Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Autonomous Vehicles; Toyota Motor Company; Volkswagon; General Motors; National Highway Traffic Safety Administration; Vehicle Regulation; Self-Driving Vehicles (1)
- Choice of law (1)
- Civil damages (1)
- Compliance and technology; Self-regulatory organizations (SROs); Compliance; Financial regulations; Automated information gathering; Automated surveillance; Public disclosure; Information dissemination; Recordkeeping and reporting requirements; Dodd-Frank; Financial technology; Data analytics; Marketplace risks; Real-time regulation; Prophylactic regulation; “Regulation by enforcement” model; Empirical rulemaking; Culture of compliance; Homogenization of compliance practices; Cybersecurity; Human agency in compliance; Investment advisers; Broker-dealers; Regulatory performance standards; Revolving door; Corporate governance (1)
- Compliance technology; Corporate culture; Culture of compliance; Federal Sentencing Guidelines; Big data; Compliance monitoring and audits; Employee morale; Values based compliance; Command-and control approaches; Self-regulatory approaches; Financial regulation; Criminalized compliance; Corporate policing; Ethical misconduct (1)
-
- Corporation (1)
- Data breach; data protection; small businesses; breach notification framework; cybersecurity; MyBizHomepage; cyberattack; Code Spaces; Software as a Service; SaaS; cybercriminals; data security; Great Depression; World War II; Small Business Act of 1953; SBA; Small Business Administration; Privacy Rights Clearinghouse; ChoicePoint; Personally Identifiable Information; PII; consumer credit reporting information; Protected Health Information; PHI; Gramm-Leach-Bliley Act; GLBA; Bank Holding Company Act of 1956; Health Insurance Portability and Accountability Act of 1996; HIPAA; Federal Trade Commission; FTC; Fair Credit Reporting Act; civil penalties; Commonwealth v. Haney; Massachusetts Security Breaches Law; In re Yahoo! Inc. Customer Data Security Breach Litigation; California Customer Records Act; attorney general; Community Bank of Trenton v. Schnuck Markets; In re Target Corp. Customer Data Security Breach Litigation; Personal Data Privacy and Security Act; Personal Data Privacy and Security Act; Department of Homeland Security; National Institute of Standards and Technology (NIST) Small Business Cybersecurity Act; Cybersecurity Enhancement Act of 2014; Small Business Reauthorization Act of 1997; Historically Underutilized Business Zones; HUBZone; European Union; General Data Protection Regulation; GDPR; Privacy by Design; California Consumer Privacy Act; CCPA; liability insurance; burden-shifting (1)
- EEA (1)
- Economic Espionage Act (1)
- Economic loss (1)
- Economics (1)
- Federal civil statute (1)
- Federal courts (1)
- Federal statute (1)
- Intangible property (1)
- Interstate commerce (1)
- Misappropriation (1)
- NSPA (1)
- National Stolen Property Act (1)
- Privacy law; Cybersecurity; Hackers; FTC v. Wyndham Worldwide Corp.; Data breaches; Data security procedures; Self-regulatory organizations (SROs); Financial Trade Commission (FTC); Corporate privacy; Cyber Crime; Section 5 of the Federal Trade Commission Act; Deceptive or unfair business practice; Congressional inaction; Key principles of compliance; Best Practices Guidelines; Cyber risk insurance; Commercial general liability (CGL) insurance; First party cyber loss; Third party cyber liability; Technical policies and procedures; Written information security plan (WISP) (1)
- Second Circuit (1)
- State law (1)
- Technology (1)
- Theft (1)
- Trade secrets (1)
- Transfer (1)
- United States v. Aleynikov (1)
- United States v. Angrawal (1)
Articles 1 - 6 of 6
Full-Text Articles in Science and Technology Law
Saving Small Business From The Big Impact Of Data Breach: A Tiered Federal Approach To Data Protection Law, Nadia Udeshi
Saving Small Business From The Big Impact Of Data Breach: A Tiered Federal Approach To Data Protection Law, Nadia Udeshi
Brooklyn Journal of Corporate, Financial & Commercial Law
Small businesses provide a significant positive impact on the American economy. However, the current fragmented federal and state data protection and breach notification legal scheme puts the viability of small businesses at risk. While the probability of data breaches occurring continues to increase, small businesses lack the financial and technological resources to contend with the various state and federal laws that impose different monetary penalties and remedial requirements in the event of such breaches. To preserve the viability of small businesses, Congress should enact a centralized, multi-tiered federal data protection and breach notification framework that preempts state laws, imposes minimum …
The Race Is On! Regulating Self-Driving Vehicles Before They Hit The Streets, Jack Liechtung
The Race Is On! Regulating Self-Driving Vehicles Before They Hit The Streets, Jack Liechtung
Brooklyn Journal of Corporate, Financial & Commercial Law
As the world braces itself for the unveiling of autonomous vehicles, the idea of regulation and oversight has gone largely undetected. Though some states have already begun enacting legislation ahead of the technology’s wide release, the regulatory landscape across the country is in disarray. It is imperative that both manufacturers and consumers be given some sort of uniform understanding as to how the automation is overseen throughout the manufacturing process and how liability will be levied in the case of inevitable mistakes on our nation’s roadways. This Note proposes that the National Highway Traffic Safety Administration be responsible for providing …
Preserving Human Agency In Automated Compliance, Onnig H. Dombalagian
Preserving Human Agency In Automated Compliance, Onnig H. Dombalagian
Brooklyn Journal of Corporate, Financial & Commercial Law
As technology transforms financial services, so too must it transform the regulation of financial markets and intermediaries. The imperative of real-time, prophylactic regulation increasingly compels reallocation of regulatory and compliance budgets to surveillance and enforcement technology. At the same time, in light of the well-known weaknesses of automated systems, securities firms (and their regulators) must temper investment in automation with efforts to augment the agency of compliance professionals. This symposium contribution considers how investment in the professional development of compliance personnel can better integrate automated tools within established compliance and supervisory structures and thereby advance regulatory and operational objectives.
The Question Concerning Technology In Compliance, Sean J. Griffith
The Question Concerning Technology In Compliance, Sean J. Griffith
Brooklyn Journal of Corporate, Financial & Commercial Law
In this symposium Essay, I apply insights from philosophy and psychology to argue that modes of achieving compliance that focus on technology undermine, and are undermined by, modes of achieving compliance that focus on culture. Insisting on both may mean succeeding at neither. How an organization resolves this apparent contradiction in program design, like the broader question of optimal corporate governance arrangements, is highly idiosyncratic. Firms should therefore be accorded maximum freedom in designing their compliance programs, rather than being forced by enforcement authorities into a set of de facto mandatory compliance structures.
Like A Bad Neighbor, Hackers Are There: The Need For Data Security Legislation And Cyber Insurance In Light Of Increasing Ftc Enforcement Actions, Jennifer Gordon
Like A Bad Neighbor, Hackers Are There: The Need For Data Security Legislation And Cyber Insurance In Light Of Increasing Ftc Enforcement Actions, Jennifer Gordon
Brooklyn Journal of Corporate, Financial & Commercial Law
Privacy has come to the forefront of the technology world as third party hackers are constantly attacking companies for their customers’ data. With increasing instances of compromised customer information, the Federal Trade Commission (FTC) has been bringing suit against companies for inadequate data security procedures. The FTC’s newfound authority to bring suit regarding cybersecurity breaches, based on the Third Circuit’s decision in FTC v. Wyndham Worldwide Corp., is a result of inaction—Congress has been unable to pass sufficient cybersecurity legislation, causing the FTC to step in and fill the void in regulation. In the absence of congressional action, this self-proclaimed …
Another Bite At The Apple For Trade Secret Protection: Why Stronger Federal Laws Are Needed To Protect A Corporation's Most Valuable Property, Alissa Cardillo
Another Bite At The Apple For Trade Secret Protection: Why Stronger Federal Laws Are Needed To Protect A Corporation's Most Valuable Property, Alissa Cardillo
Brooklyn Journal of Corporate, Financial & Commercial Law
Trade secrets are one of a corporation’s most valuable assets. However, they lack adequate protection under federal law, leaving them vulnerable to theft and misappropriation. As technology advances, it becomes easier and less time consuming for individuals and entities to access and steal trade secrets to a corporation’s detriment. Most often these thefts involve stealing trade secrets in an intangible form. Current legislation fails to adequately protect intangible trade secrets, leaving them vulnerable to theft. An amendment to the National Stolen Property Act that encompasses intangible trade secrets would close a loophole that currently exists relating to intangible assets, allowing …