Panel three: Implementation-what methods, if any, can be employed to promote the existing rules' attempts to protect private identifier information from internet access?

Ronald Leighton, Joe Cecil, Michel Ishakian, Edward Felten, Elizabeth Stong, Jay Safer, Robert Heinemann, Joseph Goldstein

Research output: Contribution to journalArticlepeer-review

2 Scopus citations
Original languageEnglish (US)
Pages (from-to)45-64
Number of pages20
JournalFordham Law Review
Volume79
Issue number1
StatePublished - Oct 2010

All Science Journal Classification (ASJC) codes

  • Law

Fingerprint

Dive into the research topics of 'Panel three: Implementation-what methods, if any, can be employed to promote the existing rules' attempts to protect private identifier information from internet access?'. Together they form a unique fingerprint.

Cite this