Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Data protection (25)
- Data privacy (23)
- Cybersecurity (16)
- International privacy law (12)
- Privacy (11)
-
- Surveillance (5)
- Machine learning (4)
- AI (3)
- Artificial intelligence (3)
- Big data (3)
- European Union (3)
- Government access (3)
- Technology (3)
- COVID-19 (2)
- Civil liberties (2)
- Cloud computing (2)
- Compliance (2)
- Data collection (2)
- Data security (2)
- National security (2)
- Personal data (2)
- Privacy law (2)
- Private-sector data (2)
- Risk management (2)
- Security (2)
- Survey (2)
- "New York" (1)
- "Tiger King" (1)
- 1960s (1)
- 2020 (1)
- Publication Year
- Publication
-
- Articles by Maurer Faculty (26)
- All Faculty Scholarship (6)
- Articles (5)
- Book Chapters (1)
- Centre for AI & Data Governance (1)
-
- Department of Electrical and Computer Engineering: Dissertations, Theses, and Student Research (1)
- Faculty Publications (1)
- Faculty Scholarship (1)
- Graduate Research Papers (1)
- Independent Study Project (ISP) Collection (1)
- Law Library Newsletters/Blog (1)
- Publications and Research (1)
- Research Collection Yong Pung How School Of Law (1)
- SPU Works (1)
- Whittier Scholars Program (1)
Articles 31 - 49 of 49
Full-Text Articles in Privacy Law
Taking Stock After Four Years, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson
Taking Stock After Four Years, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson
Articles by Maurer Faculty
No abstract provided.
The (Data Privacy) Law Hasn't Even Checked In When Technology Takes Off, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson
The (Data Privacy) Law Hasn't Even Checked In When Technology Takes Off, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson
Articles by Maurer Faculty
No abstract provided.
Systematic Government Access To Private-Sector Data Redux, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson
Systematic Government Access To Private-Sector Data Redux, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson
Articles by Maurer Faculty
No abstract provided.
Face-To-Data -- Another Developing Privacy Threat?, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson
Face-To-Data -- Another Developing Privacy Threat?, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson
Articles by Maurer Faculty
No abstract provided.
The Business Of Privacy, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson
The Business Of Privacy, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson
Articles by Maurer Faculty
No abstract provided.
The Extraterritoriality Of Data Privacy Laws -- An Explosive Issue Yet To Detonate, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson
The Extraterritoriality Of Data Privacy Laws -- An Explosive Issue Yet To Detonate, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson
Articles by Maurer Faculty
No abstract provided.
Notice And Consent In A World Of Big Data, Fred H. Cate, Viktor Mayer-Schönberger
Notice And Consent In A World Of Big Data, Fred H. Cate, Viktor Mayer-Schönberger
Articles by Maurer Faculty
- Nowadays individuals are often presented with long and complex privacy notices routinely written by lawyers for lawyers, and are then requested to either ‘consent’ or abandon the use of the desired service.
- The over-use of notice and consent presents increasing challenges in an age of ‘Big Data’.
- These phenomena are receiving attention particularly in the context of the current review of the OECD Privacy Guidelines.
- In 2012 Microsoft sponsored an initiative designed to engage leading regulators, industry executives, public interest advocates, and academic experts in frank discussions about the role of individual control and notice and consent in data protection …
Prism And Privacy: Will This Change Everything?, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson
Prism And Privacy: Will This Change Everything?, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson
Articles by Maurer Faculty
No abstract provided.
The End Of The Beginning, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson
The End Of The Beginning, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson
Articles by Maurer Faculty
No abstract provided.
The Intricacies Of Independence, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantession
The Intricacies Of Independence, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantession
Articles by Maurer Faculty
No abstract provided.
The Challenge Of "Big Data" For Data Protection, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson
The Challenge Of "Big Data" For Data Protection, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson
Articles by Maurer Faculty
No abstract provided.
Systematic Government Access To Private-Sector Data, Fred H. Cate, James X. Dempsey, Ira S. Rubenstein
Systematic Government Access To Private-Sector Data, Fred H. Cate, James X. Dempsey, Ira S. Rubenstein
Articles by Maurer Faculty
No abstract provided.
Cloud Computing: Architectural And Policy Implications, Christopher S. Yoo
Cloud Computing: Architectural And Policy Implications, Christopher S. Yoo
All Faculty Scholarship
Cloud computing has emerged as perhaps the hottest development in information technology. Despite all of the attention that it has garnered, existing analyses focus almost exclusively on the issues that surround data privacy without exploring cloud computing’s architectural and policy implications. This article offers an initial exploratory analysis in that direction. It begins by introducing key cloud computing concepts, such as service-oriented architectures, thin clients, and virtualization, and discusses the leading delivery models and deployment strategies that are being pursued by cloud computing providers. It next analyzes the economics of cloud computing in terms of reducing costs, transforming capital expenditures …
Privacy -- An Elusive Concept, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson
Privacy -- An Elusive Concept, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson
Articles by Maurer Faculty
No abstract provided.
Moving Forward Together, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson
Moving Forward Together, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson
Articles by Maurer Faculty
No abstract provided.
Editorial, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson
Editorial, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson
Articles by Maurer Faculty
No abstract provided.
When Machines Are Watching: How Warrantless Use Of Gps Surveillance Technology Violates The Fourth Amendment Right Against Unreasonable Searches, David Thaw, Priscilla Smith, Nabiha Syed, Albert Wong
When Machines Are Watching: How Warrantless Use Of Gps Surveillance Technology Violates The Fourth Amendment Right Against Unreasonable Searches, David Thaw, Priscilla Smith, Nabiha Syed, Albert Wong
Articles
Federal and state law enforcement officials throughout the nation are currently using Global Positioning System (GPS) technology for automated, prolonged surveillance without obtaining warrants. As a result, cases are proliferating in which criminal defendants are challenging law enforcement’s warrantless uses of GPS surveillance technology, and courts are looking for direction from the Supreme Court. Most recently, a split has emerged between the Ninth and D.C. Circuit Courts of Appeal on the issue. In United States v. Pineda-Moreno, the Ninth Circuit relied on United States v. Knotts — which approved the limited use of beeper technology without a warrant — to …
Let's Not Kill All The Privacy Laws (And Lawyers), Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson
Let's Not Kill All The Privacy Laws (And Lawyers), Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson
Articles by Maurer Faculty
No abstract provided.
Privacy Issues Dealing With Technology : A Review Of The Literature, Kimberly S. Mccoy
Privacy Issues Dealing With Technology : A Review Of The Literature, Kimberly S. Mccoy
Graduate Research Papers
The sophisticated applications of technology are expanding everyday. Unfortunately, so are the many concerns individuals in society are having about their right to privacy. The actual regulations dealing with one's right to privacy has not expand as rapidly as the applications of technology. Individuals using various types of technology are under the assumption their activities are private; however, this is not the case. It does not seem to matter if you are using a computer for communications work, school, or in the "privacy" of your own home, there is absolutely no privacy when dealing with this type of technology.
This …