Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 7 of 7

Full-Text Articles in Law

It's Nothing Personal: Why Existing State Laws On Point-Of-Sale Consumer Data Collection Should Be Replaced With A Federal Standard, Kate Mirino Oct 2019

It's Nothing Personal: Why Existing State Laws On Point-Of-Sale Consumer Data Collection Should Be Replaced With A Federal Standard, Kate Mirino

St. John's Law Review

(Excerpt)

Accordingly, this Note proposes a contemporary-minded federal solution to preempt and standardize the various, outmoded state approaches in this field. Part I engages in a historical overview of the development of information privacy law in the United States. Part II provides a summary and comparison of the existing state rules at play. Part III discusses the negative consequences—both to consumers and to businesses—of inconsistent regulation in this area, and explains why a federal solution is necessary. Part IV outlines the parameters of the federal regulation proposed by this Note.


Mind Your Businesses: Why Georgia Companies Should Worry About European Privacy Law, Emily E. Seaton Jul 2019

Mind Your Businesses: Why Georgia Companies Should Worry About European Privacy Law, Emily E. Seaton

Georgia Journal of International & Comparative Law

No abstract provided.


Protecting Personal Data: A Model Data Security And Breach Notifications Statute, Michael Bloom May 2019

Protecting Personal Data: A Model Data Security And Breach Notifications Statute, Michael Bloom

St. John's Law Review

(Excerpt)

This Note argues that current law is inadequate to protect consumers in light of the prevalence and severity of data breaches in recent years, and that a unifying federal legislation combining portions of state law and the DSBNA should be enacted. Part I of this Note analyzes the DSBNA for notification requirements when data breaches occur, the requirements for the implementation of security policies, regulatory mechanisms for monitoring compliance with these requirements, and criminal penalties for failing to comply. Part II summarizes the various state laws that exist for notification of data breaches. Part III proposes a model federal …


Forget Me, Forget Me Not: Elements Of Erasure To Determine The Sufficiency Of A Gdpr Article 17 Request, Haya Yaish Jan 2019

Forget Me, Forget Me Not: Elements Of Erasure To Determine The Sufficiency Of A Gdpr Article 17 Request, Haya Yaish

Journal of Law, Technology, & the Internet

The data subject’s (or the individual to whom the data relates) right to erasure under the new EU’s data protection law is likely to cause tensions with the right to freedom of expression. Using Article 17(1)(d)-(e) of the General Data Protection Regulation as a nexus to trigger and apply the right to privacy in EU law to the right to erasure, this Note presents a balancing test of four factors that can be used to consistently determine whether individual cases that request a right to erasure for published material are entitled to privacy protections. The proposed balancing test “Elements of …


Is The Grass Greener On The Other Side Of The Geofence: The First Amendment And Privacy Implications Of Unauthorized Smartphone Messages, Kearston L. Wesner Jan 2019

Is The Grass Greener On The Other Side Of The Geofence: The First Amendment And Privacy Implications Of Unauthorized Smartphone Messages, Kearston L. Wesner

Journal of Law, Technology, & the Internet

Geofencing technology enables companies to obtain users’ physical location and deliver customized communications, including political messages. But to accomplish this, some businesses transmit user data to third parties without consent. The privacy tort of intrusion and Federal Trade Commission actions target unfair or deceptive practices, but these avenues are inadequate. Users’ privacy should be safeguarded by creating a federal privacy statute that requires opt-in notification and periodic reminders of data collection, usage, and transmission practices.


Creating A National Data Privacy Law For The United States, Shaun G. Jamison Jan 2019

Creating A National Data Privacy Law For The United States, Shaun G. Jamison

Cybaris®

No abstract provided.


Forensic Border Searches After Carpenter Require Probable Cause And A Warrant, Christopher I. Pryby Jan 2019

Forensic Border Searches After Carpenter Require Probable Cause And A Warrant, Christopher I. Pryby

Michigan Law Review

Under the border search doctrine, courts have upheld the federal government's practice of searching people and their possessions upon entry into or exit from the United States, without any requirement of suspicion, as reasonable under the Fourth Amendment. Since the advent of electronic devices with large storage capacities, courts have grappled with whether this definition of reasonableness continues to apply. So far, courts have consistently characterized “nonforensic” border inspections of electronic devices (for example, paging through photos on a phone) as “routine” searches that, like inspecting luggage brought across international lines, require no suspicion. But there is a circuit split …