-
1
-
-
42449109350
-
-
For our view on the antitrust issue, see generally, 29 Reg 12 , arguing that markets provide sufficient rate regulation and that antitrust threatens to stifle the competition that it seeks to foster
-
For our view on the antitrust issue, see generally Richard A. Epstein and Thomas P. Brown, The War on Plastic, 29 Reg 12 (2006) (arguing that markets provide sufficient rate regulation and that antitrust threatens to stifle the competition that it seeks to foster);
-
(2006)
The War on Plastic
-
-
Epstein, R.A.1
Brown, T.P.2
-
2
-
-
33645788995
-
-
Richard A. Epstein, Behavioral Economics: Human Errors and Market Corrections, 73 U Chi L Rev 111 (2006) (analyzing consumer-credit behavior and concluding that even devotees of a soft form of paternalism should propose no protection beyond that which a truth-in-lending law affords against misleading representations);
-
Richard A. Epstein, Behavioral Economics: Human Errors and Market Corrections, 73 U Chi L Rev 111 (2006) (analyzing consumer-credit behavior and concluding that even devotees of a soft form of paternalism should propose no protection beyond that which a truth-in-lending law affords against misleading representations);
-
-
-
-
4
-
-
42449086251
-
-
We thus largely exclude from this discussion other important dangers that include denial of service attacks, viruses, and loss of state secrets
-
We thus largely exclude from this discussion other important dangers that include denial of service attacks, viruses, and loss of state secrets.
-
-
-
-
5
-
-
33947536241
-
Notification of Data Security Breaches, 105
-
arguing that current models are insufficient and advocating for the creation of a coordinated response architecture as well as a critical organization monitoring credit security performance, For a discussion of currently accepted models for addressing data leaks, see
-
For a discussion of currently accepted models for addressing data leaks, see Paul M. Schwartz and Edward J. Janger, Notification of Data Security Breaches, 105 Mich L Rev 913, 932-45 (2007) (arguing that current models are insufficient and advocating for the creation of a coordinated response architecture as well as a critical organization monitoring credit security performance).
-
(2007)
Mich L Rev
, vol.913
, pp. 932-945
-
-
Schwartz, P.M.1
Janger, E.J.2
-
6
-
-
42449136874
-
-
For the relevant materials, see Gaius, The Institutes of Gaius, bk III, §§ 195-97 at 219 (Clarendon 1946) (Francis de Zulueta, ed). For a general discussion,
-
For the relevant materials, see Gaius, The Institutes of Gaius, bk III, §§ 195-97 at 219 (Clarendon 1946) (Francis de Zulueta, ed). For a general discussion,
-
-
-
-
7
-
-
42449137752
-
-
see Barry Nicholas, An Introduction to Roman Law 211-15 (Clarendon 1962) (lamenting the complexities of the Roman law of theft, detailing the offense's particular history, and explaining the distinctions between different theft offenses).
-
see Barry Nicholas, An Introduction to Roman Law 211-15 (Clarendon 1962) (lamenting the complexities of the Roman law of theft, detailing the offense's particular history, and explaining the distinctions between different theft offenses).
-
-
-
-
8
-
-
42449162185
-
-
Gaius, The Institutes of Gaius bk III, § 189 at 215-16 (cited in note 4) (stating that the penalty for theft was capital and required enslavement to the person from whom the thief had stolen or, if the thief was a slave, death).
-
Gaius, The Institutes of Gaius bk III, § 189 at 215-16 (cited in note 4) (stating that the penalty for theft was capital and required enslavement to the person from whom the thief had stolen or, if the thief was a slave, death).
-
-
-
-
10
-
-
38349089943
-
The Metamorphosis of Larceny, 89
-
arguing that the transformation from the common law has expanded the range of circumstances that can provoke intrusive prosecutorial scrutiny, For an exposition of the evolution of larceny away from its roots in trespass, see generally
-
For an exposition of the evolution of larceny away from its roots in trespass, see generally George P. Fletcher, The Metamorphosis of Larceny, 89 Harv L Rev 469 (1976) (arguing that the transformation from the common law has expanded the range of circumstances that can provoke intrusive prosecutorial scrutiny).
-
(1976)
Harv L Rev
, vol.469
-
-
Fletcher, G.P.1
-
11
-
-
42449144593
-
-
For the variations, see Model Penal Code § 223.1(1) (ALI 1962) (calling for the consolidation of theft offenses).
-
For the variations, see Model Penal Code § 223.1(1) (ALI 1962) (calling for the consolidation of theft offenses).
-
-
-
-
12
-
-
42449146915
-
-
Id § 223.06, defining property as anything of value
-
Id § 223.0(6) (defining property as anything of value).
-
-
-
-
13
-
-
42449118287
-
-
See Economic Espionage Act of 1996, Pub L No 104-294, 110 Stat 3488, codified as amended at 18 USC §§ 1831-39 (2000 & Supp 2002) (broadly covering the conversion of trade secrets related to or included in a product that is produced for or placed in interstate or foreign commerce, which covers just about every commercial secret). For an explanation of fines and imprisonment,
-
See Economic Espionage Act of 1996, Pub L No 104-294, 110 Stat 3488, codified as amended at 18 USC §§ 1831-39 (2000 & Supp 2002) (broadly covering the conversion of trade secrets "related to or included in a product that is produced for or placed in interstate or foreign commerce," which covers just about every commercial secret). For an explanation of fines and imprisonment,
-
-
-
-
14
-
-
42449116019
-
-
see id § 1832a
-
see id § 1832(a).
-
-
-
-
15
-
-
42449106810
-
-
For criminal forfeiture, see id § 1834
-
For criminal forfeiture, see id § 1834.
-
-
-
-
16
-
-
42449120051
-
-
Id § 1832(a)3
-
Id § 1832(a)(3).
-
-
-
-
17
-
-
42449090113
-
-
For the Roman rules, see Gaius, The Institutes of Gaius bk III, §§ 203-08 at 221-22 (cited in note 4) (explaining that a theft action is available to those who have an interest in the safety of the thing stolen, including collateral interests).
-
For the Roman rules, see Gaius, The Institutes of Gaius bk III, §§ 203-08 at 221-22 (cited in note 4) (explaining that a theft action is available to those who have an interest in the safety of the thing stolen, including collateral interests).
-
-
-
-
18
-
-
42449120050
-
-
The text describes a typical Visa or MasterCard card transaction. See David S. Evans and Richard Schmalensee, Playing with Plastic: The Digital Revolution in Buying and Borrowing 9-10 (MIT 2d ed 2005). American Express and Discover transactions omit a couple of steps in the approval process by dealing directly with merchants and cardholders.
-
The text describes a typical Visa or MasterCard card transaction. See David S. Evans and Richard Schmalensee, Playing with Plastic: The Digital Revolution in Buying and Borrowing 9-10 (MIT 2d ed 2005). American Express and Discover transactions omit a couple of steps in the approval process by dealing directly with merchants and cardholders.
-
-
-
-
19
-
-
42449147343
-
-
Over the last thirty years, a highly specialized payment business in the United States has developed, which relies on third-party data processors to help banks on both the cardholder and merchant sides. The increase in the number of parties to a transaction to seven decreases the total processing time
-
Over the last thirty years, a highly specialized payment business in the United States has developed, which relies on third-party data processors to help banks on both the cardholder and merchant sides. The increase in the number of parties to a transaction to seven decreases the total processing time.
-
-
-
-
20
-
-
42449142588
-
-
See id at 247-51 discussing the evolution of payment processing and identifying the different entities involved in a payment card transaction
-
See id at 247-51 (discussing the evolution of payment processing and identifying the different entities involved in a payment card transaction).
-
-
-
-
21
-
-
42449098802
-
-
For a discussion of the role of Russian mafia, see text accompanying notes 41-42.
-
For a discussion of the role of Russian mafia, see text accompanying notes 41-42.
-
-
-
-
22
-
-
34147147424
-
-
For a similar view about cybersecurity issues more generally, see, 30 Harv J L & Pub Policy 283, 286 , noting that the cure is often worse than the disease
-
For a similar view about cybersecurity issues more generally, see Robert W. Hahn and Anne Layne-Farrar, The Law and Economics of Software Security, 30 Harv J L & Pub Policy 283, 286 (2006) (noting that the cure is often worse than the disease).
-
(2006)
The Law and Economics of Software Security
-
-
Hahn, R.W.1
Layne-Farrar, A.2
-
23
-
-
42449118748
-
-
For a somewhat different take, see Schwartz and Janger, 105 Mich L Rev at 960-70 (cited in note 3) (suggesting the need for a coordinated response agent to deal with information security concerns).
-
For a somewhat different take, see Schwartz and Janger, 105 Mich L Rev at 960-70 (cited in note 3) (suggesting the need for a "coordinated response agent" to deal with information security concerns).
-
-
-
-
24
-
-
42449114327
-
-
For the latest version, see generally Mary T. Monahan, 2007 Identity Fraud Survey Report: Identity Fraud Is Dropping, Continued Vigilance Necessary (2007 Javelin Survey) (Javelin Strategy & Research, Feb 2007).
-
For the latest version, see generally Mary T. Monahan, 2007 Identity Fraud Survey Report: Identity Fraud Is Dropping, Continued Vigilance Necessary ("2007 Javelin Survey") (Javelin Strategy & Research, Feb 2007).
-
-
-
-
25
-
-
42449138600
-
-
Id at 1
-
Id at 1.
-
-
-
-
26
-
-
42449094010
-
-
Id
-
Id.
-
-
-
-
27
-
-
42449151981
-
-
Total Number of Fraud Complaints & Amount Paid: Calendar Years 2004 through 2006, ConsumerSentinel (Feb 7, 2007), online at http://www.consumer.gov/sentinel/Sentinel_CY_2006/ total_fraudcomplaints_amountpaid.pdf (visited Jan 12, 2008).
-
Total Number of Fraud Complaints & Amount Paid: Calendar Years 2004 through 2006, ConsumerSentinel (Feb 7, 2007), online at http://www.consumer.gov/sentinel/Sentinel_CY_2006/ total_fraudcomplaints_amountpaid.pdf (visited Jan 12, 2008).
-
-
-
-
28
-
-
70450256774
-
Bill Would Punish Retailers for Leaks of Personal Data
-
reporting on a proposed Massachusetts statute that would require retailers to pay for losses when hackers and thieves breach their security systems, For discussion, see also, Feb 22
-
For discussion, see also Joseph Pereira, Bill Would Punish Retailers for Leaks of Personal Data, Wall St J B1 (Feb 22, 2007) (reporting on a proposed Massachusetts statute that would require retailers to pay for losses when hackers and thieves breach their security systems).
-
(2007)
Wall St J
, vol.B1
-
-
Pereira, J.1
-
29
-
-
42449090965
-
-
See, for example, Visa USA, Inc, Quarterly Performance Data Fourth Quarter 2006, online at http://www.usa.visa.com/download/about_visa/ press_resources/statistics/Q42006.pdf (visited Oct 2, 2007).
-
See, for example, Visa USA, Inc, Quarterly Performance Data Fourth Quarter 2006, online at http://www.usa.visa.com/download/about_visa/ press_resources/statistics/Q42006.pdf (visited Oct 2, 2007).
-
-
-
-
30
-
-
42449119603
-
-
See id providing data on total for 2006 and the percentage of net fraud
-
See id (providing data on total volume for 2006 and the percentage of net fraud).
-
-
-
-
31
-
-
42449162617
-
-
In 2005, for example, Visa estimated that it was planning to increase spending to combat fraud by $200 million over the following four years. Visa USA, Inc, Visa USA Annual Report 2005 1-2, online at, visited Oct 2, 2007, discussing challenges from and responses to fraud for Visa
-
In 2005, for example, Visa estimated that it was planning to increase spending to combat fraud by $200 million over the following four years. Visa USA, Inc, Visa USA Annual Report 2005 1-2, online at http://usa.visa.com/download/about_visa/annual_report.pdf (visited Oct 2, 2007) (discussing challenges from and responses to fraud for Visa).
-
-
-
-
32
-
-
42449109351
-
-
Visa dispensed with the signature authorization requirement to expand acceptance of its cards at quick service restaurants such as McDonald's and Taco Bell. Typically, quick service restaurants needed to capture signatures at the point of sale in order to avoid liability for fraudulent transactions; a major disadvantage for payment cards relative to cash. Two years ago, however, Visa persuaded issuers to eliminate the requirement and to accept liability for fraudulent transactions, and acceptance in the category has increased dramatically
-
Visa dispensed with the signature authorization requirement to expand acceptance of its cards at quick service restaurants such as McDonald's and Taco Bell. Typically, quick service restaurants needed to capture signatures at the point of sale in order to avoid liability for fraudulent transactions; a major disadvantage for payment cards relative to cash. Two years ago, however, Visa persuaded issuers to eliminate the requirement and to accept liability for fraudulent transactions, and acceptance in the category has increased dramatically.
-
-
-
-
33
-
-
42449111538
-
Identity Crisis
-
detailing the ease with which personal identity can be obtained, often in internet chat rooms, For a vivid description of this market, see, Mar 11
-
For a vivid description of this market, see Stephen J. Dubner and Steven Levitt, Identity Crisis, NY Times Mag 24-25 (Mar 11, 2007) (detailing the ease with which personal identity can be obtained, often in internet chat rooms).
-
(2007)
NY Times Mag
, vol.24-25
-
-
Dubner, S.J.1
Levitt, S.2
-
34
-
-
42449160047
-
-
2007 Javelin Survey at 30 (cited in note 17).
-
2007 Javelin Survey at 30 (cited in note 17).
-
-
-
-
35
-
-
84862265754
-
Risk Management and Nonbank Participation in the US Retail Payments System, 92
-
See generally
-
See generally Richard J. Sullivan, Risk Management and Nonbank Participation in the US Retail Payments System, 92(2) Economic Review 5 (2007).
-
(2007)
Economic Review
, vol.5
-
-
Sullivan, R.J.1
-
36
-
-
42449119600
-
-
Id at 15 table 2 providing percentages of publicly reported data breaches across sectors of the economy
-
Id at 15 table 2 (providing percentages of publicly reported data breaches across sectors of the economy).
-
-
-
-
37
-
-
42449096666
-
-
Id (reporting 19.9 percent and 22.6 percent of all breaches for retail and education respectively and 61,288322 and 40,691,306 records compromised for retail and processors of financial data respectively compared with, for example, 6,352,711 records compromised for education).
-
Id (reporting 19.9 percent and 22.6 percent of all breaches for retail and education respectively and 61,288322 and 40,691,306 records compromised for retail and processors of financial data respectively compared with, for example, 6,352,711 records compromised for education).
-
-
-
-
38
-
-
42449127812
-
-
2007 Javelin Survey at 5 (cited in note 17) (explaining that the average victim of an existing account fraud paid $587 out of pocket in consumer costs, but if the thief opened a new account in the victim's name, the average consumer had to pay $792).
-
2007 Javelin Survey at 5 (cited in note 17) (explaining that the average victim of an existing account fraud paid $587 out of pocket in consumer costs, but if the thief opened a new account in the victim's name, the average consumer had to pay $792).
-
-
-
-
39
-
-
42449140063
-
-
See Visa Reaches Major Technology Milestones-Paves the Way for Global Growth and Innovation, Bus Wire (Sept 27, 2006) (reprinting the VISA press release).
-
See Visa Reaches Major Technology Milestones-Paves the Way for Global Growth and Innovation, Bus Wire (Sept 27, 2006) (reprinting the VISA press release).
-
-
-
-
40
-
-
42449141365
-
-
See PCI Security Standards Council, About the PCI Data Security Standard (PCI DSS), online at https://www.pcisecuritystandards.org/tech/ index.htm (visited Jan 12, 2008).
-
See PCI Security Standards Council, About the PCI Data Security Standard (PCI DSS), online at https://www.pcisecuritystandards.org/tech/ index.htm (visited Jan 12, 2008).
-
-
-
-
41
-
-
42449111930
-
-
See PCISSC, PCI Security Standards Council Appoints Robert M. Russo, Sr. as General Manager (Mar 27, 2007), online at https://www. pcisecuritystandards.org/pdfs/03-27-07.pdf (visited Jan 12, 2008).
-
See PCISSC, PCI Security Standards Council Appoints Robert M. Russo, Sr. as General Manager (Mar 27, 2007), online at https://www. pcisecuritystandards.org/pdfs/03-27-07.pdf (visited Jan 12, 2008).
-
-
-
-
42
-
-
42449113634
-
-
See About the PCI Data Security Standard (PCI DSS) (cited in note 32).
-
See About the PCI Data Security Standard (PCI DSS) (cited in note 32).
-
-
-
-
43
-
-
42449092350
-
-
See, for example, Visa USA, Inc, What to Do if Comprised: Visa USA Fraud Investigations and Incident Management Procedures 1, online at http://usa.visa.com/download/merchants/cisp_what_ to_do_if_compromised.pdf (visited Jan 12, 2008).
-
See, for example, Visa USA, Inc, What to Do if Comprised: Visa USA Fraud Investigations and Incident Management Procedures 1, online at http://usa.visa.com/download/merchants/cisp_what_ to_do_if_compromised.pdf (visited Jan 12, 2008).
-
-
-
-
44
-
-
42449095377
-
-
Visa USA, Inc, Cardholder Information Security Program, online at http://usa.visa.com/ merchants/risk_management/cisp_if_compromised.html?it=12|/ merchants/risk_management/cis_ overview.html|If%20Compromised (visited Jan 12, 2008).
-
Visa USA, Inc, Cardholder Information Security Program, online at http://usa.visa.com/ merchants/risk_management/cisp_if_compromised.html?it=12|/ merchants/risk_management/cis_ overview.html|If%20Compromised (visited Jan 12, 2008).
-
-
-
-
45
-
-
42449116463
-
-
Visa USA, Inc, Visa USA Pledges $20 Million in Incentives to Protect Cardholder Data (Dec 12, 2006), online at http://corporate.visa.com/ md/nr/press667.jsp (visited Jan 12, 2008). MasterCard's website only offers this cryptic warning: If a merchant does not meet the applicable compliance requirements of the SDP Program, then MasterCard may levy a noncompliance assessment on the responsible MasterCard member. MasterCard Worldwide, Compliance Considerations, online at http://www.mastercard.com/us/sdp/ merchants/compliance_ considerations.html (visited Jan 12, 2008).
-
Visa USA, Inc, Visa USA Pledges $20 Million in Incentives to Protect Cardholder Data (Dec 12, 2006), online at http://corporate.visa.com/ md/nr/press667.jsp (visited Jan 12, 2008). MasterCard's website only offers this cryptic warning: "If a merchant does not meet the applicable compliance requirements of the SDP Program, then MasterCard may levy a noncompliance assessment on the responsible MasterCard member." MasterCard Worldwide, Compliance Considerations, online at http://www.mastercard.com/us/sdp/ merchants/compliance_ considerations.html (visited Jan 12, 2008).
-
-
-
-
46
-
-
42449083171
-
Visa USA Pledges $20 Million
-
cited in note 37
-
Visa USA, Inc, Visa USA Pledges $20 Million (cited in note 37).
-
Visa U.S.A. Inc.
-
-
-
47
-
-
42449160869
-
-
The TJX Companies, Inc, Form 10-K for the Year Ending January 27, 2007 at 2, 7 (providing a brief discussion of the company's market position and information about the computer intrusion).
-
The TJX Companies, Inc, Form 10-K for the Year Ending January 27, 2007 at 2, 7 (providing a brief discussion of the company's market position and information about the computer intrusion).
-
-
-
-
49
-
-
42449102032
-
-
Id describing the methods and technology by which the information was intercepted
-
Id (describing the methods and technology by which the information was intercepted).
-
-
-
-
50
-
-
42449088811
-
-
Id (quoting a source identified as a person familiar with TJX's internal probe).
-
Id (quoting a source identified as a "person familiar with TJX's internal probe").
-
-
-
-
51
-
-
42449136512
-
-
See TJX Companies, Inc, Form 10-K at 9 (cited in note 39) (indicating that the security data included in the magnetic stripe on payment cards required for card present transactions ('track 2' data) was no longer stored on the system after September 2, 2003).
-
See TJX Companies, Inc, Form 10-K at 9 (cited in note 39) (indicating that the "security data included in the magnetic stripe on payment cards required for card present transactions ('track 2' data)" was no longer stored on the system after September 2, 2003).
-
-
-
-
52
-
-
42449117460
-
-
See Larry Greenemeier, TJX Stored Customer Data, Violated Visa Payment Rules, Info Week (Jan 29, 2007), online at http://www.informationweek.com/ story/showArticle.jhtml? articleID=197001447 (visited Jan 12, 2008) (criticizing the length for which TJX stored its customer data and detailing how information is intercepted).
-
See Larry Greenemeier, TJX Stored Customer Data, Violated Visa Payment Rules, Info Week (Jan 29, 2007), online at http://www.informationweek.com/ story/showArticle.jhtml? articleID=197001447 (visited Jan 12, 2008) (criticizing the length for which TJX stored its customer data and detailing how information is intercepted).
-
-
-
-
54
-
-
42449090537
-
-
Id at 8
-
Id at 8.
-
-
-
-
55
-
-
42449127376
-
-
Id
-
Id.
-
-
-
-
57
-
-
42449086693
-
-
A stored value card looks like a typical general purpose payment card, but instead of accessing a credit limit or a checking account, it accesses an electronic purse
-
A stored value card looks like a typical general purpose payment card, but instead of accessing a credit limit or a checking account, it accesses an electronic purse.
-
-
-
-
58
-
-
42449157469
-
-
Evan Schuman, Stolen TJX Data Used in $8M Scheme before Breach Discovery, eWeek.com (Mar 21, 2007), online at http://www.eweek.com/ article2/0,1895,2106149,00.asp (visited Jan 12,2008).
-
Evan Schuman, Stolen TJX Data Used in $8M Scheme before Breach Discovery, eWeek.com (Mar 21, 2007), online at http://www.eweek.com/ article2/0,1895,2106149,00.asp (visited Jan 12,2008).
-
-
-
-
59
-
-
42449106402
-
-
Matt Hines, Data from TJX Security Breach Fuels Fraud Scheme, CSO (Mar 21, 2007), online at http://www2.csoonline.com/blog_view.html?CID=32617 (visited Jan 12, 2008).
-
Matt Hines, Data from TJX Security Breach Fuels Fraud Scheme, CSO (Mar 21, 2007), online at http://www2.csoonline.com/blog_view.html?CID=32617 (visited Jan 12, 2008).
-
-
-
-
60
-
-
42449083570
-
-
Id
-
Id.
-
-
-
-
61
-
-
42449129956
-
-
15 USC § 1643(a)(1)(B) (2000).
-
15 USC § 1643(a)(1)(B) (2000).
-
-
-
-
62
-
-
42449106004
-
-
See Visa USA, Inc, Visa Security Program, online at http://usa.visa.com/personal/ security/visa_security_program/zero_liability.html (visited Jan 12, 2008).
-
See Visa USA, Inc, Visa Security Program, online at http://usa.visa.com/personal/ security/visa_security_program/zero_liability.html (visited Jan 12, 2008).
-
-
-
-
63
-
-
42449110192
-
-
Class Action Complaint, In re Retail Security Breach Litigation, No 07-101621 3 (D Mass filed Apr 25, 2007).
-
Class Action Complaint, In re Retail Security Breach Litigation, No 07-101621 3 (D Mass filed Apr 25, 2007).
-
-
-
-
64
-
-
42449140516
-
-
Id ¶¶ 72-74
-
Id ¶¶ 72-74.
-
-
-
-
65
-
-
42449131652
-
-
Id ¶ 81
-
Id ¶ 81.
-
-
-
-
66
-
-
42449090114
-
-
See, for example, Pennsylvania State Employees Credit Union v Fifth Third Bank, 398 F Supp 2d 317, 322-23 (MD Pa 2005).
-
See, for example, Pennsylvania State Employees Credit Union v Fifth Third Bank, 398 F Supp 2d 317, 322-23 (MD Pa 2005).
-
-
-
-
67
-
-
42449097511
-
-
Id at 338
-
Id at 338.
-
-
-
-
68
-
-
42449106005
-
-
Id at 332-37
-
Id at 332-37.
-
-
-
-
69
-
-
42449083568
-
-
See Pennsylvania State Employees Credit Union v Fifth Third Bank, 2006 WL 1724574, *1 (MD Pa) (memorandum opinion).
-
See Pennsylvania State Employees Credit Union v Fifth Third Bank, 2006 WL 1724574, *1 (MD Pa) (memorandum opinion).
-
-
-
-
70
-
-
42449084403
-
-
See also Cumis Insurance Society, Inc v BJ's Wholesale Club, Inc, Civil Action No 05-1158, *2 (Mass Super Ct filed Dec 1,2005) (memorandum opinion) (rejecting a similar claim in Massachusetts).
-
See also Cumis Insurance Society, Inc v BJ's Wholesale Club, Inc, Civil Action No 05-1158, *2 (Mass Super Ct filed Dec 1,2005) (memorandum opinion) (rejecting a similar claim in Massachusetts).
-
-
-
-
71
-
-
42449083990
-
-
See Act of May 21, 2007, 2007 Minn Laws 108, to be codified at Minn Stat Ann § 325E.64 (West 2007) (mandating a forty-eight hour limit on the retention of personal information following a transaction).
-
See Act of May 21, 2007, 2007 Minn Laws 108, to be codified at Minn Stat Ann § 325E.64 (West 2007) (mandating a forty-eight hour limit on the retention of personal information following a transaction).
-
-
-
-
72
-
-
42449111124
-
-
Pub L No 107-204, 116 Stat 745 (Supp 2002).
-
Pub L No 107-204, 116 Stat 745 (Supp 2002).
-
-
-
-
73
-
-
42449096667
-
-
Michael Bloomberg and Charles Serhumer, Sustaining New York's and the US' Global Financial Services Leadership 19-20, online at http://www.senate.gov/~schumer/SchumerWebsite/ pressroom/special_reports/2007/ NY_REPORT%20_FINAL.pdf (visited Jan 12, 2008).
-
Michael Bloomberg and Charles Serhumer, Sustaining New York's and the US' Global Financial Services Leadership 19-20, online at http://www.senate.gov/~schumer/SchumerWebsite/ pressroom/special_reports/2007/ NY_REPORT%20_FINAL.pdf (visited Jan 12, 2008).
-
-
-
-
74
-
-
22744451767
-
-
See generally Roberta Romano, The Sarbanes-Oxley Act and the Making of Quack Corporate Governance, 114 Yale L J 1521 (2005) (noting that Sarbanes-Oxley represents a change in regulation regimes, moving from disclosure requirements to substantive corporate governance mandates and arguing that the change resulted from hasty decisionmaking, not careful legislative deliberation).
-
See generally Roberta Romano, The Sarbanes-Oxley Act and the Making of Quack Corporate Governance, 114 Yale L J 1521 (2005) (noting that Sarbanes-Oxley represents a change in regulation regimes, moving from disclosure requirements to substantive corporate governance mandates and arguing that the change resulted from hasty decisionmaking, not careful legislative deliberation).
-
-
-
|