Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Series

PDF

George Washington University Law School

2015

Authentication

Articles 1 - 2 of 2

Full-Text Articles in Law

Authentication And Hearsay: Which Trumps?, Stephen A. Saltzburg Jan 2015

Authentication And Hearsay: Which Trumps?, Stephen A. Saltzburg

GW Law Faculty Publications & Other Works

This article addresses the relationship between two federal rules of evidence: Rules 104(a) and 104(b) and which standards a trial judge should apply in admitting hearsay evidence when its authentication is in question. Focusing on United States v. Harvey, 117 F.3d 1044 (7th Circ. 1997) and a simple hypothetical, the article concludes that evidence must be authenticated under Rule 104(b) as well as satisfying the hearsay rule and Rule 104(a).


Should The Ftc Kill The Password? The Case For Better Authentication, Daniel J. Solove, Woodrow Hartzog Jan 2015

Should The Ftc Kill The Password? The Case For Better Authentication, Daniel J. Solove, Woodrow Hartzog

GW Law Faculty Publications & Other Works

Data security breaches are occurring at an alarming frequency, and one of the main causes involves problems authenticating the identity of account holders. The most common approach to authentication is the use of passwords, but passwords are a severely flawed means of authentication. People are being asked to do a nearly impossible task – create unique, long, and complex passwords for each of the numerous accounts they hold, change them frequently, and remember them all. People do very poorly in following these practices, and even if they manage to do so, hackers and phishers can readily trick people into revealing …