Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Internet (2)
- Biometric technology (1)
- COVID-19 (1)
- Celebrity (1)
- Computer crimes (1)
-
- Computer fraud (1)
- Computers & privacy (1)
- Data security (1)
- ERISA (1)
- Ethics (1)
- Fiduciary responsibility (1)
- GPS Act (1)
- Hacking (1)
- Intimate Privacy Protection Act (1)
- Invasion of privacy (1)
- Legislation (1)
- Personal data protection (1)
- Personally identifiable information (1)
- Privacy (1)
- Privacy protections (1)
- Professional Responsibility (1)
- Publicity (1)
- SEC (1)
- Section 230 (1)
- Social Media (1)
- Technology (1)
Articles 1 - 8 of 8
Full-Text Articles in Law
From Alpha To Omegle: A.M. V. Omegle And The Shift Towards Product Liability For Harm Incurred Online, Preston Buchanan
From Alpha To Omegle: A.M. V. Omegle And The Shift Towards Product Liability For Harm Incurred Online, Preston Buchanan
University of Miami Business Law Review
But for the Internet, many of our interactions with others would be impossible. From socializing to shopping, and, increasingly, working and attending class, the Internet greatly facilitates the ease of our daily lives. However, we frequently neglect to consider that our conduits to the Internet have the potential to lead to harm and injury. When the Internet was in its infancy, and primarily was a repository of information, Congress recognized the threat of continual lawsuits against online entities stemming from the content created by their users. The Communications Decency Act of 1996 arose to mitigate the seemingly Herculean task for …
Virtual Stardom: The Case For Protecting The Intellectual Property Rights Of Digital Celebrities As Software, Alexander Plansky
Virtual Stardom: The Case For Protecting The Intellectual Property Rights Of Digital Celebrities As Software, Alexander Plansky
University of Miami Business Law Review
For the past several decades, technology has allowed us to create digital human beings that both resemble actual celebrities (living or deceased) or entirely virtual personalities from scratch. In the near future, this technology is expected to become even more advanced and widespread to the point where there may be entirely virtual celebrities who are just as popular as their flesh-and-blood counterparts—if not more so. This raises intellectual property questions of how these near-future digital actors and musicians should be classified, and who will receive the proceeds from their performances and appearances. Since, in the near-term, these entities will probably …
The Increased Use And Permanency Of Technology: How Those Changes Impact Attorneys’ Professional Responsibility And Ethical Obligations To Clients And Recommendations For Improvement, Scott B. Piekarsky
University of Miami Business Law Review
No abstract provided.
Breaches Within Breaches: The Crossroads Of Erisa Fiduciary Responsibilities And Data Security, Gregg Moran
Breaches Within Breaches: The Crossroads Of Erisa Fiduciary Responsibilities And Data Security, Gregg Moran
University of Miami Law Review
Although the drafters of the Employee Retirement Income Security Act of 1974 (“ERISA”) likely could not have anticipated the data security issues of the twenty-first century, ERISA’s duty of prudence almost certainly requires employee benefit plan fiduciaries to protect sensitive participant data in at least some manner. This Article suggests the Department of Labor should issue a regulation clarifying fiduciaries’ data security obligations. Given that fiduciaries are in the best positions to recognize their plans’ individual security needs and capabilities, the regulation should not attempt to micromanage fiduciaries’ substantive data security policies; rather, it should focus on the procedures by …
The Privacy Hierarchy: A Comparative Analysis Of The Intimate Privacy Protection Act Vs. The Geolocational Privacy And Surveillance Act, Katherine A. Mitchell
The Privacy Hierarchy: A Comparative Analysis Of The Intimate Privacy Protection Act Vs. The Geolocational Privacy And Surveillance Act, Katherine A. Mitchell
University of Miami Law Review
The advent of the technological boom brought the world smartphones, social media, and Siri. These novel benefits, however, were accompanied by unchartered invasions of privacy. Congress has embarked on the seemingly endless path of protecting its constituents through civil and criminal legislation aimed at combatting such invasions. Two recent examples include the Intimate Privacy Protection Act (“IPPA”) and the Geolocational Privacy and Surveillance Act (“GPS Act”). Nonetheless, the IPPA, which was proposed to criminalize the dissemination of nonconsensual pornography, has garnered much less support—and much more criticism—than its geolocational counterpart.
This Note discusses the striking similarities of both bills, both …
Privacy Regulation In The Age Of Biometrics That Deal With A New World Order Of Information, Michael Monajemi
Privacy Regulation In The Age Of Biometrics That Deal With A New World Order Of Information, Michael Monajemi
University of Miami International and Comparative Law Review
No abstract provided.
Deception Absent Duty: Computer Hackers & Section 10(B) Liability, Brian A. Karol
Deception Absent Duty: Computer Hackers & Section 10(B) Liability, Brian A. Karol
University of Miami Business Law Review
No abstract provided.
Thinking Outside The Box: Considering Transparency, Anonymity, And Pseudonymity As Overall Solutions To The Problems Of Information Privacy In The Internet Society, Tal Z. Zarsky
University of Miami Law Review
No abstract provided.