Lectures

Conference on Privacy and Internet Access to Court Files, Panel Three: Implementation-What Methods, If Any, Can Be Employed To Promote the Existing Rules’ Attempts to Protect Private Identifier Information From Internet Access?

By Hon. Ronald Leighton, Joe Cecil, Michel Ishakian, Edward Felten, Hon. Elizabeth Stong, Jay Safer, Robert Heinemann, & Joseph Goldstein
October 1, 2010