David Thaw

University of Pittsburgh - School of Law

Assistant Professor of Law and Information Sciences

3900 Forbes Ave.

Pittsburgh, PA 15260

United States

http://www.davidthaw.com

University of Pittsburgh - School of Information Sciences

Pittsburgh, PA 15260

United States

Yale University - Information Society Project

Affiliated Fellow

P.O. Box 208215

New Haven, CT 06520-8215

United States

University of Pittsburgh - Graduate School of Public & International Affairs

Pittsburgh, PA 15260-0001

United States

SCHOLARLY PAPERS

13

DOWNLOADS
Rank 18,032

SSRN RANKINGS

Top 18,032

in Total Papers Downloads

2,459

CITATIONS
Rank 44,960

SSRN RANKINGS

Top 44,960

in Total Papers Citations

3

Scholarly Papers (13)

1.

Information Privacy Law Scholars' Brief in Spokeo, Inc. v. Robins

UC Berkeley Public Law Research Paper No. 2656482, Minnesota Legal Studies Research Paper No. 15-27, Fordham Law Legal Studies Research Paper No. 2656482, Loyola Law School, Los Angeles Legal Studies Research Paper No. 2015-32, U. of Pittsburgh Legal Studies Research Paper No. 2015-32
Number of pages: 46 Posted: 06 Sep 2015 Last Revised: 12 Sep 2015
Georgetown University Law Center, University of California, Berkeley - School of Information, University of Minnesota Law School, Georgetown University Law Center, Fordham University School of Law, Washington University in St. Louis - School of Law, University of Pittsburgh - School of Law and Loyola Law School Los Angeles
Downloads 435 (61,244)

Abstract:

Loading...

Article III standing, injury, harm, privacy, Fair Credit Reporting Act, FCRA, data brokers, modern hiring practices, consumer reporting, inaccuracy, background checks

2.

The Efficacy of Cybersecurity Regulation

Georgia State University Law Review, Vol. 30, 2014
Number of pages: 73 Posted: 31 Mar 2013 Last Revised: 05 Oct 2013
David Thaw
University of Pittsburgh - School of Law
Downloads 382 (71,553)

Abstract:

Loading...

cybersecurity, regulation, regulatory capture, information security, hybrid rulemaking, regulatory delegation

3.

Criminalizing Hacking, Not Dating: Reconstructing the CFAA Intent Requirement

Journal of Criminal Law and Criminology, Vol. 103, No. 3, 2013
Number of pages: 43 Posted: 28 Feb 2013 Last Revised: 11 Apr 2015
David Thaw
University of Pittsburgh - School of Law
Downloads 338 (82,473)

Abstract:

Loading...

Cybercrime, Computer Crime, Computer Fraud and Abuse Act, CFAA, Deterrence

4.

Enlightened Regulatory Capture

89 Wash. L. Rev. 331 (2014), U. of Pittsburgh Legal Studies Research Paper No. 2014-30
Number of pages: 49 Posted: 08 Aug 2013 Last Revised: 30 Oct 2014
David Thaw
University of Pittsburgh - School of Law
Downloads 226 (126,515)

Abstract:

Loading...

Regulatory Capture, Administrative Law, regulation, cybersecurity, information security, HIPAA, healthcare

5.

Cybersecurity Stovepiping

96 Nebraska Law Review 339 (2017), U. of Pittsburgh Legal Studies Research Paper No. 2016-07
Number of pages: 25 Posted: 07 Apr 2015 Last Revised: 05 Dec 2017
David Thaw
University of Pittsburgh - School of Law
Downloads 201 (141,469)

Abstract:

Loading...

cybersecurity, privacy, data security, data breach, security breach, technology, risk management, risk tolerance, evidence-based regulation, rulemaking, policymaking

6.

Reasonable Expectations of Privacy Settings: Social Media and the Stored Communications Act

13 Duke L. & Tech. Rev. 36 (2015), U. of Pittsburgh Legal Studies Research Paper No. 2015-02
Number of pages: 31 Posted: 23 Aug 2013 Last Revised: 29 Jan 2015
University of Connecticut - School of Law, SCARINCI HOLLENBECK, LLC and University of Pittsburgh - School of Law
Downloads 187 (151,250)

Abstract:

Loading...

SCA, Stored Communications Act, privacy, Fourth Amendment, surveillance

7.

Data Breach (Regulatory) Effects

2015 Cardozo L. Rev. de Novo 151, U. of Pittsburgh Legal Studies Research Paper No. 2015-13
Number of pages: 14 Posted: 18 Apr 2015 Last Revised: 10 Jun 2015
David Thaw
University of Pittsburgh - School of Law
Downloads 176 (159,735)

Abstract:

Loading...

cybersecurity, privacy, data security, data breach, security breach, breach notification, regulation

8.

When Machines are Watching: How Warrantless Use of GPS Surveillance Technology Violates the Fourth Amendment Right Against Unreasonable Searches

Yale Law Journal Online, Vol. 121, p. 177, 2011
Number of pages: 26 Posted: 08 Mar 2012
Yale Law School - Information Society Project, Stanford Law School Center for Internet and Society, University of Pittsburgh - School of Law and Columbia University - Law School
Downloads 101 (247,267)

Abstract:

Loading...

9.

Redefining Cybersecurity Policy

U. of Pittsburgh Legal Studies Research Paper No. 2016-30
Number of pages: 18 Posted: 08 Sep 2016 Last Revised: 19 Oct 2016
David Thaw
University of Pittsburgh - School of Law
Downloads 98 (252,370)

Abstract:

Loading...

10.

Ancient Worries and Modern Fears: Different Roots and Common Effects of U.S. and EU Privacy Regulation

Connecticut Law Review, Forthcoming, U. of Pittsburgh Legal Studies Research Paper No. 2016-06
Number of pages: 35 Posted: 21 Apr 2015 Last Revised: 21 Sep 2017
Pierluigi Perri and David Thaw
University of Milan - Faculty of Law and University of Pittsburgh - School of Law
Downloads 89 (268,519)

Abstract:

Loading...

jurisdiction, privacy, chilling effects, surveillance, compliance, cross-jurisdictional privacy management, data protection reform, framework

11.

User Choices and Regret: Understanding Users’ Decision Process About Consensually Acquired Spyware

I/S: A Journal of Law and Policy for the Information Society, Vol. 2, No. 2, pp. 283-344, 2006
Number of pages: 62 Posted: 22 May 2013
University of California, Berkeley - School of Information, Pennsylvania State University, University of Pittsburgh - School of Law, Case Western Reserve University School of Law, University of California, Berkeley - School of Information and University of Minnesota - Minneapolis
Downloads 79 (288,754)
Citation 3

Abstract:

Loading...

Privacy, Notice, End User License Agreement, EULA, Security and Usability, Spyware, Terms of Service, ToS

12.

Surveillance at the Source

Kentucky Law Journal, Forthcoming, U. of Pittsburgh Legal Studies Research Paper No. 2014-40
Number of pages: 17 Posted: 21 Oct 2014 Last Revised: 02 Dec 2014
David Thaw
University of Pittsburgh - School of Law
Downloads 75 (297,664)

Abstract:

Loading...

privacy, surveillance, public-private partnerships

13.

Managing Electoral Cyber Risk (a.k.a. "Hacking Democracy")

Number of pages: 35 Posted: 20 Sep 2017 Last Revised: 22 Aug 2018
David Thaw
University of Pittsburgh - School of Law
Downloads 72 (304,692)

Abstract:

Loading...

cybersecurity, elections, hacking, risk management