Open Access. Powered by Scholars. Published by Universities.®
- Discipline
- Institution
Articles 1 - 3 of 3
Full-Text Articles in Law
The Fight Over Encryption: Reasons Why Congress Must Block The Government From Compelling Technology Companies To Create Backdoors Into Their Devices, Shannon Lear
Cleveland State Law Review
Advances in technology in the past decade have blurred the line between individuals’ privacy rights and the government’s ability to access information. How should this issue be handled in a manner that balances the privacy rights of individuals and the government’s access to information in the interest of national security?
This Note proposes a bright-line rule that would continue to allow the government to obtain specific information from a data service provider without forcing the company to circumvent its own security features. Under this rule, a company shall relinquish specific information in its control or possession only by court order …
Averting The Inherent Dangers Of "Going Dark": Why Congress Must Require A Locked Front Door To Encrypted Data, Geoffrey S. Corn
Averting The Inherent Dangers Of "Going Dark": Why Congress Must Require A Locked Front Door To Encrypted Data, Geoffrey S. Corn
Washington and Lee Law Review
No abstract provided.
Compelled Production Of Encrypted Data, John E.D. Larkin
Compelled Production Of Encrypted Data, John E.D. Larkin
Vanderbilt Journal of Entertainment & Technology Law
There is a myth that shadowy and powerful government agencies can crack the encryption software that criminals use to protect computers filled with child pornography and stolen credit card numbers. The reality is that cheap or free encryption programs can place protected data beyond law enforcement's reach. If courts seriously mean to protect the victims of Internet crime--all too often children--then Congress must adopt a legal mechanism to remedy the technological deficiency.
To date, police and prosecutors have relied on subpoenas to either compel defendants to produce their password, or to decipher their protected data. This technique has been met …