Open Access. Powered by Scholars. Published by Universities.®

Privacy Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Privacy Law

Constitutional Confidentiality, Natalie Ram, Jorge L. Contreras, Laura M. Beskow, Leslie E. Wolf Oct 2023

Constitutional Confidentiality, Natalie Ram, Jorge L. Contreras, Laura M. Beskow, Leslie E. Wolf

Washington and Lee Law Review

Federal Certificates of Confidentiality (“Certificates”) protect sensitive information about human research subjects from disclosure and use in judicial, administrative, and legislative proceedings at both the state and federal levels. When they were first authorized by Congress in the 1970s, Certificates covered sensitive information collected in research about drug addiction use. Today, however, they extend to virtually all personal information gathered by biomedical research studies. The broad reach of Certificates, coupled with their power to override state subpoenas and warrants issued in the context of law enforcement, abortion regulation, and other police powers typically under state control, beg the question whether …


Comment: The Necessary Evolution Of State Data Breach Notification Laws: Keeping Pace With New Cyber Threats, Quantum Decryption, And The Rapid Expansion Of Technology, Beth Burgin Waller, Elaine Mccafferty Jan 2022

Comment: The Necessary Evolution Of State Data Breach Notification Laws: Keeping Pace With New Cyber Threats, Quantum Decryption, And The Rapid Expansion Of Technology, Beth Burgin Waller, Elaine Mccafferty

Washington and Lee Law Review

The legal framework that was built almost two decades ago now struggles to keep pace with the rapid expansion of technology, including quantum computing and artificial intelligence, and an ever-evolving cyber threat landscape. In 2002, California passed the first data breach notification law, with all fifty states following suit to require notice of unauthorized access to and acquisition of an individual’s personal information.1 These data breach notification laws, originally designed to capture one-off unauthorized views of data in a computerized database, were not built to address PowerShell scripts by cyber terrorists run across thousands of servers, leaving automated accessed data …