Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Computers (3)
- All Other Telecommunications (2)
- Cybersecurity (2)
- Right of privacy (2)
- 1976 Copyright Act (1)
-
- 3D-Printed Firearms (1)
- A Comprehensive Empirical Study (1)
- Addison C. Harris Lecture (1)
- Agency (Law) (1)
- Agency Paradigm (1)
- Alternatives to Copyright Protection (1)
- Anti-hacking laws (1)
- Article 2 of the U.C.C. (1)
- Automation (1)
- Autonomy (Psychology) (1)
- Baker v. Seldon (1)
- Beta (Video format) (1)
- Binding Commitment (1)
- California (1)
- Censorship -- Government policy (1)
- Commercial Interests (1)
- Computer Programs (1)
- Computer Systems Design Services (1)
- Computer security (1)
- Computer trespass (1)
- Computer-Generated Displays (1)
- Computer-aided design (1)
- Consumer Autonomy (1)
- Consumers -- United States -- Legal status and laws etc. (1)
- Contract theory (1)
Articles 1 - 14 of 14
Full-Text Articles in Law
Strengthening Our Intuitions About Hacking, Jeffrey L. Vagle
Strengthening Our Intuitions About Hacking, Jeffrey L. Vagle
Indiana Law Journal
The computer trespass analogy has served us reasonably well as a basis for cybersecurity policies and related anti-hacking laws, but computers, and our uses of them, have changed significantly in ways that stretch the computer trespass metaphor beyond usefulness. This Essay proposes an approach to expanding and strengthening our intuitions about computer security that accounts for new computing paradigms, giving courts and lawmakers additional tools for interpreting and drafting effective anti-hacking laws.
This Essay argues that many new and existing computer use scenarios leave courts unsure how existing anti-hacking laws might apply, increasing the possibility of under- or over-inclusive policies …
What's The Harm? Federalism, The Separation Of Powers, And Standing In Data Breach Litigation, Grayson Wells
What's The Harm? Federalism, The Separation Of Powers, And Standing In Data Breach Litigation, Grayson Wells
Indiana Law Journal
This Comment will argue that the Supreme Court should analyze standing in data breach litigation under a standard that is deferential to state statutory and common law. Specifically, federal standing analysis should look to state law when determining whether an injury is concrete such that the injury-in-fact requirement is met. Some argue that allowing more data breach cases to proceed to the merits could lead to an explosion of successful litigation and settlements, burdening the federal courts and causing economic losses for the breached businesses. These concerns may be valid. But if state law provides a remedy to the harm …
A Comprehensive Empirical Study Of Data Privacy, Trust, And Consumer Autonomy, Jay P. Kesan, Carol M. Hayes, Masooda N. Bashir
A Comprehensive Empirical Study Of Data Privacy, Trust, And Consumer Autonomy, Jay P. Kesan, Carol M. Hayes, Masooda N. Bashir
Indiana Law Journal
Modern society is driven by data. Data storage is practically unlimited with today’s technology, and analytical tools make it easy to find patterns and make predictions in a way that is very useful for private businesses and governments. These uses of digital data can raise considerable privacy issues that are of great concern to consumers. In this Article, we present and analyze the results of an extensive survey that we conducted to explore what people know, what people do, and what people want when it comes to privacy online.
Our survey is the first comprehensive examination of the intersection of …
Unlocked And Loaded: Government Censorship Of 3d-Printed Firearms And A Proposal For More Reasonable Regulation Of 3d-Printed Goods, Danton L. Bryans
Unlocked And Loaded: Government Censorship Of 3d-Printed Firearms And A Proposal For More Reasonable Regulation Of 3d-Printed Goods, Danton L. Bryans
Indiana Law Journal
This Comment analyzes the regulations in place on 3D-printed firearms and proposes a new standard for regulating 3D-printed goods. Part I provides a brief primer on 3D printing and 3D-printed firearms. Part II turns to the events surrounding Defense Distributed’s creation of the world’s first 3D-printed firearm and the subsequent government censorship of the corresponding CAD files. Part III discusses the regulations affecting 3D-printed firearms and why these regulations are ill-suited for CAD files and 3D-printed goods. Part IV analyzes the implications of treating CAD files and 3D-printed goods as equivalents of traditional goods. Finally, Part V offers a proposal …
Furtive Encryption: Power, Trusts, And The Constitutional Cost Of Collective Surveillance, Jeffrey L. Vagle
Furtive Encryption: Power, Trusts, And The Constitutional Cost Of Collective Surveillance, Jeffrey L. Vagle
Indiana Law Journal
Recent revelations of heretofore secret U.S. government surveillance programs have sparked national conversations about their constitutionality and the delicate balance between security and civil liberties in a constitutional democracy. Among the revealed policies asserted by the National Security Agency (NSA) is a provision found in the “minimization procedures” required under section 702 of the Foreign Intelligence Surveillance Act of 1978. This provision allows the NSA to collect and keep indefinitely any encrypted information collected from domestic communications—including the communications of U.S. citizens. That is, according to the U.S. government, the mere fact that a U.S. citizen has encrypted her electronic …
A New Approach To Digital Reader Privacy; State Regulations And Their Protection Of Digital Book Data, Andrew A. Proia
A New Approach To Digital Reader Privacy; State Regulations And Their Protection Of Digital Book Data, Andrew A. Proia
Indiana Law Journal
No abstract provided.
Maintaining Government Accountability: Calls For A "Public Use" Beyond Eminent Domain, Gregory S. Knapp
Maintaining Government Accountability: Calls For A "Public Use" Beyond Eminent Domain, Gregory S. Knapp
Indiana Law Journal
No abstract provided.
Humans, Computers, And Binding Commitment, Margaret Jane Radin
Humans, Computers, And Binding Commitment, Margaret Jane Radin
Indiana Law Journal
Addison C. Harris Lecture at the Indiana University School of Law-Bloomington on October 26, 1999.
Computers As Agents: A Proposed Approach To Revised U.C.C. Article 2, John P. Fischer
Computers As Agents: A Proposed Approach To Revised U.C.C. Article 2, John P. Fischer
Indiana Law Journal
No abstract provided.
Fixation On Fixation: Why Imposing Old Copyright Law On New Technology Will Not Work, Douglas J. Mason
Fixation On Fixation: Why Imposing Old Copyright Law On New Technology Will Not Work, Douglas J. Mason
Indiana Law Journal
No abstract provided.
The Computer As Advocate: An Approach To Computer-Generated Displays In The Courtroom, Mario Borelli
The Computer As Advocate: An Approach To Computer-Generated Displays In The Courtroom, Mario Borelli
Indiana Law Journal
No abstract provided.
Copyright And Software Technology Infringement: Defining Third Party Development Rights, Raymond T. Nimmer, Patricia A. Krauthaus
Copyright And Software Technology Infringement: Defining Third Party Development Rights, Raymond T. Nimmer, Patricia A. Krauthaus
Indiana Law Journal
No abstract provided.
The Patentability Of Computer Programs: Merrill Lynch's Patent For A Financial Services System, Lynne B. Allen
The Patentability Of Computer Programs: Merrill Lynch's Patent For A Financial Services System, Lynne B. Allen
Indiana Law Journal
No abstract provided.
Copyright Protection For Computer Programs Under The 1976 Copyright Act, Louis Peter Pataki Jr.
Copyright Protection For Computer Programs Under The 1976 Copyright Act, Louis Peter Pataki Jr.
Indiana Law Journal
No abstract provided.