Search Results - "Schwartz, Paul M"
-
1
Global data privacy: The EU way
Published in New York University law review (1950) (01-10-2019)“…EU data protection law is playing an increasingly prominent role in today's global technological environment. The cornerstone of EU law in this area, the…”
Get full text
Journal Article -
2
THE EU-U.S. PRIVACY COLLISION: A TURN TO INSTITUTIONS AND PROCEDURES
Published in Harvard law review (01-05-2013)“…Internet scholarship in the United States generally concentrates on how decisions made in this country about copyright law, network neutrality, and other…”
Get full text
Journal Article -
3
LEGAL ACCESS TO THE GLOBAL CLOUD
Published in Columbia law review (01-10-2018)“…Increased use of the cloud and its international scope raise significant challenges to traditional legal authorities that permit access to data stored outside…”
Get full text
Journal Article -
4
Transatlantic data privacy law
Published in The Georgetown law journal (01-11-2017)“…International flows of personal information are more significant than ever, but differences in transatlantic data privacy law imperil this data trade. The…”
Get full text
Journal Article -
5
The PII problem: Privacy and a new concept of personally identifiable information
Published in New York University law review (1950) (01-12-2011)“…Personally identifiable information (PII) is one of the most central concepts in information privacy regulation. The scope of privacy laws typically turns on…”
Get full text
Journal Article -
6
Reconciling Personal Information in the United States and European Union
Published in California law review (01-08-2014)“…U.S. and EU privacy law diverge greatly. At the foundational level, they differ in their underlying philosophy: In the United States, privacy law focuses on…”
Get full text
Journal Article -
7
INFORMATION PRIVACY IN THE CLOUD
Published in University of Pennsylvania law review (01-05-2013)“…Cloud computing is the locating of computing resources on the Internet in a fashion that makes them highly dynamic and scalable. This kind of distributed…”
Get full text
Journal Article -
8
Notification of Data Security Breaches
Published in Michigan law review (01-03-2007)“…The law increasingly requires private companies to disclose information for the benefit of consumers. The latest examples of such regulation are state and…”
Get full text
Journal Article -
9
Warrantless Wiretapping, FISA Reform, and the Lessons of Public Liberty: A Comment on Holmes's Jorde Lecture
Published in California law review (01-04-2009)“…The central metaphor of Stephen Holmes's Jorde Lecture is a haunting one: it is of emergency room personnel taking time and care during a life-threatening…”
Get full text
Journal Article -
10
The Data Privacy Law of Brexit: Theories of Preference Change
Published in Theoretical inquiries in law (27-07-2021)“…Upon Brexit, the United Kingdom chose to follow the path of EU data protection and remain tied to the requirements of the General Data Protection Regulation…”
Get full text
Journal Article -
11
ALI Data Privacy: Overview and Black Letter Text
Published in UCLA law review (01-01-2022)“…In this Article, the Reporters for the American Law Institute Principles of Law, Data Privacy provide an overview of the project as well as the text of its…”
Get full text
Journal Article -
12
Property, Privacy, and Personal Data
Published in Harvard law review (01-05-2004)“…Modern computing technologies and the Internet have generated the capacity to gather, manipulate, and share massive quantities of data; this capacity, in turn,…”
Get full text
Journal Article -
13
Preemption and Privacy
Published in The Yale law journal (01-03-2009)“…A broad coalition, including companies formerly opposed to the enactment of privacy statutes, has now formed behind the idea of a national information privacy…”
Get full text
Journal Article -
14
A Fractal Landscape Realizer for Generating Synthetic Maps
Published in Conservation ecology (01-06-2002)“…A fractal landscape realizer has been developed that generates synthetic landscape maps to user specifications. The alternative landscape realizations are not…”
Get full text
Journal Article -
15
Prosser's "Privacy" and the German Right of Personality: Are Four Privacy Torts Better than One Unitary Concept?
Published in California law review (01-12-2010)“…After fifty years, William Prosser's article Privacy rests securely in the canon of classic American law review articles. At the fiftieth anniversary of…”
Get full text
Journal Article -
16
Persistent Shoulder Pain Due to a Suprascapular Nerve Injury in the Setting of Trauma
Published in Curēus (Palo Alto, CA) (11-03-2019)“…Suprascapular neuropathy is a rare cause of shoulder pain with an injury to the nerve intrinsically related to the anatomy and course of the suprascapular…”
Get full text
Journal Article -
17
Reviving Telecommunications Surveillance Law
Published in The University of Chicago law review (01-12-2008)“…Consider three questions. How would one decide if there was too much telecommunications surveillance in the US or too little? How would one know if law…”
Get full text
Journal Article -
18
Privacy and democracy in cyberspace
Published in Vanderbilt law review (01-11-1999)“…The widespread, silent collection of personal information in cyberspace is depicted. At present, it is impossible to know the fate of the personal data that…”
Get full text
Journal Article -
19
Data Mining and Internet Profiling: Emerging Regulatory and Technological Approaches
Published in The University of Chicago law review (01-12-2008)“…The Septermber 11 terrorists, before their deadly attacks, sought invisibility through integration into the society they hoped to destroy. This strategy has…”
Get full text
Journal Article -
20
Beyond the "War" on Terrorism: Towards the New Intelligence Network
Published in Michigan Law Review (01-05-2005)“…In 'Terrorism, Freedom, and Security', Philip B. Heymann undertakes a wide-ranging study of how the United States can - and in his view should - respond to the…”
Get full text
Book Review Journal Article