Open Access. Powered by Scholars. Published by Universities.®

Computer Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Computer Law

Sony, Cyber Security, And Free Speech: Preserving The First Amendment In The Modern World, Conrad Wilton Jun 2017

Sony, Cyber Security, And Free Speech: Preserving The First Amendment In The Modern World, Conrad Wilton

Pace Intellectual Property, Sports & Entertainment Law Forum

Reprinted from 16 U.C. Davis Bus. L.J. 309 (2016). This paper explores the Sony hack in 2014 allegedly launched by the North Korean government in retaliation over Sony’s production of The Interview and considers the hack’s chilling impact on speech in technology. One of the most devastating cyber attacks in history, the hack exposed approximately thirty- eight million files of sensitive data, including over 170,000 employee emails, thousands of employee social security numbers and unreleased footage of upcoming movies. The hack caused Sony to censor the film and prompted members of the entertainment industry at large to tailor their communication …


Death By Bullying: A Comparative Culpability Proposal, Audrey Rogers May 2015

Death By Bullying: A Comparative Culpability Proposal, Audrey Rogers

Pace Law Review

This article explores the possibility and advisability of imposing homicide charges against bullies, a controversial approach because of the serious causation questions it poses. Nonetheless, there is precedent for holding a person criminally culpable for a victim’s suicide. A notorious case involved the head of the Ku Klux Klan who was convicted of murder after the woman he raped killed herself by swallowing poison, “distracted by pain and shame so inflicted upon her.” Some may see her shame as analogous to gay teens who commit suicide after being bullied about their sexual orientation. But perhaps the law should not demand …


Global Cyber Intermediary Liability: A Legal & Cultural Strategy, Jason H. Peterson, Lydia Segal, Anthony Eonas Sep 2014

Global Cyber Intermediary Liability: A Legal & Cultural Strategy, Jason H. Peterson, Lydia Segal, Anthony Eonas

Pace Law Review

This Article fills the gap in the debate on fighting cybercrime. It considers the role of intermediaries and the legal and cultural strategies that countries may adopt. Part II.A of this Article examines the critical role of intermediaries in cybercrime. It shows that the intermediaries’ active participation by facilitating the transmission of cybercrime traffic removes a significant barrier for individual perpetrators. Part II.B offers a brief overview of legal efforts to combat cybercrime, and examines the legal liability of intermediaries in both the civil and criminal context and in varying legal regimes with an emphasis on ISPs. Aside from some …


From Peer-To-Peer Networks To Cloud Computing: How Technology Is Redefining Child Pornography Laws, Audrey Rogers Jan 2013

From Peer-To-Peer Networks To Cloud Computing: How Technology Is Redefining Child Pornography Laws, Audrey Rogers

Elisabeth Haub School of Law Faculty Publications

This Article traces the history of the child pornography laws and sentencing policy in Part I. Part II explains the technologies that have caused some of the current controversies, and then Part III describes how these technologies have blurred the offenses. Finally, Part IV makes suggestions as to how the law could better reflect technology and comport with a refined harm rationale. Courts, legal scholars, and medical experts have explained the harm includes the sexual abuse captured in the images and the psychological injury the victim endures knowing the images are being viewed. This Article further develops the harm rationale …


Protecting Children On The Internet: Mission Impossible?, Audrey Rogers Jan 2009

Protecting Children On The Internet: Mission Impossible?, Audrey Rogers

Elisabeth Haub School of Law Faculty Publications

This Article posits that the Williams Court properly upheld Congress' shift in focus from the images to the speech pandering them. The majority ruled that the inability to complete a crime because of a factual error is not a defense. Its reasoning should lay to rest lingering claims that child protection statutes require an actual child. Nevertheless, the Article explains that the Williams dissent essentially relied on legal impossibility in its finding that the PROTECT Act's pandering provision was unconstitutionally overbroad. In so doing, the dissent reflects the reluctance of many to accept the extent to which adults are seeking …