2013
DOI: 10.2139/ssrn.2312913
|View full text |Cite
|
Sign up to set email alerts
|

The FTC and the New Common Law of Privacy

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
59
0

Year Published

2014
2014
2019
2019

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 68 publications
(59 citation statements)
references
References 19 publications
0
59
0
Order By: Relevance
“…15 As a result, patients using apps and other telehealth devices must largely rely on company policies regarding uses of data, typically found in a company's privacy policy or the license agreement. These policies are frequently offered to users unilaterally: Accept the terms or don't use the product.…”
Section: Other Federal Protectionsmentioning
confidence: 99%
See 1 more Smart Citation
“…15 As a result, patients using apps and other telehealth devices must largely rely on company policies regarding uses of data, typically found in a company's privacy policy or the license agreement. These policies are frequently offered to users unilaterally: Accept the terms or don't use the product.…”
Section: Other Federal Protectionsmentioning
confidence: 99%
“…15 Because the FTC does not set detailed requirements for either data privacy or security, protections for telehealth technologies not covered by HIPAA are largely dependent on the technology vendor's discretion.…”
Section: Other Federal Protectionsmentioning
confidence: 99%
“…More recent breaches such as Target's loss of millions of consumer credit cards have also resulted in FTC investigations and lawsuits for companies responsible for data [47]. However, the effectiveness of these lawsuits has been questioned [51], and more robust laws have been suggested [52].…”
Section: Software Industrymentioning
confidence: 99%
“…The news about data leakages and their potential effects frequently appear in media, informing the audience about the potential privacy risks. Since privacy violations are in the center of interest, governments and policymakers introduced legal guidelines and regulations aiming to protect personal data, such as the General Data Protection Regulation (GDPR) in Europe [42] or FTC requirements in USA [49]. Simultaneously, the academic research resulted in multiple studies about online privacy, demonstrating that people are concerned about their data, nevertheless, they trade them for potential benefits arising from applications [4,55,16].…”
Section: Introductionmentioning
confidence: 99%