Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- International Law (3)
- Privacy Law (3)
- Consumer Protection Law (2)
- Internet Law (2)
- Science and Technology Law (2)
-
- Civil Rights and Discrimination (1)
- Communication (1)
- Communication Technology and New Media (1)
- Communications Law (1)
- Comparative and Foreign Law (1)
- Computer Law (1)
- Conflict of Laws (1)
- Energy and Utilities Law (1)
- European Law (1)
- First Amendment (1)
- Health Law and Policy (1)
- Human Rights Law (1)
- Intellectual Property Law (1)
- International and Intercultural Communication (1)
- Law and Society (1)
- Legislation (1)
- National Security Law (1)
- Social and Behavioral Sciences (1)
Articles 1 - 4 of 4
Full-Text Articles in Entire DC Network
The Rise Of 5g Technology: How Internet Privacy And Protection Of Personal Data Is A Must In An Evolving Digital Landscape, Justin Rabine
The Rise Of 5g Technology: How Internet Privacy And Protection Of Personal Data Is A Must In An Evolving Digital Landscape, Justin Rabine
Catholic University Journal of Law and Technology
No abstract provided.
The Fsia And Cyberspace: Could Hact Be The Answer?, Ritika Malkani
The Fsia And Cyberspace: Could Hact Be The Answer?, Ritika Malkani
Catholic University Journal of Law and Technology
Under the non-commercial tort exception to the Foreign Sovereign Immunities Act (FSIA), a tort committed by a foreign state must occur wholly within the United States in order to trigger jurisdiction and liability in an American court. As such, cybercrimes which are committed abroad, even if targeted at and cause harm to U.S. citizens, fall outside this exception, leaving injured parties with no domestic avenue of redress. Potential solutions to closing this gap in the legal framework include the proposed Homeland and Cyber Threat Act (HACT), expansion of the FSIA's terrorism exception, or overruling the entire tort doctrine.
The Survival Of Critical Infrastructure: How Do We Stop Ransomware Attacks On Hospitals?, Helena Roland
The Survival Of Critical Infrastructure: How Do We Stop Ransomware Attacks On Hospitals?, Helena Roland
Catholic University Journal of Law and Technology
Our nation’s infrastructure is under an emerging new threat: ransomware attacks. These attacks can cause anything from individual laptops, to entire cities to shut down for a period of time until the victim pays a ransom to the attacker. Unfortunately, these attacks are on the rise and the attackers have a new target: hospitals. Ransomware attacks on hospitals can temporarily shut down operating room technology and limit physician access to patient files, ultimately threatening the safety of hospital patients and the surrounding community. This paper examines how the threat of ransomware attacks on hospitals is on the rise and what …
Who Are The Real Cyberbullies: Hackers Or The Ftc? The Fairness Of The Ftc’S Authority In The Data Security Context, Jaclyn K. Haughom
Who Are The Real Cyberbullies: Hackers Or The Ftc? The Fairness Of The Ftc’S Authority In The Data Security Context, Jaclyn K. Haughom
Catholic University Law Review
As technology continues to be an integral part of daily life, there lies an ever-increasing threat of the personally identifiable information of consumers being lost, stolen, or accessed without authorization. The Federal Trade Commission (FTC) is the U.S. government’s primary consumer protection agency and the country’s lead enforcer against companies subject to data breaches. Although the FTC lacks explicit statutory authority to enforce against data breaches, the Commission has successfully relied on Section 5 of the FTC Act (FTCA) to exercise its consumer protection power in the data security context. However, as the FTC continues to take action against businesses …