Search

Your search keyword '"Data security -- Laws, regulations and rules"' showing total 21,806 results

Search Constraints

Start Over You searched for: Descriptor "Data security -- Laws, regulations and rules" Remove constraint Descriptor: "Data security -- Laws, regulations and rules"
21,806 results on '"Data security -- Laws, regulations and rules"'

Search Results

1. Unchecked Checkpoints: Why TSA's Facial Recognition Plan May Need Congressional Approval.

2. Revisiting Code-as-Law: Regulation and Extended Reality.

3. Towards Future-Proof, Rights-Respecting Automated Data Collection: An Examination of European Jurisprudence.

4. The Privacy Paradox in Discovery.

5. THE PRESIDENT'S AUTHORITY OVER CROSS-BORDER DATA FLOWS.

6. Taxation of Information and the Data Revolution.

7. Artificial Intelligence (AI) Law, Rights & Ethics.

8. Artificial Intelligence (AI) Law, Rights & Ethics.

9. Data as Likeness

10. Dystopian Dreams, Utopian Nightmares: AI and the Permanence of Racism.

11. Thinking of a Master Plan: Data Citizenship/Ownership as a Portal to an Unfettered Black Universal Basic Income.

12. Political Spam: Why It Sucks and How To Fix It.

13. The Necessary and Proper Stewardship of Judicial Data.

14. BAYOU-METRICS: HOW LOUISIANA CAN PROTECT ITS CITIZENS IN A BIOMETRICS-INTENSIVE WORLD.

15. THE KIDS ARE NOT ALRIGHT: NEGATIVE CONSEQUENCES OF STUDENT DEVICE AND ACCOUNT SURVEILLANCE.

16. Musk’s anticipated cost-cutting hacks could weaken American cybersecurity

17. NIS2’s cybersecurity value spreads beyond its expanded scope

18. The Fourth Amendment State Agency Requirement: Some Doubts.

19. Power to the people tech: Our panel posits that artificial intelligence isn't the only technology trend making waves in accounting firms and finance departments.

20. NAVIGATING DISCOVERY IN data privacy cases: These four takeaways can help you find your way through common e-discovery issues in data privacy and data breach cases.

21. Data as Likeness.

22. THE LEGAL IMPLICATIONS OF REMOTE EXAM PROCTORING: EXTENDING FEDERAL LAW TO PROTECT STUDENT PRIVACY.

23. SECURITY AS A SUPERSTITION: The Constitution as a Potential Ritual.

24. Synthetic Data: Legal Implications of the Data-Generation Revolution.

25. Gather around the table: Tabletop exercises help bank leaders prep for cybersecurity risks

26. Building a Practice at the Intersection of Blockchain and Law.

27. SURVEILLANCE CLASS ACTIONS: RECONSTRUCTING A FEDERAL DATA PRIVACY PRIVATE RIGHT OF ACTION.

28. DATA SHARING AGREEMENTS: CONTRACTING PERSONAL INFORMATION IN THE DIGITAL AGE

31. FACING UP TO INTERNET GIANTS.

32. A Tragedy in Three Acts: Discrimination, Retaliation, and FERPA.

33. Data Localization: From China and Beyond.

34. ANALYSIS OF GLOBAL DATA PRIVACY REGULATIONS AND HOW TRANSNATIONAL COMPANIES ARE IMPACTED.

35. A Global Crypto Code of Conduct: Crafting an Internationally Centralized Regulatory Body for a Decentralized Asset.

36. Addressing Unlawful Cyber Operations in Armed Conflict Through Human Rights Bodies Instead of the International Criminal Court.

37. Vehicle Data Forensics and Legal Considerations.

38. CONFLICTS OF LAW AND THE ABORTION WAR BETWEEN THE STATES.

39. SETTING THE FRAMEWORK FOR ACCOUNTABILITY FOR ALGORITHMIC DISCRIMINATION AT WORK.

40. Mass Surveillance Is Dangerous for American Communities: Reforming the Section 702 Spying Regime.

41. Are Geofence Warrants Headed for Extinction?

42. X's privacy dilemma: When blocking is not really blocking anymore

43. A New Rule Will Force Banks to Protect Your Data

44. Meta fines for storing user passwords in plaintext instead of encrypting them

45. Privacy the path to profits, firm says; Transparency about data can be an edge

46. SUPERPOWERS WITH VILLAINOUS OBJECTIVES: HOW THE EXECUTIVE BRANCH'S IMMIGRATION ENFORCEMENT 'POWERS' UTILIZE TECHNOLOGY TO VIOLATE NONCITIZENS' PRIVACY.

47. ARE TRADE SECRET PROTECTIONS IN GOVERNMENT CONTRACTS ADEQUATE? AN ANALYSIS OF FOIA EXEMPTION 4 AND DATA RIGHTS.

48. Crouching Tiger, Hidden Agenda? The Emergence of China in the Global Internet Standard-Setting Arena.

49. Decriminalizing Trivial Computer Use: The Need to Narrow the Computer Fraud and Abuse Act (CFAA) After Van Buren.

50. From One Sector to Another: Applying a Proactive Framework to the FCC's Network Resiliency Efforts.

Catalog

Books, media, physical & digital resources