Open Access. Powered by Scholars. Published by Universities.®

Privacy Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 18 of 18

Full-Text Articles in Privacy Law

Solving The Information Security & Privacy Crisis By Expanding The Scope Of Top Management Personal Liability, Charles Cresson Wood Dec 2016

Solving The Information Security & Privacy Crisis By Expanding The Scope Of Top Management Personal Liability, Charles Cresson Wood

Journal of Legislation

While information security and privacy losses are now spiraling out of control, and have been demonstrably shown to threaten national sovereignty, military superiority, industrial infrastructure order, national economic competitiveness, the solvency of major businesses, faith and trust in the Internet as a platform for modern commerce, as well as political stability, the U.S. Congress has nonetheless to date refused to seriously address the root cause of these threats. The root cause is a legally reinforced incentive system that encourages, and further entrenches, top management decisions that provide inadequate resources for, and inadequate top management attention to, information security and privacy …


Like A Bad Neighbor, Hackers Are There: The Need For Data Security Legislation And Cyber Insurance In Light Of Increasing Ftc Enforcement Actions, Jennifer Gordon Dec 2016

Like A Bad Neighbor, Hackers Are There: The Need For Data Security Legislation And Cyber Insurance In Light Of Increasing Ftc Enforcement Actions, Jennifer Gordon

Brooklyn Journal of Corporate, Financial & Commercial Law

Privacy has come to the forefront of the technology world as third party hackers are constantly attacking companies for their customers’ data. With increasing instances of compromised customer information, the Federal Trade Commission (FTC) has been bringing suit against companies for inadequate data security procedures. The FTC’s newfound authority to bring suit regarding cybersecurity breaches, based on the Third Circuit’s decision in FTC v. Wyndham Worldwide Corp., is a result of inaction—Congress has been unable to pass sufficient cybersecurity legislation, causing the FTC to step in and fill the void in regulation. In the absence of congressional action, this self-proclaimed …


“Hello…It’S Me. [Please Don’T Sue Me!]” Examining The Fcc’S Overbroad Calling Regulations Under The Tcpa, Marissa A. Potts Dec 2016

“Hello…It’S Me. [Please Don’T Sue Me!]” Examining The Fcc’S Overbroad Calling Regulations Under The Tcpa, Marissa A. Potts

Brooklyn Law Review

Americans have received unwanted telemarketing calls for decades. In response to a rapid increase in pre-recorded calls made using autodialer devices, Congress enacted the Telephone Consumer Protection Act (TCPA) in 1992. The TCPA imposes restrictions on calls made to consumers’ residences and wireless phones using autodialer devices, even if they are not telemarketing calls. Congress appointed the Federal Communications Commission (FCC) to prescribe rules and regulations to enforce the TCPA. In 2015, the FCC released an order that defined autodialer more broadly under the statute. Consequently, devices that have the potential to become autodialers in the future, even if they …


Wearable Devices As Admissible Evidence: Technology Is Killing Our Opportunity To Lie, Nicole Chauriye May 2016

Wearable Devices As Admissible Evidence: Technology Is Killing Our Opportunity To Lie, Nicole Chauriye

Catholic University Journal of Law and Technology

No abstract provided.


Video-Streaming Records And The Video Privacy Protection Act: Broadening The Scope Of Personally Identifiable Information To Include Unique Device Identifiers Disclosed With Video Titles, Gregory M. Huffman May 2016

Video-Streaming Records And The Video Privacy Protection Act: Broadening The Scope Of Personally Identifiable Information To Include Unique Device Identifiers Disclosed With Video Titles, Gregory M. Huffman

Chicago-Kent Law Review

The Video Privacy Protection Act (“VPPA”) prohibits video tape service providers from disclosing their consumers’ video rental or sale records. Although the VPPA was originally enacted to regulate disclosures by brick-and-mortar video rental stores, litigators have more recently used the VPPA as a vehicle to regulate disclosures by online video content providers.

The application of the VPPA to video streaming via web browsers and mobile devices raises new questions of statutory interpretation. One key question is whether the scope of the VPPA is broad enough to cover a disclosure of a unique device identifier of a user’s device, rather than …


Living Under The Boot: Militarization And Peaceful Protest, Charlotte Guerra Apr 2016

Living Under The Boot: Militarization And Peaceful Protest, Charlotte Guerra

Seattle Journal for Social Justice

No abstract provided.


His Feminist Facade: The Neoliberal Co-Option Of The Feminist Movement, Anjilee Dodge, Myani Gilbert Apr 2016

His Feminist Facade: The Neoliberal Co-Option Of The Feminist Movement, Anjilee Dodge, Myani Gilbert

Seattle Journal for Social Justice

No abstract provided.


Prostitution Policy: Legalization, Decriminalization And The Nordic Model, Ane Mathieson, Easton Branam, Anya Noble Apr 2016

Prostitution Policy: Legalization, Decriminalization And The Nordic Model, Ane Mathieson, Easton Branam, Anya Noble

Seattle Journal for Social Justice

No abstract provided.


Don’T Risk It; Wait Until She’S Sober, Patrick John White Apr 2016

Don’T Risk It; Wait Until She’S Sober, Patrick John White

Seattle Journal for Social Justice

No abstract provided.


Let’S Talk About Sex: A Call For Guardianship Reform In Washington State, Sage Graves Apr 2016

Let’S Talk About Sex: A Call For Guardianship Reform In Washington State, Sage Graves

Seattle Journal for Social Justice

No abstract provided.


Let’S Invest In People, Not Prisons: How Washington State Should Address Its Ex-Offender Unemployment Rate, Sara Taboada Apr 2016

Let’S Invest In People, Not Prisons: How Washington State Should Address Its Ex-Offender Unemployment Rate, Sara Taboada

Seattle Journal for Social Justice

No abstract provided.


In Her Words: Recognizing And Preventing Abusive Litigation Against Domestic Violence Survivors, David Ward Apr 2016

In Her Words: Recognizing And Preventing Abusive Litigation Against Domestic Violence Survivors, David Ward

Seattle Journal for Social Justice

No abstract provided.


Persistence And Resistance: Women’S Leadership And Ending Gender-Based Violence In Guatemala, Serena Cosgrove, Kristi Lee Apr 2016

Persistence And Resistance: Women’S Leadership And Ending Gender-Based Violence In Guatemala, Serena Cosgrove, Kristi Lee

Seattle Journal for Social Justice

No abstract provided.


The Voting Rights Act And The "New And Improved" Intent Test: Old Wine In New Bottles, Randolph M. Scott-Mclaughlin Apr 2016

The Voting Rights Act And The "New And Improved" Intent Test: Old Wine In New Bottles, Randolph M. Scott-Mclaughlin

Touro Law Review

No abstract provided.


Diy Solutions To The Hobby Lobby Problem, Kristin Haule Jan 2016

Diy Solutions To The Hobby Lobby Problem, Kristin Haule

Loyola of Los Angeles Law Review

No abstract provided.


Cyber Force: The International Legal Implications Of The Communication Security Establishment's Expanded Mandate Under Bill C-59, Leah West Jan 2016

Cyber Force: The International Legal Implications Of The Communication Security Establishment's Expanded Mandate Under Bill C-59, Leah West

Canadian Journal of Law and Technology

Canada is about to join the ranks of Russia, China, Iran, and North Korea; countries with a declared policy and authorized program of state-sponsored cyber attacks. In the summer of 2017, the Liberal Government introduced Bill C-59 An Act 2 Respecting National Security Matters. The bill, if passed, represents the most significant overhaul to Canadian national security institutions since the establishment of the Canadian Security Intelligence Service (CSIS) as a separate organization from the Royal Canadian Mounted Police (RCMP) in 1984. One component of this sweeping reform is the introduction of The Communications Security Establishment Act (CSE Act or the …


The Need For An International Convention On Data Privacy: Taking A Cue From The Cisg, Morgan Corley Jan 2016

The Need For An International Convention On Data Privacy: Taking A Cue From The Cisg, Morgan Corley

Brooklyn Journal of International Law

In light of the invalidation of the U.S.-EU Safe Harbor, along with the increase in sales of personal data as a commodity, data privacy has become a major concern amongst different nations. The lack of harmonization of data-privacy laws around the world continues to pose obstacles to the free flow of data across national borders. The free flow of data is, nonetheless, essential the international economy. As a result, nations continue to work together to try to create mechanisms by which data can be transferred across borders in a secure manner. This Note examines the current state of data-privacy law …


Protecting Personal Information: Achieving A Balance Between User Privacy And Behavioral Targeting, Patrick Myers Jan 2016

Protecting Personal Information: Achieving A Balance Between User Privacy And Behavioral Targeting, Patrick Myers

University of Michigan Journal of Law Reform

Websites and mobile applications provide immeasurable benefits to both users and companies. These services often collect vast amounts of personal information from the individuals that use them, including sensitive details such as Social Security numbers, credit card information, and physical location. Personal data collection and dissemination leave users vulnerable to various threats that arise from the invasion of their privacy, particularly because users are often ignorant of the existence or extent of these practices. Current privacy law does not provide users with adequate protection from the risks attendant to the collection and dissemination of their personal information. This Note advocates …