Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- All Other Telecommunications (2)
- Computers (2)
- Right of privacy (2)
- A Comprehensive Empirical Study (1)
- Agency (Law) (1)
-
- Agency Paradigm (1)
- Article 2 of the U.C.C. (1)
- Autonomy (Psychology) (1)
- California (1)
- Computer-Generated Displays (1)
- Consumer Autonomy (1)
- Consumers -- United States -- Legal status and laws etc. (1)
- Copyright Act of 1976 (1)
- Copyright Law (1)
- Court of Customs and Patent Appeals (1)
- Cybersecurity (1)
- Data Breach Climate (1)
- Data Breach Litigation (1)
- Data Privacy (1)
- Data brokers (1)
- Data encryption (Computer science) (1)
- Data security -- Law & legislation (1)
- Digital Book Data (1)
- Digital Library (1)
- Digital Reader Privacy (1)
- Disclosure of information -- Law & legislation (1)
- Dual Sovereignty (1)
- Electronic Data Interchange (1)
- Electronic book readers (1)
- Electronic books (1)
Articles 1 - 9 of 9
Full-Text Articles in Computer Law
What's The Harm? Federalism, The Separation Of Powers, And Standing In Data Breach Litigation, Grayson Wells
What's The Harm? Federalism, The Separation Of Powers, And Standing In Data Breach Litigation, Grayson Wells
Indiana Law Journal
This Comment will argue that the Supreme Court should analyze standing in data breach litigation under a standard that is deferential to state statutory and common law. Specifically, federal standing analysis should look to state law when determining whether an injury is concrete such that the injury-in-fact requirement is met. Some argue that allowing more data breach cases to proceed to the merits could lead to an explosion of successful litigation and settlements, burdening the federal courts and causing economic losses for the breached businesses. These concerns may be valid. But if state law provides a remedy to the harm …
A Comprehensive Empirical Study Of Data Privacy, Trust, And Consumer Autonomy, Jay P. Kesan, Carol M. Hayes, Masooda N. Bashir
A Comprehensive Empirical Study Of Data Privacy, Trust, And Consumer Autonomy, Jay P. Kesan, Carol M. Hayes, Masooda N. Bashir
Indiana Law Journal
Modern society is driven by data. Data storage is practically unlimited with today’s technology, and analytical tools make it easy to find patterns and make predictions in a way that is very useful for private businesses and governments. These uses of digital data can raise considerable privacy issues that are of great concern to consumers. In this Article, we present and analyze the results of an extensive survey that we conducted to explore what people know, what people do, and what people want when it comes to privacy online.
Our survey is the first comprehensive examination of the intersection of …
Furtive Encryption: Power, Trusts, And The Constitutional Cost Of Collective Surveillance, Jeffrey L. Vagle
Furtive Encryption: Power, Trusts, And The Constitutional Cost Of Collective Surveillance, Jeffrey L. Vagle
Indiana Law Journal
Recent revelations of heretofore secret U.S. government surveillance programs have sparked national conversations about their constitutionality and the delicate balance between security and civil liberties in a constitutional democracy. Among the revealed policies asserted by the National Security Agency (NSA) is a provision found in the “minimization procedures” required under section 702 of the Foreign Intelligence Surveillance Act of 1978. This provision allows the NSA to collect and keep indefinitely any encrypted information collected from domestic communications—including the communications of U.S. citizens. That is, according to the U.S. government, the mere fact that a U.S. citizen has encrypted her electronic …
A New Approach To Digital Reader Privacy; State Regulations And Their Protection Of Digital Book Data, Andrew A. Proia
A New Approach To Digital Reader Privacy; State Regulations And Their Protection Of Digital Book Data, Andrew A. Proia
Indiana Law Journal
No abstract provided.
Maintaining Government Accountability: Calls For A "Public Use" Beyond Eminent Domain, Gregory S. Knapp
Maintaining Government Accountability: Calls For A "Public Use" Beyond Eminent Domain, Gregory S. Knapp
Indiana Law Journal
No abstract provided.
Computers As Agents: A Proposed Approach To Revised U.C.C. Article 2, John P. Fischer
Computers As Agents: A Proposed Approach To Revised U.C.C. Article 2, John P. Fischer
Indiana Law Journal
No abstract provided.
Fixation On Fixation: Why Imposing Old Copyright Law On New Technology Will Not Work, Douglas J. Mason
Fixation On Fixation: Why Imposing Old Copyright Law On New Technology Will Not Work, Douglas J. Mason
Indiana Law Journal
No abstract provided.
The Computer As Advocate: An Approach To Computer-Generated Displays In The Courtroom, Mario Borelli
The Computer As Advocate: An Approach To Computer-Generated Displays In The Courtroom, Mario Borelli
Indiana Law Journal
No abstract provided.
The Patentability Of Computer Programs: Merrill Lynch's Patent For A Financial Services System, Lynne B. Allen
The Patentability Of Computer Programs: Merrill Lynch's Patent For A Financial Services System, Lynne B. Allen
Indiana Law Journal
No abstract provided.