Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 7 of 7

Full-Text Articles in Law

Exploring Financial Data Protection And Civil Liberties In An Evolved Digital Age, Amanda Lindner Jan 2023

Exploring Financial Data Protection And Civil Liberties In An Evolved Digital Age, Amanda Lindner

Fordham Journal of Corporate & Financial Law

There is no comprehensive financial privacy law that can protect consumers from a company’s collection sharing and selling of consumer data. The most recent federal financial privacy law, the Gramm-Leach-Bliley Act (“GLBA”), was enacted by Congress over 20 years ago. Vast technological and financial changes have occurred since 1999, and financial privacy law is due for an upgrade.

As a result, loopholes exist where companies can share financial data without being subject to laws or regulations. Additionally, federal financial privacy related laws provide little to no recourse for consumers to self-remediate with litigation, also known as a private right of …


The Rise Of 5g Technology: How Internet Privacy And Protection Of Personal Data Is A Must In An Evolving Digital Landscape, Justin Rabine Jan 2022

The Rise Of 5g Technology: How Internet Privacy And Protection Of Personal Data Is A Must In An Evolving Digital Landscape, Justin Rabine

Catholic University Journal of Law and Technology

No abstract provided.


Skating Past Liability Under The Tcpa: Robocalls And Unsolicited Texts And E-Mails, Julissa R. Rachor Jan 2022

Skating Past Liability Under The Tcpa: Robocalls And Unsolicited Texts And E-Mails, Julissa R. Rachor

Seattle University Law Review

This Note argues that the applicability of Telephone Consumer Protection Act's (TCPA) autodialer provision should be interpreted broadly to include calls made on many types of dialing equipment.

Part I of this Note offers a brief history of the TCPA and autodialers. Part II examines the FCC’s Orders that interpret the TCPA’s autodialer provision, and Part III assesses the varying interpretations of the provision by the circuit courts. Part IV reviews the general facts and procedural history of Duguid, and the Court’s interpretation of the autodialers provision. Last, Part V examines current efforts offered by Congress and potential next …


How The World's Largest Economies Regulate Data Privacy: Drawbacks, Benefits, & Proposed Solutions, Alexander J. Pantos Aug 2021

How The World's Largest Economies Regulate Data Privacy: Drawbacks, Benefits, & Proposed Solutions, Alexander J. Pantos

Indiana Journal of Global Legal Studies

National data privacy regimes are quickly gaining traction and ubiquity around the globe. Moving forward, countries will face a range of difficult decisions surrounding how best to engage internationally in cross border data flow, particularly in the context of personal information (PI).

This article takes a bird's-eye view of the current state of data privacy regimes in the world's four highest GDP regions. In part, this article hopes to provide a succinct analysis of these data privacy regimes, with a focus on the balance they strike between granting individuals rights in their data and placing responsibilities on businesses that deal …


A Dangerous Inheritance: A Child’S Digital Identity, Kate Hamming Jan 2020

A Dangerous Inheritance: A Child’S Digital Identity, Kate Hamming

Seattle University Law Review

This Comment begins with one family’s story of its experience with social media that many others can relate to in today’s ever-growing world of technology and the Internet. Technology has made it possible for a person’s online presence to grow exponentially through continuous sharing by other Internet users. This ability to communicate and share information amongst family, friends, and strangers all over the world, while beneficial in some regard, comes with its privacy downfalls. The risks to privacy are elevated when children’s information is being revealed, which often stems from a child’s own parents conduct online. Parents all over the …


Revisiting The Enforceability Of Online Contracts: The Need For Unambiguous Assent To Inconspicuous Terms, Tom Mozingo Jan 2020

Revisiting The Enforceability Of Online Contracts: The Need For Unambiguous Assent To Inconspicuous Terms, Tom Mozingo

Seattle University Law Review

In determining the enforceability of online contracts, namely those formed from the use of smartphone applications, courts typically look to whether the contract terms were reasonably conspicuous or communicated to the consumer. With the rise of “browse-wrap” contracts, where terms are not directly communicated to the consumer or where the consumer is not required to click the equivalent of an “I agree” button clearly manifesting assent to the terms, courts have inconsistently applied the reasonable communicativeness standard to the detriment of consumers and application developers alike. This Comment will explore the development of browse-wrap contracting jurisprudence and the need to …


Private Eyes Are Watching You: With The Implementation Of The E-911 Mandate, Who Will Watch Every Move You Make?, Geoffrey D. Smith Jun 2006

Private Eyes Are Watching You: With The Implementation Of The E-911 Mandate, Who Will Watch Every Move You Make?, Geoffrey D. Smith

Federal Communications Law Journal

The FCC's E-911 mandate, which will ensure that emergency operators automatically receive a caller's location information, should help save lives. However, privacy advocates have expressed concern over the potential for wireless carriers, the government, and third parties to collect and store personal information. Congress has addressed these concerns with legislation, but privacy advocates still worry that consumers are not adequately protected. This Note addresses this concern and argues that in order to ensure consumer protection, additions are needed to section 222 of the Telecommunications Act of 1996. The Note discusses the importance of individual privacy and balances it against the …