Mastering Property Law Book
Date of Publication:
Recommended Citation
Darryl Wilson, Mastering Property Law (2nd ed., Carolina Academic Press, 2026)Clicking on the button will copy the full recommended citation.
Date of Publication:
Darryl Wilson, Mastering Property Law (2nd ed., Carolina Academic Press, 2026)Clicking on the button will copy the full recommended citation.
Date of Publication:
Erin Okuno, “The Silence of the Farms”: Suppressing Speech and Trampling Transparency to Shield Big Ag, Tex. A&M L. Rev. (2026)Clicking on the button will copy the full recommended citation.
Date of Publication:
Rebecca C. Morgan, Failing Aging: Congress, the Social Contract, and “Saving” Social Security and Medicare, Journal of Aging, Law, and Policy (2026)Clicking on the button will copy the full recommended citation.
Date of Publication:
Anne E. Mullins, Asymmetric Legitimacy, Fla. L. Rev. (2026)Clicking on the button will copy the full recommended citation.
Date of Publication:
Anthony Palermo, Data Breaches and Article III, 78 Fla. L. Rev. (2026)Clicking on the button will copy the full recommended citation.
Cyberattacks, hacks, and data leaks dominate news headlines and federal court dockets. Due to the proliferation of data breaches in the modern digital economy, an entire industry dedicated to protecting our electronic identities has emerged.
The law has not caught up with these realities. Constitutional standing requires a plaintiff to demonstrate an injury, actual or imminent, caused by the defendant. Despite their growing recognition of the significance of electronic personal information, courts struggle to evaluate standing in data breach cases. Federal appellate courts have shifted positions and adopted conflicting approaches. Afraid of costly litigation and uncertainty stemming from the unsettled state of the law--coupled with the potential exposure to catastrophic damages awards--companies ranging from small businesses to Fortune 500 corporations look to settle lawsuits filed by individuals whose information may have been accessed during a data breach, even when these individuals cannot identify any resulting injury.
This Article considers the circuit split dividing federal courts regarding their power to hear and resolve claims resulting from data breaches. It suggests that the mere existence of a breach fails to present the constitutionally required injury-in-fact to establish that a claim or controversy exists, and that courts should refuse to hear cases that cannot demonstrate a concrete and particular harm. By raising the threshold for judicial inquiry, courts can be spared thousands of frivolous lawsuits--thereby conserving their time and resources and enabling them to provide speedier justice to parties who can actually demonstrate harm.
Date of Publication:
Elizabeth Ippolito Boals et al., Cases and Problems in Criminal Procedure: The Police (8th ed., Carolina Academic Press, 2026)Clicking on the button will copy the full recommended citation.
This problem-based textbook creates for law students the experience that lawyers have when analyzing the constitutional issues involved in the investigatory phase of a criminal case. The problem approach engages students with complex constitutional materials and enhances learning by offering the professor and the students the opportunity to apply the case law that is presented in each chapter.
Each chapter begins with a layered, multi-issue problem presented in the form of a memo to a law clerk working in a variety of settings. The problem is followed by the relevant body of constitutional law edited to provide manageable material for law students and includes many notes offering direction to the students as they develop analytical skills.