Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Data protection (3)
- Cybersecurity (2)
- Data privacy (2)
- International privacy law (2)
- All Other Telecommunications (1)
-
- Data encryption (Computer science) (1)
- Data protection regulations (1)
- Dissemination of information (1)
- European Union (1)
- Free speech (1)
- Mark Tunick (1)
- National Security (1)
- National security -- United States (1)
- Privacy (1)
- Privacy protection (1)
- Privacy rights (1)
- Right of privacy (1)
- Risk management (1)
- Searches & seizures (Law) (1)
- Social media (1)
- Telecommunication (1)
- Telecommunications Resellers; Other telecommunications; Communication Equipment Repair and Maintenance (1)
- United States Foreign Intelligence Surveillance Act of 1978 (1)
- United States National Security Agency (1)
- Publication Type
Articles 1 - 5 of 5
Full-Text Articles in Law
Furtive Encryption: Power, Trusts, And The Constitutional Cost Of Collective Surveillance, Jeffrey L. Vagle
Furtive Encryption: Power, Trusts, And The Constitutional Cost Of Collective Surveillance, Jeffrey L. Vagle
Indiana Law Journal
Recent revelations of heretofore secret U.S. government surveillance programs have sparked national conversations about their constitutionality and the delicate balance between security and civil liberties in a constitutional democracy. Among the revealed policies asserted by the National Security Agency (NSA) is a provision found in the “minimization procedures” required under section 702 of the Foreign Intelligence Surveillance Act of 1978. This provision allows the NSA to collect and keep indefinitely any encrypted information collected from domestic communications—including the communications of U.S. citizens. That is, according to the U.S. government, the mere fact that a U.S. citizen has encrypted her electronic …
Book Review. Balancing Privacy And Free Speech: Unwanted Attention In The Age Of Social Media By Mark Tunick, Kimberly Mattioli
Book Review. Balancing Privacy And Free Speech: Unwanted Attention In The Age Of Social Media By Mark Tunick, Kimberly Mattioli
Articles by Maurer Faculty
No abstract provided.
The Data Protection Credibility Crisis, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson, Orla Lynskey
The Data Protection Credibility Crisis, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson, Orla Lynskey
Articles by Maurer Faculty
No abstract provided.
Risk Management In Data Protection, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson, Orla Lynskey
Risk Management In Data Protection, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson, Orla Lynskey
Articles by Maurer Faculty
No abstract provided.
Internet Balkanization Gathers Pace: Is Privacy The Real Driver?, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson, Orla Lynskey
Internet Balkanization Gathers Pace: Is Privacy The Real Driver?, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson, Orla Lynskey
Articles by Maurer Faculty
No abstract provided.