Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Law

Borders And Bits, Jennifer Daskal Jan 2018

Borders And Bits, Jennifer Daskal

Vanderbilt Law Review

Our personal data is everywhere and anywhere, moving across national borders in ways that defy normal expectations of how things and people travel from Point A to Point B. Yet, whereas data transits the globe without any intrinsic ties to territory, the governments that seek to access or regulate this data operate with territorial-based limits. This Article tackles the inherent tension between how governments and data operate, the jurisdictional conflicts that have emerged, and the power that has been delegated to the multinational corporations that manage our data across borders as a result. It does so through the lens of …


Up In The Cloud: Finding Common Ground In Providing For Law Enforcement Access To Data Held By Cloud Computing Service Providers, Matthew Mckenna Jan 2016

Up In The Cloud: Finding Common Ground In Providing For Law Enforcement Access To Data Held By Cloud Computing Service Providers, Matthew Mckenna

Vanderbilt Journal of Transnational Law

Cloud computing is an everyday part of the modern world; a technology that is increasingly transcending international borders. Disregarding international borders allows cloud computing to operate more efficiently and thus provides better service to users. Yet, the global nature of cloud computing raises a question--what happens if multiple countries apply facially similar laws to cloud computing providers differently? This scenario is common, especially in the context of law enforcement seeking access to cloud computing data. The United States and the United Kingdom have similar laws regarding the government's ability to acquire users' data. Importantly, neither law explicitly addresses the question …


Cloudy Privacy Protections: Why The Stored Communications Act Fails To Protect The Privacy Of Communications Stored In The Cloud, Ilana R. Kattan Jan 2011

Cloudy Privacy Protections: Why The Stored Communications Act Fails To Protect The Privacy Of Communications Stored In The Cloud, Ilana R. Kattan

Vanderbilt Journal of Entertainment & Technology Law

The advent of new communications technologies has generated debate over the applicability of the Fourth Amendment's warrant requirement to communications sent through, and stored in, technologies not anticipated by the Framers. In 1986, Congress responded to perceived gaps in the protections of the warrant requirement as applied to newer technologies, such as email, by passing the Stored Communications Act (SCA). As originally enacted, the SCA attempted to balance the interests of law enforcement against individual privacy rights by dictating the mechanisms by which the government could compel a particular service provider to disclose communications stored on behalf of its customers. …