Works matching Electronic Communications Privacy Act of 1986 (U.S.)
Results: 61
Unintended Consequences of Marketing.
- Published in:
- ISSA Journal, 2018, v. 16, n. 9, p. 7
- By:
- Publication type:
- Article
OBSCURED BY CLOUDS: THE FOURTH AMENDMENT AND SEARCHING CLOUD STORAGE ACCOUNTS THROUGH LOCALLY INSTALLED SOFTWARE.
- Published in:
- William & Mary Law Review, 2015, v. 56, n. 6, p. 2321
- By:
- Publication type:
- Article
WARRANTS IN THE CLOUDS: HOW EXTRATERRITORIAL APPLICATION OF THE STORED COMMUNICATIONS ACT THREATENS THE UNITED STATES' CLOUD STORAGE INDUSTRY.
- Published in:
- Brooklyn Journal of Corporate, Financial & Commercial Law, 2015, v. 9, n. 2, p. 661
- By:
- Publication type:
- Article
"Yours, Mine, or Ours?": Ownership and Management of Electronic Communications in Community Property Regimes.
- Published in:
- Tulane Journal of Technology & Intellectual Property, 2015, v. 18, p. 161
- By:
- Publication type:
- Article
Nail in the MLAT Coffin: Examining Alternative Solutions to the Current Mutual Legal Assistance Treaty Regime in International Cross-Border Data Sharing.
- Published in:
- North Carolina Journal of International Law, 2019, v. 44, n. 4, p. 1
- By:
- Publication type:
- Article
Who's Ready for a J.D.?
- Published in:
- ISSA Journal, 2016, v. 14, n. 10, p. 7
- By:
- Publication type:
- Article
Global Positioning Systems and Social Media--Anathemas to Privacy.
- Published in:
- Defense Counsel Journal, 2017, v. 84, n. 4, p. 1
- By:
- Publication type:
- Article
Borrowing from the Old [Common Law] To Litigate the New [Beacon Surveillance Claims].
- Published in:
- University of Chicago Legal Forum, 2018, v. 2018, p. 239
- By:
- Publication type:
- Article
DELICATE TASK": CONTENT MODERATION AND INTERMEDIARY LIABILITY IN A POST-DSA WORLD.
- Published in:
- Berkeley Technology Law Journal, 2024, v. 39, n. 4, p. 1507, doi. 10.15779/Z38GH9BB6P
- By:
- Publication type:
- Article
CONSUMER LITIGATION AS PRIVACY REGULATION: ASSESSING THE MERITS OF SESSION REPLAY WIRETAPPING CLAIMS.
- Published in:
- Berkeley Technology Law Journal, 2024, v. 39, n. 4, p. 1419, doi. 10.15779/Z38FX74072
- By:
- Publication type:
- Article
THE COMPUTER FRAUD AND ABUSE ACT: PUNISHING HACKERS AND SOLVING EMPLOYMENT DISPUTES IN THE SAME STATUTE.
- Published in:
- Northern Kentucky Law Review, 2017, v. 44, n. 1, p. 83
- By:
- Publication type:
- Article
Co-Existing Ectopic Cortisol-Producing Adenoma and Retroperitoneal Schwannoma, a Rare Case Report.
- Published in:
- 2024
- By:
- Publication type:
- Case Study
Hidden Landmines for the Family Law Practitioner: Attorney Liability under State and Federal Wiretap Statutes.
- Published in:
- Journal of the American Academy of Matrimonial Lawyers, 2015, v. 27, n. 2, p. 263
- By:
- Publication type:
- Article
The Third Party Exception: Reshaping an Imperfect Doctrine for the Digital Age.
- Published in:
- Harvard Law & Policy Review, 2014, v. 8, n. 2, p. 471
- By:
- Publication type:
- Article
Message from the TPHA President.
- Published in:
- Texas Public Health Journal, 2024, v. 76, n. 3, p. 2
- By:
- Publication type:
- Article
A MUTUAL LEGAL ASSISTANCE CASE STUDY: THE UNITED STATES AND FRANCE.
- Published in:
- Wisconsin International Law Journal, 2016, v. 34, n. 2, p. 323
- By:
- Publication type:
- Article
POSTHUMOUS PRIVACY, DECEDENT INTENT, AND POST-MORTEM ACCESS TO DIGITAL ASSETS.
- Published in:
- George Mason Law Review, 2016, v. 24, n. 1, p. 183
- By:
- Publication type:
- Article
Litigating Data Sovereignty.
- Published in:
- Yale Law Journal, 2018, v. 128, n. 2, p. 328
- By:
- Publication type:
- Article
An electrochemical proximity assay (ECPA) for antibody detection incorporating flexible spacers for improved performance.
- Published in:
- Analytical & Bioanalytical Chemistry, 2024, v. 416, n. 28, p. 6529, doi. 10.1007/s00216-024-05546-9
- By:
- Publication type:
- Article
THE QUANTIFIED SELF MOVEMENT: LEGAL CHALLENGES AND BENEFITS OF PERSONAL BIOMETRIC DATA TRACKING.
- Published in:
- Akron Intellectual Property Journal, 2014, v. 7, n. 1, p. 27
- By:
- Publication type:
- Article
Defining Cybersecurity Law.
- Published in:
- Iowa Law Review, 2018, v. 103, n. 3, p. 985
- By:
- Publication type:
- Article
No, You Can't Call Him an: Counseling clients about social media and divorce.
- Published in:
- Bench & Bar of Minnesota, 2019, v. 76, n. 3, p. 12
- By:
- Publication type:
- Article
SURVEY OF (MOSTLY OUTDATED AND OFTEN INEFFECTIVE) LAWS AFFECTING WORK-RELATED MONITORING.
- Published in:
- Chicago-Kent Law Review, 2018, v. 93, n. 1, p. 221
- By:
- Publication type:
- Article
Unauthorized Access to Computerized Information.
- Published in:
- Business Lawyer, 2017, v. 73, n. 1, p. 199
- By:
- Publication type:
- Article
FIXING WHAT'S BROKEN: THE OUTDATED GUIDELINES OF THE SCA AND ITS APPLICATION TO MODERN INFORMATION PLATFORMS.
- Published in:
- Touro Law Review, 2021, v. 37, n. 3, p. 1
- By:
- Publication type:
- Article
DECRYPTING THE FOURTH AMENDMENT: APPLYING FOURTH AMENDMENT PRINCIPLES TO EVOLVING PRIVACY EXPECTATIONS IN ENCRYPTION TECHNOLOGIES.
- Published in:
- Loyola of Los Angeles Law Review, 2019, v. 50, n. 4, p. 765
- By:
- Publication type:
- Article
COUNTERACTING DIMINISHED PRIVACY IN AN AUGMENTED REALITY: PROTECTING GEOLOCATION PRIVACY.
- Published in:
- Loyola of Los Angeles Law Review, 2019, v. 50, n. 4, p. 713
- By:
- Publication type:
- Article
BIOMETRICS: THE FUTURE IS IN YOUR HANDS.
- Published in:
- Loyola of Los Angeles Law Review, 2019, v. 50, n. 4, p. 663
- By:
- Publication type:
- Article
DEAR YAHOO: A COMMENT ON IN RE YAHOO MAIL LITIGATION.
- Published in:
- Loyola of Los Angeles Law Review, 2015, v. 48, n. 4, p. 1287
- By:
- Publication type:
- Article
THE "ORWELLIAN CONSEQUENCE" OF SMARTPHONE TRACKING: WHY A WARRANT UNDER THE FOURTH AMENDMENT IS REQUIRED PRIOR TO COLLECTION OF GPS DATA FROM SMARTPHONES.
- Published in:
- Cleveland State Law Review, 2014, v. 62, n. 1, p. 211
- By:
- Publication type:
- Article
Zero-Day Delivery: Hacking Risks and the Use of Machine Learning for Military Logistics.
- Published in:
- Journal of National Security Law & Policy, 2024, v. 14, n. 3, p. 399
- By:
- Publication type:
- Article
ENCRYPTION<sup>CONGRESS</sup> MOD (APPLE + CALEA).
- Published in:
- Harvard Journal of Law & Technology, 2017, v. 30, n. 2, p. 355
- By:
- Publication type:
- Article
THREE'S A CROWD: TOWARDS CONTEXTUAL INTEGRITY IN THIRD-PARTY DATA SHARING.
- Published in:
- Harvard Journal of Law & Technology, 2014, v. 28, n. 1, p. 325
- By:
- Publication type:
- Article
"YOU'VE TAKEN ALL YOU CAN BEAR": REPLACING THE RICKETY FRAMEWORK FOR LAW ENFORCEMENT ACCESS TO PRIVATE COMMUNICATIONS.
- Published in:
- Harvard Journal on Legislation, 2018, v. 55, n. 1, p. 209
- By:
- Publication type:
- Article
The Security Governance and Strategic Stability Challenges of Artificial Intelligence amid Major-Power Competition.
- Published in:
- China International Studies, 2024, n. 106, p. 149
- By:
- Publication type:
- Article
THE FOURTH AMENDMENT-- ARE MOBILE PHONES Now GOVERNMENTAL TRACKING DEVICES?
- Published in:
- SMU Law Review, 2014, v. 67, n. 1, p. 211
- By:
- Publication type:
- Article
FOURTH AMENDMENT NOTICE IN THE CLOUD.
- Published in:
- Boston University Law Review, 2023, v. 103, n. 4, p. 1201
- By:
- Publication type:
- Article
TEACHING CRIMINAL PROCEDURE--ESPECIALLY THE FOURTH AMENDMENT ON ELECTRONIC SURVEILLANCE-- TO EVERYONE BUT LAW STUDENTS.
- Published in:
- St. Louis University Law Journal, 2016, v. 60, n. 3, p. 507
- By:
- Publication type:
- Article
COVER YOUR WEBCAM: THE ECPA'S LACK OF PROTECTION AGAINST SOFTWARE THAT COULD BE WATCHING YOU.
- Published in:
- Cornell Law Review, 2015, v. 100, n. 5, p. 1191
- By:
- Publication type:
- Article
REMOTE SENSING OF PRIVATE DATA BY DRONES IS MOSTLY UNREGULATED: REASONABLE EXPECTATIONS OF PRIVACY ARE AT RISK ABSENT COMPREHENSIVE FEDERAL LEGISLATION.
- Published in:
- North Dakota Law Review, 2015, v. 90, n. 3, p. 463
- By:
- Publication type:
- Article
THE SKY'S THE LIMIT: TWENTY-FIRST CENTURY SEARCHES OF HARD - DRIVES, SMARTPHONE APPLICATIONS, & THE CLOUD.
- Published in:
- North Dakota Law Review, 2014, v. 90, n. 1, p. 171
- By:
- Publication type:
- Article
Cellphones, Stingrays, and Searches! An Inquiry into the Legality of Cellular Location Information.
- Published in:
- University of Miami Law Review, 2016, v. 70, n. 4, p. 1252
- By:
- Publication type:
- Article
MOLECULAR CHARACTERIZATION OF ENTEROPATHOGENIC E. COLI (EPEC) AND SHIGA-TOXIN PRODUCING E. COLI (STEC) FROM DOMESTIC ANIMALS: PREVALENCE, VIRULENCE, COLONIZATION FACTORS AND THEIR ANTIMICROBIAL RESISTANCE.
- Published in:
- Exploratory Animal & Medical Research, 2024, v. 14, p. 42, doi. 10.52635/eamr/14(S2)42-50
- By:
- Publication type:
- Article
Extraterritorial Application of the Stored Communications Act: Why Microsoft Corp. v. United States Signals That Technology Has Surpassed the Law.
- Published in:
- Kansas Law Review, 2017, v. 66, n. 2, p. 459
- By:
- Publication type:
- Article
Privacy and Spouses in Louisiana: The Community Property Conundrum and Proposals for Reform.
- Published in:
- Tulane Law Review, 2017, v. 92, n. 1, p. 219
- By:
- Publication type:
- Article
BRINGING AN END TO THE WIRETAP ACT AS DATA PRIVACY LEGISLATION.
- Published in:
- Case Western Reserve Law Review, 2019, v. 70, n. 2, p. 457
- By:
- Publication type:
- Article
BRINGING AN END TO THE WIRETAP ACT AS DATA PRIVACY LEGISLATION.
- Published in:
- Case Western Reserve Law Review, 2019, v. 70, n. 2, p. 457
- By:
- Publication type:
- Article
A Spaceborne Ka‐Band Earth‐Coverage Phased Array Antenna Based on DBF‐Shared Subarray for LEO Communications.
- Published in:
- International Journal of RF & Microwave Computer-Aided Engineering, 2024, v. 2024, p. 1, doi. 10.1155/mmce/6566907
- By:
- Publication type:
- Article
CANYOU FINDME NOW? The Federal Government's Attempt to Track Criminal Suspects Using Their Cell Phones.
- Published in:
- Arizona State Law Journal, 2011, v. 43, n. 2, p. 591
- By:
- Publication type:
- Article
DESIGNING SURVEILLANCE LAW.
- Published in:
- 2011
- By:
- Publication type:
- Essay