Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Law

Platforms, Encryption, And The Cfaa: The Case Of Whatsapp V Nso Group, Jonathon Penney, Bruce Schneier Jan 2022

Platforms, Encryption, And The Cfaa: The Case Of Whatsapp V Nso Group, Jonathon Penney, Bruce Schneier

Articles, Book Chapters, & Popular Press

End-to-end encryption technology has gone mainstream. But this wider use has led hackers, cybercriminals, foreign governments, and other threat actors to employ creative and novel attacks to compromise or workaround these protections, raising important questions as to how the Computer Fraud and Abuse Act (CFAA), the primary federal anti-hacking statute, is best applied to these new encryption implementations. Now, after the Supreme Court recently narrowed the CFAA’s scope in Van Buren and suggested it favors a code-based approach to liability under the statute, understanding how best to theorize sophisticated code-based access barriers like end-to-end encryption, and their circumvention, is now …


Judicial Workbook On Bill C-92 — An Act Respecting First Nations, Inuit And Métis Children, Youth And Families, Hadley Friedland, Naiomi Metallic, Koren Lightning-Earle Jan 2022

Judicial Workbook On Bill C-92 — An Act Respecting First Nations, Inuit And Métis Children, Youth And Families, Hadley Friedland, Naiomi Metallic, Koren Lightning-Earle

Articles, Book Chapters, & Popular Press

Objective: Based on the purpose, history, textual wording and relevant interpretative principles, these are the approaches to the provisions of the Act that we believe will best achieve its purpose, which Canada has identified as “to protect and ensure the well-being of Indigenous children, families and communities by promoting culturally sensitive child welfare services, with the goal of putting an end to the overrepresentation of Indigenous children in child and family services systems."