Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

BLR

Internet Law

Consumer Protection Law

Publication Year

Articles 1 - 14 of 14

Full-Text Articles in Law

Private Copyright: Digital Rights Management Systems And The Consumer, Victor Nicholas Knipe Feb 2007

Private Copyright: Digital Rights Management Systems And The Consumer, Victor Nicholas Knipe

ExpressO

Digital Rights Managements (DRM) systems impact the digital content and software marketplace on several levels. The issues include copyright law, contract law, privacy, antitrust, and consumer protection. This paper examines how DRM systems affect the consumer and what changes can be made to bring about a more sensible and transparent market in the United States.


Cyber-Extortion: Duties And Liabilities Related To The Elephant In The Server Room, Adam J. Sulkowski Jan 2007

Cyber-Extortion: Duties And Liabilities Related To The Elephant In The Server Room, Adam J. Sulkowski

ExpressO

This is a comprehensive analysis of the legal frameworks related to cyber-extortion – the practice of demanding money in exchange for not carrying out threats to commit harm that would involve a victim's information systems. The author hopes it will catalyze an urgently needed discussion of relevant public policy concerns.

Cyber-extortion has, by all accounts, become a common, professionalized and profit-driven criminal pursuit targeting businesses. 17% of businesses in a recent survey indicated having received a cyber-extortion demand. An additional 13% of respondents were not sure if their business had received such a demand.

Awareness of the risks of cybercrime …


A Complete Property Right Amendment, John H. Ryskamp Oct 2006

A Complete Property Right Amendment, John H. Ryskamp

ExpressO

The trend of the eminent domain reform and "Kelo plus" initiatives is toward a comprehensive Constitutional property right incorporating the elements of level of review, nature of government action, and extent of compensation. This article contains a draft amendment which reflects these concerns.


Unwarranted Fears Mask The Benefits Of Network Diversity: An Argument Against Mandating Network Neutrality, Elvis Stumbergs Sep 2006

Unwarranted Fears Mask The Benefits Of Network Diversity: An Argument Against Mandating Network Neutrality, Elvis Stumbergs

ExpressO

The rapid development of the Internet has necessitated an update to Federal telecommunications laws. Recent Congressional efforts to enact such an update, however, have spawned a fiery debate over a somewhat nebulous concept: network neutrality. The debate concerns the way that Internet access providers handle the data traffic being sent over their networks. These providers would like the option to offer some of their customers, web site hosting companies and similar entities, additional services that would essentially result in these customers’ content loading faster, more reliably, or more securely than others not receiving such priority treatment. Yet, this proposed “diversity” …


Technoconsen(T)Sus, Andrea M. Matwyshyn Aug 2006

Technoconsen(T)Sus, Andrea M. Matwyshyn

ExpressO

Law is contributing to an information security paradox. Consumers are regularly “consenting” to the installation of computer code that makes them more vulnerable to harms such as identity theft. In particular, digital rights management technology accompanying digital music has recently left a wake of compromised user machines. Using the case study of security-invasive digital rights management technology, this article argues that a fundamental tension exists among intellectual property law, computer intrusion law and contract law regarding meaningful consumer consent in digital contexts. This article proposes to ease the noise in consent doctrine through creating an objective “reasonable digital consumer” standard …


In Sickness, Health, And Cyberspace: Protecting The Security Of Electronic Private Health Information, Sharona Hoffman, Andy Podgurski Aug 2006

In Sickness, Health, And Cyberspace: Protecting The Security Of Electronic Private Health Information, Sharona Hoffman, Andy Podgurski

ExpressO

The electronic processing of health information provides considerable benefits to patients and health care providers at the same time that it creates serious risks to the confidentiality, integrity, and availability of the data. The Internet provides a conduit for rapid and uncontrolled dispersion and trafficking of illicitly-obtained private health information, with far-reaching consequences to the unsuspecting victims. In order to address such threats to electronic private health information, the U.S. Department of Health and Human Services enacted the HIPAA Security Rule, which thus far has received little attention in the legal literature. This article presents a critique of the Security …


Are Patented Research Tools Still Valuable? Use, Intent, And A Rebuttable Presumption: A Proposed Modification For Analyzing The Exemption From Patent Infringement Under 35 Usc 271 (E) (1), Vihar R. Patel Jul 2006

Are Patented Research Tools Still Valuable? Use, Intent, And A Rebuttable Presumption: A Proposed Modification For Analyzing The Exemption From Patent Infringement Under 35 Usc 271 (E) (1), Vihar R. Patel

ExpressO

Briefly, the article proposes to have courts focus on the nature of an individual's use and apply the "UART" (Use As a Research Tool) factors to determine if a patented invention is being used as a research tool. If a patented invention is being used as a research tool, then the court is to presume that the activities are not covered by the FDA exemption. However, this presumption can be rebutted by a researcher's demonstration of the research tool owner using his patent to block efforts to develop a competing product. If the presumption is rebutted, then the court applies …


Bond Repudiation, Tax Codes, The Appropriations Process And Restitution Post-Eminent Domain Reform, John H. Ryskamp Jun 2006

Bond Repudiation, Tax Codes, The Appropriations Process And Restitution Post-Eminent Domain Reform, John H. Ryskamp

ExpressO

This brief comment suggests where the anti-eminent domain movement might be heading next.


Identity Theft And Consumer Protection: Finding Sensible Approaches To Safeguard Personal Data In The United States And Canada, Kamaal Zaidi Apr 2006

Identity Theft And Consumer Protection: Finding Sensible Approaches To Safeguard Personal Data In The United States And Canada, Kamaal Zaidi

ExpressO

This paper examines identity theft in both the United States and Canada. Various examples of commercial fraud and scams are discussed in the context of a growing trend of identity thieves assuming identities of innocent consumers. As such, various pieces of legislation and consumer initiatives (involving online consumer complaint mechanisms)in U.S. and Canadian jurisdictions are highlighted to demonstrate the pursuit towards broader consumer protection of personal data used in daily commercial transactions. The author argues that these modern efforts to safeguard consumers from identity theft is a progressive measure that will continue to afford increasing protections for consumer personal data, …


The Privacy Gambit: Toward A Game Theoretic Approach To International Data Protection, Horace E. Anderson Mar 2006

The Privacy Gambit: Toward A Game Theoretic Approach To International Data Protection, Horace E. Anderson

ExpressO

“Privacy” is one of the fastest growing areas of the law, due in part to the explosion of the Internet over the past decade. When we speak of privacy in the Internet age, we typically mean data protection, the regulation of the use of personal information about individuals by private interests, such as corporations. Unfortunately, much of the discourse on the subject adopts a framework more suitable to traditional privacy, an inviolable “right to be let alone” by the state. Rather than create a sacrosanct right against the government, the modern incarnation of privacy actually creates a quasi-property right, where …


Breaking The Bank: Revisiting Central Bank Of Denver After Enron And Sarbanes-Oxley, Celia Taylor Sep 2005

Breaking The Bank: Revisiting Central Bank Of Denver After Enron And Sarbanes-Oxley, Celia Taylor

ExpressO

No abstract provided.


A Model For Emergency Service Of Voip Through Certification And Labeling, Patrick S. Ryan, Tom Lookabaugh, Douglas Sicker May 2005

A Model For Emergency Service Of Voip Through Certification And Labeling, Patrick S. Ryan, Tom Lookabaugh, Douglas Sicker

ExpressO

Voice over Internet Protocol (VoIP) will transform many aspects of traditional telephony service, including the technology, the business models, and the regulatory constructs that govern such service. Perhaps not unexpectedly, this transformation is generating a host of technical, business, social, and policy problems. In attempting to respond to these problems, the Federal Communications Commission (FCC) could mandate obligations or specific solutions to VoIP policy issues; however, it is instead looking first to industry initiatives focused on the key functionality that users have come to expect of telecommunications services. High among this list of desired functionality is user access to emergency …


Intellectual Property Rights In Digital Media: A Comparative Analysis Of Legal Protection, Technological Measures And New Business Models Under E.U. And U.S. Law, Nicola Lucchi May 2005

Intellectual Property Rights In Digital Media: A Comparative Analysis Of Legal Protection, Technological Measures And New Business Models Under E.U. And U.S. Law, Nicola Lucchi

ExpressO

The production of digital content is a phenomenon which has completely changed the conditions of access to knowledge. Within this framework it becomes even more important to find and to formulate a new settlement for intellectual property rights balancing contrasted rights. Owners of the old technology and policy makers have found two different solutions and remedies for intellectual property rights: legal and technological. When both remedies work together any rights that a consumer may have under copyright law could be replaced by a unilaterally defined contractual term and condition. To balance this inequity this article analyses different solutions under U.S. …


Material Vulnerabilities: Data Privacy, Corporate Information Security And Securities Regulation, Andrea M. Matwyshyn Mar 2005

Material Vulnerabilities: Data Privacy, Corporate Information Security And Securities Regulation, Andrea M. Matwyshyn

ExpressO

This article undertakes a normative and empirical legal inquiry into the manner information security vulnerabilities are being addressed through law and in the marketplace. Specifically, this article questions the current legislative paradigm for information security regulation by presenting a critique grounded in information security and cryptography theory. Consequently, this article advocates shifting our regulatory approach to a process-based security paradigm that focuses on improving security of our system as a whole. Finally, this article argues that in order to accomplish this shift with least disruption to current legal and economic processes, expanding an existing set of well-functioning legal structures is …