Panel three: Implementation-what methods, if any, can be employed to promote the existing rules' attempts to protect private identifier information from internet access?

  • Ronald Leighton
  • , Joe Cecil
  • , Michel Ishakian
  • , Edward Felten
  • , Elizabeth Stong
  • , Jay Safer
  • , Robert Heinemann
  • , Joseph Goldstein

Research output: Contribution to journalArticlepeer-review

2 Scopus citations
Original languageEnglish (US)
Pages (from-to)45-64
Number of pages20
JournalFordham Law Review
Volume79
Issue number1
StatePublished - Oct 2010

All Science Journal Classification (ASJC) codes

  • Law

Fingerprint

Dive into the research topics of 'Panel three: Implementation-what methods, if any, can be employed to promote the existing rules' attempts to protect private identifier information from internet access?'. Together they form a unique fingerprint.

Cite this