Open Access. Powered by Scholars. Published by Universities.®

Computer Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 8 of 8

Full-Text Articles in Computer Law

How To Interpret The Securities Laws?, Zachary J. Gubler Jan 2024

How To Interpret The Securities Laws?, Zachary J. Gubler

Seattle University Law Review

In discussions of the federal securities laws, the SEC usually gets most of the attention. This makes some sense. After all, it is the agency charged with administrating the securities laws and regulating the industry as a whole. It makes the majority of the laws; it engages in enforcement actions; it reacts to crises; and it, or sometimes even its individual commissioners, intervene publicly in policy debates. Often overlooked in such discussion, however, is the role of the Supreme Court in shaping securities law, and a new book by Adam Pritchard and Robert Thompson demonstrates why this is an oversight. …


Sanksi Hukuman Mati Bagi Penyalahguna Narkotika Dalam Perspektif Ham Berdasarkan Konstitusi, Dharma Rozali Azhar D Jan 2023

Sanksi Hukuman Mati Bagi Penyalahguna Narkotika Dalam Perspektif Ham Berdasarkan Konstitusi, Dharma Rozali Azhar D

"Dharmasisya” Jurnal Program Magister Hukum FHUI

The death penalty is a legal act that is legitimized by the state. In the context of the constitution, the death penalty has created a contradiction in the norms in Article 28 I paragraph (1) and Article 28 J paragraph (1) and paragraph (2) which specifically focus on the right to life as a fundamental right that is very fundamental and divine in nature and the right to life of people. others who also may not be removed by anyone on purpose for any reason. The death penalty in the context of narcotics does not aim to repay crime for …


A Synthesis Of The Science And Law Relating To Eyewitness Misidentifications And Recommendations For How Police And Courts Can Reduce Wrongful Convictions Based On Them, Henry F. Fradella Jan 2023

A Synthesis Of The Science And Law Relating To Eyewitness Misidentifications And Recommendations For How Police And Courts Can Reduce Wrongful Convictions Based On Them, Henry F. Fradella

Seattle University Law Review

The empirical literature on perception and memory consistently demonstrates the pitfalls of eyewitness identifications. Exoneration data lend external validity to these studies. With the goal of informing law enforcement officers, prosecutors, criminal defense attorneys, judges, and judicial law clerks about what they can do to reduce wrongful convictions based on misidentifications, this Article presents a synthesis of the scientific knowledge relevant to how perception and memory affect the (un)reliability of eyewitness identifications. The Article situates that body of knowledge within the context of leading case law. The Article then summarizes the most current recommendations for how law enforcement personnel should—and …


Politik Hukum Dalam Penegakan Hukum Di Indonesia, Anita Anita Dec 2022

Politik Hukum Dalam Penegakan Hukum Di Indonesia, Anita Anita

"Dharmasisya” Jurnal Program Magister Hukum FHUI

Law is a guide and rules related to the concept of social life and will always be in accordance with the conditions of society. Law is a demand to be able to provide justice, meaning that the law is always faced with the question of whether the law can bring about justice. In relation to the legal concept, legal politics is defined as an activity that determines the patterns and methods of shaping law, supervises the operation of the law, and reforms the law for the purposes of the State. Therefore, law is a determinant of politics, and is also …


Cryptography, Passwords, Privacy, And The Fifth Amendment, Gary C. Kessler, Ann M. Phillips Aug 2020

Cryptography, Passwords, Privacy, And The Fifth Amendment, Gary C. Kessler, Ann M. Phillips

Journal of Digital Forensics, Security and Law

Military-grade cryptography has been widely available at no cost for personal and commercial use since the early 1990s. Since the introduction of Pretty Good Privacy (PGP), more and more people encrypt files and devices, and we are now at the point where our smartphones are encrypted by default. While this ostensibly provides users with a high degree of privacy, compelling a user to provide a password has been interpreted by some courts as a violation of our Fifth Amendment protections, becoming an often insurmountable hurdle to law enforcement lawfully executing a search warrant. This paper will explore some of the …


Cyberattacks And The Constitution, Matthew C. Waxman Jan 2020

Cyberattacks And The Constitution, Matthew C. Waxman

Faculty Scholarship

Contrary to popular view, cyberattacks alone are rarely exercises of constitutional war powers – and they might never be. They are often instead best understood as exercises of other powers pertaining to nonwar military, foreign affairs, intelligence, and foreign commerce, for example. Although this more fine-grained, fact-specific conception of cyberattacks leaves room for broad executive leeway in some contexts, it also contains a strong constitutional basis for legislative regulation of cyber operations.


From Innovation To Abuse: Does The Internet Still Need Section 230 Immunity?, Benjamin Volpe Jan 2019

From Innovation To Abuse: Does The Internet Still Need Section 230 Immunity?, Benjamin Volpe

Catholic University Law Review

In 1996, Congress passed the Communications Decency Act to allow the screening of offensive material from the internet, while preserving the continued development of the internet economy without burdensome regulation. However, for years, online intermediaries have successfully used the Act as a shield from liability when third parties use their online services to commit tortious or criminal acts. This Comment argues that a wholly-unregulated internet is no longer necessary to preserve the once-fledgling internet economy. After evaluating various approaches to intermediary liability, this Comment also argues that Congress should take a more comprehensive look at consumer protection online and establish …


Copyright And Free Expression: The Convergence Of Conflicting Normative Frameworks, Shyamkrishna Balganesh Jan 2004

Copyright And Free Expression: The Convergence Of Conflicting Normative Frameworks, Shyamkrishna Balganesh

All Faculty Scholarship

Recent attempts to expand the domain of copyright law in different parts of the world have necessitated renewed efforts to evaluate the philosophical justifications that are advocated for its existence as an independent institution. Copyright, conceived of as a proprietary institution, reveals an interesting philosophical interaction with other libertarian interests, most notably the right to free expression. This paper seeks to understand the nature of this interaction and the resulting normative decisions. The paper seeks to analyze copyright law and its recent expansions, specifically from the perspective of the human rights discourse. It looks at the historical origins of modern …