Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Federal Trade Commission (3)
- Privacy (3)
- ACA (1)
- AIRFA (1)
- Act (1)
-
- An Act Respecting National Security Matters (1)
- Autodial (1)
- Autodialer (1)
- Boerne (1)
- Burwell (1)
- CISG (1)
- CSE (1)
- CSIS (1)
- California Online Privacy Protection Act (1)
- Call (1)
- Calling (1)
- Capacity (1)
- Civil law (1)
- Civil procedure (1)
- Class action (1)
- Commercial Privacy Bill of Rights Act of 2011 (1)
- Communications Security Establishment Act (1)
- Congress (1)
- Consumers (1)
- Contraception (1)
- Convention (1)
- Convention on Data Privacy. (1)
- Cookies (1)
- Data Breach (1)
- Data Privacy (1)
Articles 1 - 18 of 18
Full-Text Articles in Privacy Law
Solving The Information Security & Privacy Crisis By Expanding The Scope Of Top Management Personal Liability, Charles Cresson Wood
Solving The Information Security & Privacy Crisis By Expanding The Scope Of Top Management Personal Liability, Charles Cresson Wood
Journal of Legislation
While information security and privacy losses are now spiraling out of control, and have been demonstrably shown to threaten national sovereignty, military superiority, industrial infrastructure order, national economic competitiveness, the solvency of major businesses, faith and trust in the Internet as a platform for modern commerce, as well as political stability, the U.S. Congress has nonetheless to date refused to seriously address the root cause of these threats. The root cause is a legally reinforced incentive system that encourages, and further entrenches, top management decisions that provide inadequate resources for, and inadequate top management attention to, information security and privacy …
Like A Bad Neighbor, Hackers Are There: The Need For Data Security Legislation And Cyber Insurance In Light Of Increasing Ftc Enforcement Actions, Jennifer Gordon
Like A Bad Neighbor, Hackers Are There: The Need For Data Security Legislation And Cyber Insurance In Light Of Increasing Ftc Enforcement Actions, Jennifer Gordon
Brooklyn Journal of Corporate, Financial & Commercial Law
Privacy has come to the forefront of the technology world as third party hackers are constantly attacking companies for their customers’ data. With increasing instances of compromised customer information, the Federal Trade Commission (FTC) has been bringing suit against companies for inadequate data security procedures. The FTC’s newfound authority to bring suit regarding cybersecurity breaches, based on the Third Circuit’s decision in FTC v. Wyndham Worldwide Corp., is a result of inaction—Congress has been unable to pass sufficient cybersecurity legislation, causing the FTC to step in and fill the void in regulation. In the absence of congressional action, this self-proclaimed …
“Hello…It’S Me. [Please Don’T Sue Me!]” Examining The Fcc’S Overbroad Calling Regulations Under The Tcpa, Marissa A. Potts
“Hello…It’S Me. [Please Don’T Sue Me!]” Examining The Fcc’S Overbroad Calling Regulations Under The Tcpa, Marissa A. Potts
Brooklyn Law Review
Americans have received unwanted telemarketing calls for decades. In response to a rapid increase in pre-recorded calls made using autodialer devices, Congress enacted the Telephone Consumer Protection Act (TCPA) in 1992. The TCPA imposes restrictions on calls made to consumers’ residences and wireless phones using autodialer devices, even if they are not telemarketing calls. Congress appointed the Federal Communications Commission (FCC) to prescribe rules and regulations to enforce the TCPA. In 2015, the FCC released an order that defined autodialer more broadly under the statute. Consequently, devices that have the potential to become autodialers in the future, even if they …
Wearable Devices As Admissible Evidence: Technology Is Killing Our Opportunity To Lie, Nicole Chauriye
Wearable Devices As Admissible Evidence: Technology Is Killing Our Opportunity To Lie, Nicole Chauriye
Catholic University Journal of Law and Technology
No abstract provided.
Video-Streaming Records And The Video Privacy Protection Act: Broadening The Scope Of Personally Identifiable Information To Include Unique Device Identifiers Disclosed With Video Titles, Gregory M. Huffman
Chicago-Kent Law Review
The Video Privacy Protection Act (“VPPA”) prohibits video tape service providers from disclosing their consumers’ video rental or sale records. Although the VPPA was originally enacted to regulate disclosures by brick-and-mortar video rental stores, litigators have more recently used the VPPA as a vehicle to regulate disclosures by online video content providers.
The application of the VPPA to video streaming via web browsers and mobile devices raises new questions of statutory interpretation. One key question is whether the scope of the VPPA is broad enough to cover a disclosure of a unique device identifier of a user’s device, rather than …
Living Under The Boot: Militarization And Peaceful Protest, Charlotte Guerra
Living Under The Boot: Militarization And Peaceful Protest, Charlotte Guerra
Seattle Journal for Social Justice
No abstract provided.
His Feminist Facade: The Neoliberal Co-Option Of The Feminist Movement, Anjilee Dodge, Myani Gilbert
His Feminist Facade: The Neoliberal Co-Option Of The Feminist Movement, Anjilee Dodge, Myani Gilbert
Seattle Journal for Social Justice
No abstract provided.
Prostitution Policy: Legalization, Decriminalization And The Nordic Model, Ane Mathieson, Easton Branam, Anya Noble
Prostitution Policy: Legalization, Decriminalization And The Nordic Model, Ane Mathieson, Easton Branam, Anya Noble
Seattle Journal for Social Justice
No abstract provided.
Don’T Risk It; Wait Until She’S Sober, Patrick John White
Don’T Risk It; Wait Until She’S Sober, Patrick John White
Seattle Journal for Social Justice
No abstract provided.
Let’S Talk About Sex: A Call For Guardianship Reform In Washington State, Sage Graves
Let’S Talk About Sex: A Call For Guardianship Reform In Washington State, Sage Graves
Seattle Journal for Social Justice
No abstract provided.
Let’S Invest In People, Not Prisons: How Washington State Should Address Its Ex-Offender Unemployment Rate, Sara Taboada
Let’S Invest In People, Not Prisons: How Washington State Should Address Its Ex-Offender Unemployment Rate, Sara Taboada
Seattle Journal for Social Justice
No abstract provided.
In Her Words: Recognizing And Preventing Abusive Litigation Against Domestic Violence Survivors, David Ward
In Her Words: Recognizing And Preventing Abusive Litigation Against Domestic Violence Survivors, David Ward
Seattle Journal for Social Justice
No abstract provided.
Persistence And Resistance: Women’S Leadership And Ending Gender-Based Violence In Guatemala, Serena Cosgrove, Kristi Lee
Persistence And Resistance: Women’S Leadership And Ending Gender-Based Violence In Guatemala, Serena Cosgrove, Kristi Lee
Seattle Journal for Social Justice
No abstract provided.
The Voting Rights Act And The "New And Improved" Intent Test: Old Wine In New Bottles, Randolph M. Scott-Mclaughlin
The Voting Rights Act And The "New And Improved" Intent Test: Old Wine In New Bottles, Randolph M. Scott-Mclaughlin
Touro Law Review
No abstract provided.
Diy Solutions To The Hobby Lobby Problem, Kristin Haule
Diy Solutions To The Hobby Lobby Problem, Kristin Haule
Loyola of Los Angeles Law Review
No abstract provided.
Cyber Force: The International Legal Implications Of The Communication Security Establishment's Expanded Mandate Under Bill C-59, Leah West
Canadian Journal of Law and Technology
Canada is about to join the ranks of Russia, China, Iran, and North Korea; countries with a declared policy and authorized program of state-sponsored cyber attacks. In the summer of 2017, the Liberal Government introduced Bill C-59 An Act 2 Respecting National Security Matters. The bill, if passed, represents the most significant overhaul to Canadian national security institutions since the establishment of the Canadian Security Intelligence Service (CSIS) as a separate organization from the Royal Canadian Mounted Police (RCMP) in 1984. One component of this sweeping reform is the introduction of The Communications Security Establishment Act (CSE Act or the …
The Need For An International Convention On Data Privacy: Taking A Cue From The Cisg, Morgan Corley
The Need For An International Convention On Data Privacy: Taking A Cue From The Cisg, Morgan Corley
Brooklyn Journal of International Law
In light of the invalidation of the U.S.-EU Safe Harbor, along with the increase in sales of personal data as a commodity, data privacy has become a major concern amongst different nations. The lack of harmonization of data-privacy laws around the world continues to pose obstacles to the free flow of data across national borders. The free flow of data is, nonetheless, essential the international economy. As a result, nations continue to work together to try to create mechanisms by which data can be transferred across borders in a secure manner. This Note examines the current state of data-privacy law …
Protecting Personal Information: Achieving A Balance Between User Privacy And Behavioral Targeting, Patrick Myers
Protecting Personal Information: Achieving A Balance Between User Privacy And Behavioral Targeting, Patrick Myers
University of Michigan Journal of Law Reform
Websites and mobile applications provide immeasurable benefits to both users and companies. These services often collect vast amounts of personal information from the individuals that use them, including sensitive details such as Social Security numbers, credit card information, and physical location. Personal data collection and dissemination leave users vulnerable to various threats that arise from the invasion of their privacy, particularly because users are often ignorant of the existence or extent of these practices. Current privacy law does not provide users with adequate protection from the risks attendant to the collection and dissemination of their personal information. This Note advocates …