Find the preliminary injunction in a case attempting to halt a George law preventing the use of false names in Internet communication.
Long article addresses issues related to privacy, digital cash, and distribute databases. Addresses encryption.
University paper argues for the protection of online anonymity rights. Includes links to sources.
Posts an account of the webmaster's suit against a law that prevents certain encryption algorithms from being exported.
Read the decision in this case regarding a math professor's attempts to retain control over his encryption software.
Gives the ruling in a US case where employees sued their employer for invasion of privacy when the employer read their email.
Read a table of contents, a biography of the editor, and reviews for this book on cryptographic policy debates.
Gary Morris of GSM Associates wrote this article on the technical and legal perspectives of computer security. Includes contact information.
Posts a big collection of reading materials for this Columbia University seminar focusing on the US Constitution and online privacy.
Article examines the ramifications of new cryptographic advances on personal liberty and privacy. Includes links to related articles.
Displays a 1999 report submitted to the European Parliament outlining risks to personal and financial information from surveillance technology.
Links to sites about computer viruses, cookies, email chain-letters, hoaxes, scams, terminology, netiquette, privacy and spam.
When a convicted online pornographer sued law enforcement officers over invasion of privacy, a US appeals court delivered this opinion.
Examine a December 1999 report from EPIC about privacy rights and lack of enforcement to protect consumers.
Brief article addresses legal concerns over email privacy and spamming. Examines several pertinent cases.
Read a US General Accounting Office report on current health information technologies and the resulting privacy trends.
Brief article on the legal implications of email, privacy, and electronic communications by lawyers at Ford Marrin Esposito Witmeyer & Gleser.
Sponsored by one consumer protection unit, this resource aims to inform the public about Internet fraud and how to avoid victimization by it.
Group supports privacy and security on the Internet through making strong encryption available.
Brief article defines legally-protected privacy and how the concept applies to the Internet. Links to the many cited articles.
University of Miami professor wrote this article on many of the implications of the encryption-proof Clipper chip.
Presents an April 2000 report about Intel's decision to not include a Processor Serial Number in its Pentium IV chips. With links to related news and commentary.
Find a detailed syllabus and some texts for this Georgetown University course.
Carl Oppedahl's article examines the issues affecting security, privacy, and discovery when lawyers conduct business via email.
Article reviews current legal privacy rights in relation to email, search engines, cookies, and online commerce.
Transborder data flows, guidelines for security of information systems, cryptography policy and intellectual property rights.
Attorney Jonathan Rosenoer analyzes the legal implications of the European Union's information privacy directive in this multi-part article.
Daily Briefing column focuses on privacy rights and issues on the Internet, the business of information and related Washington legislation.
Brief article discusses the legal aspects surrounding email filtering and explains how companies can monitor employees' email without violating privacy rights.
Browse a collection of archived discussion on an open forum news weblog concerning Intel's decision to stop making processor chips with ID numbers.
When a US company accessed a temporary employee's private email, a lawsuit and this decision resulted.
Promoting individual rights on the Net. Information on projects, events and membership.
Overview of the Act by the Federal Communications Commission - includes text of the Act, supporting materials and proceedings.
Detailed study focusing on encryption issues from a constitutional perspective.
Obtain a November 2001 report on Internet trends monitored by a Net watch group and obtain "key legal, business, and social trends in the online world."
Extensive article explores the social ramifications of automated surveillance in urban culture on a massive scale.
Read a news brief from April 27, 2000 that Intel will not include the controversial tracking device called the Processor Serial Number in its Pentium 4 processor chips.
Read an April 2001 news article about the controversial ID tracking device on Intel's Pentium III and the decision to discontinue its use following dissent and outrage.