Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Privacy (3)
- Amici (1)
- Big data policing (1)
- Carpenter (1)
- Cell site (1)
-
- Clapper (1)
- Cloud (1)
- Comparative Law (1)
- Congress (1)
- Constitutional right to privacy (1)
- Contraception (1)
- DACA (1)
- Data-breach (1)
- Deferred Action for Childhood Arrivals (1)
- Deportation (1)
- Discrimination (1)
- Due Process (1)
- Electronic communications (1)
- Entrapment (1)
- FISA (1)
- FISC (1)
- FTC (1)
- Fourth Amendment (1)
- Heightened risk of injury (1)
- Heightened-risk-of-identity-theft (1)
- Homes (1)
- Identity theft (1)
- Immigrants (1)
- Immigration Law (1)
- Individual privacy interests (1)
- Publication
- Publication Type
Articles 1 - 11 of 11
Full-Text Articles in Law
The New Fisa Court Amicus Should Be Able To Ignore Its Congressionally Imposed Duty, Ben Cook
The New Fisa Court Amicus Should Be Able To Ignore Its Congressionally Imposed Duty, Ben Cook
American University Law Review
No abstract provided.
Corporate Directors' And Officers' Cybersecurity Standard Of Care: The Yahoo Data Breach, Lawrence J. Trautman, Peter C. Ormerod
Corporate Directors' And Officers' Cybersecurity Standard Of Care: The Yahoo Data Breach, Lawrence J. Trautman, Peter C. Ormerod
American University Law Review
On September 22, 2016, Yahoo! Inc. ("Yahoo") announced that a data breach and theft of information from over 500 million user accounts had taken place during 2014, marking the largest data breach ever at the time. The information stolen likely included names, birthdays, telephone numbers, email addresses, hashed passwords, and, in some cases, encrypted or unencrypted security questions and answers. Yahoo further disclosed its belief that the stolen data "did not include unprotected passwords, payment card data, or bank account information." Just two months before Yahoo disclosed its 2014 data breach, it announced a proposed sale of the company's core …
Holding The Fbi Accountable For Hacking Apple's Software Under The Takings Clause, Mark S. Levy
Holding The Fbi Accountable For Hacking Apple's Software Under The Takings Clause, Mark S. Levy
American University Law Review
Smartphones have swiftly replaced most-if not all-conventional methods of sending, receiving, and storing personal information. Letters, address books, calendars, and trips to the bank have been rendered obsolete by tools such as text messaging, digital contacts, iCal, and mobile banking apps. Although these digital alternatives are convenient, they are not immune from attack. Therefore, to remain competitive, technology companies must maintain safe and secure platforms on which users may freely store and share their personal information.
Apple Inc., for example, strives to protect its users' intimate information, consequently earning a reputation for prioritizing security. Like a king protecting his castle, …
The Price Of Free Mobile Apps Under The Video Privacy Protection Act, Suzanne L. Riopel
The Price Of Free Mobile Apps Under The Video Privacy Protection Act, Suzanne L. Riopel
American University Business Law Review
No abstract provided.
Cybersecurity, Identity Theft, And Standing Law: A Framework For Data Breaches Using Substantial Risk In A Post-Clapper World, James C. Chou
Cybersecurity, Identity Theft, And Standing Law: A Framework For Data Breaches Using Substantial Risk In A Post-Clapper World, James C. Chou
American University National Security Law Brief
No abstract provided.
Cloudy With A Chance Of Abused Privacy Rights: Modifying Third-Party Fourth Amendment Standing Doctrine Post-Spokeo, Sarah E. Pugh
Cloudy With A Chance Of Abused Privacy Rights: Modifying Third-Party Fourth Amendment Standing Doctrine Post-Spokeo, Sarah E. Pugh
American University Law Review
No abstract provided.
Little Things And Big Challenges: Information Privacy And The Internet Of Things, Hillary Brill, Scott Jones
Little Things And Big Challenges: Information Privacy And The Internet Of Things, Hillary Brill, Scott Jones
American University Law Review
The Internet of Things (loT), the wireless connection of devices to ourselves, each other, and the Internet, has transformed our lives and our society in unimaginable ways. Today, billions of electronic devices and sensors collect, store, and analyze personal information from how fast we drive, to how fast our hearts beat, to how much and what we watch on TV. Even children provide billions of bits of personal information to the cloud through "smart" toys that capture images, recognize voices, and more. The unprecedented and unbridled new information flow generated from the little things of the loT is creating big …
Access To Data Across Borders: The Critical Role For Congress To Play Now, Jennifer Daskal
Access To Data Across Borders: The Critical Role For Congress To Play Now, Jennifer Daskal
Articles in Law Reviews & Other Academic Journals
No abstract provided.
Carpenter V. United States: Brief Of Scholars Of Criminal Procedure And Privacy As Amici Curiae In Support Of Petitioner, Andrew Ferguson
Carpenter V. United States: Brief Of Scholars Of Criminal Procedure And Privacy As Amici Curiae In Support Of Petitioner, Andrew Ferguson
Articles in Law Reviews & Other Academic Journals
Amici curiae are forty-two scholars engaged in significant research and/or teaching on criminal procedure and privacy law. This brief addresses issues that are within amici’s particular areas of scholarly expertise. They have a shared interest in clarifying the law of privacy in the digital era, and believe that a review of scholarly literature on the topic is helpful to answering the question in this case. This brief is co-authored by Harry Sandick, Kathrina Szymborski, & Jared Buszin of Patterson Belknap Webb & Tyler LLP.Carpenter v. United States presents an opportunity to reconsider the Fourth Amendment in the digital age. Cell …
Can The Government Deport Immigrants Using Information It Encouraged Them To Provide?, Amanda Frost
Can The Government Deport Immigrants Using Information It Encouraged Them To Provide?, Amanda Frost
Articles in Law Reviews & Other Academic Journals
This Essay describes the legal and policy issues raised by any systematic effort to deport unauthorized immigrants based on information the government invited them to provide. Part I briefly surveys some of the major laws, regulations, and programs that encourage unauthorized immigrants to identify themselves. Part II analyzes the strengths and weaknesses of the statutory and constitutional arguments that immigrants could raise as a defense against deportations based on self-reported data. Part III explains that even if the government’s systematic use of such data to deport unauthorized immigrants is legal, doing so would be a poor policy choice for any …
Maryland's Bundle Of Joy: A Constitutionally Stronger, More Comprehensive Take On Contraception Coverage, Alexi Nathan
Maryland's Bundle Of Joy: A Constitutionally Stronger, More Comprehensive Take On Contraception Coverage, Alexi Nathan
American University Journal of Gender, Social Policy & the Law
No abstract provided.