Open Access. Powered by Scholars. Published by Universities.®
- Institution
Articles 1 - 7 of 7
Full-Text Articles in Law
Exploring Financial Data Protection And Civil Liberties In An Evolved Digital Age, Amanda Lindner
Exploring Financial Data Protection And Civil Liberties In An Evolved Digital Age, Amanda Lindner
Fordham Journal of Corporate & Financial Law
There is no comprehensive financial privacy law that can protect consumers from a company’s collection sharing and selling of consumer data. The most recent federal financial privacy law, the Gramm-Leach-Bliley Act (“GLBA”), was enacted by Congress over 20 years ago. Vast technological and financial changes have occurred since 1999, and financial privacy law is due for an upgrade.
As a result, loopholes exist where companies can share financial data without being subject to laws or regulations. Additionally, federal financial privacy related laws provide little to no recourse for consumers to self-remediate with litigation, also known as a private right of …
The Rise Of 5g Technology: How Internet Privacy And Protection Of Personal Data Is A Must In An Evolving Digital Landscape, Justin Rabine
The Rise Of 5g Technology: How Internet Privacy And Protection Of Personal Data Is A Must In An Evolving Digital Landscape, Justin Rabine
Catholic University Journal of Law and Technology
No abstract provided.
Skating Past Liability Under The Tcpa: Robocalls And Unsolicited Texts And E-Mails, Julissa R. Rachor
Skating Past Liability Under The Tcpa: Robocalls And Unsolicited Texts And E-Mails, Julissa R. Rachor
Seattle University Law Review
This Note argues that the applicability of Telephone Consumer Protection Act's (TCPA) autodialer provision should be interpreted broadly to include calls made on many types of dialing equipment.
Part I of this Note offers a brief history of the TCPA and autodialers. Part II examines the FCC’s Orders that interpret the TCPA’s autodialer provision, and Part III assesses the varying interpretations of the provision by the circuit courts. Part IV reviews the general facts and procedural history of Duguid, and the Court’s interpretation of the autodialers provision. Last, Part V examines current efforts offered by Congress and potential next …
How The World's Largest Economies Regulate Data Privacy: Drawbacks, Benefits, & Proposed Solutions, Alexander J. Pantos
How The World's Largest Economies Regulate Data Privacy: Drawbacks, Benefits, & Proposed Solutions, Alexander J. Pantos
Indiana Journal of Global Legal Studies
National data privacy regimes are quickly gaining traction and ubiquity around the globe. Moving forward, countries will face a range of difficult decisions surrounding how best to engage internationally in cross border data flow, particularly in the context of personal information (PI).
This article takes a bird's-eye view of the current state of data privacy regimes in the world's four highest GDP regions. In part, this article hopes to provide a succinct analysis of these data privacy regimes, with a focus on the balance they strike between granting individuals rights in their data and placing responsibilities on businesses that deal …
A Dangerous Inheritance: A Child’S Digital Identity, Kate Hamming
A Dangerous Inheritance: A Child’S Digital Identity, Kate Hamming
Seattle University Law Review
This Comment begins with one family’s story of its experience with social media that many others can relate to in today’s ever-growing world of technology and the Internet. Technology has made it possible for a person’s online presence to grow exponentially through continuous sharing by other Internet users. This ability to communicate and share information amongst family, friends, and strangers all over the world, while beneficial in some regard, comes with its privacy downfalls. The risks to privacy are elevated when children’s information is being revealed, which often stems from a child’s own parents conduct online. Parents all over the …
Revisiting The Enforceability Of Online Contracts: The Need For Unambiguous Assent To Inconspicuous Terms, Tom Mozingo
Revisiting The Enforceability Of Online Contracts: The Need For Unambiguous Assent To Inconspicuous Terms, Tom Mozingo
Seattle University Law Review
In determining the enforceability of online contracts, namely those formed from the use of smartphone applications, courts typically look to whether the contract terms were reasonably conspicuous or communicated to the consumer. With the rise of “browse-wrap” contracts, where terms are not directly communicated to the consumer or where the consumer is not required to click the equivalent of an “I agree” button clearly manifesting assent to the terms, courts have inconsistently applied the reasonable communicativeness standard to the detriment of consumers and application developers alike. This Comment will explore the development of browse-wrap contracting jurisprudence and the need to …
Private Eyes Are Watching You: With The Implementation Of The E-911 Mandate, Who Will Watch Every Move You Make?, Geoffrey D. Smith
Private Eyes Are Watching You: With The Implementation Of The E-911 Mandate, Who Will Watch Every Move You Make?, Geoffrey D. Smith
Federal Communications Law Journal
The FCC's E-911 mandate, which will ensure that emergency operators automatically receive a caller's location information, should help save lives. However, privacy advocates have expressed concern over the potential for wireless carriers, the government, and third parties to collect and store personal information. Congress has addressed these concerns with legislation, but privacy advocates still worry that consumers are not adequately protected. This Note addresses this concern and argues that in order to ensure consumer protection, additions are needed to section 222 of the Telecommunications Act of 1996. The Note discusses the importance of individual privacy and balances it against the …