181 Publications (Page 2 of 8)
2013
PRISM and privacy: will this change everything?Kuner, Christopher⋅Cate, Fred and Millard, Christopher(pp. 217 - 219). Nov 2013
The extraterritoriality of data privacy laws--an explosive issue yet to detonateKuner, Christopher⋅Cate, Fred and Millard, Christopher(pp. 147 - 148). Aug 2013
The challenge of 'big data' for data protectionKuner, Christopher⋅Cate, Fred and Millard, Christopher(pp. 47 - 49). May 2012
The commodification of information and the control of expressionCate, Fred HAmicus Curiae, vol. 2002, (no. 43), 2012-02-23.
| Journal Article
The end of the beginningKuner, Christopher⋅Cate, Fred and Millard, Christopher(pp. 115 - 116). Aug 2012
The intricacies of independenceKuner, Christopher⋅Cate, Fred and Millard, Christopher(pp. 1 - 2). Feb 2012
The Supreme Court and information privacyCate, Fred and Cate, BethInternational Data Privacy Law, vol. 2, (no. 4), pp. 255 - 267, Nov 2012.
| Journal Article
2011
A Transatlantic Convergence on Privacy?Cate, Fred HIEEE Security & Privacy Magazine, vol. 9, (no. 1), pp. 76-79, 2011.
| Journal Article
EditorialKuner, Christopher⋅Cate, Fred and Millard, Christopher(pp. 1 - 2). Feb 2011
Let's not kill all the privacy laws (and lawyers)Kuner, Christopher⋅Cate, Fred H⋅Millard, Christopher and Svantesson, Dan Jerker BInternational Data Privacy Law, vol. 1, (no. 4), pp. 210, 20111100.
| Journal Article
Moving forward togetherKuner, Christopher⋅Cate, Fred and Millard, Christopher(pp. 81 - 82). May 2011
Privacy--an elusive conceptKuner, Christopher⋅Cate, Fred and Millard, Christopher(pp. 141 - 142). Aug 2011
2010
Government Access to Private-Sector DataCate, Fred HIEEE Security & Privacy, vol. 8, (no. 6), pp. 71, 2010-Nov.-Dec..
| Journal Article
Protecting Privacy in Health Research: The Limits of Individual ChoiceCate, FredCalifornia Law Review, vol. 98, (no. 6), pp. 1803, 20101201.
| Journal Article
The Limits of Notice and ChoiceCate, Fred HIEEE Security & Privacy Magazine, vol. 8, (no. 2), pp. 59-62, 2010.
| Journal Article
2009
Security, Privacy, and the Role of LawCate, Fred HIEEE Security & Privacy, vol. 7, (no. 5), pp. 63, 2009-Sept.-Oct..
| Journal Article
2008
Government Data Mining: The Need for a Legal FrameworkCate, Fred HHarvard Civil Rights - Civil Liberties Law Review, vol. 43, (no. 2), Summer 2008.
| Journal Article
2006
Information security breaches and the threat to consumersCate, FredConsumer Finance Law Quarterly Report, vol. 60, (no. 2), pp. 344, 20060622.
| Journal Article
The Privacy and Security Policy Vacuum in Higher EducationCate, Fred HEDUCAUSE Review, vol. 41, (no. 5), pp. 18-28, Sep/Oct 2006.
| Journal Article
2005
Information Security Breaches and the Threat to ConsumersCate, FredElectronic Banking Law and Commerce Report, vol. 10, (no. 5), pp. 1, 20051001.
| Journal Article
2003
Financial Privacy, Consumer Prosperity, and the Public GoodCate, Fred2003.
| Book
Privacy regulation and what is at riskCate, FredProceedings, pp. 80, 2003.
| Journal Article
Revisiting the vast wastelandCate, FredFederal Communications Law Journal, vol. 55, (no. 3), pp. 407, 20030501.
| Journal Article