@article{ed751590ffe14ccc8ee577f051c52ec1,
title = "Panel three: Implementation-what methods, if any, can be employed to promote the existing rules' attempts to protect private identifier information from internet access?",
author = "Ronald Leighton and Joe Cecil and Michel Ishakian and Edward Felten and Elizabeth Stong and Jay Safer and Robert Heinemann and Joseph Goldstein",
year = "2010",
month = oct,
language = "English (US)",
volume = "79",
pages = "45--64",
journal = "Fordham Law Review",
issn = "0015-704X",
publisher = "Fordham University School of Law",
number = "1",
}