Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Fordham Law School

2019

Hacking

Articles 1 - 2 of 2

Full-Text Articles in Law

Data Scraping As A Cause Of Action: Limiting Use Of The Cfaa And Trespass In Online Copying Cases, Kathleen C. Riley Jan 2019

Data Scraping As A Cause Of Action: Limiting Use Of The Cfaa And Trespass In Online Copying Cases, Kathleen C. Riley

Fordham Intellectual Property, Media and Entertainment Law Journal

In recent years, online platforms have used claims such as the Computer Fraud and Abuse Act (“CFAA”) and trespass to curb data scraping, or copying of web content accomplished using robots or web crawlers. However, as the term “data scraping” implies, the content typically copied is data or information that is not protected by intellectual property law, and the means by which the copying occurs is not considered to be hacking. Trespass and the CFAA are both concerned with authorization, but in data scraping cases, these torts are used in such a way that implies that real property norms exist …


Face Off: An Examination Of State Biometric Privacy Statutes & Data Harm Remedies, Maya E. Rivera Jan 2019

Face Off: An Examination Of State Biometric Privacy Statutes & Data Harm Remedies, Maya E. Rivera

Fordham Intellectual Property, Media and Entertainment Law Journal

As biometric authentication becomes an increasingly popular method of security among consumers, only three states currently have statutes detailing how such data may be collected, used, retained, and released. The Illinois Biometric Information Privacy Act is the only statute of the three that enshrines a private right of action for those who fail to properly handle biometric data. Both the Texas Capture or Use Biometric Identifier Act Information Act and the Washington Biometric Privacy Act allow for state Attorneys General to bring suit on behalf of aggrieved consumers. This Note examines these three statutes in the context of data security …