Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Cryptography (2)
- Derivative use immunity (2)
- Fifth Amendment (2)
- Privacy (2)
- Analytics (1)
-
- Automated licensing (1)
- Automation (1)
- Banking and Finance (1)
- Big data (1)
- Blockchain (1)
- Boyd v. United States (1)
- Compulsory production (1)
- Copyright (1)
- Copyright registries (1)
- Cryptographic key (1)
- Cryptographic keys (1)
- Data Aggregation (1)
- Decryption (1)
- Digital rights management (DRM) (1)
- Distributed ledger technology (DLT) (1)
- EULA (1)
- Encryption (1)
- FinTech (1)
- Foregone Conclusion Test (1)
- Fourth Amendment (1)
- Fourth amendment (1)
- Immunity compulsion (1)
- Independent discovery (1)
- Kenneth Starr (1)
- Original intent (1)
Articles 1 - 8 of 8
Full-Text Articles in Entire DC Network
Unsolicited Commercial E-Mail And The Telephone Consumer Protection Act Of 1991, David E. Sorkin
Unsolicited Commercial E-Mail And The Telephone Consumer Protection Act Of 1991, David E. Sorkin
David E. Sorkin
No abstract provided.
Sharing Stupid $H*T With Friends And Followers: The First Amendment Rights Of College Athletes To Use Social Media, Mary Margaret Meg Penrose
Sharing Stupid $H*T With Friends And Followers: The First Amendment Rights Of College Athletes To Use Social Media, Mary Margaret Meg Penrose
Meg Penrose
No abstract provided.
Computer As Confidant: Digital Investment Advice And The Fiduciary Standard, Nicole G. Iannarone
Computer As Confidant: Digital Investment Advice And The Fiduciary Standard, Nicole G. Iannarone
Nicole G. Iannarone
Digital investment advisers are the fastest growing segment of financial technology (fintech) and are disrupting traditional investment advisory delivery models. The computer-led investment advisory service model may be growing particularly quickly due to a confluence of social and political factors. Politicians and regulators have increasingly focused on the standards of care applicable to investment advice providers. Fewer Americans are ready for retirement and many lack access to affordable investment advice. At the same time, comfort with digital platforms have increased, with some preferring electronic interaction over human interaction. Claiming that they can democratize retirement service by pro- viding advice meeting …
United States V. Hubbell: Encryption And The Discovery Of Documents, Gregory S. Sergienko
United States V. Hubbell: Encryption And The Discovery Of Documents, Gregory S. Sergienko
Greg Sergienko
Five years ago, in a contribution to these pages, I suggested that the Supreme Court's oldest precedents and the original intent of the framers of the Constitution precluded the use of evidence produced under a grant of immunity against the producer, even though the material produced included documents that the producer had not been compelled to write. This implied that information concealed with a cryptographic key could not be used in a criminal prosecution against someone from whom the key had been obtained under a grant of immunity. The issue, however, was doubtful given the tendency of the Court to …
Self Incrimination And Cryptographic Keys, Gregory S. Sergienko
Self Incrimination And Cryptographic Keys, Gregory S. Sergienko
Greg Sergienko
Modern cryptography can make it virtually impossible to decipher documents without the cryptographic key thus making the availability of the contents of those documents depend on the availability of the key. This article examines the Fourth and Fifth Amendments' protection against the compulsory production of the key and the scope of the Fifth Amendment immunity against compelled production. After analyzing these questions using prevailing Fourth and Fifth Amendment jurisprudence, I shall describe the advantages of a privacy-based approach in practical and constitutional terms. [excerpt]
By Reading This Title, You Have Agreed To Our Terms Of Service, Brian Larson
By Reading This Title, You Have Agreed To Our Terms Of Service, Brian Larson
Brian Larson
A Few Criminal Justice Big Data Rules, Stephen E. Henderson
A Few Criminal Justice Big Data Rules, Stephen E. Henderson
Stephen E Henderson
Blockchain And Smart Contracts: The Missing Link In Copyright Licensing?, Balazs Bodo, Daniel Gervais, Joao Pedro Quintais
Blockchain And Smart Contracts: The Missing Link In Copyright Licensing?, Balazs Bodo, Daniel Gervais, Joao Pedro Quintais
Daniel J Gervais