Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Privacy (6)
- National security (4)
- NSA (3)
- Cybersecurity (2)
- Data Privacy (2)
-
- Drones (2)
- Law (2)
- National Security Agency (2)
- Privacy Law (2)
- Surveillance (2)
- Aerial surveillance (1)
- Amnesty International (1)
- Argentina (1)
- Avatars (1)
- Big data (1)
- Biographic data (1)
- Biometric data (1)
- CIA (1)
- Chile (1)
- Clapper (1)
- Critical Global Classroom (1)
- Cyber Law (1)
- Cybersurveillance (1)
- Data fusion (1)
- Data science (1)
- Data security (1)
- Dataveillance (1)
- Daubert (1)
- Ely (1)
- FISA (1)
Articles 1 - 10 of 10
Full-Text Articles in Privacy Law
Implications For The Future Of Global Data Security And Privacy: The Territorial Application Of The Stored Communications Act And The Microsoft Case, Russell Hsiao
Catholic University Journal of Law and Technology
No abstract provided.
Submarine Cables, Cybersecurity And International Law: An Intersectional Analysis, Tara Davenport
Submarine Cables, Cybersecurity And International Law: An Intersectional Analysis, Tara Davenport
Catholic University Journal of Law and Technology
No abstract provided.
Eliminating The No Number, No List Response; Keeping The Cia Within The Scope Of The Law Amidst America's Global War On Terror, Joseph Meissner
Eliminating The No Number, No List Response; Keeping The Cia Within The Scope Of The Law Amidst America's Global War On Terror, Joseph Meissner
Nevada Law Journal
No abstract provided.
Drones: Updating The Fourth Amendment And The Technological Trespass Doctrine, S. Alex Spelman
Drones: Updating The Fourth Amendment And The Technological Trespass Doctrine, S. Alex Spelman
Nevada Law Journal
No abstract provided.
Small Data Surveillance V. Big Data Cybersurveillance, Margaret Hu
Small Data Surveillance V. Big Data Cybersurveillance, Margaret Hu
Pepperdine Law Review
This Article highlights some of the critical distinctions between small data surveillance and big data cybersurveillance as methods of intelligence gathering. Specifically, in the intelligence context, it appears that “collect-it-all” tools in a big data world can now potentially facilitate the construction, by the intelligence community, of other individuals' digital avatars. The digital avatar can be understood as a virtual representation of our digital selves and may serve as a potential proxy for an actual person. This construction may be enabled through processes such as the data fusion of biometric and biographic data, or the digital data fusion of the …
Standing And Covert Surveillance, Christopher Slobogin
Standing And Covert Surveillance, Christopher Slobogin
Pepperdine Law Review
This Article describes and analyzes standing doctrine as it applies to covert government surveillance, focusing on practices thought to be conducted by the National Security Agency. Primarily because of its desire to avoid judicial incursions into the political process, the Supreme Court has construed its standing doctrine in a way that makes challenges to covert surveillance very difficult. Properly understood, however, such challenges do not call for judicial trenching on the power of the legislative and executive branches. Instead, they ask the courts to ensure that the political branches function properly. This political process theory of standing can rejuvenate the …
Trading Privacy For Angry Birds: A Call For Courts To Reevaluate Privacy Expectations In Modern Smartphones, Jeremy Andrew Ciarabellini
Trading Privacy For Angry Birds: A Call For Courts To Reevaluate Privacy Expectations In Modern Smartphones, Jeremy Andrew Ciarabellini
Seattle University Law Review
Of all the smartphone uses, the calling function is probably used the least. Rather, individuals more commonly use their smartphone for surfing the web, checking Facebook, and playing games. Highlighting the “smart” in smartphone, these phones often know more about their users’ daily activities than the users. Without requiring any sort of input, smartphones can tell the user how many steps they walk each day, when it is time to leave for work (also, of course, determining the traveling time with the most up-to-date traffic reports), and when an item recently ordered on Amazon will be delivered. Smartphone users may …
Authorized Investigation: A Temperate Alternative To Cyber Insecurity, Casey M. Bruner
Authorized Investigation: A Temperate Alternative To Cyber Insecurity, Casey M. Bruner
Seattle University Law Review
This Note aims to show that legal structures created to protect the Internet in its original form are completely insufficient to protect what the Internet has become. This antiquated legal framework is exacerbating the problem. The breadth of activity that the current law restricts severely limits the remedies that cyberattack victims can pursue, and it must be updated. While full hack-back may prove necessary in the long run, I argue for a more temperate initial response to the problem—I call this response “authorized investigation.” Specifically, the Computer Fraud and Abuse Act should be amended to allow victims access to their …
Clapper V. Amnesty International Usa: Balancing National Security And Individuals' Privacy, Kristen Choi
Clapper V. Amnesty International Usa: Balancing National Security And Individuals' Privacy, Kristen Choi
Journal of the National Association of Administrative Law Judiciary
No abstract provided.
Habeas Data: Comparative Constitutional Interventions From Latin America Against Neoliberal States Of Insecurity And Surveillance, Marc Tizoc Gonzalez
Habeas Data: Comparative Constitutional Interventions From Latin America Against Neoliberal States Of Insecurity And Surveillance, Marc Tizoc Gonzalez
Chicago-Kent Law Review
To cultivate the next twenty years of LatCrit theory, praxis, and community, the afterword looks back to LatCrit’s Critical Global Classroom (2003–04) (CGC), an ABA-accredited summer study-abroad program. The CGC invited U.S. law students to study comparative constitutionalism, law and society, and truth and reconciliation movements while sojourning Chile, Argentina, and South Africa under the question: “Shall the recent history of the Global South become the imminent fate of the Global North?” While enrolled in the 2004 CGC, the author learned about the extraordinary constitutional writ of habeas data, which various Latin American countries adopted as they reconstituted their …