Commodifying Consumer Data in the Era of the Internet of Things Stacy-Ann Elvy New York Law School, [email protected]

Total Page:16

File Type:pdf, Size:1020Kb

Commodifying Consumer Data in the Era of the Internet of Things Stacy-Ann Elvy New York Law School, Selvy@Nyls.Edu digitalcommons.nyls.edu Faculty Scholarship Articles & Chapters 2018 Commodifying Consumer Data in the Era of the Internet of Things Stacy-Ann Elvy New York Law School, [email protected] Follow this and additional works at: https://digitalcommons.nyls.edu/fac_articles_chapters Part of the Bankruptcy Law Commons, Consumer Protection Law Commons, Internet Law Commons, and the Privacy Law Commons Recommended Citation Boston College Law Review, Vol. 59, Issue 2 (February 2018), pp. 423-522 This Article is brought to you for free and open access by the Faculty Scholarship at DigitalCommons@NYLS. It has been accepted for inclusion in Articles & Chapters by an authorized administrator of DigitalCommons@NYLS. COMMODIFYING CONSUMER DATA IN THE ERA OF THE INTERNET OF THINGS STACY-ANN ELVY INTRODUCTION ........................................................... 424 I. THE IOT DATA GOLD RUSH ...................................................... 435 A. Biometric, Health, andHighly Sensitive Data.............. ......................... 435 B. IoTPrivacy Policies................ ....................... ........... 439 C. Consumer Harms & Risks.... ............................................... 448 1. Consensual Disclosures and Data Analytics ..................... ....... 449 2. Non-Consensual Disclosures and Data Breaches. ........................ 452 3. Non-Consensual Disclosures and Initial Data Collectors .............. ...... 455 II. DATA TRANSFERS & CoMMERCIAL REGIMES ................................... 456 A. Article 9 of the UCC ...................... 457 B. Data Ownership vs. Rights in the Data......................... ............ 463 C. Bankruptcy Implications ..................................................... 472 III. PRIVACY FRAMEWORKS .................................................. 475 A. BAPCPA ........................................................... 475 B. The FTCA & FTC Intervention .....................................................483 C. Biometric Data Statutes .................................................... 488 D. HIPAA .... ......................................................... 496 IV. PATHS FORWARD....................................................... 500 A. Transfer & Assignment Restrictions........................................50 1. Separate State Statutes........................ .................. 504 2. Article 9 Amendments..........................................505 3. Bankruptcy Code Amendments....................................511 4. Criticisms of Transfer & Assignment Restrictions........................512 B. Require CPOs in Article 9 Foreclosures.....................................518 C. Require CPOs in All Bankruptcy Transfers...................................520 CONCLUSION ............................................................. 522 423 COMMODIFYING CONSUMER DATA IN THE ERA OF THE INTERNET OF THINGS STACY-ANN ELVY* Abstract: Internet of Things ("loT") products generate a wealth of data about consumers that was never before widely and easily accessible to companies. Examples include biometric and health-related data, such as fingerprint pat- terns, heart rates, and calories burned. This Article explores the connection be- tween the types of data generated by the JoT and the financial frameworks of Article 9 of the Uniform Commercial Code and the Bankruptcy Code. It cri- tiques these regimes, which enable the commodification of consumer data, as well as laws aimed at protecting consumer data, such as the Bankruptcy Abuse Prevention and Consumer Protection Act, various state biometric data statutes, and the Health Insurance Portability and Accountability Act. This Article con- tends that in addition to privacy policies, financial frameworks can also play a critical role in facilitating the transfer and disclosure of consumer data in a manner that is opaque and potentially harmful to consumers. Furthermore, ex- isting privacy frameworks that rely heavily on a notice and choice model and the provisions of a company's privacy policy to determine the level of protec- tion given to consumers, and which may not always apply to JoT companies, do not effectively safeguard consumers in the JoT setting. This Article propos- es several solutions to engender movement away from an overreliance on the notice and choice model and the terms of privacy policies, and to reduce the various moments of data disclosure authorized by financial frameworks. It al- so offers ways to preserve the value of JoT data as a source of financing for companies while simultaneously protecting the privacy of consumers. INTRODUCTION The Internet of Things ("loT") has been described as "the next evolu- tion of the Internet" and it is expected to usher in a new economic age with "changes rivaling the industrial revolution."' However, the rapid "digitali- © 2018, Stacy-Ann Elvy. All rights reserved. * Professor of Law, New York Law School (J.D., Harvard Law School; B.S., Cornell Univer- sity). For helpful feedback, comments or insights, I am grateful to Paul Schwartz, Xuan-Thao Nguyen, Pamela Foohey, Edward Janger, Sharona Hoffman, Stephen Sepinuck, Heather Hughes, Juliet Moringiello, Jim Hawkins, Lucy Thomson, Cedric Powell, Sudha Setty, Audrey McFarlane, Nordia Elvy, Euklyn Elvy, Richard Chused, Gerald Korngold, Robert Blecker, and participants at the 2017 Property Implications of the Sharing Economy Conference at Penn State Law School. 1DAvE EVANS, THE INTERNET OF THINGS: HOW THE NEXT EVOLUTION OF THE INTERNET IS CHANGING EVERYTHING 2 (Apr. 2011), https://www.cisco.com/c/dam/enus/about/ac79/docs/in nov/IoT_IBSG_041 1FINAL.pdf [https://perma.cc/CMR6-5KS7]; Kenie Ho, Protecting the Revo- 424 2018] Commodifying Consumer Data in the JoTEra 425 zation of our physical world" raises significant concerns for consumers. 2 In 2016, researchers at the University of California, Berkeley Center for Long- Term Cybersecurity ("Berkeley Center") published a report that evaluated five cybersecurity scenarios that could potentially occur in 2020.3 Two of the most alarming scenarios involve: (1) a financial crisis in which compa- nies sell their customer "data assets" to third parties (including unwittingly selling to parties that would use consumer data for perverse purposes), while companies become increasingly vulnerable to cyberattacks, and (2) the ubiquitous use of wearable devices that collect and monitor "real-time" biometric and health-related data, including emotional state and hormone levels, and the widespread use of these data to control and manipulate con- sumers. Consumers are already experiencing the effects of the "new normal" of 2020 identified by the Berkeley Center, in which companies routinely suffer from cyberattacks. In 2016, Dyn, a business that "manages crucial parts of the [I]nternet's infrastructure," reported a serious attack on its systems that disrupted access to various websites, such as Twitter, Netflix, and the New York Times. 6 The hackers manipulated vulnerable loT devices to initiate the lution: Internet of Things Trade Secrets, LAW.COM: INSIDE COUNSEL (Oct. 6, 2016, 6:04 AM), http://www.law.com/insidecounsel/2016/10/06/protecting-the-revolution-intemet-of-things-trade/ [https://web.archive.org/web/20180103 172900/https://www.law.com/insidecounsel/2016/10/06/p rotecting-the-revolution-intemet-of-things-trade/?slreturn-20180003 122859]. The Internet of Things ("loT") has been described as a network of connected products that accumulate and transfer data over the Internet. AIG, THE INTERNET OF THINGS: EVOLUTION OR REVOLUTION? 6-7 (2015), http:// www.aig.com/content/dam/aig/america-canada/us/documents/business/casualty/aigiot-english- report.pdf [https://perna.cc/BA7X-Y9VV]. 2 JESSICA GROOPMAN & SUSAN ETLINGER, CONSUMER PERCEPTIONS OF PRIVACY IN THE INTERNET OF THINGS: WHAT BRANDS CAN LEARN FROM A CONCERNED CITIZENRY, ALTIMETER 2 (June 2015), http://www.altimetergroup.com/pdf/reports/Consumer-Perceptions-Privacy-loT- Altimeter-Group.pdf [https://perna.cc/KP7V-H9LF]. Business Insider reports that "[n]early $6 trillion will be spent on loT solutions over the next five years." John Greenough & Jonathan Cam- hi, Here Are loT Trends That Will Change the Way Businesses, Governments, and Consumers Interact with the World, BUS. INSIDER (Aug. 29, 2016, 10:18 AM), http://www.businessinsider. com/top-intemet-of-things-trends-2016-1 [https://penna.cc/73LE-LQY3]. U.C. BERKELEY CTR. FOR LONG-TERM CYBERSECURITY, CYBERSECURITY FUTURES 2020, at 1 (2016), https://cltc.berkeley.edu/wp-content/uploads/2016/04/cltcReport_04-27-04apages. pdf [https://perma.cc/M523-YEZE]. ' Id. at 6-7. As used in this Article, the term "health-related data" refers to data associated with the mental, emotional, or physical well-being and health of individuals, such as calories burned, sleep patterns, glucose levels, and the like. As used in this Article, the term "biometric data" refers to biometric identifiers, such as voice and face prints; scans and images of biometrics, such as fingerprint scans; other data related to and that can be transformed into biometric identifi- ers, such as a recording of an individual's voice or a photograph of an individual; and the authen- tication codes, templates, text, or mathematical representations associated with any such data. 5 Id. at 9-10. 6 Nicole Perlroth, Hackers Used New Weapons to DisruptMajor Websites Across U.S., N.Y. TIMES (Oct. 21, 2016), https://www.nytimes.com/2016/10/22/business/intemet-problems-attack. html [https://perma.cc/N95B-H2FX]. 426 Boston College Law Review [Vol. 59:423 attack.7
Recommended publications
  • Timeline 1994 July Company Incorporated 1995 July Amazon
    Timeline 1994 July Company Incorporated 1995 July Amazon.com Sells First Book, “Fluid Concepts & Creative Analogies: Computer Models of the Fundamental Mechanisms of Thought” 1996 July Launches Amazon.com Associates Program 1997 May Announces IPO, Begins Trading on NASDAQ Under “AMZN” September Introduces 1-ClickTM Shopping November Opens Fulfillment Center in New Castle, Delaware 1998 February Launches Amazon.com Advantage Program April Acquires Internet Movie Database June Opens Music Store October Launches First International Sites, Amazon.co.uk (UK) and Amazon.de (Germany) November Opens DVD/Video Store 1999 January Opens Fulfillment Center in Fernley, Nevada March Launches Amazon.com Auctions April Opens Fulfillment Center in Coffeyville, Kansas May Opens Fulfillment Centers in Campbellsville and Lexington, Kentucky June Acquires Alexa Internet July Opens Consumer Electronics, and Toys & Games Stores September Launches zShops October Opens Customer Service Center in Tacoma, Washington Acquires Tool Crib of the North’s Online and Catalog Sales Division November Opens Home Improvement, Software, Video Games and Gift Ideas Stores December Jeff Bezos Named TIME Magazine “Person Of The Year” 2000 January Opens Customer Service Center in Huntington, West Virginia May Opens Kitchen Store August Announces Toys “R” Us Alliance Launches Amazon.fr (France) October Opens Camera & Photo Store November Launches Amazon.co.jp (Japan) Launches Marketplace Introduces First Free Super Saver Shipping Offer (Orders Over $100) 2001 April Announces Borders Group Alliance August Introduces In-Store Pick Up September Announces Target Stores Alliance October Introduces Look Inside The BookTM 2002 June Launches Amazon.ca (Canada) July Launches Amazon Web Services August Lowers Free Super Saver Shipping Threshold to $25 September Opens Office Products Store November Opens Apparel & Accessories Store 2003 April Announces National Basketball Association Alliance June Launches Amazon Services, Inc.
    [Show full text]
  • The Edge, Spring 2003
    Eastern Michigan University DigitalCommons@EMU Alumni News University Archives 2003 The dE ge, Spring 2003 Eastern Michigan University Follow this and additional works at: http://commons.emich.edu/alumni_news Recommended Citation Eastern Michigan University, "The dE ge, Spring 2003" (2003). Alumni News. 200. http://commons.emich.edu/alumni_news/200 This Article is brought to you for free and open access by the University Archives at DigitalCommons@EMU. It has been accepted for inclusion in Alumni News by an authorized administrator of DigitalCommons@EMU. For more information, please contact [email protected]. SPRING2003 A publicatio1 lor alumni and lri1nds ol lastentMichigan Universilv Gettin downt bu sine Talking strateuv11f AdvancementVP Stu INSIDE: • EMU homecomin1upllate • campus dilital maleovers- • New Sludentunion ll'Oiect l:------------------�--=���S_PR_I_G__N 20_ 0 ___3 �------------�--------- I I I I Ci!iMU.MiMay 19 - Faculty Seminar Se- CB·folnt%Mli ries at EMU - Monroe, 1555 S. l:.ve1ygeneration of EMU Raisinville Rd., Monroe, students and alumni has · challenges to deal with. Il ow Mic· h ., 6 :30 - 8 p.m. "N egouat- we handle those challenges ing Win-Win Relationships in l • adi·ngOff helps define us. the Workplace" presented by e With the University now Dr. Sally McCracken. Cost: About our new look facing financial challenges $15. R.S.V.P. to 734.487.0250 due to the state's decision to May 29 - Grand Rapids, Mich., cul several million dollars alumni reception, 6-8 p.m., an d OU r new ffllSSIOD. from its appropriation, it's up Amway Grand Plaza. Cost: • • to us to respond to the needs $10.
    [Show full text]
  • Lending Credence to the Benefits of Allowing Emails, Text Messages, and Social Media in a Shareholder Demand, 54 UIC J
    UIC Law Review Volume 54 Issue 1 Article 5 2021 Expanding the World of Section 220: Lending Credence to the Benefits of Allowing Emails, extT Messages, and Social Media in a Shareholder Demand, 54 UIC J. Marshall L. Rev. 345 (2021) Drake Edward Follow this and additional works at: https://repository.law.uic.edu/lawreview Part of the Law Commons Recommended Citation Drake Edward, Expanding the World of Section 220: Lending Credence to the Benefits of Allowing Emails, Text Messages, and Social Media in a Shareholder Demand, 54 UIC J. Marshall L. Rev. 345 (2021) https://repository.law.uic.edu/lawreview/vol54/iss1/5 This Comments is brought to you for free and open access by UIC Law Open Access Repository. It has been accepted for inclusion in UIC Law Review by an authorized administrator of UIC Law Open Access Repository. For more information, please contact [email protected]. EXPANDING THE WORLD OF SECTION 220: LENDING CREDENCE TO THE BENEFITS OF ALLOWING EMAILS, TEXT MESSAGES, AND SOCIAL MEDIA IN A SHAREHOLDER DEMAND DRAKE EDWARD* I. INTRODUCTION ............................................................... 345 II. BACKGROUND ................................................................. 348 A. The Rights of a Shareholder .................................... 348 B. Section 220 Demand ................................................ 350 C. The Traditional Meaning Of “Books and Records” .................................................................... 352 D. Corporations and The Use of Technology ............... 354 III. ANALYSIS ........................................................................ 357 A. Admissibility of Emails ........................................... 358 1. Emails in Other Areas of the Law .................... 358 2. Emails in the Context of Section 220 ............... 360 3. Comparative Analysis of Emails Inside and Outside the Context of Section 220 .................. 361 B. Admissibility of Text Messages ............................... 362 1. Text Messages in Other Areas of the Law ......
    [Show full text]
  • Borders Release
    Melbourne - 05/06/08 - 9:00pm A&R Whitcoulls to acquire Borders assets in Australia, New Zealand and Singapore Key facts A&R Whitcoulls will acquire the Borders assets and the use of the Borders trade marks in Australia, New Zealand and Singapore Total transaction valued at up to A$110 million The proposed acquisition has already received approval from the ACCC and NZCC A&R Whitcoulls Group Holdings (NZX: ARW; “A&R Whitcoulls Group”) today entered into an agreement with Borders Group Inc (“Borders Group”) for the acquisition of 30 Borders Stores in Australia, New Zealand and Singapore. Under the agreement, A&R Whitcoulls Group will gain exclusive rights to use the Borders trademarks in Australia, New Zealand and Singapore. The transaction has been approved by the Australian Competition and Consumer Commission (“ACCC”) and the New Zealand Commerce Commission (“NZCC”). A&R Whitcoulls Group Managing Director, Ian Draper, said that the Borders business is complementary to the Company’s existing assets, offering a different format from Angus & Robertson in Australia and Whitcoulls in New Zealand. “Borders’ experience-based model invites customers to browse books, magazines, music and DVDs, with cafes in most stores. It’s a model which has proven popular in the local market, and targets a different demographic with its premium format and wide range of products.” The transaction is valued at up to A$110 million and is expected to be finalised next week. “The acquisition creates a strategic footprint for the group which comprises different formats and provides a foundation for growth and innovation. We are pleased to bring these businesses together and excited about the opportunities presented by this transaction,” said Mr Draper.
    [Show full text]
  • 2008 Newsmakers of the Year
    20080105-NEWS--0001-NAT-CCI-CD_-- 12/31/2008 5:24 PM Page 1 ® www.crainsdetroit.com Vol. 25, No. 1 JANUARY 5 – 11, 2009 $2 a copy; $59 a year ©Entire contents copyright 2009 by Crain Communications Inc. All rights reserved Inside Michigan banks get Detroit Lions redo business playbook The 2010 Buick LaCrosse sedan is short end of TARP one of three new production vehicles Page 3 GM is expected to unveil at the auto show. Treasury avoiding state, some bankers say Inland Pipe acquires a national presence BY TOM HENDERSON lar Inc. bank got $935 million. (It was announced on NAIAS CRAIN’S DETROIT BUSINESS Dec. 29 that Detroit-based GMAC Financial Services Page 3 L.L.C. would receive $5 billion but that money is not With the deadline for federal approval fast ap- included for this story because GMAC is not a tradi- proaching, a summary of Michi- tional bank.) gan-based banks that have received One other state bank was ap- Local companies scope out greener, funding from the U.S. Treasury as proved for funding but declined $3B defense contract part of the Troubled Asset Relief the offer of $84 million — Mid- Program is short and, from the per- $172 billion land-based Chemical Financial Page 17 spective of local bankers, not so Of TARP funds distributed to Corp. leaner sweet. 208 banks nationwide in the Many national and large re- The Treasury has set a deadline first round gional banks that have branches of Jan. 15 for approving applica- in Michigan have been approved This Just In tions still pending.
    [Show full text]
  • Sky High Next for NASA Digital Days Alums' Companies Plan for An
    SCHOOL OF BUSINESS ARIZONA STATE UNIVERSITY AUTUMN 2017 Sky high MBA boosts engineer’s career in space Next for NASA Lessons learned on Earth are going intergalactic Alums’ companies plan for Digital days an interstellar future Make the most of devices in business without powering down relationships The final frontier FALCONER SAM “To infinity and beyond.” — Buzz Lightyear DEAN’S LETTER WPC Dear W. P. Carey family and friends, Space and business school? opportunities for space tourism, the work on teams in space in this Really? I bet you never would or benefit from new mineral issue. What strikes me is that the have guessed how much research mining on asteroids such as space context provides even more and work relevant to space with Psyche, a NASA mission significance to the application occurs outside the labs of rocket in which ASU was awarded the of what we research, teach, and scientists. I’m extraordinarily lead role. Our first commanding learn in business schools. proud of the efforts our faculty mission, Lucy, is already sending ASU and the W. P. Carey and alumni are doing in this area. technology School of It truly reflects our belief that ASU built on “Crazy” ideas Business is the has no borders. While we are a campus into place to explore state university within a state of deep space. are only crazy these issues. the U.S., we operate in a global This takes until they work. ASU has been market for higher education, and us to a host recognized as the space — to borrow a phrase — of questions.
    [Show full text]
  • Brave New World
    The Booksellers Association of the United Kingdom & Ireland Brave New World Digitisation of Content: the opportunities for booksellers and The Booksellers Association Report to the BA Council from the DOC Working Group Martyn Daniels Member of the BA's Working Group November 2006 1 The Booksellers Association of the United Kingdom & Ireland Limited 272 Vauxhall Bridge Road, London SW1V 1BA United Kingdom Tel: 0044 (0)207 802 0802 e-mail: [email protected] website: http://www.booksellers.org.uk © The Booksellers Association of the United Kingdom & Ireland Limited, 2006 First edition November 2006 All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior permission of The Booksellers Association. British Library Cataloguing in Publication Data Brave New World Digitisation of Content: the opportunities for booksellers and The Booksellers Association ISBN 978-0-9552233-3-4 This publication was digitally printed by Lightning Source and is available on demand through booksellers. This publication is also digitally available for download to be read by DX Reader, MS Reader, Mobipocket & Adobe eBook reader from www.booksellers.org.uk This digitisation plus the digitisation for Lightning Source has been performed by Value Chain International www.value-chain.biz 2 Members of the DOC Working Group Members of the working group are as follows: Joanne Willetts Entertainment UK (Chairman)
    [Show full text]
  • Monopoly Power and the Decline of Small Business the Case for Restoring America’S Once Robust Antitrust Policies
    Monopoly Power and the Decline of Small Business The Case for Restoring America’s Once Robust Antitrust Policies By Stacy Mitchell August 2016 About the Institute for Local Self-Reliance The Institute for Local Self-Reliance (ILSR) is a 42-year-old national nonprofit research and educational organization. ILSR’s mission is to provide innovative strategies, working models, and timely information to support strong, community rooted, environmentally sound, and equitable local economies. To this end, ILSR works with citizens, policy makers, and businesses to design systems, policies, and enterprises that meet local needs; to maximize human, material, natural, and financial resources; and to ensure that the benefits of these systems and resources accrue to all local citizens. More at www.ilsr.org. About the Author Stacy Mitchell is co-director of the Institute for Local Self-Reliance and directs its Community-Scaled Economy Initiative, which produces research and analysis, and partners with a range of allies to design and implement policies that curb economic consolidation and strengthen community- rooted enterprise. She has produced numerous reports and written articles for a variety of publications, including Business Week, The Nation, and Wall Street Journal. She is the author of Big-Box Swindle: The True Cost of Mega-Retailers and the Fight for America’s Independent Businesses, which Booklist named a top-ten business book of the year in 2007. An engaging speaker, Stacy has been a featured presenter at many national conferences. In October 2012, she gave a provocative TEDx talk on Why We Can’t Shop Our Way to a Better Economy.
    [Show full text]
  • The Legal Architecture of Virtual Stores: World Wide Web Sites and the Uniform Commercial Code
    American University Washington College of Law Digital Commons @ American University Washington College of Law Articles in Law Reviews & Other Academic Journals Scholarship & Research 1997 The Legal Architecture of Virtual Stores: World Wide Web Sites and the Uniform Commercial Code Walter Effross Follow this and additional works at: https://digitalcommons.wcl.american.edu/facsch_lawrev Part of the Commercial Law Commons, Computer Law Commons, and the Internet Law Commons The Legal Architecture of Virtual Stores: World Wide Web Sites and the Uniform Commercial Code WALTER A. EFFROSS* TABLE OF CONTENTS I. INTRODUCTION ....................................... 1266 II. JUST BROWSING: VISITING A COMMERCIAL WEB SITE ........... 1289 A. Reaching the Home Page ............................ 1290 B. "DrillingDown" to a Product ........................ 1294 1. Browsing .................................... 1295 a. Profiling ................................. 1296 2. Searching ................................... 1297 3. Index Scanning ................................ 1298 III. THE ON-LINE DEFINITION OF "MERCHANT...................... 1298 A. "Business Practices" Merchants ....................... 1301 1. Answering Electronic Mail (E-mail) ................. 1304 2. PeriodicallyReviewing the Site's Integrity and Operation ................................ 1305 3. "Backing Up" Information ....................... 1307 * © 1998 Walter A. Effross. Associate Professor, Washington College of Law, American University, and Chair, American Bar Association Subcommittee
    [Show full text]
  • America's Digital Goddess® KIM IS NOW AVAILABLE
    America’s Digital Goddess® KIM IS NOW AVAILABLE FOR LIVE INTERVIEWS! AVAILABILITY: WEEKDAYS – Live Hits for East Coast and All Time Zones WEEKENDS – Live Hits for East Coast and All Time Zones LAST-MINUTE reaction to major tech-related events and stories Q & A’s or panel discussions with hosts Kim Komando is host of America’s number one talk show on digital/tech lifestyle. The Kim Komando Show is celebrating its 21st Anniversary. It is heard on more than 430 radio stations in the United States, and another 177 stations around the world through Armed Forces Radio Network. Komando reaches more than 40 million subscribers through daily digital newsletters. Her Consumer Tech Update airs Monday through Friday on more than 380 radio stations. Komando has appeared as a tech expert on CNN, CBS, MSNBC, ABC, BBC, Inside Edition and FoxNews. She writes two weekly columns for USA Today and FoxNews.com. Komando’s specialty is combining technology with everyday lifestyle, and offers advice on gadgets, websites, smartphone apps, and Internet security. AWARDS / RECOGNITION: • Keynote Speaker – NAB 2016 • National Radio Hall of Fame Nominee - 2016 • Member of the ‘Heavy Hundred’ – Talkers Magazine 2016 • Forbes Magazine Most Powerful Woman of the Year – 2009 • Outstanding Program Host – Gracie Award 2007 TRANSMISSION: • LTN Network • Skype • ISDN FOR BOOKING, CONTACT: Joanna Martens, Director Affiliate Relations [email protected] 602-381-8200 x211 @kimkomando @kimkomando @kimkomando @kimkomando 6135 North 7th Street • Phoenix, Arizona 85014 • www.komando.com.
    [Show full text]
  • “Browsing Madness” and Global Sponsors of Literacy: the Politics and Discourse of Deterritorialized Reading Practices and Space in Singapore
    . Volume 8, Issue 2 November 2011 “Browsing Madness” and Global Sponsors of Literacy: The Politics and Discourse of Deterritorialized Reading Practices and Space in Singapore Kim Trager Bohley Indiana University-Purdue University, USA Abstract Drawing on empirical data collected from interviews, focus groups, surveys, and participant observation, this article explores the intersections between cultural globalization, transnational booksellers and print cultures in Singapore, placing the changing nature of textual practices and reading audiences within the “micropolitics of local/global interactions.” In doing this, the article considers how and why various sponsors of literacy in Singapore (local, global, corporate, and individual) attempted to propagate their ideologies of reading through affirmation and censure. More specifically, it is a case study of the well- known browsing controversy at Borders Bookstore Singapore, which was debated in The Straits Times, online, and elsewhere for almost a decade. In these forums, Borders employees, newspaper editors and “good patrons” censured “rough book browsers” for dog-earring magazines, clogging book aisles and failing to return magazines where they belong. In this way, practices and discourses surrounding the browsing debacle at Borders became "boundary drawing" activities that divided "good patrons"/"civilized behavior," and "a cosmopolitan mindset" from "bad patrons"/"uncivilized behavior" and "a provincial mindset." By engaging in this "discourse of difference," these social actors began to construct a cosmopolitan identity through negation that positioned them as sponsors of literacy. As with other cultural conflicts, the Borders browsing controversy became a site for the reworking of class and ethnic stereotypes, revealing how everyday media practices such as book browsing are tied to larger socio-economic structures and meta-narratives (e.g., survival = globalization).
    [Show full text]
  • Hardik Gandhi, Note, Active Cyber Defense Certainty
    ACTIVE CYBER DEFENSE CERTAINTY: A DIGITAL SELF-DEFENSE IN THE MODERN AGE Hardik Gandhi* I. INTRODUCTION Imagine a world where your personal information can be accessed for any reason. Well unfortunately, this is the reality. It is the reality because cybersecurity (the measures that can be taken to protect a computer or computer system from unauthorized access or attack) is in a state of disarray. Currently, hackers are seldom prosecuted while major corporations frequently bear the burden for failing to secure data in an arms-race environment.1 Equifax, HBO, and Yahoo fell victim to some of the largest breaches in history.2 Certain actors use the internet as a cloak for their identity to evade tracking.3 The current law is outdated, limits entities in their defensive measures, and presents far more issues than it resolves.4 As a result, we are now entering an age many refer to as the “Code War,” where the agents of chaos, using digital means, can destabilize the real world.5 * Hardik Gandhi graduated in May 2019 with his Juris Doctor degree. He thanks his late mother for the gift of grit. And to Toronto, the city that raised him, for teaching him to value people by the depth of their actions and not the color of their skin or the mistakes of their forefathers. 1. Roger A. Grimes, Why It’s So Hard to Prosecute Cybercriminals?, CSO (DEC. 6, 2016), https://www.csoonline.com/article/3147398/why-its-so-hard-to-prosecute-cyber- criminals.html [https://perma.cc/F7NH-MAAZ]. 2. See generally, Tom Kemp, What Do Equifax, HBO, Uber and Yahoo All Have in Common?, CENTRIFY (Feb.
    [Show full text]