Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 6 of 6
Full-Text Articles in Law
Unmanned But Accelerating: Navigating The Regulatory And Privacy Challenges Of Introducing Unmanned Aircraft Into The National Airspace System, Benjamin Kapnik
Unmanned But Accelerating: Navigating The Regulatory And Privacy Challenges Of Introducing Unmanned Aircraft Into The National Airspace System, Benjamin Kapnik
Journal of Air Law and Commerce
No abstract provided.
Not In My Backyard: State V. Quiday And Warrantless Aerial Police Surveillance, Hayden Brown
Not In My Backyard: State V. Quiday And Warrantless Aerial Police Surveillance, Hayden Brown
Journal of Air Law and Commerce
No abstract provided.
A Right To Go Dark (?), David C. Gray
A Right To Go Dark (?), David C. Gray
SMU Law Review
In 2013, reports based on documents leaked by former National Security Agency contractor Edward Snowden revealed committed efforts by federal agencies to develop and deploy data surveillance technologies. These revelations documented the ability of government agencies to monitor internet usage, read the contents of communications, and access data stored in the cloud and on personal devices. These revelations marked a turning point in the public conversation as consumers became aware of the extent to which national security and law enforcement agencies can monitor a wide range of activities in physical and virtual spaces.
The market responded. Technology companies began to …
A Brave New World: Using The Outer Space Treaty To Design International Data Protection Standards For Low- Earth Orbit Satellite Operators, Amir Saboorian
A Brave New World: Using The Outer Space Treaty To Design International Data Protection Standards For Low- Earth Orbit Satellite Operators, Amir Saboorian
Journal of Air Law and Commerce
No abstract provided.
Antidiscriminatory Privacy, Ignacio Cofone
Antidiscriminatory Privacy, Ignacio Cofone
SMU Law Review
Law often blocks sensitive personal information to prevent discrimination. It does so, however, without a theory or framework to determine when doing so is warranted. As a result, these measures produce mixed results. This article offers a theoretical framework for determining, with a view of preventing discrimination, when personal information should flow and when it should not. It examines the relationship between precluded personal information, such as race, and the proxies for precluded information, such as names and zip codes. It proposes that the success of these measures depends on what types of proxies exist for the information blocked and …
“Hashing” In The Cloud: The Private Search Defense Is Active And Potent, Tri T. Truong
“Hashing” In The Cloud: The Private Search Defense Is Active And Potent, Tri T. Truong
SMU Law Review
No abstract provided.