Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Law

Privacy And Cloud Computing In Public Schools, Joel Reidenberg, N. Cameron Russell, Jordan Kovnot, Thomas B. Norton, Ryan Cloutier, Daniela Alvarado Dec 2013

Privacy And Cloud Computing In Public Schools, Joel Reidenberg, N. Cameron Russell, Jordan Kovnot, Thomas B. Norton, Ryan Cloutier, Daniela Alvarado

Center on Law and Information Policy

Today, data driven decision-making is at the center of educational policy debates in the United States. School districts are increasingly turning to rapidly evolving technologies and cloud computing to satisfy their educational objectives and take advantage of new opportunities for cost savings, flexibility, and always-available service among others. As public schools in the United States rapidly adopt cloud-computing services, and consequently transfer increasing quantities of student information to third-party providers, privacy issues become more salient and contentious. The protection of student privacy in the context of cloud computing is generally unknown both to the public and to policy-makers. This study …


Privacy And Missing Persons After Natural Disasters, Joel Reidenberg, Robert Gellman, Jamela Debelak, Adam Elewa, Nancy Liu Mar 2013

Privacy And Missing Persons After Natural Disasters, Joel Reidenberg, Robert Gellman, Jamela Debelak, Adam Elewa, Nancy Liu

Center on Law and Information Policy

When a natural disaster occurs, government agencies, humanitarian organizations, private companies, volunteers, and others collect information about missing persons to aid the search effort. Often this processing of information about missing persons exacerbates the complexities and uncertainties of privacy rules. This report offers a road map to the legal and policy issues surrounding privacy and missing persons following natural disasters. The report first identifies the privacy challenges in the disaster context and provides some recent examples that demonstrate how disaster relief information sharing raises unique privacy concerns and issues. It then outlines current missing persons information sharing activities in the …