Search

Your search keyword '"ELECTRONIC surveillance laws"' showing total 426 results

Search Constraints

Start Over You searched for: Descriptor "ELECTRONIC surveillance laws" Remove constraint Descriptor: "ELECTRONIC surveillance laws"
426 results on '"ELECTRONIC surveillance laws"'

Search Results

1. FOURTH AMENDMENT NOTICE IN THE CLOUD.

2. INTERNATIONAL DATA FLOWS: A SCHREMS II ASSESSMENT OF ELECTRONIC SURVEILLANCE LAWS IN AUSTRALIA.

3. CRIMINAL PROCEDURE — FOURTH AMENDMENT — SEVENTH CIRCUIT HOLDS LONG-TERM, WARRANTLESS VIDEO SURVEILLANCE IS NOT AN ILLEGAL SEARCH. — United States v. Tuggle, 4 F.4th 505 (7th Cir. 2021).

4. Behind the Curve: Schrems II and the Need for Increased U.S. Data Protections in a Global Economy.

5. Israel's SIGINT Oversight Ecosystem: COVID-19 Secret Location Tracking as a Test Case.

7. Race, Surveillance, Resistance.

8. Secrecy and surveillance: lessons from the law of IMSI catchers.

9. FLORIDA NEEDS TO PROTECT GRANDMA & GRANDPA.

11. China's Hukou Platform: Windows into the Family.

12. The Privacy Hierarchy: A Comparative Analysis of the Intimate Privacy Protection Act vs. the Geolocational Privacy and Surveillance Act.

13. FISA Overview.

14. TIGER BY THE TAIL?: NAVIGATING MODERN TECHNOLOGIES AND PRIVACY INTERESTS.

15. EXPOSING SECRET SEARCHES: A FIRST AMENDMENT RIGHT OF ACCESS TO ELECTRONIC SURVEILLANCE ORDERS.

16. An Analysis of New Zealand Intelligence and Security Agency Powers to Intercept Private Communications: Necessary and Proportionate?

17. "YOU'VE TAKEN ALL YOU CAN BEAR": REPLACING THE RICKETY FRAMEWORK FOR LAW ENFORCEMENT ACCESS TO PRIVATE COMMUNICATIONS.

18. Surveillance Remedies: Stingrays and the Exclusionary Rule.

19. A Bill to Bug Aliens.

20. A Hailstorm of Uncertainty: The Constitutional Quandary of Cell-Site Simulators.

21. Judicial Engagement with Surveillance Technology.

23. Everything Radiates: Does the Fourth Amendment Regulate Side-Channel Cryptanalysis?

24. Digital Surveillance and Preventive Policing.

25. Tagging re-booted! Imagining the potential of victim-oriented electronic monitoring.

26. Global Cybersecurity, Surveillance, and Privacy: The Obama Administration's Conflicted Legacy.

27. Stingray Confidential.

28. NEXT GENERATION FOREIGN INTELLIGENCE SURVEILLANCE LAW: RENEWING 702.

29. HIDING IN PLAIN SIGHT: A FOURTH AMENDMENT FRAMEWORK FOR ANALYZING GOVERNMENT SURVEILLANCE IN PUBLIC.

30. CYBER ESPIONAGE AND ELECTRONIC SURVEILLANCE: BEYOND THE MEDIA COVERAGE.

31. CIVIL LIBERTY OR NATIONAL SECURITY: THE BATTLE OVER IPHONE ENCRYPTION.

32. Upholding Citizens' Privacy in the Use of Stingray Technology: Is New York Behind?

33. IT'S TOO COMPLICATED: HOW THE INTERNET UPENDS KATZ, SMITH, AND ELECTRONIC SURVEILLANCE LAW.

34. JUDICIAL OVERSIGHT OF INTERCEPTION OF COMMUNICATIONS IN THE UNITED KINGDOM : AN HISTORICAL AND COMPARATIVE ANALYSIS.

35. E-Fears, E-Risks and Citizen-Intelligence: The Impacts of Surveillance on Resistance and Research.

36. US Government Surveillance Regulations for IT Company Networks: Toward a Global Framework.

37. Privacy in the digital era – Polish electronic surveillance law declared partially unconstitutional.

38. PRIVACY, PREDICTABILITY AND INTERNET SURVEILLANCE IN THE U.S. AND CHINA: BETTER THE DEVIL YOU KNOW?

39. COMPUTER CRIMES.

40. An International Legal Framework for Surveillance.

41. NEW AGE TRACKING TECHNOLOGIES IN THE POST-UNITED STATES V. JONES ENVIRONMENT: THE NEED FOR MODEL LEGISLATION.

42. REASONABLE EXPECTATIONS OF ANONYMITY.

43. PRIVACY IN THE CLOUD: THE MOSAIC THEORY AND THE STORED COMMUNICATIONS ACT.

44. Legislative Initiatives on Privacy and Criminal Law.

45. An Affair to Learn from: Enhanced Procedural Safeguards for Government Access to Stored Communications.

46. SHOUTING DOWN THE WELL: HUMAN OBSERVATION AS A NECESSARY CONDITION OF PRIVACY BREACH, AND WHY WARRANTS SHOULD ATTACH TO DATA ACCESS, NOT DATA GATHERING.

47. Commentary--.

48. THE FREEDOM OF INFORMATION ACT AND THE FIGHT AGAINST SECRET (SURVEILLANCE) LAW.

49. The Privacies of Life: Automatic License Plate Recognition is Unconstitutional Under the Mosaic Theory of Fourth Amendment Privacy Law.

50. The Right to Privacy under Fire -- Foreign Surveillance under the NSA and the GCHQ and Its Compatibility with Art. 17 ICCPR and Art. 8 ECHR.

Catalog

Books, media, physical & digital resources