Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Privacy (2)
- All-party consent (1)
- Auto (1)
- Autonomous (1)
- Autonomous cars (1)
-
- Berkeley Protocol (1)
- CSLI (1)
- Carpenter v. United States (1)
- Criminal Law (1)
- Crowdsourcing (1)
- Cybersecurity (1)
- Data privacy (1)
- Doxing (1)
- Eavesdropping (1)
- Fourth Amendment (1)
- Hacking (1)
- Hotspots (1)
- International law (1)
- Misidentification (1)
- Misinformation (1)
- One-party consent (1)
- Open Source Investigation (1)
- Public WiFi (1)
- Reasonable expectation of privacy (1)
- Recording (1)
- Secret recording (1)
- Secret taping (1)
- Social Media (1)
- Submarine cables (1)
- Surveillance (1)
Articles 1 - 8 of 8
Full-Text Articles in Communications Law
Protecting The Innocent: How To Prevent The Consequences Of Misidentification And Doxing By Volunteers Helping With Open Source Investigations, Leigh M. Dannhauser
Protecting The Innocent: How To Prevent The Consequences Of Misidentification And Doxing By Volunteers Helping With Open Source Investigations, Leigh M. Dannhauser
Catholic University Journal of Law and Technology
Individuals performing open source investigations can misidentify alleged perpetrators and dox innocent parties online, which can subsequently lead to threats and harassment against innocent parties and their loved ones. For example, threats were made against Sunil Tripathi’s family after he was wrongly identified as one of the Boston Marathon bombers and doxed on Reddit and Twitter. In 2020, the Berkeley Protocol on Digital Open Source Investigations was published as a guide, and it includes a set of principles to govern open source investigations. However, the Berkeley Protocol is limited to open source investigations performed by those working for organizations. It …
Privacy, Eavesdropping, And Wiretapping Across The United States: Reasonable Expectation Of Privacy And Judicial Discretion, Carol M. Bast
Privacy, Eavesdropping, And Wiretapping Across The United States: Reasonable Expectation Of Privacy And Judicial Discretion, Carol M. Bast
Catholic University Journal of Law and Technology
One-party consent and all-party consent eavesdropping and wiretapping statutes are two broad pathways for legislation to deal with the problem of secret taping and some states protect conversation under state constitutions. Whether a conversation is protected against being taped as a private conversation is often gauged by the reasonable expectation of privacy standard. Judges in both all-party consent and one-party consent jurisdictions have had to use their leeway under the reasonable expectation of privacy standard to arrive at what at the time seemed to be the most appropriate solution, perhaps in doing so creating a case law exception.
Protecting Online Privacy In The Digital Age: Carpenter V. United States And The Fourth Amendment’S Third-Party Doctrine, Cristina Del Rosso, Carol M. Bast
Protecting Online Privacy In The Digital Age: Carpenter V. United States And The Fourth Amendment’S Third-Party Doctrine, Cristina Del Rosso, Carol M. Bast
Catholic University Journal of Law and Technology
The goal of this paper is to examine the future of the third-party doctrine with the proliferation of technology and the online data we are surrounded with daily, specifically after the Supreme Court’s decision in Carpenter v. United States. It is imperative that individuals do not forfeit their Constitutional guarantees for the benefit of living in a technologically advanced society. This requires an understanding of the modern-day functional equivalents of “papers” and “effects.”
Looking to the future, this paper contemplates solutions on how to move forward in this technology era by scrutinizing the relevancy of the third-party doctrine due …
Autonomous Cars: Navigating The Patchwork Of Data Privacy Laws That Could Impact The Industry, Anthony Jones
Autonomous Cars: Navigating The Patchwork Of Data Privacy Laws That Could Impact The Industry, Anthony Jones
Catholic University Journal of Law and Technology
No abstract provided.
Is Wifi Worth It: The Hidden Dangers Of Public Wifi, Ellie Shahin
Is Wifi Worth It: The Hidden Dangers Of Public Wifi, Ellie Shahin
Catholic University Journal of Law and Technology
No abstract provided.
Decrypting Our Security: A Bipartisan Argument For A Rational Solution To The Encryption Challenge, Jamil N. Jaffer, Daniel J. Rosenthal
Decrypting Our Security: A Bipartisan Argument For A Rational Solution To The Encryption Challenge, Jamil N. Jaffer, Daniel J. Rosenthal
Catholic University Journal of Law and Technology
No abstract provided.
The Connected State Of Things: A Lawyer’S Survival Guide In An Internet Of Things World, Antigone Peyton
The Connected State Of Things: A Lawyer’S Survival Guide In An Internet Of Things World, Antigone Peyton
Catholic University Journal of Law and Technology
No abstract provided.
Submarine Cables, Cybersecurity And International Law: An Intersectional Analysis, Tara Davenport
Submarine Cables, Cybersecurity And International Law: An Intersectional Analysis, Tara Davenport
Catholic University Journal of Law and Technology
No abstract provided.