Panel Three: Implementation—What Methods, If Any, Can Be Employed To Promote the Existing Rules' Attempts to Protect Private Identifier Information From Internet Access?

Citation data:

Fordham Law Review, Vol: 79, Issue: 1, Page: 45

Publication Year:
2011
Usage 357
Downloads 345
Abstract Views 12
Repository URL:
http://ir.lawnet.fordham.edu/flr/vol79/iss1/3
Author(s):
Leighton, The Honorable Ronald; Cecil, Joe; Ishakian, Michael; Felten, Edward
Publisher(s):
FLASH: The Fordham Law Archive of Scholarship and History
Tags:
Law