Paul N. Otto has a Note in the October issue of Duke Law Review, “Reasonableness meets requirements: Regulating security and privacy in software.” Here’s the Abstract: Software security and privacy issues regularly grab headlines amid fears of identity theft, data breaches, and threats to security. Policymakers have responded with a variety of approaches to combat…
Category: Misc
Article: From Privacy To Liberty: The Fourth Amendment After Lawrence
Thomas P. Crocker has an article (pdf) in the current issue of UCLA Law Review. Here’s the abstract: This Article explores a conflict between the protections afforded interpersonal relations in Lawrence v. Texas and the vulnerability experienced under the Fourth Amendment by individuals who share their lives with others. Under the Supreme Court’s third-party doctrine,…
Article: Preemption and Privacy
Paul M. Schwartz has an article (pdf) in Yale Law Review that provides much food for thought. Here’s the abstract: A broad coalition, including companies formerly opposed to the enactment of privacy statutes, has now formed behind the idea of a national information privacy law. Among the benefits that proponents attribute to such a law…
Sex texting love rats on notice
It’s a technological breakthrough that will worry cheating partners – secret text messages can now be retrieved from mobilephones five years after they were deleted. Shaped like an ice hockey puck, the XRY forensic device mines old SIM cards for long-erased nuggets of personal information. Kim Khor is director of Khor Wills & Associates –…