Open Access. Powered by Scholars. Published by Universities.®

Privacy Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Privacy Law

Me, Myself And My Digital Double: Extending Sara Greene’S Stealing (Identity) From The Poor To The Challenges Of Identity Verification, Michele E. Gilman Mar 2022

Me, Myself And My Digital Double: Extending Sara Greene’S Stealing (Identity) From The Poor To The Challenges Of Identity Verification, Michele E. Gilman

All Faculty Scholarship

Identity is an essential part of the human condition. When one’s identity is stolen or when a state rejects a citizen’s identity, the consequences can be devastating to one’s notion of selfhood as well as undermine their economic security. In Stealing (Identity) from the Poor, Sara Greene explores the serious harms suffered by low-income people who are victimized by identity theft. She explains that our plutocratic regime of identity theft laws serves the interests of wealthier Americans at the expense of those experiencing poverty.

This Essay extends Greene’s analysis and framing to the harms of identity verification systems, particularly in …


Comment: The Necessary Evolution Of State Data Breach Notification Laws: Keeping Pace With New Cyber Threats, Quantum Decryption, And The Rapid Expansion Of Technology, Beth Burgin Waller, Elaine Mccafferty Jan 2022

Comment: The Necessary Evolution Of State Data Breach Notification Laws: Keeping Pace With New Cyber Threats, Quantum Decryption, And The Rapid Expansion Of Technology, Beth Burgin Waller, Elaine Mccafferty

Washington and Lee Law Review

The legal framework that was built almost two decades ago now struggles to keep pace with the rapid expansion of technology, including quantum computing and artificial intelligence, and an ever-evolving cyber threat landscape. In 2002, California passed the first data breach notification law, with all fifty states following suit to require notice of unauthorized access to and acquisition of an individual’s personal information.1 These data breach notification laws, originally designed to capture one-off unauthorized views of data in a computerized database, were not built to address PowerShell scripts by cyber terrorists run across thousands of servers, leaving automated accessed data …


Data Breach Notification Laws And The Quantum Decryption Problem, Phillip Harmon Jan 2022

Data Breach Notification Laws And The Quantum Decryption Problem, Phillip Harmon

Washington and Lee Law Review

In the United States, state data breach notification laws protect citizens by forcing businesses to notify those citizens when their personal information has been compromised. These laws almost universally include an exception for encrypted personal data. Modern encryption methods make encrypted data largely useless, and the notification laws aim to encourage good encryption practices.

This Note challenges the wisdom of laws that place blind faith in the continued infallibility of encryption. For decades, Shor’s algorithm has promised polynomial-time factoring once a sufficiently powerful quantum computer can be built. Competing laboratories around the world steadily continue to march toward this end. …