Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Law

Gerrymandering And Conceit: The Supreme Court's Conflict With Itself, Mckay Cunningham Jan 2018

Gerrymandering And Conceit: The Supreme Court's Conflict With Itself, Mckay Cunningham

McKay Cunningham

In November 2016, a federal court struck as unconstitutional Wisconsin’s redistricting map under both the First Amendment and the Equal Protection Clause. The court’s decision in Whitford v. Gill marks the first time a federal court invalidated a redistricting map as unconstitutional for partisan gerrymandering in over thirty years. Wisconsin has appealed the decision to the United States Supreme Court, which recently granted review. The Supreme Court has long held that extreme partisan gerrymandering violates equal protection but has simultaneously refused to determine the merits of gerrymandering disputes, instead labeling them as non-justiciable political questions. In particular, the Court has …


Privacy In The Age Of The Hacker: Balancing Global Privacy And Data Security Law, Cunningham, Mckay, Mckay Cunningham Jan 2018

Privacy In The Age Of The Hacker: Balancing Global Privacy And Data Security Law, Cunningham, Mckay, Mckay Cunningham

McKay Cunningham

The twin goals of privacy and data security share a fascinating symbiotic relationship: too much of one undermines the other. The international regulatory climate, embodied principally by the European Union’s 1995 Directive, increasingly promotes privacy. In the last two decades, fifty-three countries enacted national legislation largely patterned after the E.U. Directive. These laws, by and large, protect privacy by restricting data processing and data transfers.

At the same time, hacking, malware, and other cyber-threats continue to grow in frequency and sophistication. In 2010, one security firm recorded 286 million variants of malware and reported that 232.4 million identities were exposed. …