Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Maurer School of Law: Indiana University (8)
- Selected Works (3)
- The Catholic University of America, Columbus School of Law (3)
- University of Michigan Law School (3)
- Old Dominion University (2)
-
- SelectedWorks (2)
- American University Washington College of Law (1)
- Chicago-Kent College of Law (1)
- Cleveland State University (1)
- New York Law School (1)
- Pepperdine University (1)
- Seattle University School of Law (1)
- Texas A&M University School of Law (1)
- The University of Akron (1)
- University of Baltimore Law (1)
- University of Colorado Law School (1)
- University of Missouri School of Law (1)
- University of New Hampshire (1)
- William & Mary Law School (1)
- Yeshiva University, Cardozo School of Law (1)
- Publication Year
- Publication
-
- Federal Communications Law Journal (8)
- Articles (2)
- Catholic University Journal of Law and Technology (2)
- University of Michigan Journal of Law Reform (2)
- Akron Law Review (1)
-
- All Faculty Scholarship (1)
- Articles in Law Reviews & Other Academic Journals (1)
- Catholic University Law Review (1)
- Chicago-Kent Law Review (1)
- Cleveland State Law Review (1)
- Community & Environmental Health Faculty Publications (1)
- David E. Sorkin (1)
- Faculty Publications (1)
- Faculty Scholarship (1)
- Finance Faculty Publications (1)
- Frank A. Pasquale (1)
- Gabriel Martinez Medrano (1)
- Law Faculty Scholarship (1)
- Luis González Vaqué (1)
- NYLS Law Review (1)
- Pepperdine Law Review (1)
- Publications (1)
- Seattle University Law Review (1)
- Simon Chesterman (1)
- William & Mary Law Review (1)
- Publication Type
Articles 1 - 30 of 35
Full-Text Articles in Law
Online Disinhibited Contracts, Wayne R. Barnes
Online Disinhibited Contracts, Wayne R. Barnes
Faculty Scholarship
There have been at least two dominant forces at work in the realm of consumer contracting over the past several decades. One has been the rise and domination of the standard form contract (whereby merchants contract with consumers via the use of standardized, boilerplate terms and conditions that consumers do not read or understand). The second force has been the rise of e-commerce and the purchase of goods and services via websites and other online platforms, and the use of “wrap” formation methodology (whereby merchants obtain consumer assent to the online terms and conditions via the consumer’s informal click, scroll, …
Protecting Low-Income Consumers In The Era Of Digital Grocery Shopping: Implications For Wic Online Ordering, Qi Zhang, Priyanka Patel, Caitlin M. Lowery
Protecting Low-Income Consumers In The Era Of Digital Grocery Shopping: Implications For Wic Online Ordering, Qi Zhang, Priyanka Patel, Caitlin M. Lowery
Community & Environmental Health Faculty Publications
The Special Supplemental Nutrition Program for Women, Infants, and Children (WIC) is now expected to allow participants to redeem their food benefits online, i.e., via online ordering, rather than only in-store. However, it is unclear how this new benefit redemption model may impact participants’ welfare since vendors may have an asymmetric information advantage compared with WIC customers. The WIC online ordering environment may also change the landscape for WIC vendors, which will eventually affect WIC participants. To protect WIC consumers’ rights in the new online ordering model, policymakers need an appropriate legal and regulatory framework. This narrative review provides that …
The Rise Of 5g Technology: How Internet Privacy And Protection Of Personal Data Is A Must In An Evolving Digital Landscape, Justin Rabine
The Rise Of 5g Technology: How Internet Privacy And Protection Of Personal Data Is A Must In An Evolving Digital Landscape, Justin Rabine
Catholic University Journal of Law and Technology
No abstract provided.
Addictive Technology And Its Implications For Antitrust Enforcement, James Niels Rosenquist, Fiona M. Scott Morton, Samuel N. Weinstein
Addictive Technology And Its Implications For Antitrust Enforcement, James Niels Rosenquist, Fiona M. Scott Morton, Samuel N. Weinstein
Articles
The advent of mobile devices and digital media platforms in the past decade represents the biggest shock to cognition in human history. Robust medical evidence is emerging that digital media platforms are addictive and, when used in excess, harmful to users’ mental health. Other types of addictive products, like tobacco and prescription drugs, are heavily regulated to protect consumers. Currently, there is no regulatory structure protecting digital media users from these harms. Antitrust enforcement and regulation that lowers entry barriers could help consumers of social media by increasing competition. Economic theory tells us that more choice in digital media will …
The Internet Of Bodies, Andrea M. Matwyshyn
The Internet Of Bodies, Andrea M. Matwyshyn
William & Mary Law Review
This Article introduces the ongoing progression of the Internet of Things (IoT) into the Internet of Bodies (IoB)—a network of human bodies whose integrity and functionality rely at least in part on the Internet and related technologies, such as artificial intelligence. IoB devices will evidence the same categories of legacy security flaws that have plagued IoT devices. However, unlike most IoT, IoB technologies will directly, physically harm human bodies—a set of harms courts, legislators, and regulators will deem worthy of legal redress. As such, IoB will herald the arrival of (some forms of) corporate software liability and a new legal …
The Direct Purchaser Requirement In Clayton Act Private Litigation: The Case Of Apple Inc. V. Pepper , Konstantin G. Vertsman
The Direct Purchaser Requirement In Clayton Act Private Litigation: The Case Of Apple Inc. V. Pepper , Konstantin G. Vertsman
Catholic University Journal of Law and Technology
More than fifty years after the Supreme Court’s decision in Hanover Shoe, Inc. v. United Shoe Machinery Corp. established the direct purchaser rule, the Supreme Court was provided with an opportunity in Apple Inc. v. Pepper to reevaluate and update the proximate cause standing requirement for litigation under § 4 of the Clayton Act. In the Supreme Court’s 5-4 decision, the majority opinion established a rule that consumers who purchase directly from a monopolist satisfy the direct purchaser standing requirement notwithstanding the internal business structure of the monopolist. This interpretation of the direct purchaser rule, along with the recent reformulation …
Consumer Protection In The Age Of Connected Everything, Terrell Mcsweeny
Consumer Protection In The Age Of Connected Everything, Terrell Mcsweeny
NYLS Law Review
No abstract provided.
Empowering Consumers Through Online Dispute Resolution, Amy J. Schmitz
Empowering Consumers Through Online Dispute Resolution, Amy J. Schmitz
Faculty Publications
We transact online every day, hoping that no problems will occur. However, our purchases are not always perfect: goods may not arrive; products may be faulty; expectations may go unmet. When this occurs, we are often left frustrated, with no means for seeking redress. Phone calls to customer service are generally unappealing and ineffective, and traditional face-to-face or judicial processes for asserting claims are impractical after weighing costs against likely recovery. This is especially true when seeking redress requires travel, or for crossborder claims involving jurisdictional complexities. This situation has created a need for online dispute resolution (“ODR”), which brings …
Products Liability And The Internet Of (Insecure) Things: Should Manufacturers Be Liable For Damage Caused By Hacked Devices?, Alan Butler
University of Michigan Journal of Law Reform
While the application of products liability to insecure software is a frequently-discussed concept in academic literature, many commentators have been skeptical of the viability of such claims for several reasons. First, the economic loss doctrine bars recovery for productivity loss, business disruption, and other common damages caused by software defects. Second, the application of design defects principles to software is difficult given the complexity of the devices and recent tort reform trends that have limited liability. Third, the intervening cause of damage from insecure software is typically a criminal or tortious act by a third party, so principles of causation …
Mobile Banking: The Answer For The Unbanked In America?, Catherine Martin Christopher
Mobile Banking: The Answer For The Unbanked In America?, Catherine Martin Christopher
Catholic University Law Review
In the United States, the poor often lack access to mainstream banking services. Instead, they rely on expensive, poorly regulated alternatives like check cashers, payday lenders, pawnshops, and auto title lenders. These financial products jeopardize poor people’s financial and physical security. In pushing adoption of traditional banking products, both government officials and private enterprise have attempted to craft solutions to the banking access problem, but so far these attempts have fallen short. This Article asserts that mobile banking may be a transformative technology that can significantly increase financial inclusion in the United States.
The Article discusses current statistics and demographics …
Payment Methods For Consumer-To-Consumer Online Transactions, David E. Sorkin
Payment Methods For Consumer-To-Consumer Online Transactions, David E. Sorkin
David E. Sorkin
Participants in online auctions use a variety of payment mechanisms, but checks and money orders still represent the most commonly used means of payment. Credit cards afford greater protection to buyers, but until recently payment by credit card was not even an option for person-to-person transactions. However, several online payment services have been established that enable individuals to make credit card payments to one another, generally with the payment service acting as an intermediary. These services are growing rapidly, mainly because of the speed and convenience that they offer. Yet relatively little attention has been paid to the risks and …
Payment Methods For Consumer-To-Consumer Online Transactions, David E. Sorkin
Payment Methods For Consumer-To-Consumer Online Transactions, David E. Sorkin
Akron Law Review
Participants in online auctions use a variety of payment mechanisms, but checks and money orders still represent the most commonly used means of payment. Credit cards afford greater protection to buyers, but until recently payment by credit card was not even an option for person-to-person transactions. However, several online payment services have been established that enable individuals to make credit card payments to one another, generally with the payment service acting as an intermediary. These services are growing rapidly, mainly because of the speed and convenience that they offer. Yet relatively little attention has been paid to the risks and …
Tesla And The Car Dealers' Lobby, Daniel A. Crane
Tesla And The Car Dealers' Lobby, Daniel A. Crane
Articles
Tesla Motors, the offspring of entrepreneur Elon Musk (who brought us Pay-Pal and SpaceX), is the most exciting automotive development in many decades and a marquee story of American technological dynamism and innovation. The company’s luxury electric cars have caused a sensation in the auto industry, including a review by Consumer Reports calling Tesla’s Model S the best car it ever tested. Despite the acclaim, Tesla faces enormous challenges Despite the acclaim, Tesla faces enormous challenges in penetrating an automotive market that has been dominated for a century by internal combustion engines. Not only must it build cars that customers …
Regulating The Internet Of Things: First Steps Toward Managing Discrimination, Privacy, Security, And Consent, Scott R. Peppet
Regulating The Internet Of Things: First Steps Toward Managing Discrimination, Privacy, Security, And Consent, Scott R. Peppet
Publications
The consumer "Internet of Things" is suddenly reality, not science fiction. Electronic sensors are now ubiquitous in our smartphones, cars, homes, electric systems, health-care devices, fitness monitors, and workplaces. These connected, sensor-based devices create new types and unprecedented quantities of detailed, high-quality information about our everyday actions, habits, personalities, and preferences. Much of this undoubtedly increases social welfare. For example, insurers can price automobile coverage more accurately by using sensors to measure exactly how you drive (e.g., Progressive 's Snapshot system), which should theoretically lower the overall cost of insurance. But the Internet of Things raises new and difficult questions …
"¿Qué Información Hay Que Facilitar Al Consumidor Cuando Adquiere Productos Alimenticios Por Internet O Mediante Otros Sistemas De Comunicación A Distancia?", Luis González Vaqué
"¿Qué Información Hay Que Facilitar Al Consumidor Cuando Adquiere Productos Alimenticios Por Internet O Mediante Otros Sistemas De Comunicación A Distancia?", Luis González Vaqué
Luis González Vaqué
Para garantizar la información alimentaria, es necesario tener en cuenta todas las formas de suministrar alimentos a los consumidores, como la venta de alimentos mediante técnicas de comunicación a distancia. Es evidente que cualquier alimento suministrado a través de la venta a distancia debe cumplir los mismos requisitos de información que los alimentos vendidos en los comercios; por lo tanto, el art. 14 del Reglamento nº 1169/2011 establece la información alimentaria obligatoria pertinente en tales casos y que también debe estar disponible antes de realizar la compra.
Rankings, Reductionism, And Responsibility , Frank Pasquale
Rankings, Reductionism, And Responsibility , Frank Pasquale
Frank A. Pasquale
After discussing how search engines operate in Part I below, and setting forth a normative basis for regulation of their results in Part II, this piece proposes (in Part III) some minor, non-intrusive legal remedies for those who claim that they are harmed by search engine results. Such harms include unwanted high-ranking results relating to them, or exclusion from a page they claim it is their “due” to appear on. In the first case (deemed “inclusion harm”), I propose a right not to suppress the results, but merely to add an asterisk to the hyperlink directing web users to them, …
After Privacy: The Rise Of Facebook, The Fall Of Wikileaks, And Singapore’S Personal Data Protection Act 2012, Simon Chesterman
After Privacy: The Rise Of Facebook, The Fall Of Wikileaks, And Singapore’S Personal Data Protection Act 2012, Simon Chesterman
Simon Chesterman
This article discusses the changing ways in which information is produced, stored, and shared — exemplified by the rise of social-networking sites like Facebook and controversies over the activities of WikiLeaks — and the implications for privacy and data protection. Legal protections of privacy have always been reactive, but the coherence of any legal regime has also been undermined by the lack of a strong theory of what privacy is. There is more promise in the narrower field of data protection. Singapore, which does not recognise a right to privacy, has positioned itself as an e-commerce hub but had no …
Smoking Out Big Tobacco: Some Lessons About Academic Freedom, The World Wide Web, Media Conglomeration, And Public Service Pedagogy From The Battle Over The Brown & Williamson Documents, Clay Calvert
Pepperdine Law Review
No abstract provided.
Behavioral Advertising: The Cryptic Hunter And Gatherer Of The Internet, Joanna Penn
Behavioral Advertising: The Cryptic Hunter And Gatherer Of The Internet, Joanna Penn
Federal Communications Law Journal
In an era where three out of every four Americans have Internet access, the term "surfing" has transformed from riding waves into running the risk of having private information gathered, stored, and disseminated-all without the user's knowledge or permission. This new found online practice, known as "behavioral advertising," is a veritable goldmine for those companies that know the game. But will the FTC or Congress soon make new rules concerning how to play? This Note begins by explaining the differences between behavioral targeting and retargeting and the techniques that the two methods use to collect data. This Note then explores …
Technology Convergence And Federalism: Who Should Decide The Future Of Telecommunications Regulation?, Daniel A. Lyons
Technology Convergence And Federalism: Who Should Decide The Future Of Telecommunications Regulation?, Daniel A. Lyons
University of Michigan Journal of Law Reform
This Article critically examines the division of regulatory jurisdiction over telecommunications issues between the federal government and the states. Currently, the line between federal and state jurisdiction varies depending on the service at issue. This compartmentalization might have made sense fifteen years ago, but the advent of technology convergence has largely rendered this model obsolete. Yesterday's telephone and cable companies now compete head-to-head to offer consumers the vaunted "triple play" of voice, video, and internet services. But these telecommunications companies are finding it increasingly difficult to fit new operations into arcane, rigid regulatory compartments. Moreover, services that consumers view as …
Coding Privacy, Lilian Edwards
Coding Privacy, Lilian Edwards
Chicago-Kent Law Review
Lawrence Lessig famously and usefully argues that cyberspace is regulated not just by law but also by norms, markets and architecture or "code." His insightful work might also lead the unwary to conclude, however, that code is inherently anti-privacy, and thus that an increasingly digital world must therefore also be increasingly devoid of privacy. This paper argues briefly that since technology is a neutral tool, code can be designed as much to fight for privacy as against it, and that what matters now is to look at what incentivizes the creation of pro- rather than anti-privacy code in the mainstream …
Some Peer-To-Peer, Democratically And Voluntarily Produced Thoughts About 'The Wealth Of Networks: How Social Production Transforms Markets And Freedom,' By Yochai Benkler, Ann Bartow
Law Faculty Scholarship
In this review essay, Bartow concludes that The Wealth of Networks: How Social Production Transforms Markets and Freedom by Yochai Benkler is a book well worth reading, but that Benkler still has a bit more work to do before his Grand Unifying Theory of Life, The Internet, and Everything is satisfactorily complete. It isn't enough to concede that the Internet won't benefit everyone. He needs to more thoroughly consider the ways in which the lives of poor people actually worsen when previously accessible information, goods and services are rendered less convenient or completely unattainable by their migration online. Additionally, the …
The Law Of Unintended Consequences, Susan Ness
The Law Of Unintended Consequences, Susan Ness
Federal Communications Law Journal
No abstract provided.
The Failure Of Competition Under The 1996 Telecommunications Act, Gene Kimmelman, Mark Cooper, Magda Herra
The Failure Of Competition Under The 1996 Telecommunications Act, Gene Kimmelman, Mark Cooper, Magda Herra
Federal Communications Law Journal
No abstract provided.
Rankings, Reductionism, And Responsibility , Frank Pasquale
Rankings, Reductionism, And Responsibility , Frank Pasquale
Cleveland State Law Review
After discussing how search engines operate in Part I below, and setting forth a normative basis for regulation of their results in Part II, this piece proposes (in Part III) some minor, non-intrusive legal remedies for those who claim that they are harmed by search engine results. Such harms include unwanted high-ranking results relating to them, or exclusion from a page they claim it is their “due” to appear on. In the first case (deemed “inclusion harm”), I propose a right not to suppress the results, but merely to add an asterisk to the hyperlink directing web users to them, …
Ub Viewpoint – Aol/Microsoft Settlement Could Harm Consumers, Robert H. Lande
Ub Viewpoint – Aol/Microsoft Settlement Could Harm Consumers, Robert H. Lande
All Faculty Scholarship
No abstract provided.
Relevancia Del Uso Indebido De Marca En Internet, Gabriel Martinez Medrano
Relevancia Del Uso Indebido De Marca En Internet, Gabriel Martinez Medrano
Gabriel Martinez Medrano
No abstract provided.
Indecent Exposures In An Electronic Regime, Natalie L. Regoli
Indecent Exposures In An Electronic Regime, Natalie L. Regoli
Federal Communications Law Journal
As the topic of data privacy is vast and the subject of much scrutiny, this Comment focuses narrowly on commercial cyber-activities relating to the nonconsensual Internet acquisition of personally identifiable user data. Beginning with a brief examination of the technology that has exacerbated privacy law's inadequacies, it briefly discusses failed attempts to safeguard privacy rights through the market and federal agency management. It then addresses current U.S. privacy legislation and the 1995 European Privacy Directive. Finally, this Comment proposes the creation of a new legislative system to effectively combat the surreptitious collection, storage, use, and sale of personal data.
Protecting Privacy And Enabling Pharmaceutical Sales On The Internet: A Comparative Analysis Of The United States And Canada, Nicole A. Rothstein
Protecting Privacy And Enabling Pharmaceutical Sales On The Internet: A Comparative Analysis Of The United States And Canada, Nicole A. Rothstein
Federal Communications Law Journal
The Internet raises enhanced and unique concerns regarding informational health privacy and Internet pharmacy sales. As technology advances and the Internet changes the way people obtain medical services and products, protecting consumers and their informational health data in online pharmaceutical transactions is paramount. This Comment charts and compares the existing legal frameworks in the United States and Canada relative to informational health privacy. Following this discussion, each legal framework comes into sharp focus with regard to Internet pharmacy sales. Ultimately, this Comment concludes that based on the highly sensitive nature of personal medical information, a baseline privacy standard should be …
Browsers Beware: Avoiding Legal Entanglements On The Internet, Michael Zugelder, Theresa Flaherty, James Johnson
Browsers Beware: Avoiding Legal Entanglements On The Internet, Michael Zugelder, Theresa Flaherty, James Johnson
Finance Faculty Publications
When Chicago resident David Loundy ordered a compact disk on the Internet from a British Web site, he received an e-mail confirming his order. Loundy expected to pay the advertised price of £8.99, or about $14. When he was subsequently charged £12.99, Loundy was incensed. He argued that he had accepted the set price of £8.99 and insisted that he pay no more for the disk. But when Loundy filed suit in England under the Consumer Protection Act of 1987, he was told that the Act did not apply to him because, under English common law, the place of the …