Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Privacy (2)
- Amici (1)
- Cloud (1)
- Cybersecurity threats (1)
- Data localization (1)
-
- Data privacy (1)
- Electronic Communications Privacy Act (1)
- Electronic communications (1)
- FISA (1)
- FISC (1)
- Human Rights (1)
- Individual privacy interests (1)
- International Human Rights (1)
- International Law (1)
- Microsoft Ireland (1)
- National Security (1)
- Privacy and Data (1)
- SCA (1)
- Separation of powers (1)
- The Stored Communications Act (1)
- United Nations (1)
- United Nations Human Rights Committee (1)
Articles 1 - 10 of 10
Full-Text Articles in Law
Stars, Stripes, And Surveillance: The United States' Failure To Regulate Data Privacy, Sam Begland
Stars, Stripes, And Surveillance: The United States' Failure To Regulate Data Privacy, Sam Begland
American University Law Review
In the wake of the United States Supreme Court’s devastating decision to strip Americans of their constitutional right to abortion in Dobbs v. Jackson Women’s Health Organization, data privacy is more salient than ever. Without adequate data regulations, state governments and anti-abortion activists alike can harass and prosecute pregnant people attempting to exercise their bodily autonomy. This comment argues that the United States has violated its obligations under the International Covenant on Civil and Political Rights (ICCPR) Article 17 by failing to protect against interference with the use and collection of reproductive health data. Further, this comment analyzes interpretations of …
Dna And Law Enforcement: How The Use Of Open Source Dna Databases Violates Privacy Rights, Christine Guest
Dna And Law Enforcement: How The Use Of Open Source Dna Databases Violates Privacy Rights, Christine Guest
American University Law Review
No abstract provided.
Carpenter V. United States And The Emerging Expectations Of Privacy In Data Comprehensiveness Applied To Browsing History, Daniel De Zayas
Carpenter V. United States And The Emerging Expectations Of Privacy In Data Comprehensiveness Applied To Browsing History, Daniel De Zayas
American University Law Review
No abstract provided.
Data Localization The Unintended Consequences Of Privacy Litigation, H Jacqueline Brehmer
Data Localization The Unintended Consequences Of Privacy Litigation, H Jacqueline Brehmer
American University Law Review
No abstract provided.
The New Fisa Court Amicus Should Be Able To Ignore Its Congressionally Imposed Duty, Ben Cook
The New Fisa Court Amicus Should Be Able To Ignore Its Congressionally Imposed Duty, Ben Cook
American University Law Review
No abstract provided.
Corporate Directors' And Officers' Cybersecurity Standard Of Care: The Yahoo Data Breach, Lawrence J. Trautman, Peter C. Ormerod
Corporate Directors' And Officers' Cybersecurity Standard Of Care: The Yahoo Data Breach, Lawrence J. Trautman, Peter C. Ormerod
American University Law Review
On September 22, 2016, Yahoo! Inc. ("Yahoo") announced that a data breach and theft of information from over 500 million user accounts had taken place during 2014, marking the largest data breach ever at the time. The information stolen likely included names, birthdays, telephone numbers, email addresses, hashed passwords, and, in some cases, encrypted or unencrypted security questions and answers. Yahoo further disclosed its belief that the stolen data "did not include unprotected passwords, payment card data, or bank account information." Just two months before Yahoo disclosed its 2014 data breach, it announced a proposed sale of the company's core …
Holding The Fbi Accountable For Hacking Apple's Software Under The Takings Clause, Mark S. Levy
Holding The Fbi Accountable For Hacking Apple's Software Under The Takings Clause, Mark S. Levy
American University Law Review
Smartphones have swiftly replaced most-if not all-conventional methods of sending, receiving, and storing personal information. Letters, address books, calendars, and trips to the bank have been rendered obsolete by tools such as text messaging, digital contacts, iCal, and mobile banking apps. Although these digital alternatives are convenient, they are not immune from attack. Therefore, to remain competitive, technology companies must maintain safe and secure platforms on which users may freely store and share their personal information.
Apple Inc., for example, strives to protect its users' intimate information, consequently earning a reputation for prioritizing security. Like a king protecting his castle, …
Cloudy With A Chance Of Abused Privacy Rights: Modifying Third-Party Fourth Amendment Standing Doctrine Post-Spokeo, Sarah E. Pugh
Cloudy With A Chance Of Abused Privacy Rights: Modifying Third-Party Fourth Amendment Standing Doctrine Post-Spokeo, Sarah E. Pugh
American University Law Review
No abstract provided.
Little Things And Big Challenges: Information Privacy And The Internet Of Things, Hillary Brill, Scott Jones
Little Things And Big Challenges: Information Privacy And The Internet Of Things, Hillary Brill, Scott Jones
American University Law Review
The Internet of Things (loT), the wireless connection of devices to ourselves, each other, and the Internet, has transformed our lives and our society in unimaginable ways. Today, billions of electronic devices and sensors collect, store, and analyze personal information from how fast we drive, to how fast our hearts beat, to how much and what we watch on TV. Even children provide billions of bits of personal information to the cloud through "smart" toys that capture images, recognize voices, and more. The unprecedented and unbridled new information flow generated from the little things of the loT is creating big …
They['Ve] Got Eyes In The Sky: How The Family Educational Rights And Privacy Act Governs Body Camera Use In Public Schools, Sarah Pierce West
They['Ve] Got Eyes In The Sky: How The Family Educational Rights And Privacy Act Governs Body Camera Use In Public Schools, Sarah Pierce West
American University Law Review
No abstract provided.