Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Privacy (3)
- America Invents Act. (1)
- Amici (1)
- Asylum (1)
- Clapper (1)
-
- Cloud (1)
- Constitutional right to privacy (1)
- Contraception (1)
- Cybersecurity threats (1)
- DNA (1)
- Data localization (1)
- Data privacy (1)
- Data-breach (1)
- Electronic Communications Privacy Act (1)
- Electronic communications (1)
- Event limit for trade secret protection (1)
- FISA (1)
- FISC (1)
- FTC (1)
- Heightened risk of injury (1)
- Heightened-risk-of-identity-theft (1)
- Human Rights (1)
- Identity theft (1)
- Individual privacy interests (1)
- International Human Rights (1)
- International Law (1)
- Judge Robert Bork (1)
- Law and Society (1)
- Maryland contraceptive equity act (1)
- Microsoft Ireland (1)
Articles 1 - 20 of 20
Full-Text Articles in Law
Stars, Stripes, And Surveillance: The United States' Failure To Regulate Data Privacy, Sam Begland
Stars, Stripes, And Surveillance: The United States' Failure To Regulate Data Privacy, Sam Begland
American University Law Review
In the wake of the United States Supreme Court’s devastating decision to strip Americans of their constitutional right to abortion in Dobbs v. Jackson Women’s Health Organization, data privacy is more salient than ever. Without adequate data regulations, state governments and anti-abortion activists alike can harass and prosecute pregnant people attempting to exercise their bodily autonomy. This comment argues that the United States has violated its obligations under the International Covenant on Civil and Political Rights (ICCPR) Article 17 by failing to protect against interference with the use and collection of reproductive health data. Further, this comment analyzes interpretations of …
Criminalizing Asylum: Dna Testing Asylum Seekers Violates Privacy Rights, Scarlett L. Montenegro
Criminalizing Asylum: Dna Testing Asylum Seekers Violates Privacy Rights, Scarlett L. Montenegro
American University Journal of Gender, Social Policy & the Law
Introduction.
On June 16, 2015, President Trump announced his 2016 presidential campaign and claimed that Mexicans are criminals who “[h]ave lots of problems . . . they’re bringing drugs. They’re bringing crime. They’re rapists . . . It’s coming from all over . . . Latin America.” President Trump has publicly expressed his hostility towards immigrants by calling them “animals” and blaming them for drugs and gangs in the United States. While in office, President Trump tweeted that immigrants were invading the United States and suggested that “we must immediately, with no Judges or Court Cases, bring them back from …
The Georgia Life Act: Limiting Women's State Constitutional Right To Privacy, Phoebe Varunok
The Georgia Life Act: Limiting Women's State Constitutional Right To Privacy, Phoebe Varunok
American University Journal of Gender, Social Policy & the Law
No abstract provided.
Insidious Encroachment? Strengthening The "Crown Jewels": The 2018 Reauthorization Of Fisa Section 702, John F. Schifalacqua
Insidious Encroachment? Strengthening The "Crown Jewels": The 2018 Reauthorization Of Fisa Section 702, John F. Schifalacqua
American University National Security Law Brief
No abstract provided.
Legalizing Intelligence Sharing: A Consensus Approach, Brian Mund
Legalizing Intelligence Sharing: A Consensus Approach, Brian Mund
American University National Security Law Brief
No abstract provided.
Dna And Law Enforcement: How The Use Of Open Source Dna Databases Violates Privacy Rights, Christine Guest
Dna And Law Enforcement: How The Use Of Open Source Dna Databases Violates Privacy Rights, Christine Guest
American University Law Review
No abstract provided.
Carpenter V. United States And The Emerging Expectations Of Privacy In Data Comprehensiveness Applied To Browsing History, Daniel De Zayas
Carpenter V. United States And The Emerging Expectations Of Privacy In Data Comprehensiveness Applied To Browsing History, Daniel De Zayas
American University Law Review
No abstract provided.
Data Localization The Unintended Consequences Of Privacy Litigation, H Jacqueline Brehmer
Data Localization The Unintended Consequences Of Privacy Litigation, H Jacqueline Brehmer
American University Law Review
No abstract provided.
The New Fisa Court Amicus Should Be Able To Ignore Its Congressionally Imposed Duty, Ben Cook
The New Fisa Court Amicus Should Be Able To Ignore Its Congressionally Imposed Duty, Ben Cook
American University Law Review
No abstract provided.
Corporate Directors' And Officers' Cybersecurity Standard Of Care: The Yahoo Data Breach, Lawrence J. Trautman, Peter C. Ormerod
Corporate Directors' And Officers' Cybersecurity Standard Of Care: The Yahoo Data Breach, Lawrence J. Trautman, Peter C. Ormerod
American University Law Review
On September 22, 2016, Yahoo! Inc. ("Yahoo") announced that a data breach and theft of information from over 500 million user accounts had taken place during 2014, marking the largest data breach ever at the time. The information stolen likely included names, birthdays, telephone numbers, email addresses, hashed passwords, and, in some cases, encrypted or unencrypted security questions and answers. Yahoo further disclosed its belief that the stolen data "did not include unprotected passwords, payment card data, or bank account information." Just two months before Yahoo disclosed its 2014 data breach, it announced a proposed sale of the company's core …
Holding The Fbi Accountable For Hacking Apple's Software Under The Takings Clause, Mark S. Levy
Holding The Fbi Accountable For Hacking Apple's Software Under The Takings Clause, Mark S. Levy
American University Law Review
Smartphones have swiftly replaced most-if not all-conventional methods of sending, receiving, and storing personal information. Letters, address books, calendars, and trips to the bank have been rendered obsolete by tools such as text messaging, digital contacts, iCal, and mobile banking apps. Although these digital alternatives are convenient, they are not immune from attack. Therefore, to remain competitive, technology companies must maintain safe and secure platforms on which users may freely store and share their personal information.
Apple Inc., for example, strives to protect its users' intimate information, consequently earning a reputation for prioritizing security. Like a king protecting his castle, …
The Price Of Free Mobile Apps Under The Video Privacy Protection Act, Suzanne L. Riopel
The Price Of Free Mobile Apps Under The Video Privacy Protection Act, Suzanne L. Riopel
American University Business Law Review
No abstract provided.
Cybersecurity, Identity Theft, And Standing Law: A Framework For Data Breaches Using Substantial Risk In A Post-Clapper World, James C. Chou
Cybersecurity, Identity Theft, And Standing Law: A Framework For Data Breaches Using Substantial Risk In A Post-Clapper World, James C. Chou
American University National Security Law Brief
No abstract provided.
Cloudy With A Chance Of Abused Privacy Rights: Modifying Third-Party Fourth Amendment Standing Doctrine Post-Spokeo, Sarah E. Pugh
Cloudy With A Chance Of Abused Privacy Rights: Modifying Third-Party Fourth Amendment Standing Doctrine Post-Spokeo, Sarah E. Pugh
American University Law Review
No abstract provided.
Little Things And Big Challenges: Information Privacy And The Internet Of Things, Hillary Brill, Scott Jones
Little Things And Big Challenges: Information Privacy And The Internet Of Things, Hillary Brill, Scott Jones
American University Law Review
The Internet of Things (loT), the wireless connection of devices to ourselves, each other, and the Internet, has transformed our lives and our society in unimaginable ways. Today, billions of electronic devices and sensors collect, store, and analyze personal information from how fast we drive, to how fast our hearts beat, to how much and what we watch on TV. Even children provide billions of bits of personal information to the cloud through "smart" toys that capture images, recognize voices, and more. The unprecedented and unbridled new information flow generated from the little things of the loT is creating big …
Maryland's Bundle Of Joy: A Constitutionally Stronger, More Comprehensive Take On Contraception Coverage, Alexi Nathan
Maryland's Bundle Of Joy: A Constitutionally Stronger, More Comprehensive Take On Contraception Coverage, Alexi Nathan
American University Journal of Gender, Social Policy & the Law
No abstract provided.
They['Ve] Got Eyes In The Sky: How The Family Educational Rights And Privacy Act Governs Body Camera Use In Public Schools, Sarah Pierce West
They['Ve] Got Eyes In The Sky: How The Family Educational Rights And Privacy Act Governs Body Camera Use In Public Schools, Sarah Pierce West
American University Law Review
No abstract provided.
The Innovator's Dilemma, Max S. Oppenheimer
The Innovator's Dilemma, Max S. Oppenheimer
American University Business Law Review
No abstract provided.
The Intersection Of "Internet Terrorism" And "Individual Privacy" In The Context Of The First Amendment, Amanda Leonard
The Intersection Of "Internet Terrorism" And "Individual Privacy" In The Context Of The First Amendment, Amanda Leonard
American University National Security Law Brief
No abstract provided.
Avenging Revenge Porn, Samantha Kopf