Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

School of Law Faculty Publications

Howard University

Law and Technology

Articles 1 - 2 of 2

Full-Text Articles in Law

Information Overload, Multi-Tasking, And The Socially Networked Jury: Why Prosecutors Should Approach The Media Gingerly, Andrew E. Taslitz Jun 2015

Information Overload, Multi-Tasking, And The Socially Networked Jury: Why Prosecutors Should Approach The Media Gingerly, Andrew E. Taslitz

School of Law Faculty Publications

The rise of computer technology, the internet, rapid news dissemination, multi-tasking, and social networking have wrought changes in human psychology that alter how we process news media. More specifically, news coverage of high-profile trials necessarily focuses on emotionally-overwrought, attention-grabbing information disseminated to a public having little ability to process that information critically. The public’s capacity for empathy is likewise reduced, making it harder for trial processes to overcome the unfair prejudice created by the high-profile trial. Market forces magnify these changes. Free speech concerns limit the ability of the law to alter media coverage directly, and the tools available to …


Once More Unto The Breach: An Analysis Of Legal, Technological And Policy Issues Involving Data Breach Notification Statutes, Dana J. Lesemann Jun 2015

Once More Unto The Breach: An Analysis Of Legal, Technological And Policy Issues Involving Data Breach Notification Statutes, Dana J. Lesemann

School of Law Faculty Publications

Once More Unto the Breach: An Analysis of Legal, Technological, and Policy Issues Involving Data Breach Notification Statutes

Dana J. Lesemann

Companies facing the loss of a laptop or a compromised server have long waged battles on several fronts: investigating the source of the breach, identifying potentially criminal behavior, retrieving or replicating lost or manipulated data, and putting better security in place, to name a few generalized steps. As recently as seven years ago, the broader consequences of a data breach were largely deflected from the party on whose resource the data resided and instead rested essentially on those whose …