Skip to content

Instantly share code, notes, and snippets.

@Ore4444
Forked from wendyck/fn.md
Created November 11, 2015 20:37
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save Ore4444/f7c77d790c25ec5c7a93 to your computer and use it in GitHub Desktop.
Save Ore4444/f7c77d790c25ec5c7a93 to your computer and use it in GitHub Desktop.
footnotes file from a word doc

#Footnotes in file

  1. Brian D. Eyink , Note, Constitutional Secrecy: Aligning National Security Letter Nondisclosure Provisions with First Amendment Rights , 58 Duke L.J . 473, 481 (2008).
  2. US Dept. of Justice Office of the Inspector General, A Review of the Federal Bureau of Investigation's Use of National Security Letters: Assessment of Progress in Implementing Recommendations and Examination of Use in 2007 through 2009 , 2, 3 August 2014, available at http://www.justice.gov/oig/reports/201 4/s1408.pdf (“National security letters are written directives to produce records that the FBI issues to third parties such as telephone companies, Internet service providers, financial institutions, and consumer credit reporting agencies… each NSL statute has special certification and notification requirements when the FBI invokes the statute's nondisclosure provisions. Each NSL statute permits the FBI Director, or the appropriate designee, to prohibit the recipient of an NSL from disclosing to any person that the FBI sought or obtained access to information under the NSL statute.”).
  3. Susan Landau, Surveillance or Security 77-78 (2010).
  4. Nancy J. King and V.T. Raja, What Do They Really Know About Me in the Cloud? A Comparative Law Perspective on Protectin g Privacy and Security of Sensitive Consumer Data , 50 Am. Bus. L.J. 413, 418 (2013); Paul Ohm, The Future of Digital Evidence Searches and Seizures: The Fourth Amendment i n A World Without Privacy , 81 Miss. L.J. 1309, 1315-16 (2012) (describing the migration of data storage from local devices controlled by their users to data centers controlled by providers).
  5. Jackie Calmes And Nick Wingfield , Tech Leaders and Obama Find Shared Problem: Fading Public Trust The New York Times (Dec. 17, 2013), http://www.nytimes.com/2013/12/18/us/politics/as-tech-industry-leaders-meet-with-obama-nsa-ruling-looms-large.html.
  6. 18 USC §1510(e) .
  7. Pac. Gas & Elec. Co. v. Pub. Utilities Com., 475 U.S. 1, 16 (1986).
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment