Bug Bounty Programs as a Corporate Governance “Best Practice” Mechanism

By Amit Elazari Bar On, Adv., LL.M., Doctoral Law Student (J.S.D.), UC Berkeley School of Law, CTSP Fellow, … Continue Reading

Data Collection by Design?

Data Collection by Design? Chante Westmoreland (JD Candidate ’18) and Patrick Johnson (JD Candidate ’19) interview Chris Hoofnagle … Continue Reading

An Unprincipled Future? The Conflict Between FIPPs and the Internet of Things

Contemporary consumer privacy law in the United States is largely based on the Fair Information Practice Principles (FIPPs). … Continue Reading

The “Nutrition Label” Approach to Privacy Policies

If privacy policies are meant to secure informed consent from consumers before their personal data is collected, several … Continue Reading

Here Comes Another One: Examining the Home Depot Data Breach Lawsuit

40 million; the number of credit and debit card numbers stolen in the Target data breach of 2013. … Continue Reading

The Copyright Alert System After Its Roll-Out: First (Non)Reactions

The Copyright Alert System (CAS) was rolled out in late February 2013. CAS constitutes the United States realization … Continue Reading

President Obama's Privacy Bill of Rights: Encouraging a Collaborative Process for Digital Privacy Reform

On February 23, 2012 President Obama’s administration (“the Administration”) released an important new report entitled “Consumer Data Privacy … Continue Reading