Protecting Privacy Through a Responsible Decryption Policy.
Harvard Journal of Law & Technology 2009, Spring, 22, 2
-
- 79,00 Kč
-
- 79,00 Kč
Publisher Description
I. INTRODUCTION In late December 2006, Sebastien Boucher crossed into Vermont from Canada. (1) At the border, customs officials inspected Boucher's car and found a laptop in the back seat. (2) A customs agent accessed the computer without entering a password and initiated a search for media files; the query returned tens of thousands of images. (3) Later, a special agent continuing the investigation found "thousands of images of adult pornography and animation depicting adult and child pornography." (4)
More Books by Harvard Journal of Law & Technology
Much Ado About Data Ownership.
2011
The Wealth of Networks: How Social Production Transforms Markets and Freedom (Book Review)
2006
Brand Spillovers.
2009
Bad Faith in Cyberspace: Grounding Domain Name Theory in Trademark, Property, And Restitution.
2010
Open Source Semiconductor Core Licensing.
2011
The Statutory Presumption of Patent Validity in Antitrust Cases.
2011