PUBLICATIONS

  • “Survey of Privacy Law Developments in 2009: United States, Canada and the European Union,” The Business Lawyer, November 2009, at 285 (co-author).
  • “Protecting Data: Security, Minimization and Anonymization” in Ninth Annual Institute on Privacy and Security Law, Volume Two (Practising Law Institute Course Handbook Series), at 299 (2008).
  • “Policies and Practices for Protecting Personal Data: An In-House Perspective” in Information Technology Law Institute 2008 (Practising Law Institute Course Handbook Series), at 525 (2008).
  • “Making Sense of Privacy and Security Laws and Regulations: Selected Developments Over the Last 12 Months” in Eighth Annual Institute on Privacy and Security Law, Volume One (Practising Law Institute Course Handbook Series), at 71 (2007).
  • “Privacy and Commercial Communications,” in Proskauer on Privacy: A Guide to Privacy and Data Security in the Information Age (Christopher Wolf, ed.), Practising Law Institute (2006).
  • “Tinkering With the Machinery of Death: Capital Punishment’s Toll on the American Judiciary,” Judicature, March/April 2006, at 254.
  • “Keeping Secrets: The Growing Challenge of Protecting Data in Outsourcing & Service Provider Agreements,” ACC Docket (The Journal of the Association of Corporate Counsel), Nov./Dec. 2004, at 44 (co-author).
  • “Export Controls on Encryption Software,” in Coping with U.S. Export Controls 2000 (Practising Law Institute Course Handbook Series), at 505 (co-author) (2000).
  • “Data Privacy: Self-Regulation Works,” New York Law Journal, Nov. 9, 1998, at T3.
  • "The Risks and Myths of E-Mail," New York Law Journal, Sept. 14, 1998, at S5 (co-author).
  • “Sign of the Times: Digital Signatures and Government Regulation,” Information Security, May 1998, at 28 (co-author).
  • "1997 Encryption Legislation: Industry Shifts Focus from Export Liberalization to Domestic Controls," High-Tech Industry, Jan./Feb. 1998, at 30.
  • "Government Regulation of Encryption Increases as International Coordination of Policy Is Deemed Necessary," High-Tech Industry, Nov./Dec. 1997, at 34 (co-author).
  • "United States Government Policy on Encryption Technology," 3 Computer & Telecommunications Law Review 109 (1997) (co-author).
  • "Canadian Export Controls on Encryption Products and Technology," ABA Canadian Law Newsletter, Spring 1997, at 11 (co-author).
  • "Towering Over Babel: A Guide to Global Encryption Policies," Security Management, May 1997, at 72 (co-author).
  • "The Cost of Retaining the Death Penalty: Some Lessons from the American Experience," 111 South African Law Journal 55 (1994).
  • "Attacking the Death Penalty: Toward a Renewed Strategy Twenty Years After Furman," 24 Columbia Human Rights Law Review 395 (1993).