Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Law (41)
- Internet Law (24)
- Privacy Law (16)
- Science and Technology Law (16)
- Computer Law (14)
-
- International Law (13)
- Comparative and Foreign Law (9)
- Intellectual Property Law (9)
- National Security Law (8)
- Commercial Law (7)
- First Amendment (7)
- Civil Law (6)
- Consumer Protection Law (6)
- Law and Society (6)
- Litigation (6)
- Other Law (6)
- Transnational Law (6)
- Administrative Law (5)
- Business Organizations Law (5)
- European Law (5)
- Human Rights Law (5)
- Legislation (5)
- Torts (5)
- Banking and Finance Law (4)
- Communications Law (4)
- Law and Economics (4)
- Law and Politics (4)
- Legal Remedies (4)
- Constitutional Law (3)
- Contracts (3)
- Keyword
-
- Internet (4)
- European Union (2)
- Intellectual Property (2)
- Affirmative consent; revenge porn; copyright (1)
- Amazon (1)
-
- And Non-Discriminatory (1)
- Anti-hacking (1)
- Arbitration (1)
- Attorney-client privilege; full and frank conversations; hack; hackers; hacktivism; whistleblowing; technology; cybersecurity; ethics; bar associations; evidence; Federal Rules of Evidence; Federal Rules of Civil Procedure; claw back agreements; quick peek agreements; litigation; waiver; express waiver; implicit waiver; privileged communications; inadvertent disclosure; unintentional disclosure; unauthorized disclosure; purloined communications; stolen documents; technology; email; Wikileaks; Panama papers; Ashley Madison; Clinton Foundation; Teneo; John Podesta; Sony Entertainment; public domain; duty of confidentiality (1)
- Authorization (1)
- CFAA (1)
- CISG (1)
- Cartier International AG v. British Sky Broad (1)
- Civil liberties (1)
- Code requirement (1)
- Compliance technology; Corporate culture; Culture of compliance; Federal Sentencing Guidelines; Big data; Compliance monitoring and audits; Employee morale; Values based compliance; Command-and control approaches; Self-regulatory approaches; Financial regulation; Criminalized compliance; Corporate policing; Ethical misconduct (1)
- Computer Fraud and Abuse Act (1)
- Computer fraud (1)
- Consumers (1)
- Convention (1)
- Convention on Data Privacy. (1)
- Counterfeit (1)
- Counterfeit Goods (1)
- Counterfeit Market (1)
- Courts (1)
- Criminal liability (1)
- Cyber security; trespass (1)
- Cyber warfare; kinetic warfare; chaos theory; Iran; Aegs; United States; keystroke; Tallinn Manual; Morris worm; autonomous; DDoS attack; Russia; Stuxnet; Kaspersky Red October; hackers; back hacking; Shamoon; National Security Agency; WannaCry; malware; Windows; cybersecurity; ransomware; NotPetya; artificial intellegence; international law; Caroline doctrine; UN Charter; NATO; butterfly effect; Edward Lorenz (1)
- Cyber-attacks; cyber-crime; information security; cybersecurity; Ponemon Institute; data sharing; data breach; Securities Exchange Commission; SEC; hacking; information technology system; phishing; Department of Justice; DOJ; cybercriminal; malware; spyware; IT; Denial of Service Attacks; DoS; DDoS; Distributed Denial of Service campaign; third-party vendor attack; Dumpster Diving; Economic Espionage; Trade Secret Misappropriation; Office of Compliance Inspections and Examinations; OCIE; Financial Industry Regulatory Authority; FINRA; broker-dealer; Risk Alert; Regulation S-P; Gramm-Leach-Bliley Act; GLBA; Computer Fraud and Abuse Act; CFAA; protected computer; United States v. Valle; Electronic Communications Privacy Act; ECPA; The Wiretap Act; The Stored Communications Act; SCA; The Pen Registry Act; Federal Trade Commission; FTC; Federal Deposit Insurance Corporation; FDIC; Federal Reserve; Economic Espionage Act; EEA; Defend Trade Secrets Act; DTSA; Huawei Technologies Co.; Cybersecurity Disclosure Act of 2017 and 2018; common law; class action; standing; Rule 23(a); 23(b)(3); negligence; breach of contract; derivative shareholder suits; Wyndham Worldwide Corporation; Regulatory Systems Compliance and Integrity; SCI; Regulation S-ID; Regulation S-P; General Disclosure Provisions; 503(c); Regulation S-K; Description of Business; financial statements; Framework for Improving Critical Infrastructure Cybersecurity; compliance; disaster plan; plaintext; ciphertext; crisis management; due diligence; The Protecting Cyber Networks Act; PCNA; National Cybersecurity Protection Advancement Act of 2015; NCPAA; The Cybersecurity Information Sharing Act; CISA; Privacy and Civil Liberties Oversight Board; Department of Homeland Security; DHS; National Cybersecurity and Communications Integration Center; NCIC; U.S. Chamber of Commerce Leadership Council; (1)
- Cybercrimes; cyberharassment; cyberstalking; Internet; First Amendment; The Council of Europe’s Convention on Cybercrime (COC); Interstate Communications Act (ICA); Communications Act; Interstate Stalking Punishment and Prevention Act (ISPPA); Nova Scotia’s Cyber-Safety Act (CSA); Elonis v. United States; Canada; Canadian Criminal Code; Australia; Australian Criminal Code Act of 1995 (ACCA; (1)
- Publication Year
Articles 1 - 30 of 94
Full-Text Articles in Entire DC Network
Towards A Strengthening Of Non-Interference, Sovereignty, And Human Rights From Foreign Cyber Meddling In Democratic Electoral Processes, Francesco Seatzu, Nicolás Carrillo-Santarelli
Towards A Strengthening Of Non-Interference, Sovereignty, And Human Rights From Foreign Cyber Meddling In Democratic Electoral Processes, Francesco Seatzu, Nicolás Carrillo-Santarelli
Brooklyn Journal of International Law
States have resorted to meddling in the elections of their counterparts throughout history. Recently, though, there has been an exponential increased in the use of the possibilities provided by technology. Attention to this phenomenon has deservedly grown quickly and exponentially. This has led to debates focusing on the adequacy of international legal rules and general principles to respond to foreign cyber election interference. In many of these debates some have expressed doubts and skepticism about the adequacy of current international law to confront foreign election interference through cyber means. There have also been disagreements about the applicable standards to fight …
Deep Dive Into Deepfakes—Safeguarding Our Digital Identity, Yi Yan
Deep Dive Into Deepfakes—Safeguarding Our Digital Identity, Yi Yan
Brooklyn Journal of International Law
Deepfake technology is becoming increasingly sophisticated, and with it, the potential to pose a significant threat to the digital community, democratic institutions, and private individuals. With the creation of highly convincing but entirely fabricated audio, video, and images, there is a pressing need for the international community to address the vulnerabilities posed by deepfake technology in the current legal landscape through unambiguous legislation. This Note explores the ethical, legal, and social implications of deepfakes, including issues of privacy, identity theft, and political manipulation. It also reviews existing international legal frameworks, i.e., the Convention on Cybercrime (“Budapest Convention”) and proposes a …
Beyond Consumer Protection: Standardized Stablecoins Disclosure As Information Infrastructure, Shuping Li
Beyond Consumer Protection: Standardized Stablecoins Disclosure As Information Infrastructure, Shuping Li
Brooklyn Journal of International Law
This article argues for standardized disclosure for stablecoins regulation. Information disclosure has long been considered a primary tool for consumer protection. Stablecoin issuers should disclose honestly and responsibly about the qualification of themselves, as well as the value, quantity, and operational mechanism of their stablecoins. Such disclosure can prevent issuers from taking advantage of information asymmetries for consumer exploitation or fraud. It is then up to the consumers to make informed investment or consumption decisions. More importantly, this paper argues that the fundamental role of information disclosure is to form a knowledge base for financial regulation and policymaking. The importance …
Breaking Down Digital Walls: The Interface Of International Trade Law And Online Content Regulation Through The Lens Of The Chinese Vpn Measure, Neha Mishra
Brooklyn Journal of International Law
The interface of international trade law and online content regulation is problematic and complex. This Article examines the consistency of the regulation pertaining to Virtual Private Network (VPN) services in China with WTO law. It argues that although WTO law may be effective in disciplining protectionist aspects of online content regulations, they can neither scrutinize domestic values underlying such regulations nor guarantee the free flow of online content. Thus, existing rules contained in international trade agreements play a limited role in balancing domestic socio-cultural and political values vis-à-vis online censorship with an open, globally interconnected internet enabling seamless digital flows. …
The Use Of Force To Prevent Recurrence Of Conflict: Where Are The Limits Of Self-Defense?, Laurie R. Blank
The Use Of Force To Prevent Recurrence Of Conflict: Where Are The Limits Of Self-Defense?, Laurie R. Blank
Brooklyn Law Review
The prohibition on the use of force is the central pillar of the international system of peace and security, and yet contemporary conflicts continue to stretch and pressure this foundational rule. This article examines how international law applies to the use of force in the territory of another state for the purpose of preventing a resurgence of violence after a conflict has ended. In the absence of consent or U.N. Security Council authorization, can self-defense be a justification for a state to use force to prevent the resurgence of conflict? In January 2018, the United States announced an intended policy …
Data Governance And The Elasticity Of Sovereignty, Roxana Vatanparast
Data Governance And The Elasticity Of Sovereignty, Roxana Vatanparast
Brooklyn Journal of International Law
Traditionally, the world map and territorially bounded spaces have dominated the ways in which we imagine how states govern, make laws, and exercise their authority. Under this conception, reflected in traditional international law principles of territorial sovereignty, each state would have exclusive authority to govern and make laws over everything concerning the land within its borders. Yet developments like the proliferation of data flows, which are based on divisible, mobile, and interconnected components of data, are not territorially bounded. This presents a challenge to the traditional bases for territorial sovereignty and jurisdiction under international law, which some scholars claim is …
Easing The Burdens Of A Patchwork Approach To Data Privacy Regulation In Favor Of A Singular Comprehensive International Solution—The International Data Privacy Agreement, Scott Resnick
Brooklyn Journal of International Law
Data privacy has become one of the premier hot-button issues in today’s increasingly digital human experience. Legislatures around the globe have attempted to act swiftly in an effort to safeguard the highly coveted personal information of their citizens and combat misuse at the hands of international businesses operating with an online presence. Since the European Union’s enactment of the General Data Protection Regulation (GDPR) in 2018, countries around the globe have been grappling with how best to replicate the EU’s leading data privacy regulation while providing the same or greater level of transparency into data collection practices. While a mere …
Cyber-Insecurity: The Reasonableness Standard In Internet Of Things Device Regulation And Why Technical Standards Are Better Equipped To Combat Cybercrime, Chynna Rose Foucek
Cyber-Insecurity: The Reasonableness Standard In Internet Of Things Device Regulation And Why Technical Standards Are Better Equipped To Combat Cybercrime, Chynna Rose Foucek
Brooklyn Journal of Corporate, Financial & Commercial Law
While the Internet of Things (IoT) has created an interconnected world via phones, laptops, and even household devices, it is not infallible. As cyber-attacks increase in frequency, affecting companies of all sizes and industries, IoT device manufacturers have become particularly vulnerable, due in large part to the fact that many companies fail to implement adequate cybersecurity protocols. Mass data breaches occur often. However, these companies are not held accountable due to the use of the reasonableness standard in existing cybersecurity legislation, which is flexible and malleable. In 2019, the California Legislature enacted a cybersecurity law specific to IoT device manufacturers. …
The Revolution Of The Commercial Space Industry: Why Current Laws Must Be Replaced Before American Business Expands To The Moon And Beyond, Drew M. Fryhoff
The Revolution Of The Commercial Space Industry: Why Current Laws Must Be Replaced Before American Business Expands To The Moon And Beyond, Drew M. Fryhoff
Brooklyn Journal of Corporate, Financial & Commercial Law
Space, the final frontier. Resting at the rim of the Earth, an endless void full of opportunity awaits those who are willing to take a leap of faith. Historically, only national space programs have been capable of orchestrating expeditions to outer space. However, American aerospace companies now rival governmental entities in their abilities to operate beyond the Earth’s atmosphere. State-of-the-art developments in aerospace technology have positioned the American commercial space sector to become more productive than national space programs in the years to come. Unfortunately, the potential of the American commercial space sector is severely hindered under the Treaty on …
“To Infinity And Beyond”: A Limitless Approach To Telemedicine Beyond State Borders, Kate Nelson
“To Infinity And Beyond”: A Limitless Approach To Telemedicine Beyond State Borders, Kate Nelson
Brooklyn Law Review
Although the growth and acceptance of technological advances in the medical field have been rapid, the legal system has neglected to adjust its laws accordingly. Perhaps the most significant innovation is telemedicine, which allows a patient and a doctor, miles away from each other, to form a medical relationship across state lines. Yet, the traditional state-by-state physician licensing scheme, which promotes a medical relationship within just one state, remains the governing law. Consequently, many citizens––especially those residing in rural areas––continue to suffer from lack of health care access due to physician shortages within their state borders. Accordingly, this note critically …
“Estonia’S Gift To The World”: The Implementation Of A Blockchain Protocol For Corporate Governance In New York, Sydney Lauren Abualy
“Estonia’S Gift To The World”: The Implementation Of A Blockchain Protocol For Corporate Governance In New York, Sydney Lauren Abualy
Brooklyn Journal of Corporate, Financial & Commercial Law
The traditional procedures of corporate governance are not designed to resolve issues related to close outcomes of corporate votes, empty voting practices, the proxy voting protocol, verification of shareholder identities, and access to corporate records. Blockchain technology allows all corporate shareholders to participate in corporate governance more conveniently, with increased transparency, on a secure network. Estonia sought to revolutionize corporate governance by facilitating the development of a blockchain based e-voting protocol for shareholders of companies listed on the Tallinn Stock Exchange to vote in shareholder meetings. After unsuccessful attempts, New York stands well behind other states, such as Delaware, in …
The Criminal, Regulatory, And Civil Issues Surrounding Intellectual Property And Cybersecurity, Ernest Edward Badway, Christie Mcguinness
The Criminal, Regulatory, And Civil Issues Surrounding Intellectual Property And Cybersecurity, Ernest Edward Badway, Christie Mcguinness
Brooklyn Journal of Corporate, Financial & Commercial Law
Cyber-attacks have affected all organizations and individual consumers. Dissemination of relevant information and attention to strong information security practices is an important tool in fighting this cyber “pandemic.” Additionally, the legal and regulatory liability companies face from cyber-attacks as well as general strategies and practical solutions companies may implement to protect against cyber-intrusions and respond effectively in the event of an attack are considered. There are many iterations of cyber-crime, and we address the various methods cybercriminals use and the many ways cyber-attacks can take place, as well as the entities and victims affected. Moreover, the legal liability and regulatory …
A Keystroke Causes A Tornado: Applying Chaos Theory To International Cyber Warfare Law, Daniel Garrie, Masha Simonova
A Keystroke Causes A Tornado: Applying Chaos Theory To International Cyber Warfare Law, Daniel Garrie, Masha Simonova
Brooklyn Journal of International Law
Cyber warfare today finds itself on the front page of the news daily. It is increasingly apparent that the cyber domain demands more guidance, with leaders opting for the deployment of cyber capabilities to bypass kinetic warfare norms. Proposed solutions abound, but none adequately address the specific features of cyber warfare that set it apart from traditional kinetic warfare. This Article argues that a new legal framework is necessary to properly address this problem, and such a doctrine should incorporate principles of chaos theory. Chaos theory is a branch of mathematics dealing with complex systems, with the most well-known example …
The Common Law Of Cyber Trespass, Michael J. O'Connor
The Common Law Of Cyber Trespass, Michael J. O'Connor
Brooklyn Law Review
Right now, if executives in California and Virginia each bribe a competitor’s disloyal employee to steal a trade secret from the competitor’s servers, under the federal Computer Fraud and Abuse Act (CFAA), the Government can charge one executive but not the other. Courts decide these cases differently due to the widening circuit split over the CFAA term “without authorization.” Neither the Supreme Court nor Congress has shown interest in resolving the split over authorization. Even more concerning is the suggestion that they can’t resolve it; the statute addresses too many potential scenarios for a single definition to end all debate. …
In Defense Of Brandenburg: The Aclu And Incitement Doctrine In 1919, 1969, And 2019, Emerson J. Sykes
In Defense Of Brandenburg: The Aclu And Incitement Doctrine In 1919, 1969, And 2019, Emerson J. Sykes
Brooklyn Law Review
In the United States, full-throated advocacy—even advocacy of violence—is protected by the First Amendment of the Constitution. Few other countries define “incitement to violence” as narrowly, and governments tend to exploit any authority to regulate speech. The ACLU has played a central role in developing America’s speech-protective modern incitement doctrine over the last century, sometimes by representing clients with abhorrent views, including in the landmark Brandenburg v. Ohio. The Brandenburg test sets a high bar for incitement that should be maintained, even with respect to online speech. Calls for increased regulation of speech should not be heeded.
Increasing Lapses In Data Security: The Need For A Common Answer To What Constitutes Standing In A Data Breach Context, Aaron Benjamin Edelman
Increasing Lapses In Data Security: The Need For A Common Answer To What Constitutes Standing In A Data Breach Context, Aaron Benjamin Edelman
Journal of Law and Policy
As the number of data breaches continues to rise in the United States, so does the amount of data breach litigation. Many potential plaintiffs who suffered as victims of data breaches, however, find themselves in limbo regarding the issue of standing before a court because of a significant split on standing determinations amongst the federal circuit courts. Thus, while victims of data breaches oftentimes have their personal information fall into the hands of nefarious characters who intend to use the information to a victim’s detriment, that may not be enough to provide victims a right to sue in federal court …
Trade Secret Protection In Japan And The United States: Comparison And Recommendations, Thomas Landman
Trade Secret Protection In Japan And The United States: Comparison And Recommendations, Thomas Landman
Brooklyn Journal of International Law
Trade secret law is a vital, yet often misunderstood, form of intellectual property law. As economic superpowers, both Japan and the United States realize that effective trade secret protection is essential for the prosperity of their domestic economies, and both nations have enacted laws to protect their trade secrets. While both Japan and the United States are signatories to the TRIPS agreement and therefore provide a shared baseline standard of trade secret protection, cultural and systemic differences between the two nations have resulted in differences in the way each nation implements its trade secret laws. This Note traces the history …
The Need For A Shared Responsibility Regime Between State And Non-State Actors To Prevent Human Rights Violations Caused By Cyber-Surveillance Spyware, Anna W. Chan
Brooklyn Journal of International Law
Technology has undoubtedly contributed to the field of human rights. Internet connection and a smartphone has enabled activists to call out political leaders, shine light on human atrocities and organize mass protests through social media platforms. This has resulted in many authoritarian governments spending large amounts of their resources to purchase cyber-surveillance spyware systems from multi-national corporations to closely monitor and track their citizens for any signs of dissidence. Such technology has enabled authoritarian regimes to commit human right violations ranging from invasion of privacy, arbitrary arrest, arbitrary detention, torture and even murder. Despite the uncovering of such questionable transactions …
On The Clock, Best Bet To Draft Cyberdefensive Linemen: Federal Regulation Of Sports Betting From A Cybersecurity Perspective, William H. Williams
On The Clock, Best Bet To Draft Cyberdefensive Linemen: Federal Regulation Of Sports Betting From A Cybersecurity Perspective, William H. Williams
Brooklyn Journal of Corporate, Financial & Commercial Law
On May 14, 2018, Justice Alito delivered the majority opinion for the United States Supreme Court in Murphy v. National Collegiate Athletic Association (NCAA). The Professional and Amateur Protection Act (PASPA), a twenty-six-year-old federal statute, was deemed unconstitutional; thus, this decision allows state legislatures to legalize sports betting within their borders. With many states independently legalizing sports gambling, the regulatory landscape throughout the country is becoming a patchwork of state statutes. Additionally, top tier sporting organizations heavily depend on data analytics to formulate game plan strategy, train efficiently, rehab player injuries, gauge team and player performance, etc. The popularity of …
Pay For (Privacy) Performance: Holding Social Network Executives Accountable For Breaches In Data Privacy Protection, Lital Helman
Pay For (Privacy) Performance: Holding Social Network Executives Accountable For Breaches In Data Privacy Protection, Lital Helman
Brooklyn Law Review
Social networking has proliferated over the past years and is now being utilized by a large percentage of the world’s population. Social networks substantially contribute to enhanced speech, creativity, and communication. Yet, their practices of collecting and monetizing personal data of users pose severe privacy risks. Compelling social networks to internalize these risks is crucial for the healthy evolution of social networking. This article proposes a novel approach to address this challenge: to link executive compensation in social networking firms to the quality of data protection the company provides to its users. This proposal is different from other solutions that …
The Equifax Data Breach And The Resulting Legal Recourse, Caitlin Kenny
The Equifax Data Breach And The Resulting Legal Recourse, Caitlin Kenny
Brooklyn Journal of Corporate, Financial & Commercial Law
What happens when one’s sensitive information falls into the wrong hands? With the twenty-first century’s advancement of technology comes the increasing problem of data breaches wherein sensitive information is exposed. On September 7, 2017, Equifax, one of three major United States credit reporting agencies announced one of the largest data breaches in the history of the United States. The data breach affected approximately 145 million consumers and subsequently a wave of consumer class actions followed. This Note clarifies why class action lawsuits and arbitration are not viable legal remedies for massive data breaches where entities like credit reporting agencies are …
Telemarketing, Technology, And The Regulation Of Private Speech: First Amendment Lessons From The Fcc’S Tcpa Rules, Justin (Gus) Hurwitz
Telemarketing, Technology, And The Regulation Of Private Speech: First Amendment Lessons From The Fcc’S Tcpa Rules, Justin (Gus) Hurwitz
Brooklyn Law Review
This article considers the viability of the Telephone Consumer Protection Act (TCPA) in light of recent Supreme Court First Amendment precedent and technological and regulatory developments. Robocalls—phone calls made using autodialers or prerecorded messages without the consent of the call recipient—have become one of the primary consumer protection issues facing regulators. With more than 2.4 billion of these calls placed each month, consumer concern about them dominate complaints received by both the Federal Communications Commission and Federal Trade Commission. Simultaneously, as cellphones have become a ubiquitous means by which individuals engage with one another and have become the public square, …
The Modern-Day Scarlet Letter: Erasing The Scar Of Non-Consensual Pornography Through Affirmative Consent, Jennifer Esposito
The Modern-Day Scarlet Letter: Erasing The Scar Of Non-Consensual Pornography Through Affirmative Consent, Jennifer Esposito
Journal of Law and Policy
Most have heard the phrase “revenge pornography” via the various websites that have infiltrated the internet for the sole purpose of posting this type of content. Not only do these websites display photos and videos of the victim in their most intimate moments, but they also often include names, addresses, phone numbers, and other identifying information. While many people know what revenge pornography is, they are completely unaware of the devastating impact that revenge pornography has on victims, the majority of which are women. As a result of revenge pornography, victims often suffer from mental illnesses (depression, anxiety, suicidal ideation, …
No Security Through Obscurity: Changing Circumvention Law To Protect Our Democracy Against Cyberattacks, Andrew Moshirnia
No Security Through Obscurity: Changing Circumvention Law To Protect Our Democracy Against Cyberattacks, Andrew Moshirnia
Brooklyn Law Review
Cybersecurity is increasingly vital in a climate of unprecedented digital assaults against liberal democracy. Russian hackers have launched destabilizing cyberattacks targeting the United States’ energy grid, voting machines, and political campaigns. America's existing inadequate cyber defenses operate according to a simple assumption: hide the computer code that powers critical infrastructure so that America's enemies cannot exploit undiscovered weaknesses. Indeed, the intellectual property regime relies entirely on this belief, protecting those who own the rights in computer code by punishing those who might access and copy that code. This “security through obscurity” approach has failed. Rightsholders, on their own, cannot develop …
Remnants Of Net Neutrality: Policing Unlawful Content Through Broadband Providers, Aaron Lerman
Remnants Of Net Neutrality: Policing Unlawful Content Through Broadband Providers, Aaron Lerman
Brooklyn Journal of Corporate, Financial & Commercial Law
The 2015 Open Internet Order, released by The Federal Communication Commission (FCC), introduced sweeping, new rules that promised to preserve an equal and open Internet to consumers. These rules, otherwise known as “Net Neutrality,” prohibited broadband and internet service providers from impairing, blocking, or throttling access to “lawful content” online. But with a new administration and agenda, the FCC’s 2017 Restoring Internet Freedom Order repealed Net Neutrality. Since then, various states have pushed back against the repeal, with some adopting their own versions of the 2015 Open Internet Order’s Net Neutrality, keeping most of the rule language intact, including the …
The Scrivener’S Secrets Seen Through The Spyglass: Gchq And The International Right To Journalistic Expression, Matthew B. Hurowitz
The Scrivener’S Secrets Seen Through The Spyglass: Gchq And The International Right To Journalistic Expression, Matthew B. Hurowitz
Brooklyn Journal of International Law
As part of the U.K.’s electronic surveillance program, the Government Communications Headquarters (GCHQ), started in 1909 to combat German Spies, now collects metadata from both foreigners and its own citizens. Through the express statutory authority of the Regulation of Investigatory Powers Act of 2000 (RIPA), and a loophole in section 94 of the Telecommunications Act of 1984, the GCHQ collects metadata, which is all of the information that is extrinsic to the actual contents of a communication. The GCHQ can request an authorization from a public authority—a member of its own staff—to collect traffic data, service use information, or subscriber …
Secrecy For The Sake Of It: The Defend Trade Secrets Act, Lauren Rayner Davis
Secrecy For The Sake Of It: The Defend Trade Secrets Act, Lauren Rayner Davis
Brooklyn Law Review
With foreign economic espionage and national security concerns thrust to the forefront of the discussion, Congress nearly unanimously passed the Defend Trade Secrets Act after a concerted effort by the executive branch, federal law enforcement, and intellectual property scholars. While this landmark legislation provides the long sought-after grounds of original federal jurisdiction for trade secret misappropriation claims, the statute also offers litigants a powerful remedy—the ex parte seizure provision. This unprecedented provision in trade secrets law allows a plaintiff, with no notice to the defendant, to file an application with the court requesting that U.S. Marshals seize and hold the …
Reevaluating Attorney-Client Privilege In The Age Of Hackers, Anne E. Conroy
Reevaluating Attorney-Client Privilege In The Age Of Hackers, Anne E. Conroy
Brooklyn Law Review
The news story is now familiar: hackers breach a security system and post internal, confidential information online for anyone with an Internet connection to comb through. This digital version of whistleblowing, called “hacktivism,” is attractive to the media, which has leaned on broad First Amendment protections to widely cover the confidential communications revealed by hackers. These hacks also provide attorneys with enticing opportunities to look through previously confidential files. But as ethics and evidentiary rules stand, it is not clear if an attorney may view the files, let alone use them as evidence in litigation. That companies are hacked is …