Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 2 of 2
Full-Text Articles in Law
Authentication And Hearsay: Which Trumps?, Stephen A. Saltzburg
Authentication And Hearsay: Which Trumps?, Stephen A. Saltzburg
GW Law Faculty Publications & Other Works
This article addresses the relationship between two federal rules of evidence: Rules 104(a) and 104(b) and which standards a trial judge should apply in admitting hearsay evidence when its authentication is in question. Focusing on United States v. Harvey, 117 F.3d 1044 (7th Circ. 1997) and a simple hypothetical, the article concludes that evidence must be authenticated under Rule 104(b) as well as satisfying the hearsay rule and Rule 104(a).
Should The Ftc Kill The Password? The Case For Better Authentication, Daniel J. Solove, Woodrow Hartzog
Should The Ftc Kill The Password? The Case For Better Authentication, Daniel J. Solove, Woodrow Hartzog
GW Law Faculty Publications & Other Works
Data security breaches are occurring at an alarming frequency, and one of the main causes involves problems authenticating the identity of account holders. The most common approach to authentication is the use of passwords, but passwords are a severely flawed means of authentication. People are being asked to do a nearly impossible task – create unique, long, and complex passwords for each of the numerous accounts they hold, change them frequently, and remember them all. People do very poorly in following these practices, and even if they manage to do so, hackers and phishers can readily trick people into revealing …