Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Embry-Riddle Aeronautical University (32)
- UIC School of Law (21)
- Chicago-Kent College of Law (12)
- University of Richmond (7)
- West Virginia University (6)
-
- University of Michigan Law School (2)
- University of Washington School of Law (2)
- Villanova University Charles Widger School of Law (2)
- Maurer School of Law: Indiana University (1)
- New York Law School (1)
- University of Nevada, Las Vegas -- William S. Boyd School of Law (1)
- Vanderbilt University Law School (1)
- Keyword
-
- Data security (8)
- Data retention (4)
- Digital records (3)
- Hacking (3)
- Auditing (2)
-
- Computer games (2)
- Cybercrime (2)
- Data (2)
- Data protection (2)
- Digital technology (2)
- Information economy (2)
- Information security (2)
- Intellectual property (2)
- Patents (2)
- Privacy (2)
- Records (2)
- Social media (2)
- Steganography (2)
- Virtual reality software (2)
- 985 Reasons to Comply with Discovery Requests (1)
- ABA LEO (1)
- ABA Model Rules of Professional Conduct (1)
- ADSL router; manuals; quick start guide; network security; wireless (1)
- Accounting education (1)
- Accounting information systems (1)
- Achieving an Appropriate Balance: The Use of Counsel Sanctions in Connection with the Resolution of E- Discovery Misconduct (1)
- Afterglow (1)
- Albert Gonzalez (1)
- Anonymous (1)
- Anti-benchmarking (1)
- Publication
-
- Journal of Digital Forensics, Security and Law (32)
- UIC John Marshall Journal of Information Technology & Privacy Law (19)
- Chicago-Kent Law Review (12)
- Richmond Journal of Law & Technology (7)
- West Virginia Law Review (6)
-
- Michigan Law Review (2)
- Villanova Law Review (2)
- Washington Journal of Law, Technology & Arts (2)
- Indiana Journal of Global Legal Studies (1)
- NYLS Law Review (1)
- Nevada Law Journal (1)
- UIC Law Review (1)
- UIC Review of Intellectual Property Law (1)
- Vanderbilt Journal of Entertainment & Technology Law (1)
Articles 1 - 30 of 88
Full-Text Articles in Law
The End Of The (Virtual) World, Joshua A.T. Fairfield
The End Of The (Virtual) World, Joshua A.T. Fairfield
West Virginia Law Review
No abstract provided.
Virtual Rule Of Law, Michael Risch
The Patent System's Relationship To Digital Entrepreneurship, Mark Chandler
The Patent System's Relationship To Digital Entrepreneurship, Mark Chandler
West Virginia Law Review
No abstract provided.
Capitalizing On Digital Entrepreneurship For Low-Income Residents And Communities, Janet Thompson Jackson
Capitalizing On Digital Entrepreneurship For Low-Income Residents And Communities, Janet Thompson Jackson
West Virginia Law Review
No abstract provided.
Facebook 2 Blackberry And Database Trading Systems: Morphing Social Networking To Business Growth In A Global Recession, Roger M. Groves
Facebook 2 Blackberry And Database Trading Systems: Morphing Social Networking To Business Growth In A Global Recession, Roger M. Groves
West Virginia Law Review
No abstract provided.
Best Practices And The State Of Information Security, Kevin Cronin
Best Practices And The State Of Information Security, Kevin Cronin
Chicago-Kent Law Review
The forces of globalization, together with widely available industry standards and best practices, and heightened state legislative activity, are driving the U.S. towards a more unified approach to data security. But the success of this unified approach requires more than free market efficiency and innovation. In order to maintain a state of evolutionary equilibrium in the global information economy, the U.S. must move from a fragmented approach towards data security and privacy standards, towards a more comprehensive set of standards with new penalties and effective enforcement, to better reflect the inherent value of personal data in today's global marketplace.
Patenting Cryptographic Technology, Greg Vetter
Patenting Cryptographic Technology, Greg Vetter
Chicago-Kent Law Review
The policy concerns intersecting patent law and cryptographic technology relate to the technology's beneficial uses in securing information in a commercial and social fabric that increasingly relies on computing and electronic communications for its makeup. The presence of patenting in a technology can impact diffusion of interoperable technology. Standardized embeddable cryptography facilitates its supply. Patent law for several decades has waxed and waned in its embrace of software implemented inventions rooted in abstract ideas such as the mathematics and mathematical algorithms underlying modern cryptography. This article documents the growth of cryptographic patenting. Then, in light of this growth and patent …
The Political Economy Of Data Protection, Peter K. Yu
The Political Economy Of Data Protection, Peter K. Yu
Chicago-Kent Law Review
Information is the lifeblood of a knowledge-based economy. The control of data and the ability to translate them into meaningful information is indispensable to businesspeople, policymakers, scientists, engineers, researchers, students, and consumers. Having useful, and at times exclusive, information improves productivity, advances education and training, and helps create a more informed citizenry. In the past two decades, those who collected or obtained access to a large amount of data began to explore ways to use the collected data as an income stream. Because the then-existing laws did not offer adequate protection for that particular purpose, they actively lobbied for stronger …
Data Devolution: Corporate Information Security, Consumers, And Future Of Regulation, Andrea M. Matwyshyn
Data Devolution: Corporate Information Security, Consumers, And Future Of Regulation, Andrea M. Matwyshyn
Chicago-Kent Law Review
No abstract provided.
Trade Secrets, Data Security And Employees, Elizabeth Rowe
Trade Secrets, Data Security And Employees, Elizabeth Rowe
Chicago-Kent Law Review
This essay argues that data security is important to the protection of trade secret information, and that trusted employees on the inside pose the biggest threat to the protection of trade secrets. While investments in technical measures such as firewalls and encryption are important, it is also necessary for companies to consider the internal threats from employees when creating corporate security programs. Ultimately, a more comprehensive approach that includes technical and human elements, as well as consideration of inside and outside threats is likely to be more effective in the battle to secure data.
Returning To A Principled Basis For Data Protection, Gus Hosein
Returning To A Principled Basis For Data Protection, Gus Hosein
Chicago-Kent Law Review
Society must remain conscious of both pragmatic and principle-based rationales for information security rules. The identity card debate in the United Kingdom provides an example of exactly why a governmental information security approach that is sensitive to civil liberties would be the best approach to data protection. In contrast, we should be cautious of a balancing test that places security in parity with civil liberties and, therefore, erroneously allows pragmatism to triumph over principle.
Information Security, Contract And Liability, Jennifer Chandler
Information Security, Contract And Liability, Jennifer Chandler
Chicago-Kent Law Review
Various common provisions in software end user license agreements undermine cyber security. These include anti-benchmarking provisions and broad exclusions of liability. These short comments suggest that courts and legislatures should take steps to limit the enforceability of contractual provisions that undermine cyber security.
Reasons Why We Should Amend The Constitution To Protect Privacy, Deborah Pierce
Reasons Why We Should Amend The Constitution To Protect Privacy, Deborah Pierce
Chicago-Kent Law Review
Threats to consumer privacy are many, and varied. Some threats come from corporate entities such as data aggregators and social networking sites; while others come from panoptics government surveillance systems such as Secure Flight. Not only can the data be compromised, but consumers may be adversely affected by incorrect information in their files. The time may be right to explicitly protect privacy via a constitutional amendment to the U.S. Constitution.
Coding Privacy, Lilian Edwards
Coding Privacy, Lilian Edwards
Chicago-Kent Law Review
Lawrence Lessig famously and usefully argues that cyberspace is regulated not just by law but also by norms, markets and architecture or "code." His insightful work might also lead the unwary to conclude, however, that code is inherently anti-privacy, and thus that an increasingly digital world must therefore also be increasingly devoid of privacy. This paper argues briefly that since technology is a neutral tool, code can be designed as much to fight for privacy as against it, and that what matters now is to look at what incentivizes the creation of pro- rather than anti-privacy code in the mainstream …
Data Collection And Leakage, Philip Howard, Kris Erickson
Data Collection And Leakage, Philip Howard, Kris Erickson
Chicago-Kent Law Review
Every year millions of digital records containing personally identifiable information are exposed. When are malicious hackers to blame, and when is it organizational malfeasance? Which kinds of organizations—private firms, government agencies, or educational institutions—lose the most data? With over 1.9 billion records lost (on average that's 9 records per U.S. adult), a surprising number of breaches can be attributed to organizational practices.
Optimal Hackback, Jay P. Kesan, Ruperto Majuca
Optimal Hackback, Jay P. Kesan, Ruperto Majuca
Chicago-Kent Law Review
Professor Jay Kesan from the University of Illinois College of Law, in joint work with Ruperto Majuca of the University of Illinois Department of Economics, argue in favor of legal rules that allow "hacking [data] back" in certain business circumstances. They analyze the strategic interaction between the hacker and the attacked company or individual and conclude that neither total prohibition nor unrestrained permission of hack-back is optimal. Instead, they argue that when other alternatives such as criminal enforcement and litigation are ineffective, self-defense is the best response to cybercrime because there is a high likelihood of correctly attacking the criminal, …
The Duty Of Care And The Data Control Systems In The Wake Of Sarbanes-Oxley, Michael R. Siebecker
The Duty Of Care And The Data Control Systems In The Wake Of Sarbanes-Oxley, Michael R. Siebecker
Chicago-Kent Law Review
The essay examines the wisdom of exempting small public companies from Section 404 of the Sarbanes-Oxley Act of 2002 (SOX), which requires companies to provide management assessment and external auditing of a company's internal control systems over financial data. In particular, the essay questions whether a fiduciary duty of care might require officers and directors to adopt internal control systems, perhaps substantially similar to those envisioned by SOX, even if small public companies were exempt from the ambit of the statute.
Evaluating Columbia Pictures Industries V. Bunnell And The Role Of Ram Under The Federal Rules Of Civil Procedure On E-Discovery, Loren M. Hall
Evaluating Columbia Pictures Industries V. Bunnell And The Role Of Ram Under The Federal Rules Of Civil Procedure On E-Discovery, Loren M. Hall
Washington Journal of Law, Technology & Arts
In 2007, the District Court for the Central District of California required the preservation of data stored in random access memory (RAM), which sparked significant commentary about the rapidly expanding realm of electronically-stored discoverable information. This Article addresses the impact of Columbia Pictures Industries v. Bunnell in the context of the duty to preserve and produce documents, and the scope of information that can be subject to e-discovery obligations. This Article also describes how the 2006 amendments to the Federal Rules of Civil Procedure provide a necessary limitation—reasonableness—on the costly and unrealistic preservation, and subsequent production, of electronic information. Furthermore, …
The Rite Of Rhetoric: Cognitive Framing In Technology Law, Chris Riley
The Rite Of Rhetoric: Cognitive Framing In Technology Law, Chris Riley
Nevada Law Journal
No abstract provided.
Will Quants Rule The (Legal) World?, Edward K. Cheng
Will Quants Rule The (Legal) World?, Edward K. Cheng
Michigan Law Review
The quants are coming! And they are here to stay-so argues Professor Ian Ayres' in his new book, Super Crunchers, which details the brave new world of statistical prediction and how it has already begun to affect our lives. For years, academic researchers have known about the considerable and at times surprising advantages of statistical models over the considered judgments of experienced clinicians and experts. Today, these models are emerging all over the landscape. Whether the field is wine, baseball, medicine, or consumer relations, they are vying against traditional experts for control over how we make decisions. To be …