Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Law reform (2)
- Access to information (1)
- All Writs Act (1)
- Apple (1)
- Attribution (1)
-
- Communications Assistance for Law Enforcement Act (1)
- Computers (1)
- Congress (1)
- Cybersecurity (1)
- Data (1)
- Data privacy (1)
- Data security (1)
- Digital security (1)
- Encrypted devices (1)
- Encryption (1)
- Federal Bureau of Investigation (1)
- Going dark (1)
- Information (1)
- Lawmaking (1)
- Non-state actors (1)
- Private companies (1)
- Sensitive data (1)
- Soft law (1)
- United Nations (1)
- Publication
- Publication Type
Articles 1 - 3 of 3
Full-Text Articles in Computer Law
Persuasion About/Without International Law: The Case Of Cybersecurity Norms, Steven R. Ratner
Persuasion About/Without International Law: The Case Of Cybersecurity Norms, Steven R. Ratner
Book Chapters
International law on cybersecurity is characterized by at best a thin consensus on the existence of rules, their meaning, and the desirability and content of new rules. This legal landscape results in a unique pattern of argumentation and persuasion by states and non-state actors both in advocating for a regulatory scheme for cyber activity and in reacting to malicious cyber acts. By examining argumentation in the absence of a generally agreed legal framework, this chapter seeks to provide new insights into the motivations for and effects of international legal argumentation in shaping debates and behavior. After describing the legal landscape …
Shedding Light On The "Going Dark" Problem And The Encryption Debate, John Mylan Traylor
Shedding Light On The "Going Dark" Problem And The Encryption Debate, John Mylan Traylor
University of Michigan Journal of Law Reform
In an effort to protect the enormous volume of sensitive and valuable data that travels across the Internet and is stored on personal devices, private companies have created encryption software to secure data from criminals, hackers, and terrorists who wish to steal it. The greatest benefit of encryption also creates the biggest problem: Encryption software has become so secure that often not even the government can bypass it. The “Going Dark” problem—a scenario in which the government has obtained the legal authority to search a suspected criminal’s encrypted device but lacks the technical ability to do so—is becoming increasingly common. …
Personal Privacy In The Computer Age: The Challenge Of A New Technology In An Information-Oriented Society, Arthur R. Miller
Personal Privacy In The Computer Age: The Challenge Of A New Technology In An Information-Oriented Society, Arthur R. Miller
Michigan Law Review
The purpose of this Article is to survey the new technology's implications for personal privacy and to evaluate the contemporary common-law and statutory pattern relating to data-handling. In the course of this examination, it will appraise the existing framework's capacity to deal with the problems created by society's growing awareness of the primordial character of information. The Article is intended to be suggestive; any attempt at definitiveness would be premature. Avowedly, it was written with the bias of one who believes that the new information technology has enormous long-range societal implications and who is concerned about the consequences of the …