Open Access. Powered by Scholars. Published by Universities.®

Privacy Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 91 - 95 of 95

Full-Text Articles in Privacy Law

The Wild West Of Data Privacy: Why Rhode Island Needs To Enact Comprehensive Legislation To Protect Consumers’ Data, Candace Quinn Jan 2022

The Wild West Of Data Privacy: Why Rhode Island Needs To Enact Comprehensive Legislation To Protect Consumers’ Data, Candace Quinn

Roger Williams University Law Review

No abstract provided.


Platforms, Encryption, And The Cfaa: The Case Of Whatsapp V Nso Group, Jonathon Penney, Bruce Schneier Jan 2022

Platforms, Encryption, And The Cfaa: The Case Of Whatsapp V Nso Group, Jonathon Penney, Bruce Schneier

Articles, Book Chapters, & Popular Press

End-to-end encryption technology has gone mainstream. But this wider use has led hackers, cybercriminals, foreign governments, and other threat actors to employ creative and novel attacks to compromise or workaround these protections, raising important questions as to how the Computer Fraud and Abuse Act (CFAA), the primary federal anti-hacking statute, is best applied to these new encryption implementations. Now, after the Supreme Court recently narrowed the CFAA’s scope in Van Buren and suggested it favors a code-based approach to liability under the statute, understanding how best to theorize sophisticated code-based access barriers like end-to-end encryption, and their circumvention, is now …


Table Of Contents, Seattle University Law Review Jan 2022

Table Of Contents, Seattle University Law Review

Seattle University Law Review

Table of Contents


Sharenting Is Here To Stay, So Now What?, Anonymous Author Jan 2022

Sharenting Is Here To Stay, So Now What?, Anonymous Author

Seattle University Law Review

This Note explores the concept of sharenting, its real-world consequences, and the daunting task of creating a workable solution. Part I of this Note provides a broad overview of sharenting and its implications. Part II describes the current state of the law and why sharenting remains a difficult issue to address. Part III discusses four legal frameworks posed by legal scholars to combat sharenting: anti-bullying, privacy, erasure, and child labor laws—and, ultimately, why each fails to offer an airtight solution. Part IV offers an alternative solution: the regulation of data brokers and outlawing advertisement-based social media platforms to protect children’s …


Do We Own What We Post?: The Fundamental Property Right To Destroy Your Presence On The Internet, Olivia Shangrow Jan 2022

Do We Own What We Post?: The Fundamental Property Right To Destroy Your Presence On The Internet, Olivia Shangrow

Seattle University Law Review

This Note will explore the well-established right to destroy your own property and how such a fundamental right can and should be applied to our online property to develop more protective data privacy legislation. Part I highlights the longstanding pillar of property law establishing a right to destroy one’s property, and how that can and should be applied to your digital identity. Part II will discuss the ambiguity of personal data ownership online and the ill effects resulting from the lack of control of our personal information on the Internet. Part III examines the current state of data privacy legislation …