; Adoption Law; Domestic adoption; Domestic adoption law; Interstate Compact on the Placement of Children; Reform; Legal history; Legal system; Family Law; European Union; EU; France; Germany; Italy; Economics; Enforcement (1)
-
- Affirmative consent; revenge porn; copyright (1)
- Anti-Money Laundering Legislation (1)
- Attorney-client privilege; full and frank conversations; hack; hackers; hacktivism; whistleblowing; technology; cybersecurity; ethics; bar associations; evidence; Federal Rules of Evidence; Federal Rules of Civil Procedure; claw back agreements; quick peek agreements; litigation; waiver; express waiver; implicit waiver; privileged communications; inadvertent disclosure; unintentional disclosure; unauthorized disclosure; purloined communications; stolen documents; technology; email; Wikileaks; Panama papers; Ashley Madison; Clinton Foundation; Teneo; John Podesta; Sony Entertainment; public domain; duty of confidentiality (1)
- Autodial (1)
- Autodialer (1)
- Biometric; biometric data; protection; legislation; reform; personal identifier; personally identifiable information (1)
- CFAA; Computer Fraud and Abuse Act; right to privacy; civil action; equitable relief; personal privacy; federal civil litigation (1)
- CISG (1)
- Call (1)
- Calling (1)
- Capacity (1)
- Clarifying Lawful Overseas Use of Data Act; CLOUD Act; CLOUD Act agreements; data privacy; data protection; technology; cloud; direct access; data sharing; data protection; lawful data use; production orders; overseas production orders; international production orders; stored communications; SCA; overseas data; privacy; digital privacy; digital privacy rights; European Convention on Human Rights; international cooperation; international law; ECHR; law enforcement; international law enforcement; constitutional law; privacy; Fourth Amendment; Article 8; Article 1; criminal investigation; mutual legal assistance; mutual legal assistance treaties; mla; mlat; third country persons; us uk agreements; service provider; Verdugo-Urquidez; Microsoft Ireland; Al-Skeini; extraterritorial; extraterritoriality; territorial; territoriality; cross-border; law enforcement cooperation; comparative law; transnational law (1)
- Class action (1)
- Computer; fiduciary; hacking; insider trading; securities; Securities Exchange Act; hacker-seller; 10b-5 (1)
- Consumers (1)
- Convention (1)
- Convention on Data Privacy. (1)
- Customer Identification Program (1)
- Cyber security; trespass (1)
- Cyber-attacks; cyber-crime; information security; cybersecurity; Ponemon Institute; data sharing; data breach; Securities Exchange Commission; SEC; hacking; information technology system; phishing; Department of Justice; DOJ; cybercriminal; malware; spyware; IT; Denial of Service Attacks; DoS; DDoS; Distributed Denial of Service campaign; third-party vendor attack; Dumpster Diving; Economic Espionage; Trade Secret Misappropriation; Office of Compliance Inspections and Examinations; OCIE; Financial Industry Regulatory Authority; FINRA; broker-dealer; Risk Alert; Regulation S-P; Gramm-Leach-Bliley Act; GLBA; Computer Fraud and Abuse Act; CFAA; protected computer; United States v. Valle; Electronic Communications Privacy Act; ECPA; The Wiretap Act; The Stored Communications Act; SCA; The Pen Registry Act; Federal Trade Commission; FTC; Federal Deposit Insurance Corporation; FDIC; Federal Reserve; Economic Espionage Act; EEA; Defend Trade Secrets Act; DTSA; Huawei Technologies Co.; Cybersecurity Disclosure Act of 2017 and 2018; common law; class action; standing; Rule 23(a); 23(b)(3); negligence; breach of contract; derivative shareholder suits; Wyndham Worldwide Corporation; Regulatory Systems Compliance and Integrity; SCI; Regulation S-ID; Regulation S-P; General Disclosure Provisions; 503(c); Regulation S-K; Description of Business; financial statements; Framework for Improving Critical Infrastructure Cybersecurity; compliance; disaster plan; plaintext; ciphertext; crisis management; due diligence; The Protecting Cyber Networks Act; PCNA; National Cybersecurity Protection Advancement Act of 2015; NCPAA; The Cybersecurity Information Sharing Act; CISA; Privacy and Civil Liberties Oversight Board; Department of Homeland Security; DHS; National Cybersecurity and Communications Integration Center; NCIC; U.S. Chamber of Commerce Leadership Council; (1)
- DNA; DNA testing; Argentina; right to truth; right to privacy; civil war; litigation; identity; orphans; orphan (1)
- DNA; DTC; National Security; Fourth Amendment; constitutional right to privacy; BIPA; Genetic Information Privacy Act (1)
- Data Breach (1)
- Data Privacy (1)
- Data Privacy; Personal Information; Personal Data; Biometrics; Biometric Data; Right to Erasure; New York; New York Privacy Act; Biometric Privacy Act; Smart Devices; Smart Watch; Research; Scientific Research; Technological Research; Medical Research; Research Participants; Health; Research Exemption (1)
- Publication Year
- Publication
- Publication Type
Articles 1 - 30 of 81
Full-Text Articles in Privacy Law
My Body, Whose Choice? A Case For A Fundamental Right To Bodily Autonomy, Miri Trauner
My Body, Whose Choice? A Case For A Fundamental Right To Bodily Autonomy, Miri Trauner
Brooklyn Law Review
In 2022, the US Supreme Court decided Dobbs v. Jackson Women’s Health Organization, which overturned Roe v. Wade and the fundamental right to abortion it had established nearly fifty years prior. The Court’s decision threw into uncertainty the future of not only reproductive rights in this country, but also many other individual rights. At the same time as the decision, the world was still reeling from a global pandemic, and the development of COVID-19 vaccines had spurred widespread controversy over the constitutionality of vaccine mandates. Both advocates for abortion access and opponents to vaccine mandates shared a common cry: “my …
How (Not) To Deal With The Bubble Effect In Cyberspace: The Case Of The Eu And Digital Services Act, João Tornada
How (Not) To Deal With The Bubble Effect In Cyberspace: The Case Of The Eu And Digital Services Act, João Tornada
Brooklyn Journal of International Law
Deliberative democracies are based on an ideal process of speech and dialogue that fosters an “uninhibited, robust, and wide-open” public discourse sphere. In cyberspace, social networks and search engine platforms largely operate with recommender systems that tailor content according to the users' interests and online behavior (“profiling”), thus segregating them from different points of view (“bubble effect”). While this personalization of content is particularly efficient to promote commercial goods and services, when it comes to information of common interest, especially on political matters, it undermines consensus-building dialogue and threatens democratic ideals. The theory of a free “marketplace of ideas” justifies …
It's Finally Time For A National Data Privacy Law: A Discussion Of The American Data Privacy And Protection Act (Adppa), Erin J. An
Brooklyn Journal of Corporate, Financial & Commercial Law
Millions of Americans face unprecedented privacy risks related to their data, often without their awareness. With the increasing value of consumer data and its growing utilization by businesses, there is a growing demand for greater transparency and privacy protections. As of 2023, no comprehensive federal law governs data privacy in the United States, leaving citizens with limited protections. Introduced to Congress on June 21, 2022, the American Data and Privacy Protection Act (ADPPA) successfully passed the House of Representatives Committee on Energy and Commerce, making it the furthest a national comprehensive data privacy bill has progressed through the federal legislative …
Deep Dive Into Deepfakes—Safeguarding Our Digital Identity, Yi Yan
Deep Dive Into Deepfakes—Safeguarding Our Digital Identity, Yi Yan
Brooklyn Journal of International Law
Deepfake technology is becoming increasingly sophisticated, and with it, the potential to pose a significant threat to the digital community, democratic institutions, and private individuals. With the creation of highly convincing but entirely fabricated audio, video, and images, there is a pressing need for the international community to address the vulnerabilities posed by deepfake technology in the current legal landscape through unambiguous legislation. This Note explores the ethical, legal, and social implications of deepfakes, including issues of privacy, identity theft, and political manipulation. It also reviews existing international legal frameworks, i.e., the Convention on Cybercrime (“Budapest Convention”) and proposes a …
Battling Baby Brokers: A Comparative Analysis Of The United States’ Versus Europe’S Adoption Policies, Amanda P. Gonzales
Battling Baby Brokers: A Comparative Analysis Of The United States’ Versus Europe’S Adoption Policies, Amanda P. Gonzales
Brooklyn Journal of International Law
Child adoption involves the permanent transfer of parental rights from a child’s biological or legal parents to another party. Parties in the Unites States (US) have engaged in this process in various forms for centuries. Today, over one hundred thousand children are adopted by American families each year. Many of these adoptions take place privately through agencies. An agency assists in the process of matching prospective adoptive parents with birth parents from whom they will adopt a child. In exchange for this assistance, the prospective adoptive parents pay tens of thousands of dollars in fees and expenses to the agency …
Policing The Police: Establishing The Right To Record And Civilian Oversight Boards To Oversee America’S Police, Michael G. Brewster
Policing The Police: Establishing The Right To Record And Civilian Oversight Boards To Oversee America’S Police, Michael G. Brewster
Brooklyn Law Review
Police misconduct is a persistent issue in the United States that undermines public trust in law enforcement and the criminal justice system as a whole. The video of George Floyd’s arrest and murder played an irreplaceable role in bringing attention to the case and sparking nationwide discussions about the state of policing in America. The video, showing former Minneapolis police officer Derek Chauvin kneeling on Mr. Floyd’s neck for several minutes, also helped convict Mr. Chauvin of murder at trial. Recording police activity is an important means of holding officers accountable for their actions and protecting citizens from abuse of …
Standing In The Ether: Constitutional Standing In Data Breach Cases After Mcmorris, Andrew Ridge
Standing In The Ether: Constitutional Standing In Data Breach Cases After Mcmorris, Andrew Ridge
Brooklyn Journal of Corporate, Financial & Commercial Law
For some time, circuit courts have been ostensibly divided over the power of plaintiffs to maintain claims for injuries sustained from data breaches based merely on an increased risk of injury. However, in McMorris v. Carlos Lopez & Assocs., LLC, 995 F.3d 295 (2d Cir. 2021), the Second Circuit denied the existence of the circuit split, instead contending that its three-factor balancing test for determining standing for risk of future injury in data breach cases could be reconciled with the positions of both clusters of circuits. The three factors are “(1) whether the plaintiffs’ data has been exposed as the …
Dna Dystopia: How The National Security Apparatus Could Map The Entire Genome Of America Without Violating The Fourth Amendment Or The Constitutional Right To Privacy, Elias Rios Iii
Brooklyn Law Review
Over the past decade, scientific advances have allowed genetic testing to become accessible to consumers. Direct-to-consumer (DTC) DNA testing companies can analyze your DNA sample so you can learn about your family’s origins or whether you are genetically predisposed to a specific disease or disorder. Consumers can then send these analyzed files to third-party databases that aggregate genetic data for specific purposes, like helping law enforcement solve cold cases. Recently, the Department of Defense alerted servicemembers that DTC DNA tests were a national security threat. Simply put, when the national security apparatus finds a threat, it proactively seeks to neutralize …
The "Worst Law In Technology": How The Computer Fraud And Abuse Act Allows Big Businesses To Collect And Sell Your Personal Information, Alicia Nakhjavan
The "Worst Law In Technology": How The Computer Fraud And Abuse Act Allows Big Businesses To Collect And Sell Your Personal Information, Alicia Nakhjavan
Brooklyn Law Review
For years, big businesses have been collecting and selling users’ personal information without permission. In attempts at preventing this practice, users have brought civil actions under the Computer Fraud and Abuse Act (CFAA), alleging a loss of personal privacy. As currently enacted, “personal privacy” is not included in the statutory definition of loss. Further, courts have been reluctant to interpret the CFAA broadly to cover loss of personal privacy claims. This note proposes that an amendment to the CFAA is necessary to close this gap in the statute’s coverage and better protect users’ right to privacy.
The Gatekeepers Of Research: Why A Data Protection Authority Holds The Key To Research In The New York Privacy Acts, Eric B. Green
The Gatekeepers Of Research: Why A Data Protection Authority Holds The Key To Research In The New York Privacy Acts, Eric B. Green
Brooklyn Law Review
Biometric data is among the most sensitive of personal data because it is biologically tied and unique to the individual. Nonetheless, biometric data is an invaluable facet of the research that enables progressive scientific, technological, and medical innovation. Because a comprehensive federal data privacy act does not appear to be on the horizon, the torch has been passed to the states to create their own personal data protection regimes. New Yorkers’ personal biometric data is not aptly protected, partially because neither the New York Privacy Act nor the Biometric Privacy Act (collectively, the NY Privacy Acts) have matured to the …
From The Golden Gate To London: Bridging The Gap Between Data Privacy And The Right Of Publicity, Kristin Kuraishi
From The Golden Gate To London: Bridging The Gap Between Data Privacy And The Right Of Publicity, Kristin Kuraishi
Brooklyn Journal of International Law
Currently, there is no global standard or recognition for the right of publicity. Even within the United States, the recognition, scope, and protections vary by state. As the world becomes increasingly reliant on social media for news, information, communication, and recommendations, micro-influencers and non-celebrities require a way to control their developed and curated name, image, and likeness from unauthorized commercial uses by others. Advertising is occurring more frequently online, and brands recognize the power that micro-influencers have on commerce. Some countries, like the United Kingdom, do not recognize the right of publicity, potentially leaving many individuals without recourse for the …
Compulsory Dna Testing In Argentina: The Right To Truth Versus The Right To Privacy, Margaret Foster
Compulsory Dna Testing In Argentina: The Right To Truth Versus The Right To Privacy, Margaret Foster
Brooklyn Journal of International Law
During the Dirty War—a seven year repression by the Argentinian junta of political dissidents and alleged subversives—an estimated 500 babies were stolen from their mothers while imprisoned and given to leading military officials as "adopted" children. These children had their true identities erased and replaced with a false one covering up their true origins. This Note will explore Argentina's response to the Dirty War. Namely, it will consider the tension between the right to truth—an international right right often associated with enforced disappearances—and the right to privacy. In particular, it will consider cases in which adults resisted DNA testing to …
Digital Privacy Rights And Cloud Act Agreements, Tim Cochrane
Digital Privacy Rights And Cloud Act Agreements, Tim Cochrane
Brooklyn Journal of International Law
The United States (US) and United Kingdom (UK) will soon bring into force a new international law enforcement data sharing ‘CLOUD Act agreement’ (US-UK Agreement), the first of its kind under the Clarifying Lawful Overseas Use of Data Act 2018 (CLOUD Act). These agreements enable law enforcement in one state to directly request data from service providers based in the other state. They respond to long-standing concerns with the main mechanism for obtaining overseas data, mutual legal assistance (MLA). The US and UK claim the US-UK Agreement will significantly speed up data access relative to MLA while “respecting privacy and …
“More Than Tangential”: When Does The Public Have A Right To Access Judicial Records?, Jordan Elias
“More Than Tangential”: When Does The Public Have A Right To Access Judicial Records?, Jordan Elias
Journal of Law and Policy
Public accountability requires open proceedings and access to documents filed with the courts. The strong policy favoring access to judicial records creates a presumption against sealing documents without a compelling reason. The Ninth Circuit Court of Appeals recently held that this presumption of access arises when a proceeding relates “more than tangentially” to the merits. This is a low standard under which many types of motions qualify for the compelling reasons test. With too much litigation occurring in secret, courts can use the “more than tangential” standard proactively to keep electronic case dockets available to citizens.
Data Governance And The Elasticity Of Sovereignty, Roxana Vatanparast
Data Governance And The Elasticity Of Sovereignty, Roxana Vatanparast
Brooklyn Journal of International Law
Traditionally, the world map and territorially bounded spaces have dominated the ways in which we imagine how states govern, make laws, and exercise their authority. Under this conception, reflected in traditional international law principles of territorial sovereignty, each state would have exclusive authority to govern and make laws over everything concerning the land within its borders. Yet developments like the proliferation of data flows, which are based on divisible, mobile, and interconnected components of data, are not territorially bounded. This presents a challenge to the traditional bases for territorial sovereignty and jurisdiction under international law, which some scholars claim is …
Easing The Burdens Of A Patchwork Approach To Data Privacy Regulation In Favor Of A Singular Comprehensive International Solution—The International Data Privacy Agreement, Scott Resnick
Brooklyn Journal of International Law
Data privacy has become one of the premier hot-button issues in today’s increasingly digital human experience. Legislatures around the globe have attempted to act swiftly in an effort to safeguard the highly coveted personal information of their citizens and combat misuse at the hands of international businesses operating with an online presence. Since the European Union’s enactment of the General Data Protection Regulation (GDPR) in 2018, countries around the globe have been grappling with how best to replicate the EU’s leading data privacy regulation while providing the same or greater level of transparency into data collection practices. While a mere …
The Criminal, Regulatory, And Civil Issues Surrounding Intellectual Property And Cybersecurity, Ernest Edward Badway, Christie Mcguinness
The Criminal, Regulatory, And Civil Issues Surrounding Intellectual Property And Cybersecurity, Ernest Edward Badway, Christie Mcguinness
Brooklyn Journal of Corporate, Financial & Commercial Law
Cyber-attacks have affected all organizations and individual consumers. Dissemination of relevant information and attention to strong information security practices is an important tool in fighting this cyber “pandemic.” Additionally, the legal and regulatory liability companies face from cyber-attacks as well as general strategies and practical solutions companies may implement to protect against cyber-intrusions and respond effectively in the event of an attack are considered. There are many iterations of cyber-crime, and we address the various methods cybercriminals use and the many ways cyber-attacks can take place, as well as the entities and victims affected. Moreover, the legal liability and regulatory …
The Common Law Of Cyber Trespass, Michael J. O'Connor
The Common Law Of Cyber Trespass, Michael J. O'Connor
Brooklyn Law Review
Right now, if executives in California and Virginia each bribe a competitor’s disloyal employee to steal a trade secret from the competitor’s servers, under the federal Computer Fraud and Abuse Act (CFAA), the Government can charge one executive but not the other. Courts decide these cases differently due to the widening circuit split over the CFAA term “without authorization.” Neither the Supreme Court nor Congress has shown interest in resolving the split over authorization. Even more concerning is the suggestion that they can’t resolve it; the statute addresses too many potential scenarios for a single definition to end all debate. …
Reconsidering Confidential Settlements In The #Metoo Era, Minna J. Kotkin
Reconsidering Confidential Settlements In The #Metoo Era, Minna J. Kotkin
Faculty Scholarship
No abstract provided.
The Clone Wars: The Right To Embryonic Gene Editing Under German Law, Keren Goldberger
The Clone Wars: The Right To Embryonic Gene Editing Under German Law, Keren Goldberger
Brooklyn Journal of International Law
Germany has the strictest genetic engineering laws in the world and bans virtually all kinds of embryonic gene editing. Since the invention of CRISPR, however, embryonic gene editing is more precise, and the possibilities of curing genetic diseases are more real than ever. This Note will argue for the right to embryonic gene editing through an analysis of German constitutional privacy and right to life jurisprudence. Ultimately, this Note argues for a right to procreate under German law that is backed by the state’s affirmative duty to encourage and protect life. When the technology is available, German Law should not …
“Hey Alexa, Do Consumers Really Want More Data Privacy?”: An Analysis Of The Negative Effects Of The General Data Protection Regulation, Katherine M. Wilcox
“Hey Alexa, Do Consumers Really Want More Data Privacy?”: An Analysis Of The Negative Effects Of The General Data Protection Regulation, Katherine M. Wilcox
Brooklyn Law Review
Recent news articles discuss the flooding of email inboxes with lengthy terms and condition updates, viral videos of Mark Zuckerberg’s public Cambridge Analytica hearing before Congress, and the phenomenon of internet advertisements appearing for items that consumers merely searched for on Google a day prior. Effective as of May 25, 2018, the European Union’s General Data Protection Regulation (GDPR) established a framework that sets legal standards targeted at businesses and other data collectors to dramatically increase data privacy protections for citizens of the EU. Consumers, however, do not seem to appreciate these increased protections, as they rarely read the updated …
Increasing Lapses In Data Security: The Need For A Common Answer To What Constitutes Standing In A Data Breach Context, Aaron Benjamin Edelman
Increasing Lapses In Data Security: The Need For A Common Answer To What Constitutes Standing In A Data Breach Context, Aaron Benjamin Edelman
Journal of Law and Policy
As the number of data breaches continues to rise in the United States, so does the amount of data breach litigation. Many potential plaintiffs who suffered as victims of data breaches, however, find themselves in limbo regarding the issue of standing before a court because of a significant split on standing determinations amongst the federal circuit courts. Thus, while victims of data breaches oftentimes have their personal information fall into the hands of nefarious characters who intend to use the information to a victim’s detriment, that may not be enough to provide victims a right to sue in federal court …
Protecting Health Information In Utero: A Radical Proposal, Luke Isaac Haqq
Protecting Health Information In Utero: A Radical Proposal, Luke Isaac Haqq
Journal of Law and Policy
This Article introduces an underappreciated space in which protected health information (“PHI”) remains largely unprotected, a fact that will become only more problematic as clinical medicine increasingly turns to genomics. The past decade has seen significant advances in the prevention of birth defects, especially with the introduction of clinical preconception, prenatal, and neonatal genomic sequencing. Parental access to the results of embryonic and fetal clinical sequencing is critical to reproductive autonomy; results can provide parents with important considerations in determining whether to seek or avoid conception, as well as in deciding whether to carry a pregnancy to term. The information …
The Long Road Back To Skokie: Returning The First Amendment To Mask Wearers, Rob Kahn
The Long Road Back To Skokie: Returning The First Amendment To Mask Wearers, Rob Kahn
Journal of Law and Policy
When the Seventh Circuit upheld the First Amendment right of Nazis to march in Skokie, Illinois in 1978, the protection of mask wearers was not far behind. Since then, doctrinal paths have diverged. While the Supreme Court continues to protect hate speech, mask wearing has been increasingly placed outside First Amendment protection. This article seeks to get to the bottom of this doctrinal divergence by addressing the symbolic purposes of mask bans—rooted in repudiating the Ku Klux Klan—as well as the doctrinal steps taken over the past forty years to restrict the First Amendment claims of mask wearers. It also …
The Need For A Shared Responsibility Regime Between State And Non-State Actors To Prevent Human Rights Violations Caused By Cyber-Surveillance Spyware, Anna W. Chan
Brooklyn Journal of International Law
Technology has undoubtedly contributed to the field of human rights. Internet connection and a smartphone has enabled activists to call out political leaders, shine light on human atrocities and organize mass protests through social media platforms. This has resulted in many authoritarian governments spending large amounts of their resources to purchase cyber-surveillance spyware systems from multi-national corporations to closely monitor and track their citizens for any signs of dissidence. Such technology has enabled authoritarian regimes to commit human right violations ranging from invasion of privacy, arbitrary arrest, arbitrary detention, torture and even murder. Despite the uncovering of such questionable transactions …
Comparative Analysis Of The Eu’S Gdpr And Brazil’S Lgpd: Enforcement Challenges With The Lgpd, Abigayle Erickson
Comparative Analysis Of The Eu’S Gdpr And Brazil’S Lgpd: Enforcement Challenges With The Lgpd, Abigayle Erickson
Brooklyn Journal of International Law
In the wake of the adoption of the European Union’s General Data Protection Regulation (GDPR) in May 2018, other countries and jurisdictions have contemplated personal data privacy legislation. In August 2018, the former president of Brazil, Michel Temer, signed the country’s comprehensive data privacy regulation, Lei Geral de Proteção de Dados Pessoais (LGPD), into law. Temer, however, vetoed many of the enforcement provisions. Shortly before leaving office, Temer signed an executive order creating a regulatory agency as the bill initially called for, but situated the agency under executive control instead of creating a wholly independent agency. This Note provides a …
Mugshots And The Press-Privacy Dilemma, Amy Gajda
Mugshots And The Press-Privacy Dilemma, Amy Gajda
Faculty Scholarship
No abstract provided.
Pay For (Privacy) Performance: Holding Social Network Executives Accountable For Breaches In Data Privacy Protection, Lital Helman
Pay For (Privacy) Performance: Holding Social Network Executives Accountable For Breaches In Data Privacy Protection, Lital Helman
Brooklyn Law Review
Social networking has proliferated over the past years and is now being utilized by a large percentage of the world’s population. Social networks substantially contribute to enhanced speech, creativity, and communication. Yet, their practices of collecting and monetizing personal data of users pose severe privacy risks. Compelling social networks to internalize these risks is crucial for the healthy evolution of social networking. This article proposes a novel approach to address this challenge: to link executive compensation in social networking firms to the quality of data protection the company provides to its users. This proposal is different from other solutions that …
Telemarketing, Technology, And The Regulation Of Private Speech: First Amendment Lessons From The Fcc’S Tcpa Rules, Justin (Gus) Hurwitz
Telemarketing, Technology, And The Regulation Of Private Speech: First Amendment Lessons From The Fcc’S Tcpa Rules, Justin (Gus) Hurwitz
Brooklyn Law Review
This article considers the viability of the Telephone Consumer Protection Act (TCPA) in light of recent Supreme Court First Amendment precedent and technological and regulatory developments. Robocalls—phone calls made using autodialers or prerecorded messages without the consent of the call recipient—have become one of the primary consumer protection issues facing regulators. With more than 2.4 billion of these calls placed each month, consumer concern about them dominate complaints received by both the Federal Communications Commission and Federal Trade Commission. Simultaneously, as cellphones have become a ubiquitous means by which individuals engage with one another and have become the public square, …
The Equifax Data Breach And The Resulting Legal Recourse, Caitlin Kenny
The Equifax Data Breach And The Resulting Legal Recourse, Caitlin Kenny
Brooklyn Journal of Corporate, Financial & Commercial Law
What happens when one’s sensitive information falls into the wrong hands? With the twenty-first century’s advancement of technology comes the increasing problem of data breaches wherein sensitive information is exposed. On September 7, 2017, Equifax, one of three major United States credit reporting agencies announced one of the largest data breaches in the history of the United States. The data breach affected approximately 145 million consumers and subsequently a wave of consumer class actions followed. This Note clarifies why class action lawsuits and arbitration are not viable legal remedies for massive data breaches where entities like credit reporting agencies are …