David Thaw

University of Pittsburgh - School of Law

Associate Research Professor of Law and Assistant Research Professor of Computing & Information

3900 Forbes Ave.

Pittsburgh, PA 15260

United States

http://www.davidthaw.com

University of Pittsburgh - School of Information Sciences

Pittsburgh, PA 15260

United States

Yale University - Information Society Project

Affiliated Fellow

P.O. Box 208215

New Haven, CT 06520-8215

United States

University of Pittsburgh - Graduate School of Public & International Affairs

Pittsburgh, PA 15260-0001

United States

SCHOLARLY PAPERS

15

DOWNLOADS
Rank 19,200

SSRN RANKINGS

Top 19,200

in Total Papers Downloads

3,216

SSRN CITATIONS

4

CROSSREF CITATIONS

5

Scholarly Papers (15)

1.

Information Privacy Law Scholars' Brief in Spokeo, Inc. v. Robins

UC Berkeley Public Law Research Paper No. 2656482, Minnesota Legal Studies Research Paper No. 15-27, Fordham Law Legal Studies Research Paper No. 2656482, Loyola Law School, Los Angeles Legal Studies Research Paper No. 2015-32, U. of Pittsburgh Legal Studies Research Paper No. 2015-32
Number of pages: 46 Posted: 06 Sep 2015 Last Revised: 12 Sep 2015
Georgetown University Law Center, University of California, Berkeley - School of Law, University of Minnesota Law School, Georgetown University Law Center, Fordham University School of Law, Washington University School of Law, University of Pittsburgh - School of Law and Loyola Law School Los Angeles
Downloads 555 (61,187)

Abstract:

Loading...

Article III standing, injury, harm, privacy, Fair Credit Reporting Act, FCRA, data brokers, modern hiring practices, consumer reporting, inaccuracy, background checks

2.

The Efficacy of Cybersecurity Regulation

Georgia State University Law Review, Vol. 30, 2014
Number of pages: 89 Posted: 31 Mar 2013 Last Revised: 24 May 2019
David Thaw
University of Pittsburgh - School of Law
Downloads 445 (80,203)
Citation 4

Abstract:

Loading...

cybersecurity, regulation, regulatory capture, information security, hybrid rulemaking, regulatory delegation

3.

Criminalizing Hacking, Not Dating: Reconstructing the CFAA Intent Requirement

Journal of Criminal Law and Criminology, Vol. 103, No. 3, 2013
Number of pages: 43 Posted: 28 Feb 2013 Last Revised: 11 Apr 2015
David Thaw
University of Pittsburgh - School of Law
Downloads 409 (88,559)

Abstract:

Loading...

Cybercrime, Computer Crime, Computer Fraud and Abuse Act, CFAA, Deterrence

4.

Enlightened Regulatory Capture

89 Wash. L. Rev. 331 (2014), U. of Pittsburgh Legal Studies Research Paper No. 2014-30
Number of pages: 49 Posted: 08 Aug 2013 Last Revised: 30 Oct 2014
David Thaw
University of Pittsburgh - School of Law
Downloads 277 (136,037)
Citation 2

Abstract:

Loading...

Regulatory Capture, Administrative Law, regulation, cybersecurity, information security, HIPAA, healthcare

5.

Cybersecurity Stovepiping

96 Nebraska Law Review 339 (2017), U. of Pittsburgh Legal Studies Research Paper No. 2016-07
Number of pages: 25 Posted: 07 Apr 2015 Last Revised: 05 Dec 2017
David Thaw
University of Pittsburgh - School of Law
Downloads 243 (155,082)

Abstract:

Loading...

cybersecurity, privacy, data security, data breach, security breach, technology, risk management, risk tolerance, evidence-based regulation, rulemaking, policymaking

6.

Data Breach (Regulatory) Effects

2015 Cardozo L. Rev. de Novo 151, U. of Pittsburgh Legal Studies Research Paper No. 2015-13
Number of pages: 14 Posted: 18 Apr 2015 Last Revised: 10 Jun 2015
David Thaw
University of Pittsburgh - School of Law
Downloads 235 (160,191)

Abstract:

Loading...

cybersecurity, privacy, data security, data breach, security breach, breach notification, regulation

7.

Reasonable Expectations of Privacy Settings: Social Media and the Stored Communications Act

13 Duke L. & Tech. Rev. 36 (2015), U. of Pittsburgh Legal Studies Research Paper No. 2015-02
Number of pages: 31 Posted: 23 Aug 2013 Last Revised: 29 Jan 2015
University of Connecticut - School of Law, SCARINCI HOLLENBECK, LLC and University of Pittsburgh - School of Law
Downloads 205 (182,335)
Citation 1

Abstract:

Loading...

SCA, Stored Communications Act, privacy, Fourth Amendment, surveillance

8.

From Russia With Love

Houston Law Review, Forthcoming, U. of Pittsburgh Legal Studies Research Paper No. 2019-32
Number of pages: 36 Posted: 20 Sep 2017 Last Revised: 24 May 2021
David Thaw
University of Pittsburgh - School of Law
Downloads 161 (225,353)

Abstract:

Loading...

cybersecurity, elections, hacking, risk management

9.

Bot Contracts

62 Arizona Law Review 877 (2020), U. of Pittsburgh Legal Studies Research Paper No. 2020-09, UNC Legal Studies Research Paper
Number of pages: 26 Posted: 19 Mar 2020 Last Revised: 19 Dec 2020
Deborah R. Gerhardt and David Thaw
University of North Carolina School of Law and University of Pittsburgh - School of Law
Downloads 124 (277,323)

Abstract:

Loading...

Block-chain, Contracts, Smart Contracts

10.

Redefining Cybersecurity Policy

U. of Pittsburgh Legal Studies Research Paper No. 2016-30
Number of pages: 18 Posted: 08 Sep 2016 Last Revised: 19 Oct 2016
David Thaw
University of Pittsburgh - School of Law
Downloads 123 (278,986)
Citation 1

Abstract:

Loading...

11.

When Machines are Watching: How Warrantless Use of GPS Surveillance Technology Violates the Fourth Amendment Right Against Unreasonable Searches

Yale Law Journal Online, Vol. 121, p. 177, 2011
Number of pages: 26 Posted: 08 Mar 2012
Yale Law School - Information Society Project, Stanford Law School Center for Internet and Society, University of Pittsburgh - School of Law and Columbia University - Law School
Downloads 111 (300,015)

Abstract:

Loading...

12.

Ancient Worries and Modern Fears: Different Roots and Common Effects of U.S. and EU Privacy Regulation

Connecticut Law Review, Forthcoming, U. of Pittsburgh Legal Studies Research Paper No. 2016-06
Number of pages: 35 Posted: 21 Apr 2015 Last Revised: 21 Sep 2017
Pierluigi Perri and David Thaw
University of Milan - Faculty of Law and University of Pittsburgh - School of Law
Downloads 108 (305,800)

Abstract:

Loading...

jurisdiction, privacy, chilling effects, surveillance, compliance, cross-jurisdictional privacy management, data protection reform, framework

13.

Surveillance at the Source

103 Kentucky Law Journal 405, U. of Pittsburgh Legal Studies Research Paper No. 2014-40
Number of pages: 13 Posted: 21 Oct 2014 Last Revised: 24 May 2019
David Thaw
University of Pittsburgh - School of Law
Downloads 102 (317,938)

Abstract:

Loading...

privacy, surveillance, public-private partnerships

14.

User Choices and Regret: Understanding Users’ Decision Process About Consensually Acquired Spyware

I/S: A Journal of Law and Policy for the Information Society, Vol. 2, No. 2, pp. 283-344, 2006
Number of pages: 62 Posted: 22 May 2013
University of California, Berkeley - School of Information, Pennsylvania State University, University of Pittsburgh - School of Law, Case Western Reserve University School of Law, University of California, Berkeley - School of Information and University of Minnesota - Minneapolis
Downloads 102 (317,938)
Citation 2

Abstract:

Loading...

Privacy, Notice, End User License Agreement, EULA, Security and Usability, Spyware, Terms of Service, ToS

15.

Administrative Truth: Comments on Cortez’s Information Mischief

Chicago-Kent Law Review, Forthcoming, U. of Pittsburgh Legal Studies Research Paper No. 2019-19
Number of pages: 9 Posted: 05 Jun 2019 Last Revised: 18 Sep 2019
David Thaw
University of Pittsburgh - School of Law
Downloads 16 (656,505)

Abstract:

Loading...

Administrative Law, Public Administration, Information Neutrality, Information Policy, President Trump