Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Abrams v. united states (1)
- Administrative rights (1)
- Baidu (1)
- Bob Stembridge (1)
- Bradley Manning (1)
-
- Charles L. Mauro (1)
- Clear and Present Danger Standard (1)
- Cloud Computing (1)
- Current State of Innovation in China (1)
- Cyber Attack (1)
- Cyber Exploitation (1)
- Dexter Roberts (1)
- Do not track (1)
- EU Trade Delegation (1)
- Electronic IP (1)
- Espionage (1)
- European commission (1)
- Facebook (1)
- First Amendment (1)
- Free Speech (1)
- Funes el Memorioso (1)
- Google dashboard (1)
- Google policy manager (1)
- Google+ (1)
- High Tech Innovation (1)
- Huawei (1)
- ICT (1)
- IMS health inc. v. ayotte (1)
- IP Value (1)
- Ims health inc. v. mills (1)
- Publication
Articles 1 - 4 of 4
Full-Text Articles in Law
“Advancing With The Times: Industrial Design Protection In The Era Of Virtual Migration”, Horacio E. Gutiérrez
“Advancing With The Times: Industrial Design Protection In The Era Of Virtual Migration”, Horacio E. Gutiérrez
IP Theory
No abstract provided.
Wikileaks And The First Amendment, Geoffrey R. Stone
Wikileaks And The First Amendment, Geoffrey R. Stone
Federal Communications Law Journal
FCBA Distinguished Speaker Series
In November 2010, Julian Assange's WikiLeaks collaborated with major media organizations to release thousands of classified U.S. State Department documents. American soldier Bradley Manning stands accused of leaking those documents to the website. In response, Congress introduced the SHIELD Act to amend the Espionage Act of 1917, making it a crime for any person to disseminate any classified information concerning American intelligence or the identity of a classified informant. Such sweeping language, while possibly constitutional as applied to government employees like Manning, is plainly unconstitutional as applied to those like Assange and WikiLeaks who subsequently publish …
Should Cyber Exploitation Ever Constitute A Demonstration Of Hostile Intent That May Violate Un Charter Provisions Prohibiting The Threat Or Use Of Force?, Anna Wortham
Federal Communications Law Journal
More and more, the United States and other countries rely on complex infrastructures that are primarily controlled by information technology. Although extremely destructive cyber threats and attacks against nations are a reality, the laws governing cyber exploitation have not kept pace with this threat. Because the United States and other nations may use cyber capabilities offensively as well as defensively, it is important that the laws for engaging in such cyber conflict be well defined. Currently, it seems unlikely that cyber exploitation can ever be regarded as a threat or use of force under the UN Charter because it is …
The End Of Forgetting And "Administrative Rights" To Our Online Personas, Jamie R. Lund
The End Of Forgetting And "Administrative Rights" To Our Online Personas, Jamie R. Lund
IP Theory
No abstract provided.