Open Access. Powered by Scholars. Published by Universities.®
- Keyword
Articles 1 - 2 of 2
Full-Text Articles in Law
Attention All Internet Users: How Proposed Amendments To The Communications Decency Act Could Save Your Reputation, Niki Blumentritt
Attention All Internet Users: How Proposed Amendments To The Communications Decency Act Could Save Your Reputation, Niki Blumentritt
Legislation and Policy Brief
Imagine a beautiful fall day on a Southern college campus. The leaves are changing, and the sound of the band practicing for this weekend’s big game echoes throughout campus. Jane, a college freshman, is walking through campus on the way back to her dorm from her Biology 101 class. Usually, Jane’s walk is uneventful, aside from the occasional run-in with a friend or sorority sister; however, today is much different. Jane notices that many people are staring, pointing, and snickering at her. Is there something on her face? She quickly pulls out her compact and realizes that all makeup is …
Disincentives To Data Breach: Problems With Notification And Future Legislative Possibilities, Ross Schulman
Disincentives To Data Breach: Problems With Notification And Future Legislative Possibilities, Ross Schulman
Legislation and Policy Brief
In the modern digitized and networked world, personal identifying information has quickly become a commodity that can be traded, sold, or given away like any other. The uses and potential abuses of personal identifying information, however, distinguish this commodity from any other. Personal identifying information can be copied infinitely, is often not protected nearly as well as physical commodities, and, most importantly, can have particular importance to the person identified by that information. The producer of a bushel of apples presumably cares very little about where his apples end up, as long as he is paid for them to begin …