The increasing digitalization of our personal and professional lives has generated corresponding growth in the amount of electronically stored private information in the hands of third parties. That private information is at risk of theft, loss, or manipulation. Employers that hold employee tax information and merchants that hold significant troves of consumer credit card data are particularly attractive targets. When hackers strike, victims often band together in federal class actions, naming the custodians of their private data as defendants. More and more, however, district courts are dismissing these class action claims at the doorstep for lack of Article III standing. The corporate defendants argue, and many courts agree, that a plaint...
Data breaches at private companies have occurred with increasing regularity in recent years, causing...
Part I of this Note will examine the history of the Fair Credit Reporting Act, the basics of Article...
The recent proliferation of data breaches is one such event requiring a rethreading of standing doct...
The increasing digitalization of our personal and professional lives has generated corresponding gro...
Data breaches are on the rise as consumers continue to exchange personally identifiable information ...
Every day, another hacker gains unauthorized access to information, be it credit card data from groc...
In data breach cases, the lower federal courts have split on the question of whether the plaintiffs ...
Over the last several years, data breaches have become increasingly more common, due in no small par...
Despite the increasing amount of data breaches, there is no liability for parties who do not adequat...
On February 6, 2017, in Beck v. McDonald, the United States Court of Appeals for the Fourth Circuit ...
As the number of data breaches continues to rise in the United States, so does the amount of data br...
Following a data breach, consumers suffer an increased risk of identity theft because of the exposur...
In data breach cases, the plaintiff typically alleges that the defendant used inadequate computer se...
High-profile data hacks are not uncommon. In fact, according to the Privacy Rights Clearinghouse, th...
Data breaches are becoming a more frequent and more troubling part of modern life. When customer or ...
Data breaches at private companies have occurred with increasing regularity in recent years, causing...
Part I of this Note will examine the history of the Fair Credit Reporting Act, the basics of Article...
The recent proliferation of data breaches is one such event requiring a rethreading of standing doct...
The increasing digitalization of our personal and professional lives has generated corresponding gro...
Data breaches are on the rise as consumers continue to exchange personally identifiable information ...
Every day, another hacker gains unauthorized access to information, be it credit card data from groc...
In data breach cases, the lower federal courts have split on the question of whether the plaintiffs ...
Over the last several years, data breaches have become increasingly more common, due in no small par...
Despite the increasing amount of data breaches, there is no liability for parties who do not adequat...
On February 6, 2017, in Beck v. McDonald, the United States Court of Appeals for the Fourth Circuit ...
As the number of data breaches continues to rise in the United States, so does the amount of data br...
Following a data breach, consumers suffer an increased risk of identity theft because of the exposur...
In data breach cases, the plaintiff typically alleges that the defendant used inadequate computer se...
High-profile data hacks are not uncommon. In fact, according to the Privacy Rights Clearinghouse, th...
Data breaches are becoming a more frequent and more troubling part of modern life. When customer or ...
Data breaches at private companies have occurred with increasing regularity in recent years, causing...
Part I of this Note will examine the history of the Fair Credit Reporting Act, the basics of Article...
The recent proliferation of data breaches is one such event requiring a rethreading of standing doct...