Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Science and Technology Law (3)
- Computer Law (2)
- Arts and Humanities (1)
- Business (1)
- Communications Law (1)
-
- Computational Engineering (1)
- Computer Engineering (1)
- Digital Humanities (1)
- Education (1)
- Engineering (1)
- Human Rights Law (1)
- Intellectual Property Law (1)
- International Humanitarian Law (1)
- International Law (1)
- Internet Law (1)
- Liberal Studies (1)
- Management Information Systems (1)
- Military, War, and Peace (1)
- National Security Law (1)
- Privacy Law (1)
- Public Affairs, Public Policy and Public Administration (1)
- Science and Technology Policy (1)
- Social and Behavioral Sciences (1)
- Technology and Innovation (1)
- Institution
Articles 1 - 8 of 8
Full-Text Articles in Law
Breached!: Why Data Security Law Fails And How To Improve It, Woodrow Hartzog, Daniel Solove
Breached!: Why Data Security Law Fails And How To Improve It, Woodrow Hartzog, Daniel Solove
Books
Digital connections permeate our lives—and so do data breaches. Given that we must be online for basic communication, finance, healthcare, and more, it is remarkable how difficult it is to secure our personal information. Despite the passage of many data security laws, data breaches are increasing at a record pace. In their book, BREACHED! WHY DATA SECURITY LAW FAILS AND HOW TO IMPROVE IT (Oxford University Press 2022), Professors Daniel Solove and Woodrow Hartzog argue that the law fails because, ironically, it focuses too much on the breach itself.
Drawing insights from many fascinating stories about data breaches, Solove and …
The Right To Privacy And Data Protection In Times Of Armed Conflict, Asaf Lubin, Russell Buchan
The Right To Privacy And Data Protection In Times Of Armed Conflict, Asaf Lubin, Russell Buchan
Books & Book Chapters by Maurer Faculty
Contemporary warfare yields a profound impact on the rights to privacy and data protection. Technological advances in the fields of electronic surveillance, predictive algorithms, big data analytics, user-generated evidence, artificial intelligence, cloud storage, facial recognition, and cryptography are redefining the scope, nature, and contours of military operations. Yet, international humanitarian law offers very few, if any, lex specialis rules for the lawful processing, analysis, dissemination, and retention of personal information. This edited anthology offers a pioneering account of the current and potential future application of digital rights in armed conflict.
In Part I Mary Ellen O’Connell, Tal Mimran and Yuval …
Hipaa-Phobia Hampers Efforts To Track And Contain Covid-19, Lee Hiromoto M.D., J.D.
Hipaa-Phobia Hampers Efforts To Track And Contain Covid-19, Lee Hiromoto M.D., J.D.
SLU Law Journal Online
The Health Insurance Portability and Accountability Act (HIPAA), enacted by the US Congress 1996, laudably protects medical privacy in healthcare settings. However, this federal law has created a culture of fear that limits current efforts to address the COVID-19 pandemic. Healthcare providers, who are covered by HIPAA, may be reluctant to disclose information about outbreak clusters for fear of violating the law. Healthcare organizations, who are also covered by the law, still rely on fax machines to avoid violating HIPAA’s data security requirements. And the scrupulous rule-following in healthcare has given independent life to a HIPAA boogeyman. Thus, officials who …
Center For Rights And Justice Presents: The Constitutional Right Of Private Citizens To Video Record The Nypd In Public, Center For Rights And Justice (Crj)
Center For Rights And Justice Presents: The Constitutional Right Of Private Citizens To Video Record The Nypd In Public, Center For Rights And Justice (Crj)
Flyers 2016-2017
No abstract provided.
Toys That Listen: A Study Of Parents, Children, And Internet-Connected Toys, Emily Mcreynolds, Sarah Hubbard, Timothy Lau, Aditya Saraf, Maya Cakmak, Franziska Roesner
Toys That Listen: A Study Of Parents, Children, And Internet-Connected Toys, Emily Mcreynolds, Sarah Hubbard, Timothy Lau, Aditya Saraf, Maya Cakmak, Franziska Roesner
Tech Policy Lab
Hello Barbie, CogniToys Dino, and Amazon Echo are part of a new wave of connected toys and gadgets for the home that listen. Unlike the smartphone, these devices are always on, blending into the background until needed. We conducted interviews with parent-child pairs in which they interacted with Hello Barbie and CogniToys Dino, shedding light on children’s expectations of the toys’ “intelligence” and parents’ privacy concerns and expectations for parental controls. We find that children were often unaware that others might be able to hear what was said to the toy, and that some parents draw connections between the toys …
Blown To Bits Project, David Schmidt
Blown To Bits Project, David Schmidt
Informatics Open Educational Resources
The book, Blown to Bits, uncovers the many ways that the new digital world has changed and is changing our whole environment. Some changes are incremental but others are more revolutionary. Some of the changes that we welcome are slowly eroding our privacy and are changing the rules of ownership. This book illuminates the complexities of these changes. I have attempted to capture the central points in selected chapters, and in some cases I have added new material or new examples to replace dated material. I picked chapters to summarize that address the following topics (and more). There are many …
Privacy And Cloud Computing In Public Schools, Joel Reidenberg, N. Cameron Russell, Jordan Kovnot, Thomas B. Norton, Ryan Cloutier, Daniela Alvarado
Privacy And Cloud Computing In Public Schools, Joel Reidenberg, N. Cameron Russell, Jordan Kovnot, Thomas B. Norton, Ryan Cloutier, Daniela Alvarado
Center on Law and Information Policy
Today, data driven decision-making is at the center of educational policy debates in the United States. School districts are increasingly turning to rapidly evolving technologies and cloud computing to satisfy their educational objectives and take advantage of new opportunities for cost savings, flexibility, and always-available service among others. As public schools in the United States rapidly adopt cloud-computing services, and consequently transfer increasing quantities of student information to third-party providers, privacy issues become more salient and contentious. The protection of student privacy in the context of cloud computing is generally unknown both to the public and to policy-makers. This study …
2013 Cardozo Life (Fall), Benjamin N. Cardozo School Of Law
2013 Cardozo Life (Fall), Benjamin N. Cardozo School Of Law
Cardozo Life Magazine
Table of Contents:
Campus News, page 3
Clinics News, page 16
Faculty Briefs, page 18
Felix Wu, page 22
Booting Up, page 24
Michel Rosenfeld, page 36
Legal Style, page 40
Our New York, page 44
Peter Markowitz, page 46
Alumni News & Class Notes, page 58
Floyd Abrams, page 68