-
1
-
-
84874598188
-
-
Absolute Software. (n.d.)
-
Absolute Software. (n.d.). Computrace data protection [Software]. http://www.absolute.com/en/products/computrace/features.aspx (http://www.absolute.com/en/products/computrace/features.aspx)
-
Computrace data protection [Software]
-
-
-
2
-
-
84874635644
-
-
395 Mass. 59, 479 N.E.2d 113
-
Alberts v. Devine, 395 Mass. 59, 479 N.E.2d 113 (1985)
-
(1985)
Alberts v.D
-
-
-
4
-
-
33845658747
-
-
American Association for Marriage and Family Therapy
-
American Association for Marriage and Family Therapy. (2001). Code of ethics. http://www.aamft.org/imis15/content/legal_ethics/code_of_ethics.aspx (http://www.aamft.org/imis15/content/legal_ethics/code_of_ethics.aspx)
-
(2001)
Code of ethics
-
-
-
5
-
-
84874605479
-
Code of ethics
-
American Counseling Association
-
American Counseling Association. 2005. "Code of ethics". In Journal of Counseling & Development, 84 235-254. doi:10.1002/j.1556-6678.2006.tb00401.x
-
(2005)
Journal of Counseling & Development, 84
, pp. 235-254
-
-
-
6
-
-
0036986634
-
Ethical principles of psychologists and code of conduct
-
American Psychological Association
-
American Psychological Association. 2002. Ethical principles of psychologists and code of conduct. American Psychologist, 57: 1060-1073.
-
(2002)
American Psychologist
, vol.57
, pp. 1060-1073
-
-
-
7
-
-
77958197540
-
Report of the Ethics Committee, 2009
-
American Psychological Association, Ethics Committee
-
American Psychological Association, Ethics Committee. 2010. Report of the Ethics Committee, 2009. American Psychologist, 65: 483-492. doi:10.1037/a0019515
-
(2010)
American Psychologist
, vol.65
, pp. 483-492
-
-
-
8
-
-
84874588959
-
Report of the Ethics Committee, 2010
-
American Psychological Association, Ethics Committee
-
American Psychological Association, Ethics Committee. 2011. Report of the Ethics Committee, 2010. American Psychologist, 66: 393-403. doi:10.1037/a0024003
-
(2011)
American Psychologist
, vol.66
, pp. 393-403
-
-
-
10
-
-
84874593566
-
Global position system and the Internet: A combination with privacy risks
-
Balough, R. C. 2001. Global position system and the Internet: A combination with privacy risks. Chicago Bar Association Record, 15: 28-29.
-
(2001)
Chicago Bar Association Record
, vol.15
, pp. 28-29
-
-
Balough, R.C.1
-
11
-
-
84874609724
-
Telehealth and technology innovations in professional psychology [Special issue]
-
Barnett, J. E., Kelly, J. F. and Roberts, M. C. 2011. Telehealth and technology innovations in professional psychology [Special issue]. Professional Psychology: Research and Practice, 42(6)
-
(2011)
Professional Psychology: Research and Practice
, vol.42
, Issue.6
-
-
Barnett, J.E.1
Kelly, J.F.2
Roberts, M.C.3
-
13
-
-
0026035852
-
Effects of statutes requiring psychiatrists to report suspected sexual abuse of children
-
Berlin, F. S., Malin, H. and Dean, S. 1991. Effects of statutes requiring psychiatrists to report suspected sexual abuse of children. The American Journal of Psychiatry, 148: 449-453.
-
(1991)
The American Journal of Psychiatry
, vol.148
, pp. 449-453
-
-
Berlin, F.S.1
Malin, H.2
Dean, S.3
-
14
-
-
84874629475
-
-
Biddle v. Warren Gen. Hosp., 715 N.E.2d 518 (Ohio, 1999)
-
Biddle v. Warren Gen. Hosp., 715 N.E.2d 518 (Ohio, 1999)
-
-
-
-
15
-
-
84874637188
-
-
BlackBerry Knowledge Base
-
BlackBerry Knowledge Base. (2011). Actions performed by the BlackBerry smartphone during the removal of stored user and application data. http://btsc.webapps.blackberry.com/btsc/microsites/search.do?cmd=displayKC&docType=kc&externalId=KB16307&sliceId=1&docTypeID=DT_SUPPORTISSUE_1_1&dialogID=111365201&stateId=1%200%20111768751 (http://btsc.webapps.blackberry.com/btsc/microsites/search.do?cmd=displayKC&docType=kc&externalId=KB16307&sliceId=1&docTypeID=DT_SUPPORTISSUE_1_1&dialogID=111365201&stateId=1%200%20111768751)
-
(2011)
Actions performed by the BlackBerry smartphone during the removal of stored user and application data
-
-
-
16
-
-
51049119187
-
Privacy in an age of terabytes and terror
-
(August 18)
-
Brown, P. (2008, August 18). Privacy in an age of terabytes and terror. Scientific American. http://www.scientificamerican.com/article.cfm?id=privacy-in-an-age (http://www.scientificamerican.com/article.cfm?id=privacy-in-an-age)
-
(2008)
Scientific American
-
-
Brown, P.1
-
19
-
-
84874638583
-
-
Carbonite.com
-
Carbonite.com. (2011). Carbonite data security practices. http://www.carbonite.com/en/files/carbonite-data-security-practices.pdf (http://www.carbonite.com/en/files/carbonite-data-security-practices.pdf)
-
(2011)
Carbonite data security practices
-
-
-
20
-
-
38649123675
-
Practicing safer Listserv use: Ethical use of an invaluable resource
-
Collins, L. H. 2007. Practicing safer Listserv use: Ethical use of an invaluable resource. Professional Psychology: Research and Practice, 38: 690-698.
-
(2007)
Professional Psychology: Research and Practice
, vol.38
, pp. 690-698
-
-
Collins, L.H.1
-
21
-
-
84863986619
-
-
comScore, (October 20)
-
comScore. (2011, October 20). Social networking on-the-go: U.S. mobile social media audience grows 37 Percent in the past year. http://www.comscore.com/Press_Events/Press_Releases/2011/10/Social_Networking_On-The-Go_U.S._Mobile_Social_Media_Audience_Grows_37_Percent_in_the_Past_Year (http://www.comscore.com/Press_Events/Press_Releases/2011/10/Social_Networking_On-The-Go_U.S._Mobile_Social_Media_Audience_Grows_37_Percent_in_the_Past_Year)
-
(2011)
Social networking on-the-go: U.S. mobile social media audience grows 37 Percent in the past year
-
-
-
22
-
-
84874608537
-
Study: Hacking passwords easy as 123456
-
(January 21)
-
Coursey, D. (2010, January 21). Study: Hacking passwords easy as 123456. PCWorld. http://www.pcworld.com/businesscenter/article/187354/study_hacking_passwords_easy_as_123456.html (http://www.pcworld.com/businesscenter/article/187354/study_hacking_passwords_easy_as_123456.html)
-
(2010)
PCWorld
-
-
Coursey, D.1
-
24
-
-
84873652329
-
-
Encryption. (n.d.)
-
Encryption. (n.d.). In Free Dictionary. http://www.thefreedictionary.com/encryption (http://www.thefreedictionary.com/encryption)
-
In Free Dictionary
-
-
-
25
-
-
0346271512
-
Empirical support for the United States Supreme Court's protection of the psychotherapist-patient privilege
-
Evans-Marsh, J. 2003. Empirical support for the United States Supreme Court's protection of the psychotherapist-patient privilege. Ethics and Behavior, 13: 385-400.
-
(2003)
Ethics and Behavior
, vol.13
, pp. 385-400
-
-
Evans-Marsh, J.1
-
28
-
-
84874591871
-
-
(November 17)
-
Fox, Z. (2011, November 17). 25 worst passwords of 2011. http://mashable.com/2011/11/17/worst-internet-passwords/ (http://mashable.com/2011/11/17/worst-internet-passwords/)
-
(2011)
25 worst passwords of 2011
-
-
Fox, Z.1
-
29
-
-
3042825662
-
Remembrance of data past: A study of disk sanitization practices
-
Garfinkel, S. and Shelat, A. 2003. Remembrance of data past: A study of disk sanitization practices. IEEE Security & Privacy, 1: 17-27.
-
(2003)
IEEE Security & Privacy
, vol.1
, pp. 17-27
-
-
Garfinkel, S.1
Shelat, A.2
-
31
-
-
84874584960
-
Fame is no laughing matter for the Star Wars Kid
-
(May 19)
-
Harmon, A. (2003, May 19). Fame is no laughing matter for the "Star Wars Kid." The New York Times. http://www.nytimes.com/2003/05/19/technology/19DORK.html (http://www.nytimes.com/2003/05/19/technology/19DORK.html)
-
(2003)
The New York Times
-
-
Harmon, A.1
-
32
-
-
84874634326
-
Locating mobile phones through pinging and triangulation
-
(July 1)
-
Harrell, S. (2008, July 1). Locating mobile phones through pinging and triangulation, Pursuit Magazine. http://pursuitmag.com/locating-mobile-phones-through-pinging-and-triangulation/ (http://pursuitmag.com/locating-mobile-phones-through-pinging-and-triangulation/)
-
(2008)
Pursuit Magazine
-
-
Harrell, S.1
-
33
-
-
84874616657
-
Is email privacy an oxymoron? Meeting the challenges of formulating a company email policy
-
Harris, M. S. 2002. Is email privacy an oxymoron? Meeting the challenges of formulating a company email policy. St. John's Journal of Legal Commentary, 16: 553-567.
-
(2002)
St. John's Journal of Legal Commentary
, vol.16
, pp. 553-567
-
-
Harris, M.S.1
-
37
-
-
84874633295
-
-
HITECH Breach Notification Guidance and Request for Public Comment, 74 Fed. Reg. 19006 (proposed April 27, 2009) (to be codified at 45 C.F.R. pts. 160 and 164)
-
HITECH Breach Notification Guidance and Request for Public Comment, 74 Fed. Reg. 19006 (proposed April 27, 2009) (to be codified at 45 C.F.R. pts. 160 and 164)
-
-
-
-
38
-
-
33947218255
-
In sickness, health and cyberspace: Protecting the security of electronic private health information
-
Hoffman, S. and Podgurski, A. 2007. In sickness, health and cyberspace: Protecting the security of electronic private health information. Boston College Law Review, 48: 331-386.
-
(2007)
Boston College Law Review
, vol.48
, pp. 331-386
-
-
Hoffman, S.1
Podgurski, A.2
-
39
-
-
79955004602
-
Regulation and public policy in the full deployment of the enhanced emergency call system (E-911) and their influence on wireless cellular and other technologies
-
Holloway, J. E., Seeman, E., O'Hara, M. and Forst, A. 2006. Regulation and public policy in the full deployment of the enhanced emergency call system (E-911) and their influence on wireless cellular and other technologies. Boston University Journal of Science & Technology Law, 12: 93-126.
-
(2006)
Boston University Journal of Science & Technology Law
, vol.12
, pp. 93-126
-
-
Holloway, J.E.1
Seeman, E.2
O'Hara, M.3
Forst, A.4
-
41
-
-
84860658310
-
-
InSites Consulting. (September 14)
-
InSites Consulting. (2011, September 14). Social media around the world 2011. http://www.slideshare.net/stevenvanbelleghem/social-media-around-the-world-2011 (http://www.slideshare.net/stevenvanbelleghem/social-media-around-the-world-2011)
-
(2011)
Social media around the world 2011
-
-
-
42
-
-
68249117889
-
-
International Telecommunication Union., Retrieved from the International Telecommunication Union website
-
International Telecommunication Union. (2008). Measuring the information society: The ICT Development Index. Retrieved from the International Telecommunication Union website http://www.itu.int/ITU-/ict/publications/idi/2009/material/IDI2009_w5.pdf (http://www.itu.int/ITU-/ict/publications/idi/2009/material/IDI2009_w5.pdf)
-
(2008)
Measuring the information society: The ICT Development Index
-
-
-
43
-
-
33745647277
-
Store it on the Web
-
(June 2)
-
Jacobi, J., & Larkin, E. (2006, June 2). Store it on the Web. PCWorld. http://www.pcworld.com/article/125729/store_it_on_the_web.html (http://www.pcworld.com/article/125729/store_it_on_the_web.html)
-
(2006)
PCWorld
-
-
Jacobi, J.1
Larkin, E.2
-
44
-
-
79959433819
-
-
Retrieved from National Institute for Standards and Technology, U.S. Department of Commerce website, (January)
-
Jansen, W., & Grance, T. (2011, January). Guidelines on security and privacy in public cloud computing (Draft Special Publication 800-144). Retrieved from National Institute for Standards and Technology, U.S. Department of Commerce website http://csrc.nist.gov/publications/drafts/800-144/Draft-SP-800-144_cloud-computing.pdf (http://csrc.nist.gov/publications/drafts/800-144/Draft-SP-800-144_cloud-computing.pdf)
-
(2011)
Guidelines on security and privacy in public cloud computing (Draft Special Publication 800-144)
-
-
Jansen, W.1
Grance, T.2
-
45
-
-
73049088943
-
Liability for all, privacy for none: The conundrum of protecting privacy rights in a pervasively electronic world
-
Joyce, F. M. and Bigart, A. E. 2007. Liability for all, privacy for none: The conundrum of protecting privacy rights in a pervasively electronic world. Valparaiso University Law Review, 41: 1481-1514.
-
(2007)
Valparaiso University Law Review
, vol.41
, pp. 1481-1514
-
-
Joyce, F.M.1
Bigart, A.E.2
-
46
-
-
84874616958
-
-
Retrieved from 10th Annual Security and Privacy Conference, (February 4)
-
Karbaliotis, C. (2009, February 4). Laptops, BlackBerries, and borders: Panel presentation [PowerPoint slides]. Retrieved from 10th Annual Security and Privacy Conference http://www.cio.gov.bc.ca/services/security/library/conferences/2009/Presentations/Karbaliotis_Constantine_Symantec-Laptops,Blackberries&BorderV0-3.pdf (http://www.cio.gov.bc.ca/services/security/library/conferences/2009/Presentations/Karbaliotis_Constantine_Symantec-Laptops,Blackberries&BorderV0-3.pdf)
-
(2009)
Laptops, BlackBerries, and borders: Panel presentation [PowerPoint slides]
-
-
Karbaliotis, C.1
-
47
-
-
84874643560
-
Hi-tech in the law office: We're all confronted by the mobile security sieve
-
Kashi, J. 2004. Hi-tech in the law office: We're all confronted by the mobile security sieve. The Alaska Bar Rag, 28: 26-31.
-
(2004)
The Alaska Bar Rag
, vol.28
, pp. 26-31
-
-
Kashi, J.1
-
48
-
-
84874586627
-
How to: Wipe your old iPad/iPhone/iPod ready for resale
-
(March 11)
-
Kingsley-Hughes, A. (2011, March 11). How to: Wipe your old iPad/iPhone/iPod ready for resale. ZDNet. http://www.zdnet.com/blog/hardware/how-to-wipe-your-old-ipadiphoneipod-touch-ready-for-resale/11839 (http://www.zdnet.com/blog/hardware/how-to-wipe-your-old-ipadiphoneipod-touch-ready-for-resale/11839)
-
(2011)
ZDNet
-
-
Kingsley-Hughes, A.1
-
49
-
-
84874608110
-
-
(January 27)
-
Kline, M. (2011, January 27). The parade of PHI security breaches: Escalating enforcement activity by state attorneys general-most recently in Vermont [Web log message]. http://hipaahealthlaw.foxrothschild.com/2011/01/articles/hipaa-enforcement/the-parade-of-phi-security-breaches-escalating-enforcement-activity-by-state-attorneys-general-most-recently-in-vermont/ (http://hipaahealthlaw.foxrothschild.com/2011/01/articles/hipaa-enforcement/the-parade-of-phi-security-breaches-escalating-enforcement-activity-by-state-attorneys-general-most-recently-in-vermont/)
-
(2011)
The parade of PHI security breaches: Escalating enforcement activity by state attorneys general-most recently in Vermont [Web log message]
-
-
Kline, M.1
-
50
-
-
84874621884
-
Kill your phone remotely
-
(September 11)
-
Lendino, J. (2009, September 11). Kill your phone remotely. PCMag.com. http://www.pcmag.com/article2/0,2817,2352755,00.asp (http://www.pcmag.com/article2/0,2817,2352755,00.asp)
-
(2009)
PCMag.com
-
-
Lendino, J.1
-
51
-
-
83755175326
-
Your voice mail may be even less secure than you thought
-
(August 19)
-
Lieber, R. (2011, August 19). Your voice mail may be even less secure than you thought. The New York Times, p. B1. http://www.nytimes.com/2011/08/20/your-money/your-phone-may-be-less-secure-than-you-thought.html?pagewanted=2&_r=1 (http://www.nytimes.com/2011/08/20/your-money/your-phone-may-be-less-secure-than-you-thought.html?pagewanted=2&_r=1)
-
(2011)
The New York Times
-
-
Lieber, R.1
-
52
-
-
84874643845
-
Current development: The potential effects of United States v. Councilman on the confidentiality of attorney-client email communications
-
Liebesman, Y. J. 2005. Current development: The potential effects of United States v. Councilman on the confidentiality of attorney-client email communications. Georgetown Journal of Legal Ethics, 18: 693-922.
-
(2005)
Georgetown Journal of Legal Ethics
, vol.18
, pp. 693-922
-
-
Liebesman, Y.J.1
-
53
-
-
84874595525
-
-
MacDonald v. Klinger, 84 A.D.2d 482 (1982)
-
MacDonald v. Klinger, 84 A.D.2d 482 (1982)
-
-
-
-
54
-
-
0034754483
-
E-therapy: Practical, ethical and legal issues
-
Manhal-Baugus, M. 2001. E-therapy: Practical, ethical and legal issues. CyberPsychology & Behavior, 4: 551-563.
-
(2001)
CyberPsychology & Behavior
, vol.4
, pp. 551-563
-
-
Manhal-Baugus, M.1
-
55
-
-
0032336129
-
An ethics for the new surveillance
-
Marx, J. (1998). An ethics for the new surveillance. The Information Society, 14(3). http://web.mit.edu/gtmarx/www/ncolin5.html (http://web.mit.edu/gtmarx/www/ncolin5.html)
-
(1998)
The Information Society
, vol.14
, Issue.3
-
-
Marx, J.1
-
56
-
-
84874634946
-
Comment: Safety in numbers: Revisiting the risks to client confidences and attorney-client privilege posed by Internet electronic mail
-
Masur, J. M. 1999. Comment: Safety in numbers: Revisiting the risks to client confidences and attorney-client privilege posed by Internet electronic mail. Berkeley Technology Law Journal, 14: 1117-1160.
-
(1999)
Berkeley Technology Law Journal
, vol.14
, pp. 1117-1160
-
-
Masur, J.M.1
-
57
-
-
0347804475
-
Comment: Encoded confidences: Electronic mail, the Internet, and the attorney-client privilege
-
Matthews, W. P. 1996. Comment: Encoded confidences: Electronic mail, the Internet, and the attorney-client privilege. Kansas Law Review, 45: 273-300.
-
(1996)
Kansas Law Review
, vol.45
, pp. 273-300
-
-
Matthews, W.P.1
-
58
-
-
0000044766
-
The adult client's conception of confidentiality in the therapeutic relationship
-
McGuire, J. M., Toal, P. and Blau, B. 1985. The adult client's conception of confidentiality in the therapeutic relationship. Professional Psychology: Research and Practice, 16: 375-384.
-
(1985)
Professional Psychology: Research and Practice
, vol.16
, pp. 375-384
-
-
McGuire, J.M.1
Toal, P.2
Blau, B.3
-
59
-
-
85047681030
-
Breach of confidentiality and perceived trustworthiness of counselors
-
Merluzzi, T. V. and Brischetto, C. S. 1983. Breach of confidentiality and perceived trustworthiness of counselors. Journal of Counseling Psychology, 30: 245-251. doi:10.1037/0022-0167.30.2.245
-
(1983)
Journal of Counseling Psychology
, vol.30
, pp. 245-251
-
-
Merluzzi, T.V.1
Brischetto, C.S.2
-
60
-
-
84874600081
-
-
Microsoft
-
Microsoft. (2010). Security risks in the mobile enterprise. http://technet.microsoft.com/en-us/library/cc182262.aspx (http://technet.microsoft.com/en-us/library/cc182262.aspx)
-
(2010)
Security risks in the mobile enterprise
-
-
-
61
-
-
84874607228
-
People v. Diaz: Is your iPhone constitutionally protected?
-
(February 23)
-
Minkevitch, H. (2011, February 23). People v. Diaz: Is your iPhone constitutionally protected? Berkeley Technology Law Journal. http://btlj.org/2011/02/23/people-v-diaz-is-your-iphone-constitutionally-protected/ (http://btlj.org/2011/02/23/people-v-diaz-is-your-iphone-constitutionally-protected/)
-
(2011)
Berkeley Technology Law Journal
-
-
Minkevitch, H.1
-
62
-
-
84865622218
-
-
mobiThinking. (July)
-
mobiThinking. (2011, July). Global mobile statistics 2011. http://mobithinking.com/mobile-marketing-tools/latest-mobile-stats#subscribers (http://mobithinking.com/mobile-marketing-tools/latest-mobile-stats#subscribers)
-
(2011)
Global mobile statistics 2011
-
-
-
64
-
-
84874641142
-
-
Mrozinski v. Pogue, 423 S.E.2d 405 (Ga. Ct. App. 1992)
-
Mrozinski v. Pogue, 423 S.E.2d 405 (Ga. Ct. App. 1992)
-
-
-
-
65
-
-
0022085088
-
Informing clients about the limits to confidentiality, risks, and their rights: Is self-disclosure inhibited?
-
Muehleman, T., Pickens, B. K. and Robinson, F. 1985. Informing clients about the limits to confidentiality, risks, and their rights: Is self-disclosure inhibited?. Professional Psychology: Research and Practice, 16: 385-397.
-
(1985)
Professional Psychology: Research and Practice
, vol.16
, pp. 385-397
-
-
Muehleman, T.1
Pickens, B.K.2
Robinson, F.3
-
66
-
-
84874583709
-
Travelers' laptops may be detained at border: No suspicion required under DHS policies
-
August 1
-
Nakashima, E. 2008. Travelers' laptops may be detained at border: No suspicion required under DHS policies. The Washington Post, August 1: A01
-
(2008)
The Washington Post
-
-
Nakashima, E.1
-
67
-
-
33845658747
-
-
Washington, DC, Washington, DC,: Author, National Association of Social Workers
-
National Association of Social Workers. 2008. Code of ethics, Washington, DC: Author.
-
(2008)
Code of ethics
-
-
-
69
-
-
21144466806
-
If it's not absolutely confidential, will information be disclosed?
-
Nowell, D. and Spruill, J. 1993. If it's not absolutely confidential, will information be disclosed?. Professional Psychology: Research and Practice, 24: 367-369. doi:10.1037/0735-7028.24.3.367
-
(1993)
Professional Psychology: Research and Practice
, vol.24
, pp. 367-369
-
-
Nowell, D.1
Spruill, J.2
-
70
-
-
57449096592
-
Amend the ECPA: Fourth Amendment protection erodes as e-mails get dusty
-
Oza, A. 2008. Amend the ECPA: Fourth Amendment protection erodes as e-mails get dusty. Boston University Law Review, 88: 1043-1073.
-
(2008)
Boston University Law Review
, vol.88
, pp. 1043-1073
-
-
Oza, A.1
-
72
-
-
84874609426
-
-
People v. Endacott, 164 Cal. App. 4th 1346, 79 Cal. Rptr. 3d 907 (2008)
-
People v. Endacott, 164 Cal. App. 4th 1346, 79 Cal. Rptr. 3d 907 (2008)
-
-
-
-
73
-
-
84874619756
-
Loose lips sink attorney-client ships: Unintended technological disclosure of confidential communications
-
Piatt, W. and Dewitte, P. 2008. Loose lips sink attorney-client ships: Unintended technological disclosure of confidential communications. St. Mary's Law Journal, 39: 781-818.
-
(2008)
St. Mary's Law Journal
, vol.39
, pp. 781-818
-
-
Piatt, W.1
Dewitte, P.2
-
74
-
-
84874632796
-
-
Poneman Institute. (March)
-
Poneman Institute. (2011, March), Second annual survey on medical identity theft. http://www.protectmyid.com/images/education_center/pdf/050TypesofFraud/1_types%20of%20fraud_medical%20study.PDF (http://www.protectmyid.com/images/education_center/pdf/050TypesofFraud/1_types%20of%20fraud_medical%20study.PDF)
-
(2011)
Second annual survey on medical identity theft.
-
-
-
75
-
-
84874603404
-
-
Privacy Rights Clearinghouse. (August)
-
Privacy Rights Clearinghouse. (2011, August). Fact Sheet 18: Online privacy: Using the Internet safely. https://www.privacyrights.org/fs/fs18-cyb.htm (http://https://www.privacyrights.org/fs/fs18-cyb.htm)
-
(2011)
Fact Sheet 18: Online privacy: Using the Internet safely
-
-
-
76
-
-
84874591188
-
-
Privacy Rights Clearinghouse, (January 27)
-
Privacy Rights Clearinghouse. (2012, January 27). A chronology of data breaches. http://www.privacyrights.org/ar/ChronDataBreaches.htm#2008 (http://www.privacyrights.org/ar/ChronDataBreaches.htm#2008)
-
(2012)
A chronology of data breaches.
-
-
-
77
-
-
84874600433
-
-
Province of British Columbia. (n.d.)
-
Province of British Columbia. (n.d.). Policy Summary No. 3: Portable storage devices. http://www.cio.gov.bc.ca/local/cio/informationsecurity/policy/summaries/3_portable_ (http://www.cio.gov.bc.ca/local/cio/informationsecurity/policy/summaries/3_portable_)
-
Policy Summary No. 3: Portable storage devices
-
-
-
78
-
-
84874624129
-
What would Learned Hand do? Adapting to technological change and protecting the attorney-client privilege on the Internet
-
Rand, J. W. 2000. What would Learned Hand do? Adapting to technological change and protecting the attorney-client privilege on the Internet. Brooklyn Law Review, 66: 361-420.
-
(2000)
Brooklyn Law Review
, vol.66
, pp. 361-420
-
-
Rand, J.W.1
-
79
-
-
79955031056
-
Comment: Can you find me now?-Tracking the limits on government access to cellular GPS location data
-
Richmond, D. P. 2007. Comment: Can you find me now?-Tracking the limits on government access to cellular GPS location data. CommLaw Conspectus, 16: 283-219.
-
(2007)
CommLaw Conspectus
, vol.16
, pp. 219-283
-
-
Richmond, D.P.1
-
80
-
-
42349108508
-
Data mining and Internet profiling: Emerging regulatory and technological approaches
-
Rubenstein, I. A., Lee, R. D. and Schwartz, P. M. 2008. Data mining and Internet profiling: Emerging regulatory and technological approaches. University of Chicago Law Review, 75: 261-285.
-
(2008)
University of Chicago Law Review
, vol.75
, pp. 261-285
-
-
Rubenstein, I.A.1
Lee, R.D.2
Schwartz, P.M.3
-
81
-
-
84874637022
-
-
SDAndroid. (n.d.)
-
SDAndroid. (n.d.). SHREDroid-Secure deletion for Android. http://www.securedeletion.com/ (http://www.securedeletion.com/)
-
SHREDroid-Secure deletion for Android
-
-
-
82
-
-
84874587661
-
-
Simple Encryption. (n.d.)
-
Simple Encryption. (n.d.). http://www.cs.usask.ca/content/resources/tutorials/csconcepts/1999_3/lessons/L3/SimpleEncryption.html.
-
-
-
-
83
-
-
84874620446
-
Orwell's ghost: How teletechnology is reshaping civil society
-
Slabbart, N. J. 2008. Orwell's ghost: How teletechnology is reshaping civil society. Commlaw Conspectus, 16: 349-359.
-
(2008)
Commlaw Conspectus
, vol.16
, pp. 349-359
-
-
Slabbart, N.J.1
-
84
-
-
40949116423
-
Note: Private eyes are watching you: With the implementation of the E-911 mandate, who will watch every move you make?
-
Smith, G. D. 2006. Note: Private eyes are watching you: With the implementation of the E-911 mandate, who will watch every move you make?. Federal Communications Law Journal, 58: 705-725.
-
(2006)
Federal Communications Law Journal
, vol.58
, pp. 705-725
-
-
Smith, G.D.1
-
85
-
-
84874587779
-
-
Softpedia. (n.d.)
-
Softpedia. (n.d.). Cryptofile 1.0. [Software]. http://handheld.softpedia.com/get/Security/Encryption/Cryptofile-38451.shtml (http://handheld.softpedia.com/get/Security/Encryption/Cryptofile-38451.shtml)
-
Cryptofile 1.0. [Software].
-
-
-
86
-
-
84874641989
-
-
Spearstone. (March 11), [Press release]
-
Spearstone. (2009, March 11). Spearstone announces Smartphone application for DiskAgent product line [Press release]. http://https://diskagent.com/press_releases/smartphone.php (http://https://diskagent.com/press_releases/smartphone.php)
-
(2009)
Spearstone announces Smartphone application for DiskAgent product line
-
-
-
87
-
-
84995441250
-
The Electronic Communications Privacy Act and Cell Location Data: Is the whole more than the sum of its parts? 73
-
Stapleton, T. 2007. The Electronic Communications Privacy Act and Cell Location Data: Is the whole more than the sum of its parts? 73. Brooklyn Law Review,: 383-409.
-
(2007)
Brooklyn Law Review
, pp. 383-409
-
-
Stapleton, T.1
-
88
-
-
84874582046
-
-
State Board of Medical Examiners v. Hedgepath, 325 S.C. 166, 480 S.E.2d 724 (1997)
-
State Board of Medical Examiners v. Hedgepath, 325 S.C. 166, 480 S.E.2d 724 (1997)
-
-
-
-
89
-
-
0011215849
-
Researching the effects of confidentiality law on patients' self-disclosures
-
Taube, D. O. and Elwork, A. 1990. Researching the effects of confidentiality law on patients' self-disclosures. Professional Psychology: Research and Practice, 21: 72-75.
-
(1990)
Professional Psychology: Research and Practice
, vol.21
, pp. 72-75
-
-
Taube, D.O.1
Elwork, A.2
-
90
-
-
84874640916
-
-
TechJournal (June)
-
TechJournal. (2011, June). Seven tips on keeping your mobile devices secure, report on smartphone malware. http://www.techjournalsouth.com/2011/06/seven-tips-on-keeping-your-mobile-devices-secure-report-on-smartphone-malware/ (http://www.techjournalsouth.com/2011/06/seven-tips-on-keeping-your-mobile-devices-secure-report-on-smartphone-malware/)
-
(2011)
Seven tips on keeping your mobile devices secure, report on smartphone malware
-
-
-
96
-
-
84885759934
-
-
United States Computer Emergency Readiness Team
-
United States Computer Emergency Readiness Team. (2011). Cyber threats to mobile phones. http://www.us-cert.gov/reading_room/cyber_threats_to_mobile_phones.pdf (http://www.us-cert.gov/reading_room/cyber_threats_to_mobile_phones.pdf)
-
(2011)
Cyber threats to mobile phones
-
-
-
98
-
-
84874632828
-
-
United States v. Arnold, 533 F.3d 1003 (9th Cir. 2008)
-
United States v. Arnold, 533 F.3d 1003 (9th Cir. 2008)
-
-
-
-
99
-
-
84874644205
-
-
United States v. Montoya de Hernandez, 473 U.S. 531 (1985)
-
United States v. Montoya de Hernandez, 473 U.S. 531 (1985)
-
-
-
-
100
-
-
84874606314
-
-
United States v. Ramsey, 431 U.S. 606 (1977)
-
United States v. Ramsey, 431 U.S. 606 (1977)
-
-
-
-
101
-
-
0024550156
-
Psychotherapy and mandated reporting of child abuse
-
Watson, H. and Levine, M. 1989. Psychotherapy and mandated reporting of child abuse. American Journal of Orthopsychiatry, 59: 246-256.
-
(1989)
American Journal of Orthopsychiatry
, vol.59
, pp. 246-256
-
-
Watson, H.1
Levine, M.2
-
102
-
-
64849083118
-
Sensors and sensibilities
-
Werbach, K. 2007. Sensors and sensibilities. Cardozo Law Review, 28: 2321-2371.
-
(2007)
Cardozo Law Review
, vol.28
, pp. 2321-2371
-
-
Werbach, K.1
-
103
-
-
84874604688
-
Cell phone subscriptions to hit 5 billion globally
-
(February 16)
-
Whitney, L. (2010, February 16). Cell phone subscriptions to hit 5 billion globally. CNET Reviews. http://reviews.cnet.com/8301-13970_7-10454065-8.html (http://reviews.cnet.com/8301-13970_7-10454065-8.html)
-
(2010)
CNET Reviews
-
-
Whitney, L.1
-
104
-
-
84874638550
-
-
Wickr. (n.d.)
-
Wickr. (n.d.). Wickr: Leave no trace. http://https://www.mywickr.com/ (http://https://www.mywickr.com/)
-
Wickr: Leave no trace
-
-
-
105
-
-
84874636193
-
-
November, November, San Rafael, CA, San Rafael, CA,: Paper presented at the Workshop for the American Psychological Association Insurance Trust
-
Younggren, J. November 2011. Adventures on the electronic frontier: Ethics and risk management in the digital era, November, San Rafael, CA: Paper presented at the Workshop for the American Psychological Association Insurance Trust.
-
(2011)
Adventures on the electronic frontier: Ethics and risk management in the digital era
-
-
Younggren, J.1
|