Through the magic of social media, it all went viral: a vivid photograph, an inflammatory fake version, an animation expanding on the fake, posts debunking the fakes, and stories trying …
Those who wish to control, expose, and damage the identities of individuals routinely do so by invading their privacy. People are secretly recorded in bedrooms and public bathrooms …
DK Citron, B Wittes - Fordham L. Rev., 2017 - HeinOnline
The social media site Omegle sports the jaunty slogan," Talk to strangers!"'The site's front page announces that it is" a great way to meet new friends. When you use Omegle, we pick …
Suppose that Company X fails to adequately secure its clients' personal data. Imagine the company knows that hackers previously accessed its system yet does nothing about it. This …
" Jane" allowed her ex-boyfriend to photograph her naked because, as he assured her, it would be for his eyes only. 1 After their breakup, he betrayed her trust. 2 On a popular" …
One of the great ironies about information privacy law is that the primary regulation of privacy in the United States has barely been studied in a scholarly way. Since the late …
Information privacy is in trouble. Contemporary information privacy protections emphasize individuals' control over their own personal information. But machine learning, the leading …
Internet intermediaries have the freedom and influence to seize this defining moment in cyber hate's history. We believe that a thoughtful and nuanced intermediary-based approach …
The legal community constantly grapples with technologies that enable new conduct or facilitate previously rare actions, blur estab-lished legal categories, diffuse or centralize …