Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Consumer Protection Law (6)
- Internet Law (5)
- Administrative Law (3)
- Commercial Law (3)
- Banking and Finance Law (2)
-
- Civil Law (2)
- Communications Law (2)
- Computer Law (2)
- Criminal Law (2)
- Litigation (2)
- Other Law (2)
- Science and Technology Law (2)
- Business Organizations Law (1)
- Civil Procedure (1)
- Comparative and Foreign Law (1)
- Constitutional Law (1)
- Contracts (1)
- Courts (1)
- Entertainment, Arts, and Sports Law (1)
- European Law (1)
- Fourth Amendment (1)
- Insurance Law (1)
- International Law (1)
- Law Enforcement and Corrections (1)
- Law and Politics (1)
- Law and Society (1)
- Legal Remedies (1)
- Legislation (1)
- Keyword
-
- AML (1)
- Anti-Money Laundering Legislation (1)
- Customer Identification Program (1)
- Cyber-attacks; cyber-crime; information security; cybersecurity; Ponemon Institute; data sharing; data breach; Securities Exchange Commission; SEC; hacking; information technology system; phishing; Department of Justice; DOJ; cybercriminal; malware; spyware; IT; Denial of Service Attacks; DoS; DDoS; Distributed Denial of Service campaign; third-party vendor attack; Dumpster Diving; Economic Espionage; Trade Secret Misappropriation; Office of Compliance Inspections and Examinations; OCIE; Financial Industry Regulatory Authority; FINRA; broker-dealer; Risk Alert; Regulation S-P; Gramm-Leach-Bliley Act; GLBA; Computer Fraud and Abuse Act; CFAA; protected computer; United States v. Valle; Electronic Communications Privacy Act; ECPA; The Wiretap Act; The Stored Communications Act; SCA; The Pen Registry Act; Federal Trade Commission; FTC; Federal Deposit Insurance Corporation; FDIC; Federal Reserve; Economic Espionage Act; EEA; Defend Trade Secrets Act; DTSA; Huawei Technologies Co.; Cybersecurity Disclosure Act of 2017 and 2018; common law; class action; standing; Rule 23(a); 23(b)(3); negligence; breach of contract; derivative shareholder suits; Wyndham Worldwide Corporation; Regulatory Systems Compliance and Integrity; SCI; Regulation S-ID; Regulation S-P; General Disclosure Provisions; 503(c); Regulation S-K; Description of Business; financial statements; Framework for Improving Critical Infrastructure Cybersecurity; compliance; disaster plan; plaintext; ciphertext; crisis management; due diligence; The Protecting Cyber Networks Act; PCNA; National Cybersecurity Protection Advancement Act of 2015; NCPAA; The Cybersecurity Information Sharing Act; CISA; Privacy and Civil Liberties Oversight Board; Department of Homeland Security; DHS; National Cybersecurity and Communications Integration Center; NCIC; U.S. Chamber of Commerce Leadership Council; (1)
- Enforcement (1)
-
- Equifax Data Breach; Sensitive Information; Information; Personal Information; PII; Personally Identifiable Information; Data; Private Data; Data Breaches; Data Breach; Consumer Class Actions; Class Actionl Arbitration; Victim Recovery Fund; Remedy; Consumer Data Breach (1)
- FinCEN (1)
- Financial Crimes Enforcement Network (1)
- General Data Protection Regulation; Data Protection; European Union; U.S. Surveillance Practices; National Security Agency; NSA; Small Business; European Data Privacy Law; Transatlantic Data Transfer; Data Protection Authorities (1)
- Gramm-Leach-Bliley Act (1)
- McMorris v. Carlos Lopez & Assocs; Circuit Split; data breach; second circuit; supreme court; social security; standing; injuries in fact; email; transunion; Whole Women’s Health (1)
- Palantir (1)
- Palantir Technologies (1)
- Patriot Act (1)
- Privacy (1)
- Privacy Act (1)
- Privacy Employees (1)
- Privacy law; Cybersecurity; Hackers; FTC v. Wyndham Worldwide Corp.; Data breaches; Data security procedures; Self-regulatory organizations (SROs); Financial Trade Commission (FTC); Corporate privacy; Cyber Crime; Section 5 of the Federal Trade Commission Act; Deceptive or unfair business practice; Congressional inaction; Key principles of compliance; Best Practices Guidelines; Cyber risk insurance; Commercial general liability (CGL) insurance; First party cyber loss; Third party cyber liability; Technical policies and procedures; Written information security plan (WISP) (1)
- Privacy; Data; Consumer Data; American Data and Privacy Protection Act (1)
- Private Prisons Information Act; Freedom of Information Act; History of Privatized Correctional Services; Corrections Corporation of America; GEO Group; Management and Training Corporation; Disclosure; Corruption; Prison Conditions; Private Prison; Transparency; Public Oversight; Federal Outsourcing to Private Prisons; Contract Prisons; (1)
- Terrorism (1)
- Treasury Department (1)
- Video Privacy Protection Act of 1988; Privacy Law; Data Sharing; Video Streaming; Netflix; Hulu; Advertising; Class Action Lawsuit; Liquidated Damages; Statutory Damages (1)
Articles 1 - 9 of 9
Full-Text Articles in Privacy Law
It's Finally Time For A National Data Privacy Law: A Discussion Of The American Data Privacy And Protection Act (Adppa), Erin J. An
Brooklyn Journal of Corporate, Financial & Commercial Law
Millions of Americans face unprecedented privacy risks related to their data, often without their awareness. With the increasing value of consumer data and its growing utilization by businesses, there is a growing demand for greater transparency and privacy protections. As of 2023, no comprehensive federal law governs data privacy in the United States, leaving citizens with limited protections. Introduced to Congress on June 21, 2022, the American Data and Privacy Protection Act (ADPPA) successfully passed the House of Representatives Committee on Energy and Commerce, making it the furthest a national comprehensive data privacy bill has progressed through the federal legislative …
Standing In The Ether: Constitutional Standing In Data Breach Cases After Mcmorris, Andrew Ridge
Standing In The Ether: Constitutional Standing In Data Breach Cases After Mcmorris, Andrew Ridge
Brooklyn Journal of Corporate, Financial & Commercial Law
For some time, circuit courts have been ostensibly divided over the power of plaintiffs to maintain claims for injuries sustained from data breaches based merely on an increased risk of injury. However, in McMorris v. Carlos Lopez & Assocs., LLC, 995 F.3d 295 (2d Cir. 2021), the Second Circuit denied the existence of the circuit split, instead contending that its three-factor balancing test for determining standing for risk of future injury in data breach cases could be reconciled with the positions of both clusters of circuits. The three factors are “(1) whether the plaintiffs’ data has been exposed as the …
The Criminal, Regulatory, And Civil Issues Surrounding Intellectual Property And Cybersecurity, Ernest Edward Badway, Christie Mcguinness
The Criminal, Regulatory, And Civil Issues Surrounding Intellectual Property And Cybersecurity, Ernest Edward Badway, Christie Mcguinness
Brooklyn Journal of Corporate, Financial & Commercial Law
Cyber-attacks have affected all organizations and individual consumers. Dissemination of relevant information and attention to strong information security practices is an important tool in fighting this cyber “pandemic.” Additionally, the legal and regulatory liability companies face from cyber-attacks as well as general strategies and practical solutions companies may implement to protect against cyber-intrusions and respond effectively in the event of an attack are considered. There are many iterations of cyber-crime, and we address the various methods cybercriminals use and the many ways cyber-attacks can take place, as well as the entities and victims affected. Moreover, the legal liability and regulatory …
The Equifax Data Breach And The Resulting Legal Recourse, Caitlin Kenny
The Equifax Data Breach And The Resulting Legal Recourse, Caitlin Kenny
Brooklyn Journal of Corporate, Financial & Commercial Law
What happens when one’s sensitive information falls into the wrong hands? With the twenty-first century’s advancement of technology comes the increasing problem of data breaches wherein sensitive information is exposed. On September 7, 2017, Equifax, one of three major United States credit reporting agencies announced one of the largest data breaches in the history of the United States. The data breach affected approximately 145 million consumers and subsequently a wave of consumer class actions followed. This Note clarifies why class action lawsuits and arbitration are not viable legal remedies for massive data breaches where entities like credit reporting agencies are …
Private Prisons And The Need For Greater Transparency: Private Prison Information Act, Libbi L. Vilher
Private Prisons And The Need For Greater Transparency: Private Prison Information Act, Libbi L. Vilher
Brooklyn Journal of Corporate, Financial & Commercial Law
Private prisons are not subject to the same regulations as government prisons. Particularly, private prisons are exempt from the requirements set forth in the Freedom of Information Act and its state equivalents, which provide that the public has an enforceable right to request certain records from government agencies. Numerous efforts made by members of Congress to enact the Private Prison Information Act, a bill that would subject private prisons to disclosure laws found in the Freedom of Information Act, have been unsuccessful. Such efforts to strip the veil of secrecy that shades private prisons from public scrutiny are especially important …
Video Review; Routine Data Sharing Practices Place Video-Streaming Providers In The Crosshairs Of The Video Privacy Protection Act, Jeremiah P. Ledwidge
Video Review; Routine Data Sharing Practices Place Video-Streaming Providers In The Crosshairs Of The Video Privacy Protection Act, Jeremiah P. Ledwidge
Brooklyn Journal of Corporate, Financial & Commercial Law
The Video Privacy Protection Act of 1988 (VPPA) creates a private cause of action for any consumer whose personally identifiable information has been disclosed by a video tape service provider to a third party. The rapid growth of media companies that provide free internet-based video-streaming services, and the technologically-advanced advertising methods employed to fund this business model, have created uncertainty regarding the specific consumer segments the VPPA is designed to protect. The extensive role that third-party providers play in the collection, analysis, and segmentation of user data in the personalized advertising process raises justifiable privacy concerns for consumers. Recent VPPA …
What About Small Businesses? The Gdpr And Its Consequences For Small U.S.-Based Companies, Craig Mcallister
What About Small Businesses? The Gdpr And Its Consequences For Small U.S.-Based Companies, Craig Mcallister
Brooklyn Journal of Corporate, Financial & Commercial Law
Fast-approaching changes to European data privacy law will have consequences around the globe. Historically, despite having dramatically different approaches to data privacy and data protection, the European Union and the United States developed a framework to ensure that the highspeed freeway that is transatlantic data transfer moved uninterrupted. That framework was overturned in the wake of revelations regarding U.S. surveillance practices, and amidst skepticism that the United States did not adequately protect personal data. Further, the European Union enacted the General Data Protection Regulation (GDPR), a sweeping overhaul of the legal data protection landscape that will take effect in May …
Like A Bad Neighbor, Hackers Are There: The Need For Data Security Legislation And Cyber Insurance In Light Of Increasing Ftc Enforcement Actions, Jennifer Gordon
Like A Bad Neighbor, Hackers Are There: The Need For Data Security Legislation And Cyber Insurance In Light Of Increasing Ftc Enforcement Actions, Jennifer Gordon
Brooklyn Journal of Corporate, Financial & Commercial Law
Privacy has come to the forefront of the technology world as third party hackers are constantly attacking companies for their customers’ data. With increasing instances of compromised customer information, the Federal Trade Commission (FTC) has been bringing suit against companies for inadequate data security procedures. The FTC’s newfound authority to bring suit regarding cybersecurity breaches, based on the Third Circuit’s decision in FTC v. Wyndham Worldwide Corp., is a result of inaction—Congress has been unable to pass sufficient cybersecurity legislation, causing the FTC to step in and fill the void in regulation. In the absence of congressional action, this self-proclaimed …
The Sixth Pillar Of Anti-Money Laundering Compliance: Balancing Effective Enforcement With Financial Privacy, Maria A. De Dios
The Sixth Pillar Of Anti-Money Laundering Compliance: Balancing Effective Enforcement With Financial Privacy, Maria A. De Dios
Brooklyn Journal of Corporate, Financial & Commercial Law
The U.S. government has responded to the increase of financial crimes, including money laundering and terrorist financing, by requiring that financial institutions implement anti-money laundering compliance programs within their institutions. Most recently, the Financial Crimes Enforcement Network exercised its regulatory powers, as authorized by the Treasury Department, by proposing regulations that now explicitly add customer due diligence to the preexisting anti-money laundering regime. The policy behind the government’s legislative and regulatory measures is clear—financial institutions must ensure that they are protected from and not aiding in the illegal efforts of criminals. The complexity and insidiousness of these financial crimes makes …