<?xml version="1.0" encoding="utf8"?>
 <!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.0 20120330//EN" "http://jats.nlm.nih.gov/publishing/1.0/JATS-journalpublishing1.dtd"> <article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" article-type="review-article" dtd-version="1.0" xml:lang="en">
  <front>
    <journal-meta>
      <journal-id journal-id-type="publisher-id">JBR</journal-id>
      <journal-title-group>
        <journal-title>Journal of Big Data Research</journal-title>
      </journal-title-group>
      <issn pub-type="epub">2768-0207</issn>
      <publisher>
        <publisher-name>Open Access Pub</publisher-name>
        <publisher-loc>United States</publisher-loc>
      </publisher>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="doi">10.14302/issn.2768-0207.jbr-21-4048</article-id>
      <article-id pub-id-type="publisher-id">JBR-21-4048</article-id>
      <article-categories>
        <subj-group>
          <subject>review-article</subject>
        </subj-group>
      </article-categories>
      <title-group>
        <article-title>Legal, Marketing, and Advertising Issues with Big Data </article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <name>
            <surname>Buresh</surname>
            <given-names>Donald L.</given-names>
          </name>
          <xref ref-type="aff" rid="idm1842149212">1</xref>
          <xref ref-type="aff" rid="idm1842148780">*</xref>
        </contrib>
      </contrib-group>
      <aff id="idm1842149212">
        <label>1</label>
        <addr-line>Morgan State University. </addr-line>
      </aff>
      <aff id="idm1842148780">
        <label>*</label>
        <addr-line>Corresponding author</addr-line>
      </aff>
      <author-notes>
        <corresp>
  Donald L. Buresh (PhD, JD, LL.M.) <addr-line>Morgan State University</addr-line><email>logansquaredon@sbcglobal.net</email></corresp>
        <fn fn-type="conflict" id="idm1849804316">
          <p>The authors have declared that no competing interests exist.</p>
        </fn>
      </author-notes>
      <pub-date pub-type="epub" iso-8601-date="2022-01-04">
        <day>04</day>
        <month>01</month>
        <year>2022</year>
      </pub-date>
      <volume>1</volume>
      <issue>2</issue>
      <fpage>38</fpage>
      <lpage>52</lpage>
      <history>
        <date date-type="received">
          <day>22</day>
          <month>12</month>
          <year>2021</year>
        </date>
        <date date-type="accepted">
          <day>26</day>
          <month>12</month>
          <year>2021</year>
        </date>
        <date date-type="online">
          <day>04</day>
          <month>01</month>
          <year>2022</year>
        </date>
      </history>
      <permissions>
        <copyright-statement>© </copyright-statement>
        <copyright-year>2022</copyright-year>
        <copyright-holder>Donald L. Buresh</copyright-holder>
        <license xlink:href="http://creativecommons.org/licenses/by/4.0/" xlink:type="simple">
          <license-p>This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.</license-p>
        </license>
      </permissions>
      <self-uri xlink:href="http://openaccesspub.org/jbr/article/1748">This article is available from http://openaccesspub.org/jbr/article/1748</self-uri>
      <abstract>
        <p>The purpose of this essay is to discuss the advantages and disadvantages and the benefits and costs of Big Data. The paper outlines the              relevant federal and state privacy laws, including the California Consumer Privacy Act as amended, the Virginia Consumer Data Protection Act, and the Colorado Privacy Act. While highlighting several Federal Trade Commission privacy violation cases, the effects of Big Data collection and government surveillance are described in some detail.             Advertising and marketing are defined, where it is argued that while the scanning of emails by email              providers may be legal, it should be accomplished with consent, or not at all. The essentials of                   contract law and specific contract negotiation techniques are outlined for the benefit of                       attorneys. Finally, it is argued that although Big Data is the wave of the future, like all human                      institutions, it has in its definition the inherent                   paradoxes of transparency, identity, power, and            exclusion that may potentially spell its undoing.</p>
      </abstract>
      <kwd-group>
        <kwd>Big Data</kwd>
        <kwd>Internet advertising and marketing</kwd>
        <kwd>Privacy</kwd>
        <kwd>Surveillance capitalism</kwd>
      </kwd-group>
      <counts>
        <fig-count count="0"/>
        <table-count count="0"/>
        <page-count count="15"/>
      </counts>
    </article-meta>
  </front>
  <body>
    <sec id="idm1842015996" sec-type="intro">
      <title>Introduction</title>
      <p>Many centuries and millennia ago, human beings were hunters and gatherers. Food and shelter were plentiful in the summer, but the conditions were harsh during the winter, and food was scarce. About six thousand years ago, humans became farmers and grew crops in the winter, storing food for the winter to come. This situation lasted for thousands of years. The Renaissance began about 700 years ago, people began to gather in cities, and businesses started to flourish. Three hundred years ago, the Enlightenment came on the scene, giving birth to the age of capitalism between 1715 and 1750. The Industrial Revolution was just around the corner.</p>
      <p>With the advent of machines, mass production of goods could begin in earnest. There was a reckless dash for innovation, and with it came manufactured goods of every kind and color. With the desire for untold wealth and trade, bloody wars followed, almost as if they went hand in hand. Several years   after World War II, computers were born. At first, computers were bulky machines occupying a large               air-conditioned room, powered by vacuum tubes and large amounts of electricity. However, as it turned out, computers became smaller, more powerful, and used less energy with each passing day.</p>
      <p>In the late 1970s, microcomputers became                   commercially available. It was the first time that people of limited means could afford a computer and then create computer programs of their own. These were visionaries who believed that giving people the means to attain the power of knowledge was a leap towards freedom. The  Information Age was born out. There was no turning back.</p>
      <p>The Information Age has matured with the advent of Big Data. However, instead of empowering people to achieve financial independence, Big Data seems to be the vehicle ensuring that governments and corporations              remain the dominant force in society. As advertising and marketing precede the steady, continuous flow of goods and services, it is crucial to understand that Big Data is the medium for the next societal transformation. At this stage of societal evolution, Big Data holds the promise of                 incessant consumption for those who have the means to ride the Big Data train. As for the rest of humanity, only time will tell what the future holds. Toffler was right when he wrote in 1980 that the Information Age had just                begun <xref ref-type="bibr" rid="ridm1843032356">1</xref>.</p>
    </sec>
    <sec id="idm1842016356">
      <title>Literature Review</title>
      <p>The purpose of this literature review is to                 scrutinize Big Data from various angles. In the literature review, Big Data is defined, followed by a discussion of the relevant federal and state statutes that focus on Big Data and the various law review articles that talk about Big       Data in a cybersecurity context. In the fourth subsection, Big Data is examined in light of surveillance and privacy matters surrounding Big Data. The fifth subsection                     addresses advertising and marketing in general, along with the issues peculiar to big data. The sixth subsection is concerned with contract law and its relationship to Big Data. In the following subsection, specific contractual    recommendations are discussed, particularly regarding how attorneys should evaluate potential and existing              contracts to assure that Big Data issues are appropriately addressed. Finally, a summary of the literature review encapsulates the information presented in the literature review.</p>
      <sec id="idm1842016140">
        <title>Definition of Big Data</title>
        <p>What is Big Data? According to Oracle Inc., Big Data is data that “contains greater variety, arriving in             increasing volumes and with more velocity” <xref ref-type="bibr" rid="ridm1843038908">2</xref>. This is also known as the three Vs of Big Data. In terms of volume, Big Data processes high volumes of low-density data that is essentially unstructuredv<xref ref-type="bibr" rid="ridm1843100396">3</xref>. The data may have an             unknown value, such as a Twitter data feed or                          clickstreams on a web page or a mobile app. For some                  organizations such as Google or Twitter, Big Data means tens of terabytes or petabytes of data. Velocity is the speed or rate at which data is received and processedv<xref ref-type="bibr" rid="ridm1843046908">4</xref>. In Big Data, intelligent products that gather the volumes of data typically operate and evaluate data in real-time or close to real-time. Finally, traditionally, data types were structured and fit conveniently into a relational database. However, with the advent of Big Data, unstructured or                             semi-structured data types such as text, audio, and video demand preprocessing to achieve meaningv<xref ref-type="bibr" rid="ridm1843110404">5</xref>. </p>
        <p>According to Mayer-Schönberger and Cukier, Big Data is a significant shift in how organizations collect, use, and think about data <xref ref-type="bibr" rid="ridm1843142660">6</xref>. The value of Big Data is that it can tease out hidden connections from seemingly unrelated data and thus has the potential of predicting future                  behavior, possibly violating individual privacy. The              authors outline some of the future risks, opportunities, and legal implications for a Big Data society. Marz            observed that Big Data has borne a new breed of                      technologies, including distributed filesystems, the MapReduce computation framework, and distributed    locking services pioneered by Google and Amazon <xref ref-type="bibr" rid="ridm1842891908">7</xref>.</p>
      </sec>
      <sec id="idm1842013332">
        <title>Relevant Federal and State Privacy Statutes</title>
        <p>Numerous federal laws affect cyber security and Big Data in one way or another. According to Johnson, the Economic Espionage Act (EEA) of 1996 <xref ref-type="bibr" rid="ridm1842889244">8</xref> became law on October 11, 1996 <xref ref-type="bibr" rid="ridm1842888740">9</xref><xref ref-type="bibr" rid="ridm1842894572">10</xref>. The law deals with industrial             espionage, also known as the knowing misappropriation and subsequent acquisition of trade secrets, where the intent is to profit a foreign government<xref ref-type="bibr" rid="ridm1842877468">11</xref>. The Health Insurance Portability and Accountability Act (HIPAA) of 1996 is a significant cybersecurity law. HIPAA generated national standards to protect sensitive patient health            information from being exposed without a patient’s                consent <xref ref-type="bibr" rid="ridm1842876820">12</xref>. The HIPAA Privacy Rule deals with disclosing protected health information regarding individuals by organizations subject to the rule <xref ref-type="bibr" rid="ridm1842881932">13</xref>.</p>
        <p>The Gramm-Leach-Bliley Act (GLBA) of 1999 <xref ref-type="bibr" rid="ridm1842881500">14</xref> is another primary cybersecurity law currently in place. It is also known as the Financial Modernization Act (FMA) of 1999 <xref ref-type="bibr" rid="ridm1842866804">15</xref> because it addresses how financial institutions control individual private information <xref ref-type="bibr" rid="ridm1842865652">16</xref>. The Federal Information Security Management / Modernization (FISMA) is the third primary cybersecurity law in the        United States. The FISMA Act of 2002 <xref ref-type="bibr" rid="ridm1842864428">17</xref> was included in the E-Government Act (EGA) of 2002 <xref ref-type="bibr" rid="ridm1842862412">18</xref><xref ref-type="bibr" rid="ridm1842860036">19</xref>.  FISMA of 2014 <xref ref-type="bibr" rid="ridm1842847268">20</xref>  amended FISMA of 2002 by reinforcing the            employment of continuous monitoring systems while            reducing the overall reporting requirements and focusing an agency on the compliance and reporting of breaches in security <xref ref-type="bibr" rid="ridm1842844676">21</xref>. FISMA of 2014 also required the Office of Management and Budget (O.M.B.) to revise O.M.B. Circular A-130, which promoted changes in reporting as                  technology progressed <xref ref-type="bibr" rid="ridm1842841940">22</xref><xref ref-type="bibr" rid="ridm1842840284">23</xref>. </p>
        <p>The Modernizing Government Technology Act (MGTA) of 2018 <xref ref-type="bibr" rid="ridm1842840068">24</xref> is vital to the National Defense           Authorization Act (NDAA) of 2017 <xref ref-type="bibr" rid="ridm1842836252">25</xref> that was passed on December 12, 2017 <xref ref-type="bibr" rid="ridm1842852236">26</xref>. The MGTA permitted federal agencies to invest in modern technology that improved the delivery of services to the public, ensuring the security of sensitive systems and data and thus saving taxpayer money <xref ref-type="bibr" rid="ridm1842848852">27</xref>. The Strengthening and Enhancing                      Cyber-capabilities by Utilizing Risk Exposure  Technology (SECURE IT) Act of 2019 <xref ref-type="bibr" rid="ridm1842813684">28</xref> demanded that the Secretary of Homeland Security to “generate a security vulnerability disclosure policy, to establish a bug bounty program for the Department of Homeland Security, to amend title 41, United States Code, to provide for Federal acquisition       supply chain security, and for other purposes <xref ref-type="bibr" rid="ridm1842811092">29</xref>.” On February 24, 2021, President Biden issued Executive            Order 14,017 entitled, <italic>Executive Order on America’s Supply Chains <xref ref-type="bibr" rid="ridm1842810804">30</xref></italic>. </p>
      </sec>
      <sec id="idm1842012396">
        <title>Executive Order 14,017 Stated that the</title>
        <p>“United States needs resilient, diverse, and secure supply chains to ensure our economic prosperity and            national security.  Pandemics and other biological threats, cyber-attacks, climate shocks and extreme weather events, terrorist attacks, geopolitical and economic competition, and other conditions can reduce critical manufacturing capacity and the availability and integrity of critical goods, products, and services.  Resilient American supply chains will revitalize and rebuild domestic manufacturing                capacity, maintain America’s competitive edge in research and development, and create well-paying jobs <xref ref-type="bibr" rid="ridm1842808212">31</xref>.”</p>
        <p>Executive Order 14,017 was an administrative policy that synchronized the various Cabinet departments’ supply chain security activities from a cybersecurity            perspective<xref ref-type="bibr" rid="ridm1842807780">32</xref>.</p>
        <p>The first standard is the European Union’s (EU) General Data Protection Regulation (GDPR) <xref ref-type="bibr" rid="ridm1842805188">33</xref>. The GDPR is a set of legal guidelines that address collecting and processing personal information regarding                  individuals who live and reside in the EU <xref ref-type="bibr" rid="ridm1842803820">34</xref>.  The GDPR applies regardless of where a website is located <xref ref-type="bibr" rid="ridm1842817644">35</xref>.  Any site accessed by a European citizen must obey the                 regulation, irrespective of whether an organization        markets goods or services to EU residents <xref ref-type="bibr" rid="ridm1842793508">36</xref>.  The GDPR applies to organizations that do business in the EU.</p>
        <p>The second statute is the California Consumer Privacy Act (CCPA) <xref ref-type="bibr" rid="ridm1842792140">37</xref>. The CCPA became law on June 28, 2018, when former California Governor Jerry Brown signed SB-375 <xref ref-type="bibr" rid="ridm1842791060">38</xref>. The first amendments to the CCPA were passed on August 31, 2018, whereby the CCPA             became effective on January 1, 2020 <xref ref-type="bibr" rid="ridm1842789044">39</xref>. The purpose of the CCPA was to safeguard the personal information of California consumers independent of what economic         sector the data originated <xref ref-type="bibr" rid="ridm1842785084">40</xref>. In the November 2020 election, California passed Proposition 24, or the               California Privacy Rights Act (CPRA) <xref ref-type="bibr" rid="ridm1842784580">41</xref>, by 56                   percent <xref ref-type="bibr" rid="ridm1842780908">42</xref>. With the CPRA becoming law, California            citizens now possess the right to correct inaccurate               information, the right to ensure that their collected                personal information be subordinate to data minimization and purpose limitations, and the right to receive a notice from businesses that are planning on employing sensitive personal information, along with the right to prevent an organization from using that information <xref ref-type="bibr" rid="ridm1842779612">43</xref>. The CPRA expanded the right to access information regardless of when it was collected unless it is impossible or                  impracticable, the right to opt-out of sharing information with third parties no matter if an individual is a buyer or a seller, and the right to sue a business when the                     organization exposes user names and passwords <xref ref-type="bibr" rid="ridm1842779036">44</xref>. The CPRA will take effect on January 1, 2023 <xref ref-type="bibr" rid="ridm1842744748">45</xref>. </p>
        <p>A third statute is the Virginia Consumer Data           Protection Act (VCDPA)<xref ref-type="bibr" rid="ridm1842741148">46</xref> which, on March 2, 2021,  Governor Ralph Northam signed into law <xref ref-type="bibr" rid="ridm1842739636">47</xref>. The fourth statute is Colorado’s Privacy Act (CPA) <xref ref-type="bibr" rid="ridm1842737116">48</xref> which became law on July 8, 2021 <xref ref-type="bibr" rid="ridm1842737332">49</xref>. Nevada <xref ref-type="bibr" rid="ridm1842752020">50</xref> and Maine <xref ref-type="bibr" rid="ridm1842749284">51</xref> have also passed privacy laws, but these laws are not nearly as comprehensive as the privacy laws in California, Virginia, and Colorado <xref ref-type="bibr" rid="ridm1842747556">52</xref>.</p>
        <p>Various court cases deal with cybersecurity and Big Data, including <italic>In the Matter of TaxSlayer</italic>, <italic>L.L.C<xref ref-type="bibr" rid="ridm1842726676">53</xref>.</italic>, <italic>In the Matter of </italic><italic>Everalbum</italic><italic> Corp <xref ref-type="bibr" rid="ridm1842724588">54</xref>.</italic>, and the SolarWinds Corp<xref ref-type="bibr" rid="ridm1842722860">55</xref>. breach. The first two cases were brought to           federal district courts by the Federal Trade Commission (FTC). According to the FTC complaint, TaxSlayer was a financial institution subject to Section 509(3)(A) of the GLBA,  15 U.S.C. § 6809(3)(A) because it provided tax planning and tax preparation services<xref ref-type="bibr" rid="ridm1842718684">56</xref>. The company collected non-public personal information as defined by 16 C.F.R. § 313.3(n) and 12 C.F.R. § 1015.3(p)(1)-(3) <xref ref-type="bibr" rid="ridm1842716596">57</xref>. Because of these two reasons, TaxSlayer was subject to the GLBA Privacy Rule, and the GLBA Safeguards Rule.</p>
        <p>According to the FTC, Everalbum violated Section 5(a) of the Federal Trade Commission Act, or 15 U.S.C. § 45, which states that “unfair methods of competition in or affecting commerce, and unfair or deceptive acts or practices in or affecting commerce, were declared        unlawful <xref ref-type="bibr" rid="ridm1842714940">58</xref><xref ref-type="bibr" rid="ridm1842714508">59</xref>.” Finally, the SolarWinds attack was a supply chain attack where an adversary inserted              malicious code into the company’s software                       application <xref ref-type="bibr" rid="ridm1842710908">60</xref>. The attack was compromised of Trojan horses <xref ref-type="bibr" rid="ridm1842709684">61</xref>, where the placement of a pregnant piece of code permitted hackers to infect hundreds, if not                   thousands, of computers as SolarWinds provided its wares to its customers <xref ref-type="bibr" rid="ridm1842708028">62</xref>. The two FTC settlement agreements and the information gleaned from the SolarWinds breach could be used to create reasonable cybersecurity and Big Data protection standards.</p>
      </sec>
      <sec id="idm1841987780">
        <title>Other Issues with Big Data</title>
        <p>Currently, Big Data evangelists are singing the hymns of Big Data, claiming that Big Data will help society make better decisions, conserve precious resources, trace and cure a host of diseases, and ensure that human life is safe, efficient, and possibly even effective <xref ref-type="bibr" rid="ridm1842706588">63</xref>. It is                undeniable that Big Data can yield substantial future             benefits. Big Data is an extraordinary knowledge                 revolution, yet to be fair and cautious, it is essential to take a step backward and critically examine Big Data                     independent of the persuasive rhetoric that could be drowning out a more balanced understanding.</p>
        <p>According to Richards and King, Big Data suffers from three paradoxes – the transparency paradox, the identity paradox, and the power paradox <xref ref-type="bibr" rid="ridm1842704212">64</xref>. The        transparency paradox is that Big Data promises to ensure that society is more transparent, yet the collection of              massive amounts of data is invisible, where the tools and techniques to collect this mammoth amount of data are opaque, clothed in mystery by layers of physical, legal, and technical privacy seemingly by design. The paradox is that while virtually guaranteeing an insurrection in                      transparency, Big Data is conducted in a shroud of                  secrecy <xref ref-type="bibr" rid="ridm1842733372">65</xref>. Although there are legitimate arguments for protecting this clandestine behavior, one cannot help but inquire whether Toto can still pull back the curtain,            revealing the Wizard of Oz.</p>
        <p>The second paradox discussed by Richards and King is the identity paradox. The identity paradox is                 essentially a contradiction, where Big Data desires to            <italic>identify</italic> yet menaces <italic>identity</italic>. The right to privacy heralds from Warren and Brandeis, who boldly proclaimed over 130 years ago that privacy is the “right to be let alone <xref ref-type="bibr" rid="ridm1842732508">66</xref>.”  The right of identity – to be who one wants to be and to do what one desires to do – is born out of the right of free choice. The issue is that the feedback loops hand-crafted by Google and other Big Data organizations will more than likely steer an individual in the entity’s                   direction, thereby not so subtly violating one’s free will. Richards and King imagined that because of the identity paradox, the dystopian outlook depicted in the motion picture <italic>Gattaca <xref ref-type="bibr" rid="ridm1842728260">67</xref></italic> may very well be a glimpse into the future <xref ref-type="bibr" rid="ridm1842727900">68</xref>. As expressed by Aldous Huxley when Mike Wallace interviewed him, the erosion of one’s freedom may be a Big Data consequence <xref ref-type="bibr" rid="ridm1842674932">69</xref>. </p>
        <p>The third paradox is the power paradox, where Big Data sensors are predominately controlled by                    influential intermediary persons and institutions,                    and where the benefits of Big Data flow to the individuals and entities that weld the magic wand of power <xref ref-type="bibr" rid="ridm1842673132">70</xref>. The effect of the power paradox is to create patrician winners and plebian losers in society. By not understanding the applicable legal and technical limits, individuals may                  surrender to a life of silent desperation while                                governments and corporations do what they want to be the default. According to Richards and King, a precarious state of affairs is the result. Thus, if privacy, transparency, autonomy, and identity are protected by law, the             consequences are manifold and negative, particularly when considering the advertising and marketing of Big Data.</p>
        <p>Finally, according to Leman, some individuals under Big Data may be excluded from its benefits <xref ref-type="bibr" rid="ridm1842670252">71</xref>. In examining the effects of Big Data, Leman posits two                      people. The first is a thirty-year-old white-collar resident of Manhattan who enjoys all of the benefits of a                        technological world, including a smartphone, Google Gmail, Netflix, Spotify, and Amazon. This individual                     employs the default settings on Facebook to maintain close contact with friends. This individual tweets and posts photographs on Flickr and Instagram and has debit and credit cards. The person obtains customer rewards from grocery shopping, and a global positioning system (GPS) rests on the automobile’s dashboard. On its face, this individual is reaping the rewards of a technological society <xref ref-type="bibr" rid="ridm1842665356">72</xref>.</p>
        <p>In contrast, another individual lives in Camden, New Jersey, one of America’s poorest cities. This person is underemployed while working part-time at a restaurant and being paid in cash. This individual survives in what is known as the underground economy. The person travels infrequently, does not have a passport, uses the Internet only at the local library, and pays cash when traveling by bus. Essentially, the lives of these two people are                       diametrically opposed to each other <xref ref-type="bibr" rid="ridm1842666724">73</xref>. </p>
        <p>The contrast is stark. Big Data caters to the                     Manhattan resident and completely ignores the Camden resident as if that person did not exist. The Camden                     resident is alienated from society, and it is not                         unreasonable to suggest that this individual may feel a level of hostility towards the haves of the world so that they are capable of anything. Celente eloquently stated when he observed that when a person has lost everything and has nothing left to lose, they lose it <xref ref-type="bibr" rid="ridm1842664708">74</xref>. This is the Camden resident, a potential revolutionary.</p>
      </sec>
      <sec id="idm1841984972">
        <title>Surveillance and Privacy Matters Surrounding Big Data</title>
        <p>Now, suppose that the essay focuses on the                    Manhattan resident as described in the previous                        subsection. As was previously posited, this individual has all of the benefits of Big Data. That person’s activities and whereabouts are being scooped up with every click of a mouse and every step taken in their technological world. According to Zuboff, this individual is a seemingly willing participant in surveillance capitalism, where the                       architecture of Big Data shifts the focus from Big Brother to Big Other <xref ref-type="bibr" rid="ridm1842662260">75</xref>. The crux of the Big Data paradigm is that as Big Data dutifully caters to a person’s every whim and desire, the individual never becomes aware that their                freedom to choose is ever so gradually being eroded.                     Zuboff discerned that with negligible resistance from law or society, the controlled hive of being connected assures a drone-like dependency by individuals while at the same time virtually guaranteeing maximum profits at the cost of democracy and freedom <xref ref-type="bibr" rid="ridm1842659956">76</xref>.</p>
        <p>In 2013, Snowden stunned the globe when he              revealed that the American intelligence establishment was secretly collecting, storing, using, and disseminating every single phone call, text message, and email <xref ref-type="bibr" rid="ridm1842657940">77</xref>. The result was that the federal government was shown to be the                 800-pound Big Data gorilla in the room with the technical ability to peer into the lives of every person on the planet. Whether one agrees or disagrees with Snowden’s                      disclosures, the fact that he demonstrated the level of                detailed data that can be collected, stored, used, and                  disseminated shows not only the benefits of Big Data but also the costs to individual privacy.</p>
      </sec>
      <sec id="idm1841984108">
        <title>Advertising and Marketing of Big Data</title>
        <p>Advertising and marketing are essential to                   assuring the continued success of a business. According to Berkowitz et al., marketing is “the process of planning and executing the conception, pricing, promotion, and                       distribution of idea, goods, and services to create                       exchanges that satisfy individual and organizational                    objectives <xref ref-type="bibr" rid="ridm1842654556">78</xref>.” Marketing is not the same thing as                  advertising or personal selling because it is a far broader activity. In contrast, Skinner defined advertising to be a “paid form of communication about an organization, its products, or its activities that is transmitted through a mass medium to a target audience.” Advertising provides marketeers, individuals engaged in marketing, the                       flexibility to communicate with a vast target audience <xref ref-type="bibr" rid="ridm1842651820">79</xref> or concentrate on a small, precisely defined population segment. Advertising is a cost-effective promotional way because it can influence many people with a low cost per individual <xref ref-type="bibr" rid="ridm1842650668">80</xref>.</p>
        <p> In many ways, marketing is a mechanism for achieving a competitive advantage <xref ref-type="bibr" rid="ridm1842680764">81</xref>. With Big Data and other forms of e-commerce, the media of communication between a buyer and a seller is the Internet. Big Data not only collects substantial amounts of information about specific individuals, but it also gathers data about billions of people who detrimentally rely on the Internet at any time for their livelihood <xref ref-type="bibr" rid="ridm1842678172">82</xref>. Thus, Big Data is an                        increasingly complex form of e-commerce, where                               e-commerce, or electronic commerce, is “the use of the Internet and the Web to transact business<xref ref-type="bibr" rid="ridm1842635404">83</xref>.” In Big                          Data and e-commerce, the focus is on digitally-empowered transactions between individuals and organizations. The transaction is usually commercial, typically involving an exchange of money for specified products and services.                   e-Business is different from e-commerce in that e-business is primarily concerned with “the digital enabling of                       transactions and processes <italic>within</italic> a firm, involving                       information systems under the control of the firm <xref ref-type="bibr" rid="ridm1842633028">84</xref>.” In many instances, e-business does not involve commercial transactions where an exchange of value occurs. For                  example, a firm’s online inventory control mechanism is a form of e-business that does not generate revenue from outside customers. However, e-business supports                            e-commerce by providing the infrastructure where                        commercial transactions may happen <xref ref-type="bibr" rid="ridm1842632380">85</xref>.</p>
        <p>Many Big Data companies, such as Amazon, eBay, or Yahoo!, are Internet storefront organizations, where an e-commerce storefront is an online vehicle that “combines transaction processing, security, online payment, and                  information storage to enable merchants Big Data to sell their products online <xref ref-type="bibr" rid="ridm1842630580">86</xref>.” A significant problem facing Big Data is how to attract volumes of people to come to a firm’s website. This is a classic advertising and marketing issue because it is common knowledge that viewing an advertisement or a website does not guarantee that a                    person will accept the invitation to purchase Big Data’s goods and services.</p>
        <p>Traditionally, marketers employed loss-leaders to attract customers. According to Berkowitz et al., a                      loss-leader is a product or service sold below market price to encourage buyers to purchase other goods at market price <xref ref-type="bibr" rid="ridm1842627556">87</xref>. In a traditional business, loss-leaders are                    tangible products or services that a customer can                       experience at the transaction time. However, with Big          Data and e-commerce transactions, there is a delay                         between the time that the transaction takes place and the time that the customer receives the benefits of the                      transaction. This delay is frequently because the shipment of the product or delivery of the service may take a few days, or even a week or more. This delay precipitates the customer experiencing buyer remorse, where buyer                    remorse is a “feeling of regret (= a wish that one had not done something) after making a choice or decision <xref ref-type="bibr" rid="ridm1842624028">88</xref>.” The timing delay may also increase buyer turnover and decrease purchasing frequency, where buyer turnover is “how often new buyers enter the market to by the product (or service) <xref ref-type="bibr" rid="ridm1842622804">89</xref>” and where purchasing frequency is “the frequency of purchase of a specific product (or other                   products from the same vendor <xref ref-type="bibr" rid="ridm1842618916">90</xref>.”</p>
        <p>Thus, to decrease buyer remorse and increase purchasing frequency, Big Data and other e-commerce businesses devised an extreme loss-leader – give away something of value for free – with the assumption that customers will be less inclined to make purchases                               elsewhere if they feel that they owe the company                     something in exchange for the free good or service,                          thereby making the transaction, at least in the mind of a customer, a bargained-for exchange. For companies like Google or Yahoo!, this means giving customers free email<xref ref-type="bibr" rid="ridm1842617836">91</xref>. Although McDowell and Householder enumerated the benefits of free email are accessibility, competitive features, and additional capabilities <xref ref-type="bibr" rid="ridm1842618484">92</xref>, while its risks are security, privacy, and reliability, one issue that is                        conspicuous by its absence is who owns the emails that are sent and received by an individual.</p>
        <p>According to the majority opinion in <italic>Carpenter</italic>, a cell phone owner has a reasonable expectation of privacy regarding cell phone metadata <xref ref-type="bibr" rid="ridm1842613732">93</xref>. However, in this case, there were four separate dissents. The dissents by Justices Alito, Kennedy, and Thomas essentially argued that                        without property rights, there is no privacy <xref ref-type="bibr" rid="ridm1842612724">94</xref>. However, Justice Gorsuch took a completely different approach in his dissent. He argued that the cell phone providers are bailees and the cell phone owners are bailors <xref ref-type="bibr" rid="ridm1842609628">95</xref>. In                other words, Justice Gorsuch opined that the property rights to cell phone metadata belong to the cell phone owners and not the cell phone providers.</p>
        <p>Although not law, Justice Gorsuch’s dissent is             critical when deciding whether it should be legal for a firm that offers free email services (loss-leaders) to scan                     customer emails to discover relevant topics for                         advertisers. In some sense, emails are similar to cell phone metadata because customers probably have a reasonable expectation of privacy regarding their emails, but they may not have property rights. According to Lessig, the common law holds that privacy comes with property rights, consistent with the dissents of Justices Alito,                        Kennedy, and Thomas <xref ref-type="bibr" rid="ridm1842607324">96</xref>. </p>
        <p>Thus, the answer to the question is that it is                   currently legal for email providers to scan an individual’s email to find relevant topics for advertisers, provided that the email providers first obtain the consent of email                 customers. Even so, Justice Gorsuch’s argument has merit. At some future date, if the Supreme Court uses Justice         Gorsuch’s dissent as the basis for future privacy decisions, it may turn out that the scanning activities of email                    providers will become illegal. Time will tell.</p>
      </sec>
      <sec id="idm1841980868">
        <title>Contract Law and Big Data</title>
        <p>Contract law is a complex legal field, so only the essentials will be discussed in this essay. A contract is a promise that the law will enforce <xref ref-type="bibr" rid="ridm1842604444">97</xref>. It consists of an         offer, an acceptance, and consideration. An offer is an               objective communication that demonstrates the               willingness of the maker to enter into a bargain with                another party. An acceptance is an unequivocal assent to the terms and conditions of an offer. Finally, consideration is a valuable benefit that is bargained for between the         parties. The consideration can take the form of                         money, promises, or actions. Consideration can be a               bilateral exchange of benefits or unilateral action in                  exchange for a benefit<xref ref-type="bibr" rid="ridm1842569388">98</xref>. The specific definitions of offer, acceptance, and consideration depend on whether the common law or the Uniform Commercial Code is                          applicable.</p>
        <p>There are various defenses to forming a contract, including misrepresentation, mistake, and statute of frauds. Misrepresentation occurs when one party                          intentionally, negligently, or innocently misrepresents the facts of the situation while the other party relies on this misrepresentation. A mistake happens when one or both parties believe a basic false assumption regarding the facts of the contractual situation. The statute of frauds is a                   customary law that specifies the conditions of when a                 contract should be in writing, including real estate                   agreements, contracts that take more than a year to be performed, suretyship agreements, marriage agreements, and the sale of tangible goods valued over $500 <xref ref-type="bibr" rid="ridm1842570324">99</xref>.</p>
        <p>Under certain conditions, a contract can be                  modified by the parties or by the court. Conditions and the order of performance give meaning and effect to a                    contract. Conditions may specify when a promise is                  performed, either before or after the promise is executed. Parties may make warranties to the other party, where the warranty is either expressed or implied. A breach is a                repudiation of the terms and conditions of a contract and may occur before the other party performs <xref ref-type="bibr" rid="ridm1842568956">100</xref>. When a breach occurs, the remedies depend on the circumstances. The usual remedy is money damages, putting the                       non-breaching in a position as if the contract had been performed. This is known as expectation damages. Other remedies include restitution and reliance, where nominal damages are possible but not punitive damages. Damages can be general or special, where general damages typically measure the value lost because of the breach, while special damages are related to the effect of a breach on the other party <xref ref-type="bibr" rid="ridm1842565212">101</xref>.</p>
        <p>The details of contract law are complex, and it is beyond the scope of this essay to analyze its nuances. However, what can be said is that common sense guideline should be followed when engaging in contracts. According to Laurence, there are ten recommendations that parties should follow in making solid business agreements <xref ref-type="bibr" rid="ridm1842565068">102</xref>. They include:</p>
        <p>1. Make sure that the contract is in writing;</p>
        <p>2. Keep the agreement simple to understand;</p>
        <p>3. When agreeing, deal with the person who has the      authority to contract;</p>
        <p>4. Correctly identify each party in the contract;</p>
        <p>5. State specifically all of the details of the bargain;</p>
        <p>6. Stipulate the payment obligations for all parties;</p>
        <p>7. Agree on the circumstance where the contract may be terminated;</p>
        <p>8. Decide on a way or method to resolve disputes;</p>
        <p>9. Select the state law that will govern the contract; and</p>
        <p>10. Keep the contract confidential <xref ref-type="bibr" rid="ridm1842562980">103</xref>.</p>
        <p>These fundamental principles should be followed to ensure that a contract is performed successfully by all parties.  It is a roadmap to ensure that contractual issues are kept to a minimum. It is the hidden agenda that all            parties, including attorneys, should be cognizant of when making contracts.</p>
      </sec>
      <sec id="idm1841933796">
        <title>Specific Contractual Recommendations </title>
        <p>There are many legal issues that counsel should tackle when a cyber contract is negotiated <xref ref-type="bibr" rid="ridm1842560892">104</xref>. An                  organization should try to understand what occurs when an existing security solution fails. Probably the most                   important issue that needs to be reexamined is the vendor selection process, particularly which individual in a                  company selects a supplier, what criteria were used to choose that supplier, and if the supplier’s security process was considered during the selection process assuming that it existed. The company should perform an                independent risk analysis of a supplier’s security process, where counsel proactively advises the firm to pick                      vendors that comply with government and industry                     security regulations. In a Request for Proposal (RFP)                 process, an entity should get security commitments from its vendors during contract negotiations <xref ref-type="bibr" rid="ridm1842559668">105</xref>.</p>
        <p>Counsel should demand that proper security                 requirements be included in supplier contracts. Counsel should propose that existing contracts be evaluated and possibly renegotiated if possible. The SolarWinds attack showed that contractually obliging vendors to take                     appropriate precautions is insufficient<xref ref-type="bibr" rid="ridm1842556356">106</xref>. A firm should validate the security posture of a supplier using                        independent reviews and audits if feasible. Counsel should petition that audit rights be contained in contracts and the notification of a security breach <xref ref-type="bibr" rid="ridm1842554340">107</xref>.</p>
        <p>Counsel should warn their clients to remove their names from customer lists. This act alone will deter threat actors from capturing what suppliers a firm uses <xref ref-type="bibr" rid="ridm1842554556">108</xref>. Counsel should call attention to that all-in-one solutions may imply that threat actors can use a single point of entry in trying to gain control over a system. A well-managed and diversified set of information technology (IT) tools decreases the risk of unauthorized access<xref ref-type="bibr" rid="ridm1842552108">109</xref>.  It should be understood that users want faster, more integrated technology with more functionality because, in IT,                     performance is critical. High-performance solutions                   increase the complexity of multifaceted systems and thus make them more challenging to secure. Counsel should work together with an IT department to (1) analyze the risks affiliated with complex software tools, (2) promote cybersecurity training for all employees, and (3)                     demonstrate the adverse effects of a breach<xref ref-type="bibr" rid="ridm1842549084">110</xref>. </p>
        <p>The firm should appraise all user application              privileges to ensure that users possess the least required privileges to perform their job. Applications with                      administrative access can mechanically act as a proxy for a user, system, or application. This is how the SolarWinds hack occurred. Counsel should encourage and contribute to periodic privilege reviews <xref ref-type="bibr" rid="ridm1842549516">111</xref>.  Finally, counsel should confirm that an entity has sufficient policies and resources to respond to a breach rapidly. Counsel should be acquainted with breach-notification, privacy laws, and third-party incident response organizations <xref ref-type="bibr" rid="ridm1842547428">112</xref>. </p>
      </sec>
      <sec id="idm1841932356">
        <title>Summary of the Literature Review</title>
        <p>This literature review discussed the definition of Big Data and the relevant federal and state statutes                    regarding the privacy that seemingly applies to Big Data. Other issues highlighted in the literature review included the Big Data paradoxes of transparency, identity, and          power. An argument was made that, on its face, Big Data advocates transparency, identity, and power to the people, but the reality is just the opposite. Also, in this subsection, the essay observed that Big Data sings the melody of       inclusion, but the song’s words seem to indicate that                individuals without Internet access are excluded from the chorus. <xref ref-type="bibr" rid="ridm1842544620">113</xref>.</p>
        <p>In the fourth subsection of the literature review,                   surveillance and privacy matters were described. Zuboff wryly noticed that as Big Data gathers more and more       information about the personal preferences of its                       customers, the is a high likelihood that the personal                   choices will be dictated by Big Data and not decided                    independently by individuals. Furthermore, Snowden      aptly pointed out that the federal government is likely the first instance of a Big Data organization because it has a myriad amount of data on its citizens <xref ref-type="bibr" rid="ridm1842574860">114</xref>.</p>
        <p>Advertising and marketing were the following topics to be addressed in the literature review. The                  principles of advertising and marketing were explained. The question was asked whether it is legal for email                    providers to scan a person’s email to unearth relevant subjects for commercial use. It was pointed out that given the current state of privacy in the United States, it is likely a legal activity, but that consent may be needed to                       overcome a reasonable expectation of privacy. Finally, the essentials of contract law were highlighted, and specific contractual were discussed in some detail. The tenor of the argument presented was that an attorney should pay particular attention to the contextual details to ensure that their clients are adequately protected.</p>
      </sec>
      <sec id="idm1841938404">
        <title>Discussion of the Findings</title>
        <p>The finding of the essay is manifold. First and foremost, Big Data seems to be a manifestation of a                   paradigm shift in information processing. Data are no longer conveniently structured in a linear fashion. Rather, semi-structured or unstructured data are dominating the information technology landscape. Big Data organizations are gathering and processing data from individuals at a breakneck pace to protect its citizens (governments) or satisfy their customers (companies). The mantra of Big Data is apparently that this massive data collection is in everyone’s best interest. However, the paradoxes of                  transparency, identity, and power seem to point in a                    different direction. According to Richards and King <xref ref-type="bibr" rid="ridm1842573780">115</xref>, Big Data is not the benevolent King (pun intended)                      advocated by Hobbes centuries ago <xref ref-type="bibr" rid="ridm1842527348">116</xref>. In 1651, when this classic work was published, two short years had passed from 1649 when Charles I, then King of England, was beheaded for treason, and Oliver Cromwell ran the island nation for nearly ten years <xref ref-type="bibr" rid="ridm1842525908">117</xref>. It was apparent from the literature review that power is being                        systematically concentrated in Big Data as more and more information about billions of people is collected, stored, used, and disseminated. There is a comparison between Big Data and a benevolent Hobbesian King who rules by divine right <xref ref-type="bibr" rid="ridm1842523172">118</xref>. If history is repeated and usually does, then Big Data is in for a revolutionary surprise. If there is a comparison to be made, in the future, individuals may         rebel against the intrusiveness of Big Data into their lives. Although it should be remembered that approximately ten after the beheading of Charles I, Cromwell died, and Charles II returned from exile to be crowned King of                    England, Ireland, and Scotland <xref ref-type="bibr" rid="ridm1842521156">119</xref>. After Charles II died in 1685, scarcely a hundred years later, the American                  Revolution occurred, where the reason for the revolt was to defeat the tyranny of the Crown. Suppose Big Data                 follows this historical pattern in its search for freedom and autonomy from domination. In that case, the people may carve out yet another technology, a technology where freedom, transparency, and identity are cherished and upheld by law and as a positive technological outcome, and where power is truly in the hands of the people and not the mysterious Wizard King of Big Data.</p>
      </sec>
      <sec id="idm1841938260">
        <title>Recommendations and Conclusion</title>
        <p>The recommendations and conclusion of this                  essay are directed towards a single goal. Even though Big Data is now all the rage, Big Data should be dedicated to the propositions of transparency, identity, power to the people, and the inclusion of everyone, so that the benefits of Big Data are spread across the spectrum of individuals in the world. The threat of tyrannical Big Data is accurate, where the accumulation of information about the many may bring untold power that is held by the few. As                    Richards and King<xref ref-type="bibr" rid="ridm1842517124">120</xref>, and Leman<xref ref-type="bibr" rid="ridm1842514820">121</xref>, have eloquently observed, Big Data could potentially become the                         mechanistic master of humanity. Such a fate is anathema to the human psyche and soul. Hopefully, Richards, King, and Leman are wrong, but even so, time, as always, will be the final judge.</p>
      </sec>
    </sec>
    <sec id="idm1841938476">
      <title>Miscellaneous Considerations</title>
      <sec id="idm1841938332">
        <title>Author Contributions</title>
        <p>The author has read and agreed to the published version of the manuscript.</p>
      </sec>
      <sec id="idm1841939340">
        <title>Funding</title>
        <p>This research received no external funding.</p>
      </sec>
      <sec id="idm1841935668">
        <title>Institutional Review Board Statement </title>
        <p>Not applicable.</p>
      </sec>
      <sec id="idm1841936172">
        <title>Informed Consent Statement</title>
        <p>Not applicable.</p>
      </sec>
      <sec id="idm1841935308">
        <title>Acknowledgments</title>
        <p>Not applicable.</p>
      </sec>
      <sec id="idm1841934876">
        <title>Abbreviations</title>
        <p>The following abbreviations are used in this          manuscript</p>
        <p>CCPA-   California Consumer Privacy Act of 2018</p>
        <p>CPA-   Colorado Privacy Act of 2021</p>
        <p>CPRA-   California Privacy Rights Act of 2020</p>
        <p>EEA-   Economic Espionage Act of 1996</p>
        <p>EGA-   E-Government Act of 2002</p>
        <p>EU-   European Union</p>
        <p>FISMA of 2002-   Federal Information Security                          Management Act of 2002</p>
        <p>FISMA of 2014-   Federal Information Security                          Modernization Act of 2014</p>
        <p>FMA-   Financial Modernization Act of 1999</p>
        <p>FTC-    Federal Trade Commission</p>
        <p>FTC Act-   Federal Trade Commission  Act of 1914</p>
        <p>GDPR-   General Data Protection Regulation</p>
        <p>GLBA-   Gramm-Leach-Bliley Act of 1999</p>
        <p>GPS-   Global Positioning System</p>
        <p>HIPAA-   Health Insurance Portability and Accountability Act of 1996</p>
        <p>IT-   Information Technology</p>
        <p>MGTA-   Modernizing Government Technology Act of 2018</p>
        <p>NDAA-   National Defense Authorization Act  of 2017</p>
        <p>OMB-   Office of Management and Budget</p>
        <p>RFP-   Request for Proposal</p>
        <p>SECURE IT-   Strengthening and Enhancing                        Cyber-capabilities by Utilizing Risk Exposure  Technology Act of 2019</p>
        <p>VCDPA-   Virginia Consumer Data Protection Act of 2021</p>
      </sec>
    </sec>
    <sec id="idm1841897596">
      <title>Highlights</title>
      <p>1. Big Data is defined and described.</p>
      <p>2. The relevant federal and state privacy laws are                    outlined, including the California Consumer Privacy Act as amended, the Virginia Consumer Data                         Protection Act, and the Colorado Privacy Act.</p>
      <p>3. Several Federal Trade Commission privacy violation cases are highlighted.</p>
      <p>4. The effects of Big Data collection and government                surveillance are described.</p>
      <p>5. Advertising and marketing are defined, where it is argued that while the scanning of emails by email                      providers may be legal, it should be accomplished with consent or not at all.</p>
      <p>6. The essentials of contract law and specific contract negotiation techniques are outlined for the benefit of attorneys.</p>
      <p>7.  Finally, it is argued that although Big Data is the wave of the future, like all human institutions, it has in its definition the inherent paradoxes of transparency, identity, power, and exclusion that may potentially spell its undoing.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ridm1843032356">
        <label>1.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Toffler</surname>
            <given-names>Alvin</given-names>
          </name>
          <article-title>The Third Wave William Morrow andCompany Inc</article-title>
          <date>
            <year>1980</year>
          </date>
        </mixed-citation>
      </ref>
      <ref id="ridm1843038908">
        <label>2.</label>
        <mixed-citation xlink:type="simple" publication-type="journal"><name><surname>Staff</surname><given-names>Oracle</given-names></name><article-title>What is Big Data?, Oracle Inc</article-title>
(n.d.), available at https://www.oracle.com/big-data/ what-is-big-data/



</mixed-citation>
      </ref>
      <ref id="ridm1843100396">
        <label>3.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1843046908">
        <label>4.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1843110404">
        <label>5.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1843142660">
        <label>6.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <article-title>Viktor Mayer-Schönberger and Kenneth Cukier, Big Data: A Revolution That Will Transform How We Live, Work and Think</article-title>
          <date>
            <year>2014</year>
          </date>
          <publisher-name>(Mariner Books)</publisher-name>
        </mixed-citation>
      </ref>
      <ref id="ridm1842891908">
        <label>7.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Marz</surname>
            <given-names>Nathan</given-names>
          </name>
          <article-title>Big Data: Principles and Best Practices of Scalable Real-Time Data Systems (Manning Publications</article-title>
          <date>
            <year>2015</year>
          </date>
        </mixed-citation>
      </ref>
      <ref id="ridm1842889244">
        <label>8.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <article-title>Economic Espionage Act of 1996, 18 U.S.C. §§ 1831-1839, available at https://www.congress.gov/104/plaws/publ294/PLAW-104publ294.pdf</article-title>
        </mixed-citation>
      </ref>
      <ref id="ridm1842888740">
        <label>9.</label>
        <mixed-citation xlink:type="simple" publication-type="journal"><article-title>Health Insurance Portability and Accountability Act of</article-title><date><year>1996</year></date>
Public Law 104-191, available at https://www.govinfo.gov/content/pkg/PLAW-104publ191/pdf/PLAW-104publ191.pdf



</mixed-citation>
      </ref>
      <ref id="ridm1842894572">
        <label>10.</label>
        <mixed-citation xlink:type="simple" publication-type="book">
          <date>
            <year>2020</year>
          </date>
          <chapter-title>Leighton Johnson in Security Controls Evaluation, Testing, and Assessment Handbook (Academic Press 2nd ed)</chapter-title>
        </mixed-citation>
      </ref>
      <ref id="ridm1842877468">
        <label>11.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1842876820">
        <label>12.</label>
        <mixed-citation xlink:type="simple" publication-type="book"><name><surname>Staff</surname><given-names>CDC</given-names></name><article-title>Health Insurance Portability and Accountability Act of</article-title><date><year>1996</year></date><chapter-title>(HIPAA), Centers for Disease Control and Prevention (Last reviewed</chapter-title>
available at https://www.cdc.gov/phlp/publications/topic/hipaa.html



</mixed-citation>
      </ref>
      <ref id="ridm1842881932">
        <label>13.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1842881500">
        <label>14.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <article-title>Gramm-Leach-Bliley Act of 1999, Public Law 106-102, available at https://www.govinfo.gov/content/pkg/PLAW-106publ102/html/PLAW-106publ102.htm</article-title>
        </mixed-citation>
      </ref>
      <ref id="ridm1842866804">
        <label>15.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <article-title>Financial Modernization Act of 1999, Public Law 106-102, available at https://www.govinfo.gov/content/pkg/PLAW-106publ102/html/PLAW-106publ102.htm</article-title>
        </mixed-citation>
      </ref>
      <ref id="ridm1842865652">
        <label>16.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Kranz</surname>
            <given-names>Gary</given-names>
          </name>
          <article-title>Gramm-Leach-Bliley Act (GLBA), TechTarget available at https://searchcio.techtarget.com/definition/Gramm-Leach -Bliley-Act</article-title>
          <date>
            <year>2021</year>
          </date>
        </mixed-citation>
      </ref>
      <ref id="ridm1842864428">
        <label>17.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <article-title>Federal Information Security Management Act of 2002, Public Law 107-347, available at https://www.congress.gov/107/plaws/publ347/ PLAW-107publ347.pdf</article-title>
        </mixed-citation>
      </ref>
      <ref id="ridm1842862412">
        <label>18.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <article-title>E-Government Act of 2002, Public Law 107-347, available at https://www.congress.gov/107/plaws/publ347/PLAW-107publ347.pdf</article-title>
        </mixed-citation>
      </ref>
      <ref id="ridm1842860036">
        <label>19.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>NIST</surname>
            <given-names>Staff</given-names>
          </name>
          <article-title>Federal Information Security Modernization Act (FISMA) Background, National Institute of Standards and Technology, available at https://csrc.nist.gov/projects/risk-management/fisma-background</article-title>
          <date>
            <year>2021</year>
          </date>
        </mixed-citation>
      </ref>
      <ref id="ridm1842847268">
        <label>20.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <article-title>Federal Information Security Modernization Act of 2014, Public Law 113-283, available at https://www.congress.gov/113/plaws/publ283/PLAW-113publ283.pdf</article-title>
        </mixed-citation>
      </ref>
      <ref id="ridm1842844676">
        <label>21.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1842841940">
        <label>22.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1842840284">
        <label>23.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <article-title>Office of Management and Budget, Circular A-130, available at https://www.cio.gov/policies-and-priorities/circular-a-130/</article-title>
        </mixed-citation>
      </ref>
      <ref id="ridm1842840068">
        <label>24.</label>
        <mixed-citation xlink:type="simple" publication-type="journal"><date><year>2018</year></date><institution>Modernizing Government Technology Act of</institution>
H.R. 2227, available at https://www.congress.gov/bill/115th-congress/house-bill/2227



</mixed-citation>
      </ref>
      <ref id="ridm1842836252">
        <label>25.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <article-title>Authorization Act of 2017, Public Law 114-328, available at https://www.govinfo.gov/content/pkg/PLAW-114publ328/html/PLAW-114publ328.htm</article-title>
          <institution>National Defense</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1842852236">
        <label>26.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Mulvaney</surname>
            <given-names>Mick</given-names>
          </name>
          <article-title>Implementation of the Modernizing Government Technology Act</article-title>
          <date>
            <year>2018</year>
          </date>
          <source>Office of Management and Budget</source>
        </mixed-citation>
      </ref>
      <ref id="ridm1842848852">
        <label>27.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1842813684">
        <label>28.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <article-title>Strengthening and Enhancing Cyber-capabilities by Utilizing Risk Exposure Technology Act of 2019</article-title>
          <date>
            <year>2019</year>
          </date>
          <fpage>115</fpage>
          <lpage>390</lpage>
          <publisher-loc>Public Law</publisher-loc>
        </mixed-citation>
      </ref>
      <ref id="ridm1842811092">
        <label>29.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <article-title>H.R.7327 - Strengthening and Enhancing Cyber-capabilities by Utilizing Risk Exposure Technology Act, Congress.gov, available at https://www.congress.gov/115/plaws/publ390/PLAW-115publ390.pdf</article-title>
          <date>
            <year>2018</year>
          </date>
        </mixed-citation>
      </ref>
      <ref id="ridm1842810804">
        <label>30.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Biden</surname>
            <given-names>Joseph</given-names>
          </name>
          <article-title>Executive Order on America’s Supply Chains, The White House, available at https://www.whitehouse.gov/briefing-room/presidential-actions/2021/02/24/executive-order-on-americas-supply-chains/</article-title>
          <date>
            <year>2021</year>
          </date>
        </mixed-citation>
      </ref>
      <ref id="ridm1842808212">
        <label>31.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1842807780">
        <label>32.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1842805188">
        <label>33.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <article-title>General Data Protection Regulation</article-title>
          <date>
            <year>2016</year>
          </date>
          <volume>119</volume>
          <fpage>1</fpage>
          <lpage>88</lpage>
        </mixed-citation>
      </ref>
      <ref id="ridm1842803820">
        <label>34.</label>
        <mixed-citation xlink:type="simple" publication-type="book">
          <article-title>Jake Frankenfield revised by Amy Drury, General Data Protection Regulation (GDPR)</article-title>
          <date>
            <year>2020</year>
          </date>
          <chapter-title>11, https://www.investopedia.com/terms/g/general-data-protection-regulation-gdpr.asp; See also IT Governance Privacy Team, EU General Data Protection Regulation (GDPR): An Implementation and Compliance Guide 11</chapter-title>
          <fpage>11</fpage>
          <publisher-loc>Investopedia</publisher-loc>
        </mixed-citation>
      </ref>
      <ref id="ridm1842817644">
        <label>35.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1842793508">
        <label>36.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1842792140">
        <label>37.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <article-title>California Consumer Privacy Act of 2018, SB-375, available at https://leginfo.legislature.ca.gov/faces/billTextClient.xhtml?bill_id=201720180AB375</article-title>
        </mixed-citation>
      </ref>
      <ref id="ridm1842791060">
        <label>38.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Donald</surname>
            <given-names>L Buresh</given-names>
          </name>
          <article-title>A Comparison between the European and American Approaches to Privacy, 6</article-title>
          <date>
            <year>2019</year>
          </date>
          <source>Indonesian J. of Int. and Comp</source>
          <fpage>253</fpage>
        </mixed-citation>
      </ref>
      <ref id="ridm1842789044">
        <label>39.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1842785084">
        <label>40.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1842784580">
        <label>41.</label>
        <mixed-citation xlink:type="simple" publication-type="journal"><article-title>California Privacy Rights Act of</article-title><date><year>2020</year></date>
Prop. 24, available at https://vig.cdn.sos.ca.gov/2020/general/pdf/topl-prop24.pdf



</mixed-citation>
      </ref>
      <ref id="ridm1842780908">
        <label>42.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <article-title>California Privacy Rights Act: An Overview, Privacy Rights Clearinghouse</article-title>
          <date>
            <year>2020</year>
          </date>
        </mixed-citation>
      </ref>
      <ref id="ridm1842779612">
        <label>43.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1842779036">
        <label>44.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1842744748">
        <label>45.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1842741148">
        <label>46.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Virginia</surname>
            <given-names/>
          </name>
          <article-title>Consumer Data Protection Act of 2021, SB1392, available at https://legiscan.com/VA/text/SB1392/id/2328317</article-title>
        </mixed-citation>
      </ref>
      <ref id="ridm1842739636">
        <label>47.</label>
        <mixed-citation xlink:type="simple" publication-type="book">
          <name>
            <surname>Rippy</surname>
            <given-names>Sarah</given-names>
          </name>
          <date>
            <year>2021</year>
          </date>
          <chapter-title>Virginia Passes the Consumer Data Protection Act, Int’l. ass’n. of Priv. Profhttps://iapp.org/news/a/virginia-passes-the-consumer-data-protection-act/</chapter-title>
        </mixed-citation>
      </ref>
      <ref id="ridm1842737116">
        <label>48.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <article-title>Colorado Privacy Act of 2021, SB21-190, available at https://leg.colorado.gov/sites/default/files/documents/2021A/bills/2021a_190_enr.pdf</article-title>
        </mixed-citation>
      </ref>
      <ref id="ridm1842737332">
        <label>49.</label>
        <mixed-citation xlink:type="simple" publication-type="journal"><name><surname>Rippy</surname><given-names>Sarah</given-names></name><article-title>Colorado Privacy Act Becomes Law, The Privacy Adviser</article-title><date><year>2021</year></date>
https://iapp.org/news/a/colorado-privacy-act-becomes-law/



</mixed-citation>
      </ref>
      <ref id="ridm1842752020">
        <label>50.</label>
        <mixed-citation xlink:type="simple" publication-type="book"><name><surname>Nevada</surname><given-names>Privacy Law</given-names></name><chapter-title>NRS 603A.300 – 603A.360</chapter-title>
as amended by SB 220, available at https://www.leg.state.nv.us/nrs/nrs-603a.html



</mixed-citation>
      </ref>
      <ref id="ridm1842749284">
        <label>51.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <article-title>An Act To Protect the Privacy of Online Customer Information, LD 946, available at https://www.mainelegislature.org/legis/bills/bills_129th/billtexts/SP027501.asp</article-title>
        </mixed-citation>
      </ref>
      <ref id="ridm1842747556">
        <label>52.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Donald</surname>
            <given-names>L Buresh</given-names>
          </name>
          <article-title>Should Personal Information and Biometric Data Be Protected under a Comprehensive Federal Privacy Statute that Uses the California Consumer Privacy Act and the Illinois Biometric Information Privacy Act as Model Laws?, 38 Santa Clara High Tech</article-title>
          <date>
            <year>2021</year>
          </date>
          <source>L. J</source>
          <volume>1</volume>
          <fpage>39</fpage>
          <lpage>93</lpage>
        </mixed-citation>
      </ref>
      <ref id="ridm1842726676">
        <label>53.</label>
        <mixed-citation xlink:type="simple" publication-type="book"><chapter-title>In the Matter of TaxSlayer, LLC, FTC Matter/File No</chapter-title><volume>162</volume>
063, available at https://www.ftc.gov/enforcement/cases-proceedings/162-3063/taxslayer



</mixed-citation>
      </ref>
      <ref id="ridm1842724588">
        <label>54.</label>
        <mixed-citation xlink:type="simple" publication-type="book">
          <chapter-title>In the Matter of Everalbum Corp., FTC Matter/File No. 192 3172, available at</chapter-title>
          <fpage>192</fpage>
          <lpage>3172</lpage>
        </mixed-citation>
      </ref>
      <ref id="ridm1842722860">
        <label>55.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Jibilian</surname>
            <given-names>Isabella</given-names>
          </name>
          <name>
            <surname>Canales</surname>
            <given-names>Katie</given-names>
          </name>
          <article-title>The US Is Readying Sanctions Against Russia Over the SolarWinds Cyber Attack. Here&amp;apos;s a Simple Explanation of How the Massive Hack Happened and Why It&amp;apos;s Such a Big Deal, Business Insider</article-title>
          <date>
            <year>2021</year>
          </date>
        </mixed-citation>
      </ref>
      <ref id="ridm1842718684">
        <label>56.</label>
        <mixed-citation xlink:type="simple" publication-type="book"><chapter-title>In the Matter of TaxSlayer, LLC, Complaint Docket No. C-2646</chapter-title>
(n.d.), available at https://www.ftc.gov/system/files/documents/cases/1623063_c4626_taxslayer_complaint.pdf



</mixed-citation>
      </ref>
      <ref id="ridm1842716596">
        <label>57.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1842714940">
        <label>58.</label>
        <mixed-citation xlink:type="simple" publication-type="book">
          <date>
            <year>2021</year>
          </date>
          <chapter-title>In the Matter of Everalbum, Inc., United States of America before the Federal Trade Commission, available at https://www.ftc.gov/system/files/documents/cases/1923172_-_everalbum_complaint</chapter-title>
        </mixed-citation>
      </ref>
      <ref id="ridm1842714508">
        <label>59.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>See</surname>
            <given-names>15U S</given-names>
          </name>
          <source>Code §</source>
          <volume>45</volume>
          <institution>Legal Information Institute</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1842710908">
        <label>60.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <article-title>Andy Greenberg, Hacker Lexicon: What Is a Supply Chain Attack?, Wired, available at https://www.wired.com/story/hacker-lexicon-what-is-a-supply-chain-attack/</article-title>
          <date>
            <year>2021</year>
          </date>
        </mixed-citation>
      </ref>
      <ref id="ridm1842709684">
        <label>61.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1842708028">
        <label>62.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1842706588">
        <label>63.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Neil</surname>
            <given-names>M Richards</given-names>
          </name>
          <name>
            <surname>Jonathan</surname>
            <given-names>H King</given-names>
          </name>
          <date>
            <year>2013</year>
          </date>
          <source>Three Paradoxes of Big Data</source>
          <volume>66</volume>
          <fpage>41</fpage>
        </mixed-citation>
      </ref>
      <ref id="ridm1842704212">
        <label>64.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1842733372">
        <label>65.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1842732508">
        <label>66.</label>
        <mixed-citation xlink:type="simple" publication-type="book">
          <name>
            <surname>Samuel</surname>
            <given-names>D Warren</given-names>
          </name>
          <name>
            <surname>Louis</surname>
            <given-names>D</given-names>
          </name>
          <date>
            <year>1890</year>
          </date>
          <chapter-title>Brandeis, The Right to Privacy</chapter-title>
          <volume>4</volume>
          <fpage>193</fpage>
        </mixed-citation>
      </ref>
      <ref id="ridm1842728260">
        <label>67.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <article-title>Gattaca (Andrew Niccol dir)</article-title>
          <date>
            <year>1997</year>
          </date>
        </mixed-citation>
      </ref>
      <ref id="ridm1842727900">
        <label>68.</label>
        <mixed-citation xlink:type="simple" publication-type="journal"><name><surname>Samuel</surname><given-names>D Warren</given-names></name><name><surname>Louis</surname><given-names>D Brandeis</given-names></name>

supra, note 45



</mixed-citation>
      </ref>
      <ref id="ridm1842674932">
        <label>69.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Wallace</surname>
            <given-names>Mike</given-names>
          </name>
          <article-title>The Mike Wallace Interview: Aldous Huxley(1958-05-18),YouTube(1958-05-18)</article-title>
        </mixed-citation>
      </ref>
      <ref id="ridm1842673132">
        <label>70.</label>
        <mixed-citation xlink:type="simple" publication-type="journal"><name><surname>Neil</surname><given-names>M Richards</given-names></name><name><surname>Jonathan</surname><given-names>H King</given-names></name>

supra, note 42



</mixed-citation>
      </ref>
      <ref id="ridm1842670252">
        <label>71.</label>
        <mixed-citation xlink:type="simple" publication-type="journal"><name><surname>Leman</surname><given-names>Jonas</given-names></name><article-title>Big Data and Its Exclusions,66 Stan</article-title><date><year>2013</year></date><source>L. Rev</source><volume>55</volume>
available at https://www.stanfordlawreview.org/online/privacy-and-big-data-big-data-and-its-exclusions/



</mixed-citation>
      </ref>
      <ref id="ridm1842665356">
        <label>72.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1842666724">
        <label>73.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1842664708">
        <label>74.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Celente</surname>
            <given-names>Gerald</given-names>
          </name>
          <article-title>Glen Beck’s War Room, FoxNews. available at https://www.foxnews.com/story/glenn-becks-war-room</article-title>
          <date>
            <year>2009</year>
          </date>
        </mixed-citation>
      </ref>
      <ref id="ridm1842662260">
        <label>75.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Zuboff</surname>
            <given-names>Shoshana</given-names>
          </name>
          <article-title>The Age of Surveillance Capitalism</article-title>
          <date>
            <year>2019</year>
          </date>
        </mixed-citation>
      </ref>
      <ref id="ridm1842659956">
        <label>76.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1842657940">
        <label>77.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Snowden</surname>
            <given-names>Edward</given-names>
          </name>
          <publisher-name>Permanent Record.Metropolitan Books</publisher-name>
        </mixed-citation>
      </ref>
      <ref id="ridm1842654556">
        <label>78.</label>
        <mixed-citation xlink:type="simple" publication-type="journal"><name><surname>Eric</surname><given-names>N Berkowitz</given-names></name><name><surname>Roger</surname><given-names>A Kerin</given-names></name><name><surname>Steven</surname><given-names>A Hartley</given-names></name><name><surname>Rudelius</surname><given-names>William</given-names></name><date><year>1994</year></date><source>Marketing</source><volume>10</volume>
(Irwin Publishers 4th ed)



</mixed-citation>
      </ref>
      <ref id="ridm1842651820">
        <label>79.</label>
        <mixed-citation xlink:type="simple" publication-type="book">
          <name>
            <surname>Steven</surname>
            <given-names>J</given-names>
          </name>
          <date>
            <year>1994</year>
          </date>
          <chapter-title>Skinner Marketing 587Houghton Mifflin Company 2nd ed</chapter-title>
        </mixed-citation>
      </ref>
      <ref id="ridm1842650668">
        <label>80.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1842680764">
        <label>81.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Michael</surname>
            <given-names>E Porter</given-names>
          </name>
          <article-title>Competitive Advantage: Creating and Sustaining Superior Performance</article-title>
          <date>
            <year>1985</year>
          </date>
        </mixed-citation>
      </ref>
      <ref id="ridm1842678172">
        <label>82.</label>
        <mixed-citation xlink:type="simple" publication-type="journal"><name><surname>Mayer-Schönberger</surname><given-names>Viktor</given-names></name><name><surname>Cukier</surname><given-names>Kenneth</given-names></name>

supra, note 6



</mixed-citation>
      </ref>
      <ref id="ridm1842635404">
        <label>83.</label>
        <mixed-citation xlink:type="simple" publication-type="book">
          <name>
            <surname>Kenneth</surname>
            <given-names>C Laudon</given-names>
          </name>
          <name>
            <surname>Guercio</surname>
            <given-names>Carol</given-names>
          </name>
          <date>
            <year>2008</year>
          </date>
          <chapter-title>Traver, e-Commerce: Business Technology Society10 Pearson Publishing4th ed</chapter-title>
        </mixed-citation>
      </ref>
      <ref id="ridm1842633028">
        <label>84.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <source>Id at</source>
          <volume>11</volume>
        </mixed-citation>
      </ref>
      <ref id="ridm1842632380">
        <label>85.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1842630580">
        <label>86.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>H</surname>
            <given-names>M Deitel</given-names>
          </name>
          <name>
            <surname>P</surname>
            <given-names>J Deitel</given-names>
          </name>
          <name>
            <surname>Steinbuhler</surname>
            <given-names>K</given-names>
          </name>
          <article-title>e-Business and e-Commerce for Managers 28 (Prentice-Hall Publishing</article-title>
          <date>
            <year>2001</year>
          </date>
        </mixed-citation>
      </ref>
      <ref id="ridm1842627556">
        <label>87.</label>
        <mixed-citation xlink:type="simple" publication-type="journal"><name><surname>Eric</surname><given-names>N Berkowitz</given-names></name><name><surname>Roger</surname><given-names>A Kerin</given-names></name><name><surname>Steven</surname><given-names>A Hartley</given-names></name><name><surname>Rudelius</surname><given-names>William</given-names></name>

supra, note 57



</mixed-citation>
      </ref>
      <ref id="ridm1842624028">
        <label>88.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Remorse</surname>
            <given-names>Buyer</given-names>
          </name>
          <article-title>Cambridge Dictionary (n.d.), available at https://dictionary.cambridge.org/us/dictionary/english/buyer-s-remorse</article-title>
        </mixed-citation>
      </ref>
      <ref id="ridm1842622804">
        <label>89.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Eric</surname>
            <given-names>N Berkowitz</given-names>
          </name>
          <name>
            <surname>Roger</surname>
            <given-names>A Kerin</given-names>
          </name>
          <name>
            <surname>Steven</surname>
            <given-names>A Hartley</given-names>
          </name>
          <source>William Rudelius, supra, note</source>
          <volume>57</volume>
          <fpage>543</fpage>
        </mixed-citation>
      </ref>
      <ref id="ridm1842618916">
        <label>90.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
Id at 726



</mixed-citation>
      </ref>
      <ref id="ridm1842617836">
        <label>91.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <article-title>See generally,Louis Alexander,Why Emails Are Free to Use?, Workspace (n.d.), available at https://workspace.digital/why-are-emails-free-to-use/</article-title>
        </mixed-citation>
      </ref>
      <ref id="ridm1842618484">
        <label>92.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>McDowell</surname>
            <given-names>Mindi</given-names>
          </name>
          <name>
            <surname>Householder</surname>
            <given-names>Allen</given-names>
          </name>
          <article-title>Security Tip (ST05-009): Benefits and Risks of Free Email Services, Cybersecurity &amp; Infrastructure Security Agency</article-title>
          <date>
            <year>2019</year>
          </date>
        </mixed-citation>
      </ref>
      <ref id="ridm1842613732">
        <label>93.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <article-title>Carpenter v. United States</article-title>
          <date>
            <year>2018</year>
          </date>
          <fpage>585</fpage>
        </mixed-citation>
      </ref>
      <ref id="ridm1842612724">
        <label>94.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1842609628">
        <label>95.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Donald</surname>
            <given-names>L Buresh</given-names>
          </name>
          <article-title>The Meaning of Justice Gorsuch’s Dissent in Carpenter v</article-title>
          <date>
            <year>2019</year>
          </date>
          <source>United States, 43 Amer. J. of Trial Advocacy</source>
          <volume>1</volume>
          <fpage>55</fpage>
          <lpage>103</lpage>
        </mixed-citation>
      </ref>
      <ref id="ridm1842607324">
        <label>96.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Lessig</surname>
            <given-names>Lawrence</given-names>
          </name>
          <article-title>Privacy as Property</article-title>
          <date>
            <year>2002</year>
          </date>
          <source>69 Social Research</source>
          <volume>1</volume>
        </mixed-citation>
      </ref>
      <ref id="ridm1842604444">
        <label>97.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Ferriell</surname>
            <given-names>Jeffrey</given-names>
          </name>
          <name>
            <surname>Navin</surname>
            <given-names>Michael</given-names>
          </name>
          <article-title>Understanding Contracts (LexisNexis Publishing</article-title>
          <date>
            <year>2004</year>
          </date>
        </mixed-citation>
      </ref>
      <ref id="ridm1842569388">
        <label>98.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1842570324">
        <label>99.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1842568956">
        <label>100.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1842565212">
        <label>101.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1842565068">
        <label>102.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Bethany</surname>
            <given-names>K Laurence</given-names>
          </name>
          <article-title>Ten Tips for Making Solid Business Agreements and Contracts, Nolo (n.d.,)</article-title>
        </mixed-citation>
      </ref>
      <ref id="ridm1842562980">
        <label>103.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1842560892">
        <label>104.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Mendola</surname>
            <given-names>Carina</given-names>
          </name>
          <name>
            <surname>Creasy</surname>
            <given-names>Brett</given-names>
          </name>
          <article-title>Lessons Learned from the SolarWinds Hack: What Went Wrong &amp; How Can Lawyers Help Mitigate the Risk of Cyberattacks, Association of Corporate Counsel (n.d.), available at https://www.acc.com/sites/default/files/2021-02/Lessons%20Learned%20from%20the%20SolarWinds%20Hack.pdf</article-title>
        </mixed-citation>
      </ref>
      <ref id="ridm1842559668">
        <label>105.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1842556356">
        <label>106.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1842554340">
        <label>107.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1842554556">
        <label>108.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1842552108">
        <label>109.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1842549084">
        <label>110.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1842549516">
        <label>111.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1842547428">
        <label>112.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1842544620">
        <label>113.</label>
        <mixed-citation xlink:type="simple" publication-type="journal"><name><surname>Zuboff</surname><given-names>Shoshana</given-names></name>

supra, note 54



</mixed-citation>
      </ref>
      <ref id="ridm1842574860">
        <label>114.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Snowden</surname>
            <given-names/>
          </name>
          <article-title>supra note 56</article-title>
        </mixed-citation>
      </ref>
      <ref id="ridm1842573780">
        <label>115.</label>
        <mixed-citation xlink:type="simple" publication-type="journal"><name><surname>Richards</surname><given-names/></name><name><surname>King</surname><given-names/></name>

supra note 42



</mixed-citation>
      </ref>
      <ref id="ridm1842527348">
        <label>116.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Hobbes</surname>
            <given-names>Thomas</given-names>
          </name>
          <date>
            <year>2017</year>
          </date>
          <institution>Leviathan (Penguin Classics</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1842525908">
        <label>117.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <article-title>See generally, History.com Editors, King Charles I Executed for Treason, History.com, available at https://www.history.com/this-day-in-history/king-charles-i-executed-for-treason</article-title>
          <date>
            <year>2019</year>
          </date>
        </mixed-citation>
      </ref>
      <ref id="ridm1842523172">
        <label>118.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <article-title>Hobbes, supra note 95</article-title>
        </mixed-citation>
      </ref>
      <ref id="ridm1842521156">
        <label>119.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <article-title>Biography.com Editors, Charles II of England, Biography.com, available at https://www.biography.com/royalty/charles-ii-of-england</article-title>
          <date>
            <year>2021</year>
          </date>
        </mixed-citation>
      </ref>
      <ref id="ridm1842517124">
        <label>120.</label>
        <mixed-citation xlink:type="simple" publication-type="journal"><name><surname>Richards</surname><given-names/></name><name><surname>King</surname><given-names/></name>

supra note 42



</mixed-citation>
      </ref>
      <ref id="ridm1842514820">
        <label>121.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Leman</surname>
            <given-names/>
          </name>
          <article-title>supra note 50</article-title>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>
