2013 Syllabus

CPSC 185: Control, Privacy and Technology
Brad Rosen (brad.rosen@yale.edu)

TAs:  Lauren Thomas (lauren.thomas@yale.edu), Nicholas Makarov (nicholas.makarov@yale.edu)
F, 3:30-5:20, AKW 400 (may move)

ANNOUNCEMENTS:   Enrollment is now closed.  See you Friday!

Course Readings:  Please Skim The Syllabi from  20122011 and 2010.

(1)  Crazy Laws & Prosecutorial Discretion (Jan. 25 – Intro & Overview)

  1. Inmates of Attica Correctional Facility v Rockerfeller, 477 F2d 375 (2d Cir. 1973):http://cases.justia.com/us-court-of-appeals/F2/477/375/1514/
  2. Lon Fuller, The Case of The Speluncean Explorers: http://www.nullapoena.de/stud/explorers.html
  3. Miller v. Skumanick,  Order  [Order] (Optional: Skim Complaint [Complaint])
  4. Miller v. Skumanick,  3rd Cir. Appeal Pages: 4-11, Skim 14-21, 22-35.
  5. United States v. Dougherty 473 F.2d 1113 (D.C. Cir. 1974) condensed opinion
  6. United States v. Krzyske, 857 F.2d 1089 (6th Cir. 1988)http://ftp.resource.org/courts.gov/c/F2/857/857.F2d.1089.85-1799.85-1760.html

[N.B. The Fuller Article and the Inmates of Attica case serve as a framework for a number of the issues we will discuss in the class].


2) Search, Seizure, and “Reasonable Expectations” (Feb. 1)

  1. Katz v. U.S., 389 U.S. 347 (1967):
    Harlan’s Concurrence:
  2. http://www.law.cornell.edu/supct/html/historics/USSC_CR_0389_0347_ZC1.html
  3. California v. Greenwood, 486 U.S. 35 (1988):
    Brennan’s Dissent: http://www.law.cornell.edu/supct/html/historics/USSC_CR_0486_0035_ZD.html
  4. Kyllo v. U.S., 533 U.S. 27 (2001): http://www.law.cornell.edu/supct/html/99-8508.ZO.html
  5. Time Magazine, Antonin Scalia, Civil Libertarian:
  6. U.S. v. Camacho, 368 F3d 1182 (9th Cir. 2004): http://openjurist.org/368/f3d/1182/united-states-v-camacho
  7. Forbes, Scanner Vans Allow Drive By Snooping, http://www.forbes.com/forbes/2010/0927/technology-x-rays-homeland-security-aclu-drive-by-snooping.html
  8. Andy Greenberg, Full-Body Scan Technology Deployed in Street-Roving Vans,http://blogs.forbes.com/andygreenberg/2010/08/24/full-body-scan-technology-deployed-in-street-roving-vans/
  9. Andrew Moseman, “Whats the Real Radiation Risk of the TSA’s Full Body X-Ray Scans”, http://blogs.discovermagazine.com/80beats/2010/11/17/whats-the-real-radiation-risk-of-the-tsas-full-body-x-ray-scans/
  10. Opening Brief For Petitioners, EPIC v. Napolitano, http://epic.org/EPIC_Body_Scanner_OB.pdf (pp. 1-19, 31-33)[OPTIONAL]
  11. Complaint, Ventura v. Napolitano, http://static.infowars.com/2011/01/i/general/Ventura_lawsuit.pdf (skim)[OPTIONAL]
  12. Raw Story, Naked-image full-body scanners to be taken out of U.S. airports, http://www.rawstory.com/rs/2013/01/18/naked-image-full-body-scanners-to-be-taken-out-of-u-s-airports/

(3) Search and Seizure, 2.0 (Feb. 15)

  1. U.S. v. Knotts, 460 U.S. 276 (1983) (Read the Case Syllabus Only): http://supreme.justia.com/us/460/276/case.html (Optional Skim Case)
  2. U.S. v. Garcia, 474 F3d 994 (7th Cir. 2007): http://openjurist.org/474/f3d/994/united-states-v-garcia
  3. People v. Weaver, 2009 N.Y. Slip Op. 03762: [pdf] (read pp. 1-28 and fn 1 on p. 29 — n.b. page numbers are of the pdf, as each opinion has its own page numbers)
  4. Delaware v. Holden [PDF] (read pp. 1-7, 9-17)
  5. U.S. v. Pineda Moreno, 9th Cir. Opinion: http://caselaw.findlaw.com/us-9th-circuit/1497005.html Dissent from Denial of en banc:http://www.ca9.uscourts.gov/datastore/opinions/2010/08/12/08-30385.pdf
  6. U.S. v. Jones (2012) (read all opinions): http://www.supremecourt.gov/opinions/11pdf/10-1259.pdf
  7. Chris Rovzar’s Article: http://nymag.com/daily/intelligencer/2011/05/a_brief_history_of_perp_walks.html
  8. Lauro v. Charles, 219 F.3d 202 (2d Cir. 2000): https://bulk.resource.org/courts.gov/c/F3/219/219.F3d.202.99-7239.1999.html
  9. Caldarola 343 F.3d 570 (2d Cir. 2003): http://caselaw.findlaw.com/us-2nd-circuit/1371024.html
  10. Optional: Application for Historical Cell Site Data [PDF] (read pp. 1-4, 15 – 35, skim pp. 5-14 [Conclusions of Fact])
  11. Optional: Lily Robinton, Courting Chaos: Conflicting Guidance From Courts Highlights the Need for Clearer Rules to Govern the Search and Seizure of Digital Evidence [PDF]
  12. Optional:  Read Case Syllabus Only from U.S. v. Karo, 486 U.S. 705 (1984), http://supreme.justia.com/us/468/705/case.html


(4) Right Against Self Incrimination (Feb. 22)

  1. U.S. v. Cohen, 388 F2d 464 (9th Cir. 1967): http://openjurist.org/388/f2d/464/united-states-v-cohen
  2. U.S. v. Boucher, 2007 WL 4246473 (D. Vt. Nov. 29 2007): read the Magistrate Order first, then the Appeal
  3. Bronston v. U.S., 409 U.S. 352 (1973): http://caselaw.lp.findlaw.com/cgi-bin/getcase.pl?court=US&vol=409&invol=352
  4. Brogan v. U.S., 522 U.S. 398 (1998): (note that the Souter and Stevens opinions are extremely short)
    Scalia’s Opinion: http://www.law.cornell.edu/supct/html/96-1579.ZO.html
    Souter’s Concurrence: http://www.law.cornell.edu/supct/html/96-1579.ZC.html
    Ginsburg’s Concurrence: http://www.law.cornell.edu/supct/html/96-1579.ZC1.html
    Stevens’s Dissent: http://www.law.cornell.edu/supct/html/96-1579.ZD.html
  5. Andrew J. Ungberg,  Protecting Privacy Through a Responsible Decryption Policy: SKIM [PDF]
  6. Murphy v. Waterfront Comm’n of N.Y. Harbor, 378 U.S. 52 (1964) (Sub-Optional – We were going to have you read this, but we decided it was way too boring.  Here’s the link in case you’re interested, but we won’t even call it “optional.”):


(5&6) Laptops, Documents & TXT MSGS (oh mai!) / Emails, Passwords and Consent (Mar. 1)

  1. U.S. v. Hubbell, 530 U.S. 27 (2000): http://www.law.cornell.edu/supct/html/99-166.ZO.html
    Thomas’s Concurrence: http://www.law.cornell.edu/supct/html/99-166.ZC.html
  2. U.S. v. Arnold, 523 F.3d 941 (9th Cir. 2008): district court opinionNinth Circuit opinion
  3. Ontario v. Quon, US Supreme Court
    Optional/Skim: Quon v. Arch Wireless, 529 F.3d. 892 (9th Cir. 2008)  Ninth Circuit: OpinionIkuta’s DissentWardlaw’s Concurrence
  4. People v. Diaz, California Supreme Court
  5. State v. Smith, Ohio Supreme Court
  6. Thompson v. Ross, W.D. Pa.
  7. United States v. Garvey, US Virgin Islands
  8. United States v. Flores-Lopez, 7th Cir
  9. Techdirt, Think Tank Says DHS Should Stop Border Laptop Searches (also skim full report here)
  10. Kashmir Hill, Aussie Teen Proves a Lover’s Revenge Is Best Served Digitally
  11. Kashmir Hill, The Geek Squad Becomes the Porn Squad
  12. Kashmir Hill, The Price to Cross the Border
  1. U.S. v. Warshak, (6th Cir. 2010), Slip Opinon, (skim 4-13, read p14-29, p. 94-98)
  2. In Re Application of the United States of America for an Order Pursuant to 18 U.S.C. §2703(d) —EFF Amicus Brief
  3. Romano v. Steelcase [PDF]
  4. Jennings v. Holly , SC Supreme Court
  5. Ars, Police Seizure of Text Messages Violated 4th Amendment
  6. Cnet, DOJ Abandons Warrantless Attempt to Read Yahoo Email
  7. Aol News, Snooping on Wife’s Email Could Put  Man In Prison
  8. Venkat Balasubramani, Ex-Employees Awarded $4,000 for Email Snooping by Employer
  9. The Atlantic, Should Employers Be Allowed to Ask For Your Facebook Password?
  10. Forbes, Judge Orders Divorcing Couple to Swap Facebook Passwords
  11. Reuters, In US Courts, Facebook Posts Become Less Private


(7) Skirting Around the Law’s Protection (Mar. 2)

  1. Joshua L. Simmons, Buying You – The Government’s Use of Fourth-Parties to Launder Data About “The People”: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1475524
  2. EPIC, Choicepoint Home (browse/skim): http://epic.org/privacy/choicepoint/
  3. EPIC, FTC Letter – Request for investigation into data broker products for compliance with the Fair Credit Reporting Act:http://epic.org/privacy/choicepoint/fcraltr12.16.04.html
  4. Private Information Stolen from Nationwide Consumer Database (ConsumerAffairs.com, Feb. 16, 2005): http://www.consumeraffairs.com/news04/2005/choicepoint.html
  5. Data Blunders Cost ChoicePoint $15 Million (ConsumerAffairs.com, Jan. 16, 2006):http://www.consumeraffairs.com/news04/2006/01/choicepoint_fine.html
  6. ChoicePoint-FBI Deal Raises New Privacy Questions (ConsumerAffairs.com, May 16, 2006): http://www.consumeraffairs.com/news04/2006/05/fbi_choicepoint.html
  7. ChoicePoint to pay $275,000 in latest data breach (CNET.com, Oct. 20, 2009):http://news.cnet.com/8301-27080_3-10379722-245.html
  8. Lawsuits Challenge US Online Data Brokers (Reuters Legal, Feb. 24, 2011):http://www.reuters.com/assets/print?aid=USN2427826420110224
  9. Escaping the Scrapers, WSJ, http://blogs.wsj.com/digits/2010/10/11/escaping-the-scrapers/
  10. Press Release, Leahy Renews Push For Data Privacy Legislation, http://www.leahy.senate.gov/press/press_releases/release/?id=31e641c0-013e-4abc-8148-2c4f04ac3a86
  11. Kash Hill, How Target Figured Out a Teen Girl Was Pregnant Before Her Father Did, http://www.forbes.com/sites/kashmirhill/2012/02/16/how-target-figured-out-a-teen-girl-was-pregnant-before-her-father-did/
  12. Kash Hill, Don’t Want To Be Targeted by Target?  There’s an Opt Out, http://www.forbes.com/sites/kashmirhill/2012/02/22/dont-want-to-be-targeted-by-target-theres-an-opt-out/
  13. Purcell v. Spokeo, Complaint  [PDF] (pp. 1-5)


(8) Control: Can We, Practically and Legally & If So, Should We? (Mar. 29)

A. Wiretapping

  1. Ars Technica, FBI pushes for surveillance backdoors in web 2.0 tools,http://arstechnica.com/tech-policy/news/2011/02/fbi-pushes-for-surveillance-backdoors-in-web-20-tools.ars
  2. Going Dark: Lawful Electronic Surveillance  In the Face of New Technology, Valerie Caproni, General Counsel FBI, http://judiciary.house.gov/hearings/pdf/Caproni02172011.pdf
  3. Wired, The NSA Is Building The Country’s Biggest Spy Center (Watch What You Say), http://www.wired.com/threatlevel/2012/03/ff_nsadatacenter/all/1
  4. In re National Security Agency Telecommunications Records Litigation, No. 06-1791 (N.D.C.A. June 3, 2009) (Only Pages 2-6): http://www.eff.org/files/filenode/att/orderhepting6309_0.pdf
  5. Kash Hill, Surprise Visitors are Unwelcome At the NSA’s Unifished Utah Spy Center (Especially When They Take Photos), http://www.forbes.com/sites/kashmirhill/2013/03/04/nsa-utah-data-center-visit/

B. Workplace Privacy

  1. Stengart v. Loving Care, 990 A.2d 650 (2010), http://lawlibrary.rutgers.edu/courts/supreme/a-16-09.opn.html (Supreme Court)
    408 N.J. Super. 54, 973 A.2d 390 (2009):http://lawlibrary.rutgers.edu/decisions/appellate/a3506-08.opn.html (Appellate Division – SKIM)
  2. A Company Computer and Questions About E-Mail Privacy (N.Y. Times, June 27, 2008): http://www.nytimes.com/2008/06/27/technology/27mail.html?_r=2&adxnnl=1&oref=slogin&ref=business&adxnnlx=1214862365-v6tJmItYLdKLKVEcpU7/bQ
  3. Rebels in Black Robes Recoil at Surveillance of Computers (N.Y. Times, Aug. 8, 2001):http://www.nytimes.com/2001/08/08/national/08COUR.html?
  4. Smyth v. Pillsbury Co., 914 F. Supp. 97 (E.D. Pa. 1996): http://www.loundy.com/CASES/Smyth_v_Pillsbury.html (Skim)
  5. California Judge Confirms Police Officers’ Rights Were Violated By Hidden Locker Room Camera (ACLU.org, Apr. 4, 2006): http://www.aclu.org/technology-and-liberty/california-judge-confirms-police-officers-rights-were-violated-hidden-locker-
  6. High Tech, Under the Skin (N.Y. Times, Feb. 2, 2006):http://www.nytimes.com/2006/02/02/fashion/thursdaystyles/02tags.html
  7. United States v. Hamilton (4th Circuit 2012)


(9) Technology/Privacy: Facebook / Social Net / Aggregation Effect (April 5)

A. Intro to Information Gathering

  1. How Privacy Vanishes Online (N.Y. Times, Mar. 17, 2010):http://www.nytimes.com/2010/03/17/technology/17privacy.html
  2. Cookies, Web Bugs, and In re Doubleclick Inc. Privacy Litigation, 154 F. Supp. 2d 497 (S.D.N.Y. 2001) (from Information Privacy Law 808-10 (Daniel J. Solove & Paul M. Schwartz eds., 2009)) (read the entire attached PDF)
  3. Apple Sets May 1 Deadline to Cut off UDID
  4. Fingerprinting and Beyond
  5. When Tweets Can Make You a Jailbird (N.Y. Times, Mar. 16, 2010): http://www.law.com/jsp/lawtechnologynews/PubArticleLTN.jsp?id=1202446309011&slreturn=1&hbxlogin=1
  6. NYPD’s Social Media Unit Will Track Criminals On Facebook, Twitter (HuffPo, Aug. 10, 2011), http://www.huffingtonpost.com/2011/08/10/nypd-social-media_n_923208.html
  7. Global Manhunt Will Leverage Social Media To Find Suspects, Cnet, (Mar. 25, 2012), http://news.cnet.com/8301-13772_3-57403976-52/global-manhunt-will-leverage-social-media-to-find-suspects/
  8. Law Students Teach Scalia About Privacy and the Web (N.Y. Times, May 18, 2009): http://www.nytimes.com/2009/05/18/technology/internet/18link.html
  9. CDT Memo on Sorrell v. IMShttp://www.cdt.org/files/pdfs/20110324_SorrellvIMS.pdf

B. AOL Search Term Fiasco: You Are What You Search For

  1. A Face Is Exposed for AOL Searcher No. 4417749 (N.Y. Times, Aug. 9, 2006):http://www.nytimes.com/2006/08/09/technology/09aol.html?pagewanted=1
  2. AOL search data release reveals a great deal (USAToday.com, Aug. 17, 2006):http://www.usatoday.com/tech/columnist/andrewkantor/2006-08-17-aol-data_x.htm
  3. When Anonymous Data Sometimes Isn’t, Wired, (Dec. 13, 2007), http://www.wired.com/politics/security/commentary/securitymatters/2007/12/securitymatters_1213
  4. Thanks A Lot Google For Making Me Older Than I Really Am 
  5. When Worlds Collide…

C. Facebook and a New Tomorrow

  1. Facebook is Marketing Your Brand Preferences (With Your Permission) (N.Y. Times, Nov. 7, 2007):http://www.nytimes.com/2007/11/07/technology/07adco.html
  2. Facebook Test-Drives Real Time Ad Targeting, http://www.pcmag.com/article2/0,2817,2382544,00.asp
  3. Who’s Stalking You on Facebook? (Gawker.com, May 13, 2008): http://gawker.com/390004/whos-stalking-you-on-facebook
  4. Keeping a Closer Eye on Employees’ Social Networking (NYTimes.com, Mar. 26, 2010):http://bits.blogs.nytimes.com/2010/03/26/keeping-a-closer-eye-on-workers-social-networking/?scp=1&sq=facebook%20employers&st=cse.  (OPTIONAL – For a 2009 study on the rate at which employers search for applicants’ profiles, see the following CareerBuilder.com report, published Aug. 19, 2009:http://www.careerbuilder.com/share/aboutus/pressreleasesdetail.aspx?id=pr519&sd=8/19/2009&ed=12/31/2009&siteid=cbpr&sc_cmp1=cb_pr519_&cbRecursionCnt=2&cbsid=f430eced50a44966a0c38ab247728f26-323142413-RF-4)
  5. Job Seekers Asked for Facebook Passwords, AP (Mar. 20, 2012), http://finance.yahoo.com/news/job-seekers-getting-asked-facebook-080920368.html
  6. Senator Wants To Make It Illegal For Employers To Ask For Your Facebook Password, Kash Hill/Forbes, (Mar. 22, 2012), http://www.forbes.com/sites/kashmirhill/2012/03/22/senator-wants-to-make-it-illegal-for-employers-to-ask-for-your-facebook-password/
  7. Facebook Condemns Companies That Demand User Logins, Wired, (Mar. 23, 2012), http://www.wired.com/wiredenterprise/2012/03/facebook-password-employers/
  8. Facebook Ad Trial Spokes New Privacy Fears http://edition.cnn.com/2013/03/26/business/facebook-privacy-fears
  9. Facebook Graph – Privacy Control You Still Don’t Have https://www.eff.org/deeplinks/2013/01/facebook-graph-search-privacy-control-you-still-dont-have
  10. Facebook Users Want More Privacy, Nudged Towards Less, Study Finds (Also finds Water, Wet. Pope, Catholic)
  11. Explore: http://actualfacebookgraphsearches.tumblr.com/


(10) Quis custodiet ipsos custodes? (Quidquid latine dictum sit, altum videtur) (Apr. 12 )

A. EPIC / Facebook

  1. (skim) Facebook Settles FTC Charges That It Deceived Consumers By Failing To Keep Privacy Promises, http://ftc.gov/opa/2011/11/privacysettlement.shtm
  2. (Skim) Facebook FTC Complaint, http://ftc.gov/os/caselist/0923184/111129facebookcmpt.pdf and Consent Order http://ftc.gov/os/caselist/0923184/111129facebookagree.pdf
  3. EPIC – Public Opinion on Privacy http://epic.org/privacy/survey/  (skim)
  4. EPIC – Facebook Privacy http://epic.org/privacy/facebook/ (skim)
  5. Written Congressional Testimony of Marc Rotenberg, July 28, 2010, http://epic.org/privacy/socialnet/EPIC_Testimony_House_Jud_7_10.pdf

B. FTC / Mobile

  1.  http://www.latimes.com/news/opinion/opinion-la/la-ol-ftc-rules-for-twitter-20130312,0,1847653.story
  2.  http://www.politico.com/story/2013/03/privacy-issues-at-top-of-edith-ramirezs-federal-trade-commissione-agenda-88663.html
  3. (skim) http://www.ftc.gov/os/2012/12/121210mobilekidsappreport.pdf (don’t skim the  methodology portions)
  4. (skim) http://www.ftc.gov/speeches/rosch/120914TheMentorGroupBostonParisFrance.pdf
  5. http://www.nytimes.com/2013/02/02/technology/ftc-suggests-do-not-track-feature-for-mobile-software-and-apps.html?_r=0
  6. http://articles.latimes.com/2013/feb/01/business/la-fi-tn-ftc-mobile-privacy-consumers-report-20130201
  7. http://thehill.com/blogs/hillicon-valley/technology/287089-new-ftc-chief-vows-to-continue-push-for-online-privacy


C. Governance Regimes (Skim all)

  1. Privacy Governance by Contract, by Self-Regulation, by Property, and by Statute (excerpts from Information Privacy Law 808-10 (Daniel J. Solove & Paul M. Schwartz eds., 2009)) (read the attached PDF)
  2. California OAG – Privacy Principles http://ag.ca.gov/cms_attachments/press/pdfs/n2630_signed_agreement.pdf?.
  3. Consumer Data Privacy in a Networked World, http://www.whitehouse.gov/sites/default/files/privacy-final.pdf


(11)  If you’re not paying for it…(and then what do they do with it?) (Apr. 19)

  1. FTC, Protecting Consumer Privacy in an Era of Rapid Change, http://www.ftc.gov/os/2012/03/120326privacyreport.pdf
  2. (skim) WSJ Privacy Coverage: OneTwoThreeFourFiveSixSevenEight
  3. Dana Milbank, Washington Post, From Tracking Al-Qaeda to tracking the wayward spouse, http://www.washingtonpost.com/opinions/from-tracking-al-qaeda-to-tracking-the-wayward-spouse/2012/04/03/gIQAF75ytS_story.html
  4. GigaOm, What happens when social surveillance goes mainstream?  http://gigaom.com/2012/04/02/what-happens-when-social-surveillance-goes-mainstream/
  5. Time, Private Eyes – Retailers watching our every move, http://business.time.com/2012/09/18/private-eyes-are-retailers-watching-our-every-move/
  6. Obama Campaign Misjudged Mac Users, http://www.forbes.com/sites/kashmirhill/2013/04/16/obama-campaign-misjudged-mac-users-based-on-orbitzs-experience-says-chief-data-scientist/
  7. Startup Lets Users Track Who Tracks them, http://bits.blogs.nytimes.com/2013/04/16/palo-alto-start-up-lets-users-track-who-tracks-them/



(12) Theories of Privacy Rights: Penumbras and Unintended Consequences (Apr. 26):

  1. Samuel D. Warren & Louis D. Brandeis, The Right to Privacy, 4 Harv. L. Rev. 5 (1890). (attached as PDF)
  2. Griswold v. Connecticut, 381 U.S. 479 (1965)
    Douglas’s opinion for the Court:http://www4.law.cornell.edu/supct/html/historics/USSC_CR_0381_0479_ZO.html
    Black’s dissent (first three paragraphs only):http://www4.law.cornell.edu/supct/html/historics/USSC_CR_0381_0479_ZD.html
  3. Roe v. Wade, 410 U.S. 113 (1973) (Blackmun’s opinion – only preamble (the paragraphs preceding section I) and section VIII):http://www.law.cornell.edu/supct/html/historics/USSC_CR_0410_0113_ZO.html
  4. Randall P. Bezanson, The Right to Privacy Revisited: Privacy, News, and Social Change 1890-1990, 80 Cal. L. Rev. 5 (1992) [only pages 1137-1150] (attached as PDF)
  5. Robert C. Post, The Social Foundations of Privacy: Community and Self in the Common Law Tort, 77 Cal. L. Rev. 5 (1989) [only pages 969-978] (attached as PDF)
  6. Catsouras v. Dept. of Cal. Hwy. Patrol, 181 Cal. App. 4th 856 (2010) [only pages 10-18] (attached as PDF)
  7. ABCNews, Families Struggle to Delete Loved One’s Online Presence After Death, http://abcnews.go.com/US/families-struggle-delete-loved-online-presence-death/story?id=15108300#.T4yn4qtQ4iE
  8. Justia, Facebook’s “If I Die” App Should Remind Us That We Each Need a Digital Death Plan, http://verdict.justia.com/2012/01/17/facebooks-if-i-die-app-should-remind-us-that-we-each-need-a-digital-death-plan
  9. Lifehacker, What Should I Do About My Virtual Life After Death, http://lifehacker.com/5617683/what-should-i-do-about-my-virtual-life-after-death
  10. Facebook Memorial Sites Taking Hold, http://www.cbsnews.com/2100-501366_162-6172718.html
  11. Google Inactive Account Manager, http://techcrunch.com/2013/04/11/googles-afterlife/
  12. What Inactive Account Manager means for your will, http://www.telegraph.co.uk/technology/google/9997105/Google-RIP-What-Inactive-Account-Manager-means-for-your-will.html
  13. National archives v. Favish, 541 U.S. 157 (2004) (Opinion by Kennedy):http://www.law.cornell.edu/supct/html/02-954.ZO.html
  14. Refresh Lon Fuller, The Case of The Speluncean Explorers:http://www.nullapoena.de/stud/explorers.html

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s