Why the Law Often Doesnt Recognize Privacy and Data Security Harms
In the second article of a four part series, Daniel J. Solove explains how the law is struggling to deal with privacy and data security harms.
In the second article of a four part series, Daniel J. Solove explains how the law is struggling to deal with privacy and data security harms.
Daniel J. Solove is a Law professor at George Washington University Law School, an expert in information privacy law, and founder of TeachPrivacy, a privacy and security training company. In the first of a four part series, Prof. Solove’s article focuses on the ramifications of increasingly common instances of personal data theft or improper data disclosure, and the subsequent ramifications for those compromised.
In his fourth article in a four part series, Daniel J. Solove discusses how the law should handle privacy and security harms.
Ken Strutin’s documents the scope of sources that encompass a critical issue that has recently repeatedly surfaced in mass media and the legal press – the fact that judicial decisions are believed to embody legal reasoning, societal values and support the foundations of our legal system. For scholars, lawyers and librarians there are three essential components: decision-making, opinion writing and publication. Recently, scrutiny of Supreme Court opinions and the work habits of the courts in general has been drawing attention to the entirety of judicial work that is at the heart of precedent. This article collects a range of pertinent guides, manuals, treatises, law reviews, studies and newsworthy mentions that address significant issues in judicial decision-making, opinion writing and case law publishing.
Writer David Barker introduces us to a quick, easy recipe for a delicious dish called Lemon Fish. As he says, there is actually no such fish as a lemon fish. David is rather referring to a grilling method he learned after moving to the Pacific Northwest. He provides step-by-step instructions – enjoy!
A follow-up from David Rothman’s article earlier this month, Cell phone book clubs: A new way for libraries to promote literacy, technology, family and community – he shares that while U.S. librarians mull over LibraryCity’s proposal for cell phone book clubs, an African librarian already is embracing the possibilities if he can win over his stakeholders.
Young people are heavy users of cell phones, but most do not know they can read library e-books for free on their phones. In this cutting-edge essay, David Rothman tells how libraries could use “cell phone book clubs” to reach out both to young cell phone users and their families, including low-income people and members of racial and ethnic minorities. The clubs would not only foster literacy, but also leverage technology and strengthen the connections between families and communities.
The library community welcomed the decision of the U.S. Court of Appeals for the Second Circuit in Authors Guild v. HathiTrust. The decision has implications for libraries that go far beyond the specific facts of the case. This paper by Jonathan Band offers some preliminary thoughts on what these implications may be.
Marcus P. Zillman’s guide focuses on the increasingly important topic of identifying reliable and actionable Information resources on the internet, a task specifically critical for researchers in all sectors. With the proliferation of non attributable, un-vetted, un-sourced information churning 24/7 through a spectrum of social media sites, getting it right takes time and skill, but is well worth the effort.
With over 300 million users, LinkedIn is the most popular social media platform for business and professional use, and attorneys Dennis Kennedy and Allison C. Shields clearly and concisely outline how to leverage this space with smart, targeted and effective ways that positively identify you in communities of best practice, proactively communicate with peers and potential clients, and expand your business reach.