Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Law

Review Law: New York Defamation Applied To Online Consumer Reviews, Ian Lewis-Slammon May 2020

Review Law: New York Defamation Applied To Online Consumer Reviews, Ian Lewis-Slammon

St. John's Law Review

(Excerpt)

In early July 2017, Michelle Levine booked her first and only appointment with gynecologist Dr. Joon Song for an annual exam. Ms. Levine had a dissatisfying experience with the office. She claims that Dr. Song’s office did not follow up with her for almost a month, and that when she called to ask about the results of a blood test, Dr. Song’s staff falsely informed her that she tested positive for herpes. To top it off, Ms. Levine alleges that the office overcharged her. Following this experience, Ms. Levine did what many others do when dissatisfied with a product …


Protecting Consumers In The Age Of The Internet Of Things, Nicole Smith Mar 2020

Protecting Consumers In The Age Of The Internet Of Things, Nicole Smith

St. John's Law Review

(Excerpt)

IoT devices are an ever-increasing force of nature in our daily lives. They provide a multitude of essential benefits that we as a society have come to rely on. Thus, IoT devices are likely to continue to become irreplaceable tools. With the many benefits that these devices bring, they also bring a vast array of privacy and security issues that our society has not had to face until recently. Because of the new and prevalent risks associated with the IoT and because of the increasing harms to consumers, it is time for Congress to enact an IoT-specific data privacy …


The (Possibly) Injured Consumer: Standing In Data Breach Litigation, Lauren M. Lozada Jan 2020

The (Possibly) Injured Consumer: Standing In Data Breach Litigation, Lauren M. Lozada

St. John's Law Review

(Excerpt)

This Note will address the question of what factors a prospective plaintiff must display to “push [a] threatened injury of future identity theft beyond the speculative to the sufficiently imminent.” Part I will delve into relevant statistics to identify the characteristics of a data breach that most often lead to eventual identity theft. Part II will explore recent data breach standing cases and analyze the factual differences and legal perspectives that have led to disparate results among the federal circuits. Lastly, Part III will recommend a method for evaluating future data breach standing issues.