This Article identifies and describes three data privacy policy developments from recent legislative sessions that may seem unrelated, but which I contend together offer clues about privacy law’s future over the short-to-medium term. The first is the proliferation, worldwide and in U.S. states, of legislative proposals and statutes referred to as “age-appropriate design codes.” Originating in the United Kingdom, age-appropriate design codes typically apply to online services “directed to children” and subject such services to transparency, default settings, and other requirements. Chief among them is an implied obligation to conduct ongoing assessments of whether a service could be deemed “directed to children” such that it triggers applica...
The central role that privacy concerns have in regulating the Internet, and in shaping the future us...
This two-part study employed 11 qualitative interviews, the Defining Issues Test (DIT) and a quantit...
This White Paper explores the legal dimensions of the European Union (EU)’s value-driven cybersecuri...
This article undertakes a normative and empirical legal inquiry into the manner information security...
The FBI's use of National Security Letters (NSLs) to secretly demand customer records from communica...
This thesis analyses the policy process of adoption of the General Data Protection Regulation (GDPR)...
This is a study of the intersection of law and ethics as they address the professional practice of j...
This article analyzes the possible models for regulating the use of Internet-based virtual worlds by...
A fruitful direction for future data mining research will be the development of technique that incor...
Within the last century, interrogation practices throughout the United States have notably changed. ...
This study aimed to understand the U.S. courts reasoning for either accepting or rejecting the neutr...
This dissertation consists of three essays addressing two issues related to crime and tax evasion. T...
Territorial privacy, one of the central categories of privacy protection, involves setting limit bou...
This paper analyzes three competition regulations in the European Community—article 85 and 86 of the...
This study investigates the impact body-worn cameras (BWCs) will have on police-citizen encounters. ...
The central role that privacy concerns have in regulating the Internet, and in shaping the future us...
This two-part study employed 11 qualitative interviews, the Defining Issues Test (DIT) and a quantit...
This White Paper explores the legal dimensions of the European Union (EU)’s value-driven cybersecuri...
This article undertakes a normative and empirical legal inquiry into the manner information security...
The FBI's use of National Security Letters (NSLs) to secretly demand customer records from communica...
This thesis analyses the policy process of adoption of the General Data Protection Regulation (GDPR)...
This is a study of the intersection of law and ethics as they address the professional practice of j...
This article analyzes the possible models for regulating the use of Internet-based virtual worlds by...
A fruitful direction for future data mining research will be the development of technique that incor...
Within the last century, interrogation practices throughout the United States have notably changed. ...
This study aimed to understand the U.S. courts reasoning for either accepting or rejecting the neutr...
This dissertation consists of three essays addressing two issues related to crime and tax evasion. T...
Territorial privacy, one of the central categories of privacy protection, involves setting limit bou...
This paper analyzes three competition regulations in the European Community—article 85 and 86 of the...
This study investigates the impact body-worn cameras (BWCs) will have on police-citizen encounters. ...
The central role that privacy concerns have in regulating the Internet, and in shaping the future us...
This two-part study employed 11 qualitative interviews, the Defining Issues Test (DIT) and a quantit...
This White Paper explores the legal dimensions of the European Union (EU)’s value-driven cybersecuri...