Panel three: Implementation-what methods, if any, can be employed to promote the existing rules' attempts to protect private identifier information from internet access?

Ronald Leighton, Joe Cecil, Michel Ishakian, Edward Felten, Elizabeth Stong, Jay Safer, Robert Heinemann, Joseph Goldstein

Research output: Contribution to journalArticle

2 Scopus citations
Original languageEnglish (US)
Pages (from-to)45-64
Number of pages20
JournalFordham Law Review
Volume79
Issue number1
StatePublished - Oct 1 2010

All Science Journal Classification (ASJC) codes

  • Law

Fingerprint Dive into the research topics of 'Panel three: Implementation-what methods, if any, can be employed to promote the existing rules' attempts to protect private identifier information from internet access?'. Together they form a unique fingerprint.

Cite this