Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- AV START Act (1)
- Algorithmic Trading (1)
- Autonomous (1)
- Cars (1)
- Constitutional violations (1)
-
- Dark Pools (1)
- Data (1)
- Data Protection Directive (1)
- Data Protection Rights (1)
- Disclosure (1)
- Due process (1)
- Equifax (1)
- European Union (1)
- European Union; EU; Brazil; GDPR; General Data Protection Regulation; LGPD; privacy regulation (1)
- Flash Boys (1)
- GDPR (1)
- General Data Protection Regulation (1)
- HFT (1)
- HIPAA (1)
- Health (1)
- Health Insurance Portability and Accountability Act (1)
- High Frequency Trade (1)
- High-Frequency Trading (1)
- Identity theft legislation (1)
- Judicial review (1)
- Latin America (1)
- Lei Geral de Proteção de Dados Pessoais; Michel Temer; data privacy; data privacy protection; data privacy law; ANDP; Autoridade Nacional de Proteção de Dados; privacy law; Brazilian Constitution; Consumer Code of Protection and Defense; CDC; Marco Civil Law of the Internet; enforcement mechanism; Latin America (1)
- Lidar (1)
- Market Manipulation (1)
- Medical Data (1)
Articles 1 - 10 of 10
Full-Text Articles in Privacy Law
Table Of Contents, Seattle University Law Review
Table Of Contents, Seattle University Law Review
Seattle University Law Review
No abstract provided.
Identities Lost: Enacting Federal Law Mandating Disclosure & Notice After A Data Security Breach, John Ogle
Identities Lost: Enacting Federal Law Mandating Disclosure & Notice After A Data Security Breach, John Ogle
Arkansas Law Review
Identity theft is real, it’s here, and consumers need protection. Over the past five years hackers have stolen billions of consumers’ sensitive information like social security numbers, addresses, and bank routing numbers from companies that have neglected their security measures. Most of the time these security breaches are easily preventable. Companies sometimes wait weeks, months, or even years to inform the customers whose information was stolen because there is no federal law that requires disclosure. As of 2018, all 50 states have adopted security breach notification laws that require companies to inform consumers that their information may have been stolen …
A Repeated Call For Omnibus Federal Cybersecurity Law, Carol Li
A Repeated Call For Omnibus Federal Cybersecurity Law, Carol Li
Notre Dame Law Review
In Part I, this Note discusses the concerning regularity of high-profile data breaches that have occurred within the United States’ weak and patchwork landscape of cybersecurity law. Part II discusses the challenges companies face when attempting to comply with the current cybersecurity law, and why companies who are deemed compliant are still falling victim to hackers and data breaches. Part III makes a call for federal legislation to replace the current, inadequate, fragmented, and uneven landscape of cybersecurity law. Part IV discusses numerous factors and incentives to consider in creating an omnibus federal cybersecurity law. Finally, Part V offers some …
Comparative Analysis Of The Eu’S Gdpr And Brazil’S Lgpd: Enforcement Challenges With The Lgpd, Abigayle Erickson
Comparative Analysis Of The Eu’S Gdpr And Brazil’S Lgpd: Enforcement Challenges With The Lgpd, Abigayle Erickson
Brooklyn Journal of International Law
In the wake of the adoption of the European Union’s General Data Protection Regulation (GDPR) in May 2018, other countries and jurisdictions have contemplated personal data privacy legislation. In August 2018, the former president of Brazil, Michel Temer, signed the country’s comprehensive data privacy regulation, Lei Geral de Proteção de Dados Pessoais (LGPD), into law. Temer, however, vetoed many of the enforcement provisions. Shortly before leaving office, Temer signed an executive order creating a regulatory agency as the bill initially called for, but situated the agency under executive control instead of creating a wholly independent agency. This Note provides a …
Table Of Contents, Seattle University Law Review
Table Of Contents, Seattle University Law Review
Seattle University Law Review
No abstract provided.
Insidious Encroachment? Strengthening The "Crown Jewels": The 2018 Reauthorization Of Fisa Section 702, John F. Schifalacqua
Insidious Encroachment? Strengthening The "Crown Jewels": The 2018 Reauthorization Of Fisa Section 702, John F. Schifalacqua
American University National Security Law Brief
No abstract provided.
Has Regulation Affected The High Frequency Trading Market?, Kevin O'Connell
Has Regulation Affected The High Frequency Trading Market?, Kevin O'Connell
Catholic University Journal of Law and Technology
As technology rapidly advances society, there are a few industries that have not been drastically impacted by disruptive technology. The financial markets are no different. Over the past ten years, algorithmic trading has quickly revolutionized the financial markets and continues to dominate an industry that for many years remained largely uninfluenced by society’s technological advances. Algorithmic trading is “a type of trading done with the use of mathematical formulas” and market data “run by powerful computers” to execute trades. One of the most commonly used platforms of algorithmic trading is high frequency trading. High frequency trading (“HFT”) uses a computerized …
"You Have The Data"...The Writ Of Habeas Data And Other Data Protection Rights: Is The United States Falling Behind?, Sarah L. Lode
"You Have The Data"...The Writ Of Habeas Data And Other Data Protection Rights: Is The United States Falling Behind?, Sarah L. Lode
Indiana Law Journal
In Part I of this Note, I will discuss the writ of habeas data that has been developed primarily, but not exclusively, in Latin American countries. I will discuss the intricacies of the writ, how it evolved, and how it is applied today. Using Argentina as an example, I will discuss how the writ would be used by an Argentine citizen to protect her personal data. Part II summarizes the previously employed data protection scheme in the European Union, the Data Protection Directive (“the Directive”), and will also discuss the new EU data protection regulation, the General Data Protection Regulation …
Secret Searches: The Sca's Standing Conundrum, Aviv S. Halpern
Secret Searches: The Sca's Standing Conundrum, Aviv S. Halpern
Michigan Law Review
The Stored Communications Act (“SCA”) arms federal law enforcement agencies with the ability to use a special type of warrant to access users’ electronically stored communications. In some circumstances, SCA warrants can require service providers to bundle and produce a user’s electronically stored communications without ever disclosing the existence of the warrant to the individual user until charges are brought. Users that are charged will ultimately receive notice of the search after the fact through their legal proceedings. Users that are never charged, however, may never know that their communications were obtained and searched. This practice effectively makes the provisions …
Let’S Get This Show On The Road: Driverless Cars Have Arrived And It’S Time To Advance The Regulatory Framework, Joshua D. Borneman
Let’S Get This Show On The Road: Driverless Cars Have Arrived And It’S Time To Advance The Regulatory Framework, Joshua D. Borneman
Catholic University Journal of Law and Technology
The potential benefits that driverless automobile technology will provide to the U.S. and its roadways are vast. Greatly enhanced safety of American citizens is chief among these benefits. Congressional and administrative support will be required if these benefits are to be completely realized by American society. However, lawmakers are dragging their feet on passing legislation that will allow driverless cars to hit the road in full force. This comment examines the legislative proposals put forth by the House of Representatives and Senate. It argues that the differences between the two versions are inconsequential and urges lawmakers to act in order …