Abstracts - faqs.org

Abstracts

Law

Search abstracts:
Abstracts » Law

Public cried 'no' to know-your-customer regulations; uproar over potential invasions of privacy forced anti-money-laundering proposals to be withdrawn, maybe only temporarily

Article Abstract:

The "know your customer" rules, developed by the Treasury Department and bank regulatory agencies searching for a workable means of strengthening law enforcement measures against money laundering, were withdrawn due to a public outcry over the rules' invasion of privacy. The proposals would have implemented section 8(S) of the Federal Deposit Insurance Act's requirement that depository institutions establish procedures ensuring and monitoring compliance with the Currency and Foreign Transaction Reporting Act.

Author: Scranton, David F.
Publisher: ALM Media, Inc.
Publication Name: The National Law Journal
Subject: Law
ISSN: 0162-7325
Year: 1999
Prevention, Disclosure (Securities law), Money laundering

User Contributions:

Comment about this article or add new information about this topic:

CAPTCHA


Workplace surveillance poses legal, ethical issues; employers should set clear policies for monitoring e-mail, computer files and phone calls

Article Abstract:

The employer should conduct electronic employee monitoring for business purposes only, limit the scope of such monitoring, keep it confidential and make appropriate disclosures to employees. Guidelines governing disclosures to employees, barring discriminatory, inappropriate or offensive material and the use of communications, and detailing the use of information gathered will place the employer in a better position to argue that appropriate steps to avoid claims of employment discrimination were taken.

Publisher: ALM Media, Inc.
Publication Name: The National Law Journal
Subject: Law
ISSN: 0162-7325
Year: 1999
Electronic employee monitoring

User Contributions:

Comment about this article or add new information about this topic:

CAPTCHA


Beware of cookies; do marketers that track a user's online activities threaten privacy?

Article Abstract:

Legal theories used to combat the use of cookies on the Internet and the results courts have reached in these suits are discussed. The statutes used in the fight include the Federal Wiretap Act, the Electronic Communications Privacy Act, and the Computer Fraud and Abuse Act, all enacted before the popularity of cookies.

Author: Roth, Mark S.
Publisher: ALM Media, Inc.
Publication Name: The National Law Journal
Subject: Law
ISSN: 0162-7325
Year: 2001
Usage, Cookie files (Computers)

User Contributions:

Comment about this article or add new information about this topic:

CAPTCHA


Subjects list: United States, Laws, regulations and rules, Protection and preservation, Privacy, Right of, Right of privacy
Similar abstracts:
  • Abstracts: PBGC publishes information booklet on QDROs. Suspension of benefits - still confusing after all these years. Interest rate assumption for crediting contributions to a cash balance plan sufficient to make benefits definitely determinable
  • Abstracts: TAMs force recognition of deferred gains in member stock. Temporary regulations: application of Section 382 to a consolidated group
  • Abstracts: Congressional procedure and statutory interpretation. Congressional-executive information access disputes: a modest proposal - do nothing
  • Abstracts: Encouraging creditor participation: integrating the allowance of administrative expenses with the common fund theory
This website is not affiliated with document authors or copyright owners. This page is provided for informational purposes only. Unintentional errors are possible.
Some parts © 2026 Advameg, Inc.