Control, Privacy, & Technology

CPSC 185: Control, Privacy and Technology
Brad Rosen (brad.rosen@yale.edu)

TAs:  Alexandra Gutierrez (alexandra.gutierrez) & Gabriella Capone (gabriella.capone)
F, 3:30-5:30, WLH 204

Course Readings:  Please Skim The Syllabi from 201520142013, etc.

(1) Crazy Laws & Prosecutorial Discretion 

  1. Inmates of Attica Correctional Facility v Rockerfeller, 477 F2d 375 (2d Cir. 1973):http://cases.justia.com/us-court-of-appeals/F2/477/375/1514/
  2. Lon Fuller, The Case of The Speluncean Explorers: http://www.nullapoena.de/stud/explorers.html
  3. Miller v. Skumanick,  Order  [Order] (Optional: Skim Complaint [Complaint])
  4. Miller v. Skumanick,  3rd Cir. Appeal Pages: 4-11, Skim 14-21, 22-35.
  5. United States v. Dougherty 473 F.2d 1113 (D.C. Cir. 1974) condensed opinion
  6. United States v. Krzyske, 857 F.2d 1089 (6th Cir. 1988)   and United States v. Krzyske, 836 F.2d 1013 (6th Cir. 1988)  (read sections on jury nullification)
  7. Tang, Xiyin: The Perverse Logic of Teen Sexting Prosecutions (And How To Stop It)

[N.B. The Fuller Article and the Inmates of Attica case serve as a framework for a number of the issues we will discuss in the class].

 

(2) Search, Seizure, and “Reasonable Expectations” 

  1. Katz v. U.S., 389 U.S. 347 (1967):
 http://www.law.cornell.edu/supct/html/historics/USSC_CR_0389_0347_ZO.html
    Harlan’s Concurrence: http://www.law.cornell.edu/supct/html/historics/USSC_CR_0389_0347_ZC1.html
  2. California v. Greenwood, 486 U.S. 35 (1988), including Brennan’s Dissent: 
http://supreme.justia.com/cases/federal/us/486/35/case.html
  3. Kyllo v. U.S., 533 U.S. 27 (2001): http://www.law.cornell.edu/supct/html/99-8508.ZO.html
  4. Florida v. Riley, 488 U.S. 445 (1989): https://supreme.justia.com/cases/federal/us/488/445/case.html
  5. Re-read:  California v. Ciraolo, 476 U.S. 207 (1986):  https://supreme.justia.com/cases/federal/us/476/207/ (this is from 183)
  6. Time Magazine, Antonin Scalia, Civil Libertarian: 
http://www.time.com/time/nation/article/0,8599,130509,00.html
  7. U.S. v. Camacho, 368 F3d 1182 (9th Cir. 2004): http://openjurist.org/368/f3d/1182/united-states-v-camacho
  8. Forbes, Scanner Vans Allow Drive By Snooping, http://www.forbes.com/forbes/2010/0927/technology-x-rays-homeland-security-aclu-drive-by-snooping.html
  9. Andy Greenberg, Full-Body Scan Technology Deployed in Street-Roving Vans,http://blogs.forbes.com/andygreenberg/2010/08/24/full-body-scan-technology-deployed-in-street-roving-vans/
  10. Raw Story, Naked-image full-body scanners to be taken out of U.S. airports, http://www.rawstory.com/rs/2013/01/18/naked-image-full-body-scanners-to-be-taken-out-of-u-s-airports/
  11. Washington Post, How My Shirt Flummoxed the TSA,  http://www.washingtonpost.com/lifestyle/travel/how-my-shirt-flummoxed-the-tsa/2011/09/19/gIQA2PZwqK_story.html
  12. Gonzalez v Schenectady, 2d Cir (Slip. Op. 2013)

(3) Search and Seizure, 2.0 

  1. U.S. v. Knotts, 460 U.S. 276 (1983) (Read the Case Syllabus Only): http://supreme.justia.com/us/460/276/case.html (Optional Skim Case)

Use of GPS / Phones

  1. U.S. v. Garcia, 474 F3d 994 (7th Cir. 2007): http://openjurist.org/474/f3d/994/united-states-v-garcia
  2. People v. Weaver, 2009 N.Y. Slip Op. 03762: [pdf] (read pp. 1-28 and fn 1 on p. 29 — n.b. page numbers are of the pdf, as each opinion has its own page numbers)
  3. Delaware v. Holden [PDF] (read pp. 1-7, 9-17)
  4. U.S. v. Pineda Moreno, 9th Cir. Opinion: http://caselaw.findlaw.com/us-9th-circuit/1497005.html AND Dissent from Denial of en banc:http://www.ca9.uscourts.gov/datastore/opinions/2010/08/12/08-30385.pdf
  5. U.S. v. Jones (2012) (read all opinions): http://www.supremecourt.gov/opinions/11pdf/10-1259.pdf
  6. https://www.eff.org/deeplinks/2013/10/third-circuit-agrees-eff-warrant-required-track-car-gps
  7. http://arstechnica.com/tech-policy/2013/07/again-federal-court-finds-cops-dont-need-a-warrant-for-cellphone-location-data/
  8. Maryland v. Andrews, http://www.mdcourts.gov/opinions/cosa/2016/1496s15.pdf (skim)
  9. Optional: Application for Historical Cell Site Data [PDF] (read pp. 1-4, 15 – 35, skim pp. 5-14 [Conclusions of Fact])
  10. Optional:  Read Case Syllabus Only from U.S. v. Karo, 486 U.S. 705 (1984), http://supreme.justia.com/us/468/705/case.html

Perp walks

  1. A brief history of perp walks: http://nymag.com/daily/intelligencer/2011/05/a_brief_history_of_perp_walks.html
  2. Lauro v. Charles, 219 F.3d 202 (2d Cir. 2000): https://law.resource.org/pub/us/case/reporter/F3/219/219.F3d.202.99-7239.1999.html
  3. Caldarola 343 F.3d 570 (2d Cir. 2003): http://caselaw.findlaw.com/us-2nd-circuit/1371024.html
  4. Mugged by a Mug Shot Online

 

(4) Right Against Self Incrimination (Feb. 17)

  1. U.S. v. Cohen, 388 F2d 464 (9th Cir. 1967): http://openjurist.org/388/f2d/464/united-states-v-cohen
  2. U.S. v. Boucher, 2007 WL 4246473 (D. Vt. Nov. 29 2007): read the Magistrate Order first, then the Appeal
  3. Bronston v. U.S., 409 U.S. 352 (1973): http://caselaw.lp.findlaw.com/cgi-bin/getcase.pl?court=US&vol=409&invol=352
  4. Brogan v. U.S., 522 U.S. 398 (1998): (note that the Souter and Stevens opinions are extremely short)
    1. Scalia’s Opinion: http://www.law.cornell.edu/supct/html/96-1579.ZO.html
    2. Souter’s Concurrence: http://www.law.cornell.edu/supct/html/96-1579.ZC.html
    3. Ginsburg’s Concurrence: http://www.law.cornell.edu/supct/html/96-1579.ZC1.html
    4. Stevens’s Dissent: http://www.law.cornell.edu/supct/html/96-1579.ZD.html
  5. Andrew J. Ungberg,  Protecting Privacy Through a Responsible Decryption Policy: SKIM [PDF]
  6. Techdirt:  Massachusetts Ignores 5th Amendment; Says Defendant Can Be Forced To Decrypt His Computer
  7. EFF’s Know Your Rights: https://www.eff.org/issues/know-your-rights
  8. Apple’s Fingerprint ID May Mean You Can’t ‘Take the Fifth’  http://www.wired.com/opinion/2013/09/the-unexpected-result-of-fingerprint-authentication-that-you-cant-take-the-fifth/
  9. Forcing Suspects to Reveal Phone Passwords Is Unconstitutional – http://arstechnica.com/tech-policy/2015/09/forcing-suspects-to-reveal-phone-passwords-is-unconstitutional-court-says/  (also skim the linked court opinion in SEC v. Huang)
  10. Fifth Amendment Limits on Forced Decryption
  11. Minnesota Court on the Fifth Amendment (skim linked TouchID post)
  12. Murphy v. Waterfront Comm’n of N.Y. Harbor, 378 U.S. 52 (1964) (Sub-Optional – We were going to have you read this, but we decided it was way too boring.  Here’s the link in case you’re interested, but we won’t even call it “optional.”): http://openjurist.org/378/us/52/murphy-v-waterfront-commission-of-new-york-harbor

 

(5) Laptops, Documents & TXT MSGS (oh mai!) (Feb. 24)

  1. U.S. v. Hubbell, 530 U.S. 27 (2000): http://www.law.cornell.edu/supct/html/99-166.ZO.html
  2. Thomas’s Concurrence: http://www.law.cornell.edu/supct/html/99-166.ZC.html
  3. Arizona v. Hicks, 480 US 321 (1987):  https://supreme.justia.com/cases/federal/us/480/321/case.html

Search by government employer (will be more on private employers next week)

  1. Ontario v. Quon, US Supreme Court
  2. Optional/Skim: Quon v. Arch Wireless, 529 F.3d. 892 (9th Cir. 2008)  Ninth Circuit: OpinionIkuta’s DissentWardlaw’s Concurrence

Searches at the border

  1. U.S. v. Arnold, 523 F.3d 941 (9th Cir. 2008): district court opinionNinth Circuit opinion
  2. US v. Jae Shik Kim:  district court opinion
  3. United States v. Cotterman: Ninth circuit en banc
  4. Techdirt, Think Tank Says DHS Should Stop Border Laptop Searches (also skim full report here)
  5. Kashmir Hill, The Price to Cross the Border

Cell phone searches

  1. Ars, Police Seizure of Text Messages Violated 4th Amendment
  2. People v. Diaz, California Supreme Court
  3. State v. Smith, Ohio Supreme Court
  4. United States v. Garvey, US Virgin Islands
  5. United States v. Flores-Lopez, 7th Cir
  6. Riley v. California Sup Ct.
  7. Where Police Can & Can’t Snoop Through Your Phone

(6) Emails, Passwords and Consent (Mar. 3)

  1. UNITED STATES v. GALPIN
  2. Kashmir Hill, The Geek Squad Becomes the Porn Squad
  3. Thompson v. Ross, W.D. Pa.
  4. U.S. v. Warshak, (6th Cir. 2010), Slip Opinon, (skim 4-13, read p14-29, p. 94-98)
  5. Romano v. Steelcase [PDF]
  6. Jennings v. Holly , SC Supreme Court
  7. Cnet, DOJ Abandons Warrantless Attempt to Read Yahoo Email
  8. Who Has Your Back 2015
  9. ABC News, Man Faces Five Years in Prison for Snooping Through Wife’s Emails (Update: CBS Detroit, Final Charges Dropped in Husband-Wife Hacking Case)
  10. Kashmir Hill, Aussie Teen Proves a Lover’s Revenge Is Best Served Digitally
  11. Judge dismisses case against Brooklyn man who shared nude photos of girlfriend on his Twitter account (full opinion: http://www.courts.state.ny.us/reporter/3dseries/2014/2014_50193.htm)
  12. Reddit Bans Nude Photos Posted Without Consent

Email in the workplace

  1. Stengart v. Loving Care, 990 A.2d 650 (2010), http://caselaw.findlaw.com/nj-supreme-court/1522648.html
  2. A Company Computer and Questions About E-Mail Privacy (N.Y. Times, June 27, 2008): http://www.nytimes.com/2008/06/27/technology/27mail.html?_r=2&adxnnl=1&oref=slogin&ref=business&adxnnlx=1214862365-v6tJmItYLdKLKVEcpU7/bQ
  3. Rebels in Black Robes Recoil at Surveillance of Computers (N.Y. Times, Aug. 8, 2001):http://www.nytimes.com/2001/08/08/national/08COUR.html?
  4. Smyth v. Pillsbury Co., 914 F. Supp. 97 (E.D. Pa. 1996): http://www.loundy.com/CASES/Smyth_v_Pillsbury.html (Skim)
  5. United States v. Hamilton (4th Circuit 2012)
  6. California Judge Confirms Police Officers’ Rights Were Violated By Hidden Locker Room Camera (ACLU.org, Apr. 4, 2006): http://www.aclu.org/technology-and-liberty/california-judge-confirms-police-officers-rights-were-violated-hidden-locker-
  7. Venkat Balasubramani, Ex-Employees Awarded $4,000 for Email Snooping by Employer

7) Recordings (Mar. 10)

Recording police officers

  1. ACLU v. Alvarez
  2. Sharp v. Baltimore
  3. Justice Dept. defends public’s constitutional ‘right to record’ cops 
  4. DOJ letter
  5. Cops Roll Out Citizen Video Order
  6. Yes, You Have A Right to Record The Police
  7. The Danger In Recording A Cop
  8. What To Say When The Police Tell You To Stop Filming Them
  9. Police Must Respect Citizen’s Right To Record Them
  10. Federal Judge: Recording Cops Isn’t Necessarily Protected By 1st Amendment
  11. Fields v. Philadelphia (read it now before it gets overturned)

Secretly recording sex

  1. NY v. Piznarski  (Read up to page 12, skim the rest)
  2. Charges target sex taping in dorm
  3. Desfeux granted special probation 

Other recording

  1. Caro v. Weintraub 
  2. Dillon v. Seattle Deposition Reporters 
  3. ABC wins appeal over hidden camera investigation of medical lab (Optional: opinion)
  4. Google “The Fappening” and “The Snappening” and read generally about both.

(8)  If you’re not paying for it…(and then what do they do with it?) (Mar. 31)

  1. (skim) WSJ Privacy Coverage: OneTwoThreeFourFiveSixSevenEight
  2. Terms and Conditions: A movie about privacy policies you’ll actually want to watch

A. Social Media and employment

  1. Keeping a Closer Eye on Employees’ Social Networking (NYTimes.com, Mar. 26, 2010):http://bits.blogs.nytimes.com/2010/03/26/keeping-a-closer-eye-on-workers-social-networking/?scp=1&sq=facebook%20employers&st=cse.
  2. OPTIONAL – For a 2009 study on the rate at which employers search for applicants’ profiles, see the following CareerBuilder.com report, published Aug. 19, 2009:http://www.careerbuilder.com/share/aboutus/pressreleasesdetail.aspx?id=pr519&sd=8/19/2009&ed=12/31/2009&siteid=cbpr&sc_cmp1=cb_pr519_&cbRecursionCnt=2&cbsid=f430eced50a44966a0c38ab247728f26-323142413-RF-4
  3. The Atlantic, Should Employers Be Allowed to Ask For Your Facebook Password?
  4. Millennial Fired For Tweet
  5. GigaOm, What happens when social surveillance goes mainstream?  http://gigaom.com/2012/04/02/what-happens-when-social-surveillance-goes-mainstream/

B. Social media, police, passwords, and courts

  1. Reuters, In US Courts, Facebook Posts Become Less Private
  2. Ehling-v.-Monmouth-Ocean-Hospital-SCA [repeat from 183]
  3. Forbes, Judge Orders Divorcing Couple to Swap Facebook Passwords
  4. When Tweets Can Make You a Jailbird
  5. Criminal Selfies: One, Two, Three
  6. The Federal Crime Nobody Talks About In Making A Murderer

C. Data Privacy and Marketing

  1. Facebook is Marketing Your Brand Preferences (With Your Permission) (N.Y. Times, Nov. 7, 2007):http://www.nytimes.com/2007/11/07/technology/07adco.html
  2. Facebook to Shut Down Ad Program
  3. Facebook Test-Drives Real Time Ad Targeting, http://www.pcmag.com/article2/0,2817,2382544,00.asp
  4. Kash Hill, How Target Figured Out a Teen Girl Was Pregnant Before Her Father Did, http://www.forbes.com/sites/kashmirhill/2012/02/16/how-target-figured-out-a-teen-girl-was-pregnant-before-her-father-did/
  5. Kash Hill, When An App Tells Companies You’re Pregnant But Not That You’ve Miscarried, http://fusion.net/story/345471/what-to-expect-app-privacy-problems/
  6. Kash Hill, Facebook and your friends.  One.  Two.
  7. Vibrator Spies On You.
  8. Amazon Wants to Ship Your Package Before You Buy It
  9. Time, Private Eyes – Retailers watching our every move, http://business.time.com/2012/09/18/private-eyes-are-retailers-watching-our-every-move/
9) Data Aggregation, Brokers, and Breaches (April 7)
 
A. Aggregation Effect
  1. How Privacy Vanishes Online (N.Y. Times, Mar. 17, 2010):http://www.nytimes.com/2010/03/17/technology/17privacy.html
  2. Cookies, Web Bugs, and In re Doubleclick Inc. Privacy Litigation, 154 F. Supp. 2d 497 (S.D.N.Y. 2001) (from Information Privacy Law 808-10 (Daniel J. Solove & Paul M. Schwartz eds., 2009)) (read the entire attached PDF)
  3. Apple Sets May 1 Deadline to Cut off UDID
  4. Fingerprinting and Beyond
  5. Law Students Teach Scalia About Privacy and the Web (N.Y. Times, May 18, 2009): http://www.nytimes.com/2009/05/18/technology/internet/18link.html
  6. CDT Memo on Sorrell v. IMShttp://www.cdt.org/files/pdfs/20110324_SorrellvIMS.pdf
  7. A Face Is Exposed for AOL Searcher No. 4417749 (N.Y. Times, Aug. 9, 2006):http://www.nytimes.com/2006/08/09/technology/09aol.html?pagewanted=1
  8. AOL search data release reveals a great deal (USAToday.com, Aug. 17, 2006):http://www.usatoday.com/tech/columnist/andrewkantor/2006-08-17-aol-data_x.htm
  9. Google Thinks I’m a Middle-Aged Man. What About You? (Mashable.com, Jan. 25, 2012): http://mashable.com/2012/01/25/google-cookies/
  10. Facebook Graph – Privacy Control You Still Don’t Have https://www.eff.org/deeplinks/2013/01/facebook-graph-search-privacy-control-you-still-dont-have
  11. Facebook Users Want More Privacy, Nudged Towards Less, Study Finds (Also finds Water, Wet. Pope, Catholic)
  12. Explore: http://actualfacebookgraphsearches.tumblr.com/
  13. Teens, Social Media, and Privacy http://www.pewinternet.org/2013/05/21/teens-social-media-and-privacy/
  14. “Critics of Privacy.” Solove and Schwartz, Information Privacy Law (4th), pp. 62-69. (excerpt)
B. Data Brokers
  1. The Data Brokers: Selling your personal information
  2. Joshua L. Simmons, Buying You – The Government’s Use of Fourth-Parties to Launder Data About “The People”: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1475524
  3. EPIC, FTC Letter – Request for investigation into data broker products for compliance with the Fair Credit Reporting Act:http://epic.org/privacy/choicepoint/fcraltr12.16.04.html
  4. Escaping the Scrapers, WSJ, http://blogs.wsj.com/digits/2010/10/11/escaping-the-scrapers/
  5. Press Release, Leahy Renews Push For Data Privacy Legislation, http://www.leahy.senate.gov/press/press_releases/release/?id=31e641c0-013e-4abc-8148-2c4f04ac3a8
  6. Lawsuits Challenge US Online Data Brokers (Reuters Legal, Feb. 24, 2011):http://www.reu dters.com/assets/print?aid=USN2427826420110224
  7. Purcell v. Spokeo, Complaint  [PDF] (pp. 1-5)
  8. Spokeo and Privacy Harms
  9. Data Broker Defendants Settle…. (Skim Complaint)

C. Data Breaches

  1. Private Information Stolen from Nationwide Consumer Database (ConsumerAffairs.com, Feb. 16, 2005): http://www.consumeraffairs.com/news04/2005/choicepoint.html
  2. ChoicePoint Details Data Breach Lessons
  3. ChoicePoint-FBI Deal Raises New Privacy Questions
  4. ChoicePoint to pay $275,000 in latest data breach (CNET.com, Oct. 20, 2009):http://news.cnet.com/8301-27080_3-10379722-245.html
  5. The Target Data Breach is Becoming a Nightmare
  6. Calif. attorney general: Time to crack down on companies that don’t encrypt
  7. Does Clapper Silence Data Breach Litigation?  A Two Year Retrospective
  8. Third Circuit Analyzes Post-Spokeo
  9. Post Spokeo Standing

 

(10) Quis custodiet ipsos custodes? (Quidquid latine dictum sit, altum videtur) (Apr. 14)

A. The Gatekeepers

  1. http://digiday.com/publishers/native-advertisings-social-media-problem/
  2. http://www.usatoday.com/story/tech/2014/07/03/facebook-emotion-study-complaint-epic/12157471/
  3. https://arstechnica.com/business/2016/12/facebook-will-outsource-fact-checking-to-fight-fake-news/
  4. EPIC – Public Opinion on Privacy http://epic.org/privacy/survey/  (skim)

  5. EPIC – Facebook Privacy http://epic.org/privacy/facebook/ (skim)

  6. Written Congressional Testimony of Marc Rotenberg, July 28, 2010, http://epic.org/privacy/socialnet/EPIC_Testimony_House_Jud_7_10.pdf

  7. http://www.slate.com/articles/technology/technology/2015/03/google_ftc_report_here_s_why_the_government_and_the_company_agreed_to_a.html

B. FTC / Mobile

  1. https://www.dataprivacymonitor.com/mobile-privacy/2016-mobile-data-privacy-and-security-update-and-2015-review/
  2. http://marketingland.com/ftc-puts-social-media-marketers-on-notice-with-updated-disclosure-guidelines-132017
  3. http://www.latimes.com/news/opinion/opinion-la/la-ol-ftc-rules-for-twitter-20130312,0,1847653.story

  4. (skim) http://www.ftc.gov/speeches/rosch/120914TheMentorGroupBostonParisFrance.pdf

  5. http://articles.latimes.com/2013/feb/01/business/la-fi-tn-ftc-mobile-privacy-consumers-report-20130201

  6. http://thehill.com/blogs/hillicon-valley/technology/287089-new-ftc-chief-vows-to-continue-push-for-online-privacy

  7. FTC, Protecting Consumer Privacy in an Era of Rapid Change, http://www.ftc.gov/os/2012/03/120326privacyreport.pdf

C. Governance Regimes (Skim all)

  1. Privacy Governance by Contract, by Self-Regulation, by Property, and by Statute (excerpts from Information Privacy Law 808-10 (Daniel J. Solove & Paul M. Schwartz eds., 2009)) (read the attached PDF)

  2. RadioShack puts customer personal data up for sale in bankruptcy auction – http://www.pcworld.com/article/2901028/radioshack-puts-customers-personal-data-up-for-sale-in-bankruptcy-auction.html
  3. California OAG – Privacy Principles http://ag.ca.gov/cms_attachments/press/pdfs/n2630_signed_agreement.pdf?.

  4. Consumer Data Privacy in a Networked World, http://repository.cmu.edu/cgi/viewcontent.cgi?article=1096&context=jpc

  5. The FTC and the New Common Law of Privacy (download paper) http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2312913

 

(12) Theories of Privacy Rights: Penumbras and Unintended Consequences (Apr. 28):

  1. Samuel D. Warren & Louis D. Brandeis, The Right to Privacy, 4 Harv. L. Rev. 5 (1890). (attached as PDF)

  2. Griswold v. Connecticut, 381 U.S. 479 (1965): Douglas’s opinion for the Court:http://www4.law.cornell.edu/supct/html/historics/USSC_CR_0381_0479_ZO.html; Black’s dissent (first three paragraphs only): http://www.law.cornell.edu/supremecourt/text/381/479#writing-USSC_CR_0381_0479_ZD

  3. Roe v. Wade, 410 U.S. 113 (1973) (Blackmun’s opinion – only preamble (the paragraphs preceding section I) and section VIII):http://www.law.cornell.edu/supct/html/historics/USSC_CR_0410_0113_ZO.html

  4. Randall P. Bezanson, The Right to Privacy Revisited: Privacy, News, and Social Change 1890-1990, 80 Cal. L. Rev. 5 (1992) [only pages 1137-1150] (attached as PDF)

  5. Robert C. Post, The Social Foundations of Privacy: Community and Self in the Common Law Tort, 77 Cal. L. Rev. 5 (1989) [only pages 969-978] (attached as PDF)

  6. Catsouras v. Dept. of Cal. Hwy. Patrol, 181 Cal. App. 4th 856 (2010) [only pages 10-18] (attached as PDF)

  7. ABCNews, Families Struggle to Delete Loved One’s Online Presence After Death, http://abcnews.go.com/US/families-struggle-delete-loved-online-presence-death/story?id=15108300#.T4yn4qtQ4iE

  8. Justia, Facebook’s “If I Die” App Should Remind Us That We Each Need a Digital Death Plan, http://verdict.justia.com/2012/01/17/facebooks-if-i-die-app-should-remind-us-that-we-each-need-a-digital-death-plan

  9. Facebook Now Lets You Choose Who Controls Your Account After You Die, http://www.theverge.com/2015/2/12/8025117/facebook-account-after-death
  10. ….but people aren’t using it:  http://www.forbes.com/sites/ellenhuet/2015/04/21/digital-asset-legacy-poll/
  11. Lifehacker, What Should I Do About My Virtual Life After Death, http://lifehacker.com/5617683/what-should-i-do-about-my-virtual-life-after-death

  12. Facebook Memorial Sites Taking Hold, http://www.cbsnews.com/2100-501366_162-6172718.html

  13. Google Inactive Account Manager, http://techcrunch.com/2013/04/11/googles-afterlife/

  14. What Inactive Account Manager means for your will, http://www.telegraph.co.uk/technology/google/9997105/Google-RIP-What-Inactive-Account-Manager-means-for-your-will.html

  15. National archives v. Favish, 541 U.S. 157 (2004) (Opinion by Kennedy):http://www.law.cornell.edu/supct/html/02-954.ZO.html

  16. Marsh v. San Diego http://cdn.ca9.uscourts.gov/datastore/opinions/2012/05/30/11-55395.pdf

  17. Chanko v. American Broadcasting Corp
  18. Rodriguez v Fox
  19. Kiel Brennan Marquez, “A modest defense of mind-reading” http://yjolt.org/modest-defense-mind-reading

  20. Refresh Lon Fuller, The Case of The Speluncean Explorers:http://www.nullapoena.de/stud/explorers.html

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s