Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Law

Reasonableness Meets Requirements: Regulating Security And Privacy In Software, Paul N. Otto Nov 2009

Reasonableness Meets Requirements: Regulating Security And Privacy In Software, Paul N. Otto

Duke Law Journal

Software security and privacy issues regularly grab headlines amid fears of identity theft, data breaches, and threats to security. Policymakers have responded with a variety of approaches to combat such risk. Suggested measures include promulgation of strict rules, enactment of open-ended standards, and, at times, abstention in favor of allowing market forces to intervene. This Note lays out the basis for understanding how both policymakers and engineers should proceed in an increasingly software-dependent society. After explaining what distinguishes software-based systems from other objects of regulation, this Note argues that policymakers should pursue standards-based approaches to regulating software security and privacy. …


The U.S. Discovery-Eu Privacy Directive Conflict: Constructing A Three-Tiered Compliance Strategy, Carla L. Reyes Jan 2009

The U.S. Discovery-Eu Privacy Directive Conflict: Constructing A Three-Tiered Compliance Strategy, Carla L. Reyes

Duke Journal of Comparative & International Law

No abstract provided.


Privacy Protection: When Is “Adequate” Actually Adequate?, Nikhil S. Palekar Apr 2008

Privacy Protection: When Is “Adequate” Actually Adequate?, Nikhil S. Palekar

Duke Journal of Comparative & International Law

No abstract provided.


Encryption’S Importance To Economic And Infrastructure Security, F. Lynn Mcnulty Apr 1999

Encryption’S Importance To Economic And Infrastructure Security, F. Lynn Mcnulty

Duke Journal of Comparative & International Law

No abstract provided.