Mike Hintze's Publications
“Science and Privacy: Data Protection Laws and Their Impact on Research,” 14 Washington Journal of Law, Technology & Arts 103 (2019).
“Privacy Statements Under the GDPR,” 42 Seattle University Law Review 1129 (2019).
“Comparing the benefits of pseudonymisation and anonymisation under the GDPR,“ Journal of Data Protection and Privacy, Vol. 2, No. 2, at 145 (2018) (co-author).
“Data Controllers, Data Processors, and the Growing Use of Connected Products in the Enterprise: Managing Risks, Understanding Benefits, and Complying with the GDPR,” Journal of Internet Law (Wolters Kluwer), August 2018.
“Privacy Statements: Purposes, Requirements, and Best Practices,” in Cambridge Handbook of Consumer Privacy, Jules Polonetsky, Evan Selinger & Omer Tene, eds., Cambridge University Press (2018).
“Viewing the GDPR through a De-Identification Lens: A Tool for Compliance, Clarification, and Consistency,” International Data Protection Law (Oxford University Press), December 2017.
“In Defense of the Long Privacy Statement,” 76 Maryland Law Review 1044 (2017).
“Survey of Privacy Law Developments in 2009: United States, Canada and the European Union,” The Business Lawyer, November 2009, at 285 (co-author).
“Protecting Data: Security, Minimization and Anonymization” in Ninth Annual Institute on Privacy and Security Law, Volume Two (Practising Law Institute Course Handbook Series), at 299 (2008).
“Policies and Practices for Protecting Personal Data: An In-House Perspective” in Information Technology Law Institute 2008 (Practising Law Institute Course Handbook Series), at 525 (2008).
“Making Sense of Privacy and Security Laws and Regulations: Selected Developments Over the Last 12 Months” in Eighth Annual Institute on Privacy and Security Law, Volume One (Practising Law Institute Course Handbook Series), at 71 (2007).
“Privacy and Commercial Communications,” in Proskauer on Privacy: A Guide to Privacy and Data Security in the Information Age (Christopher Wolf, ed.), Practising Law Institute (2006).
“Tinkering With the Machinery of Death: Capital Punishment’s Toll on the American Judiciary,” Judicature, March/April 2006, at 254.
“Keeping Secrets: The Growing Challenge of Protecting Data in Outsourcing & Service Provider Agreements,” ACC Docket (The Journal of the Association of Corporate Counsel), Nov./Dec. 2004, at 44 (co-author).
“Export Controls on Encryption Software,” in Coping with U.S. Export Controls 2000 (Practising Law Institute Course Handbook Series), at 505 (co-author) (2000).
“Data Privacy: Self-Regulation Works,” New York Law Journal, Nov. 9, 1998, at T3.
"The Risks and Myths of E-Mail," New York Law Journal, Sept. 14, 1998, at S5 (co-author).
“Sign of the Times: Digital Signatures and Government Regulation,” Information Security, May 1998, at 28 (co-author).
"1997 Encryption Legislation: Industry Shifts Focus from Export Liberalization to Domestic Controls," High-Tech Industry, Jan./Feb. 1998, at 30.
"Government Regulation of Encryption Increases as International Coordination of Policy Is Deemed Necessary," High-Tech Industry, Nov./Dec. 1997, at 34 (co-author).
"United States Government Policy on Encryption Technology," 3 Computer & Telecommunications Law Review 109 (1997) (co-author).
"Canadian Export Controls on Encryption Products and Technology," ABA Canadian Law Newsletter, Spring 1997, at 11 (co-author).
"Towering Over Babel: A Guide to Global Encryption Policies," Security Management, May 1997, at 72 (co-author).
"The Cost of Retaining the Death Penalty: Some Lessons from the American Experience," 111 South African Law Journal 55 (1994).
"Attacking the Death Penalty: Toward a Renewed Strategy Twenty Years After Furman," 24 Columbia Human Rights Law Review 395 (1993).