Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Copyright (5)
- Agreement (3)
- Deposit Insurance Corporation (3)
- Indonesia (3)
- Investment (3)
-
- Legal Protection (3)
- Privacy (3)
- Transparency (3)
- Acquisitions (2)
- Administrative Court (2)
- Bank (2)
- COVID-19 (2)
- Corporation (2)
- Credit (2)
- Cybersecurity (2)
- Fourth Amendment (2)
- Human Rights (2)
- Insurance (2)
- Insurance Company (2)
- Internet Law (2)
- Legal policy (2)
- Personal Data (2)
- Policy Guarantee Agency (2)
- Policy Guarantee Program (2)
- Privacy Law (2)
- Regional regulations (2)
- Song (2)
- South Korea (2)
- Trade Secret (2)
- 5C Principle (1)
- Publication
- Publication Type
Articles 91 - 95 of 95
Full-Text Articles in Privacy Law
The Wild West Of Data Privacy: Why Rhode Island Needs To Enact Comprehensive Legislation To Protect Consumers’ Data, Candace Quinn
The Wild West Of Data Privacy: Why Rhode Island Needs To Enact Comprehensive Legislation To Protect Consumers’ Data, Candace Quinn
Roger Williams University Law Review
No abstract provided.
Platforms, Encryption, And The Cfaa: The Case Of Whatsapp V Nso Group, Jonathon Penney, Bruce Schneier
Platforms, Encryption, And The Cfaa: The Case Of Whatsapp V Nso Group, Jonathon Penney, Bruce Schneier
Articles, Book Chapters, & Popular Press
End-to-end encryption technology has gone mainstream. But this wider use has led hackers, cybercriminals, foreign governments, and other threat actors to employ creative and novel attacks to compromise or workaround these protections, raising important questions as to how the Computer Fraud and Abuse Act (CFAA), the primary federal anti-hacking statute, is best applied to these new encryption implementations. Now, after the Supreme Court recently narrowed the CFAA’s scope in Van Buren and suggested it favors a code-based approach to liability under the statute, understanding how best to theorize sophisticated code-based access barriers like end-to-end encryption, and their circumvention, is now …
Table Of Contents, Seattle University Law Review
Table Of Contents, Seattle University Law Review
Seattle University Law Review
Table of Contents
Sharenting Is Here To Stay, So Now What?, Anonymous Author
Sharenting Is Here To Stay, So Now What?, Anonymous Author
Seattle University Law Review
This Note explores the concept of sharenting, its real-world consequences, and the daunting task of creating a workable solution. Part I of this Note provides a broad overview of sharenting and its implications. Part II describes the current state of the law and why sharenting remains a difficult issue to address. Part III discusses four legal frameworks posed by legal scholars to combat sharenting: anti-bullying, privacy, erasure, and child labor laws—and, ultimately, why each fails to offer an airtight solution. Part IV offers an alternative solution: the regulation of data brokers and outlawing advertisement-based social media platforms to protect children’s …
Do We Own What We Post?: The Fundamental Property Right To Destroy Your Presence On The Internet, Olivia Shangrow
Do We Own What We Post?: The Fundamental Property Right To Destroy Your Presence On The Internet, Olivia Shangrow
Seattle University Law Review
This Note will explore the well-established right to destroy your own property and how such a fundamental right can and should be applied to our online property to develop more protective data privacy legislation. Part I highlights the longstanding pillar of property law establishing a right to destroy one’s property, and how that can and should be applied to your digital identity. Part II will discuss the ambiguity of personal data ownership online and the ill effects resulting from the lack of control of our personal information on the Internet. Part III examines the current state of data privacy legislation …