Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Cybersecurity (4)
- Internet (4)
- Computers (3)
- Sovereignty (Political science) (3)
- All Other Telecommunications (2)
-
- Cyberspace (2)
- GPL (2)
- Globalization (2)
- Intellectual property (2)
- Jurisdiction (2)
- Licensing (2)
- Privacy (2)
- Right of privacy (2)
- 516 U.S. 233 (1)
- A Comprehensive Empirical Study (1)
- A better License for Open Source Software (1)
- Access Rights (1)
- Agency (Law) (1)
- Agency Paradigm (1)
- Amazon Kindle (1)
- Amazon.com (1)
- Apache License (1)
- Article 2 of the U.C.C. (1)
- Article 3(9) (1)
- Article 72 (1)
- Article 73 (1)
- Article 75 (1)
- Artistic License (1)
- Autonomy (Psychology) (1)
- BSD (1)
- Publication Year
- Publication
- Publication Type
Articles 1 - 26 of 26
Full-Text Articles in Computer Law
What's The Harm? Federalism, The Separation Of Powers, And Standing In Data Breach Litigation, Grayson Wells
What's The Harm? Federalism, The Separation Of Powers, And Standing In Data Breach Litigation, Grayson Wells
Indiana Law Journal
This Comment will argue that the Supreme Court should analyze standing in data breach litigation under a standard that is deferential to state statutory and common law. Specifically, federal standing analysis should look to state law when determining whether an injury is concrete such that the injury-in-fact requirement is met. Some argue that allowing more data breach cases to proceed to the merits could lead to an explosion of successful litigation and settlements, burdening the federal courts and causing economic losses for the breached businesses. These concerns may be valid. But if state law provides a remedy to the harm …
Global Cybersecurity, Surveillance, And Privacy: The Obama Administration's Conflicted Legacy, Peter Margulies
Global Cybersecurity, Surveillance, And Privacy: The Obama Administration's Conflicted Legacy, Peter Margulies
Indiana Journal of Global Legal Studies
To analyze the Obama administration's cyber efforts, this Article proposes a paradigm of stewardship with both discursive and structural dimensions. Discursive stewardship refers to the Executive's openness to dialogue with other stakeholders. Structural stewardship refers to the domestic and transnational distribution of decisional authority, including checks and balances that guard against the excesses of unilateral action. The Article concludes that the Obama administration made substantial progress in each of these realms. However, the outsized role of law enforcement agendas and dearth of clearly articulated checks on transnational surveillance drove headwinds that limited forward movement.
A Comprehensive Empirical Study Of Data Privacy, Trust, And Consumer Autonomy, Jay P. Kesan, Carol M. Hayes, Masooda N. Bashir
A Comprehensive Empirical Study Of Data Privacy, Trust, And Consumer Autonomy, Jay P. Kesan, Carol M. Hayes, Masooda N. Bashir
Indiana Law Journal
Modern society is driven by data. Data storage is practically unlimited with today’s technology, and analytical tools make it easy to find patterns and make predictions in a way that is very useful for private businesses and governments. These uses of digital data can raise considerable privacy issues that are of great concern to consumers. In this Article, we present and analyze the results of an extensive survey that we conducted to explore what people know, what people do, and what people want when it comes to privacy online.
Our survey is the first comprehensive examination of the intersection of …
Furtive Encryption: Power, Trusts, And The Constitutional Cost Of Collective Surveillance, Jeffrey L. Vagle
Furtive Encryption: Power, Trusts, And The Constitutional Cost Of Collective Surveillance, Jeffrey L. Vagle
Indiana Law Journal
Recent revelations of heretofore secret U.S. government surveillance programs have sparked national conversations about their constitutionality and the delicate balance between security and civil liberties in a constitutional democracy. Among the revealed policies asserted by the National Security Agency (NSA) is a provision found in the “minimization procedures” required under section 702 of the Foreign Intelligence Surveillance Act of 1978. This provision allows the NSA to collect and keep indefinitely any encrypted information collected from domestic communications—including the communications of U.S. citizens. That is, according to the U.S. government, the mere fact that a U.S. citizen has encrypted her electronic …
A New Approach To Digital Reader Privacy; State Regulations And Their Protection Of Digital Book Data, Andrew A. Proia
A New Approach To Digital Reader Privacy; State Regulations And Their Protection Of Digital Book Data, Andrew A. Proia
Indiana Law Journal
No abstract provided.
The Granting Clause And Intellectual Property Rights Management In Open-Source Software Licensing, Vikrant N. Vasudeva
The Granting Clause And Intellectual Property Rights Management In Open-Source Software Licensing, Vikrant N. Vasudeva
IP Theory
No abstract provided.
Data Protection Principles For The 21st Century, Fred H. Cate, Peter Cullen, Viktor Mayer-Schonberger
Data Protection Principles For The 21st Century, Fred H. Cate, Peter Cullen, Viktor Mayer-Schonberger
Books & Book Chapters by Maurer Faculty
This paper proposes revisions to the OECD Guidelines that include basic changes essential for the protection of individual privacy in the 21st century, while avoiding unnecessary restrictions on uses of personal information that are increasingly important.
Nato, Cyber Defense, And International Law, David P. Fidler, Richard Pregent, Alex Vandurme
Nato, Cyber Defense, And International Law, David P. Fidler, Richard Pregent, Alex Vandurme
Articles by Maurer Faculty
Cybersecurity threats pose challenges to individuals, corporations, states, and intergovernmental organizations. The emergence of these threats also presents international cooperation on security with difficult tasks. This essay analyzes how cybersecurity threats affect the North Atlantic Treaty Organization (NATO), which is arguably the most important collective defense alliance in the world.1 NATO has responded to the cyber threat in policy and operational terms (Part I), but approaches and shifts in cybersecurity policies create problems for NATO— problems that NATO principles, practices, and politics exacerbate in ways that will force NATO to address cyber threats more aggressively than it has done so …
Why Copyright Falls Behind The Requirement For Protecting Graphic User Interfaces: Case Studies On Limitations Of Copyright Protection For Guis In China, Ling Jin, Yihong Ying
Why Copyright Falls Behind The Requirement For Protecting Graphic User Interfaces: Case Studies On Limitations Of Copyright Protection For Guis In China, Ling Jin, Yihong Ying
IP Theory
No abstract provided.
An End To End-To-End? A Review Essay Of Barbara Van Schewick’S Internet Architecture And Innovation, Adam Candeub
An End To End-To-End? A Review Essay Of Barbara Van Schewick’S Internet Architecture And Innovation, Adam Candeub
Federal Communications Law Journal
Amidst much controversy, the FCC released its landmark "network neutrality" order in December 2010. This regulation prohibits Internet service providers, such as Verizon or Comcast, from discriminating in favor of traffic or content that they own or with which they are affiliated. Professor Barbara van Schewick's recently published book, Internet Architecture and Innovation, could not be timelier. Employing a variety of economic and technical arguments, van Schewick defends the type of regulation the FCC passed as necessary to preserve the Internet's potential for innovation. My central critique of Internet Architecture is its deployment of economic theories on one side of …
Openness, Intellectual Property And Standardization In The European Ict Sector, Carl Mair
Openness, Intellectual Property And Standardization In The European Ict Sector, Carl Mair
IP Theory
No abstract provided.
Restraining Amazon.Com's Orwellian Potential: The Computer Fraud And Abuse Act As Consumer Rights Legislation, Alicia C. Sanders
Restraining Amazon.Com's Orwellian Potential: The Computer Fraud And Abuse Act As Consumer Rights Legislation, Alicia C. Sanders
Federal Communications Law Journal
In 2009, Amazon.com decided to correct a potential copyright violation by deleting e-books by George Orwell and Ayn Rand from the Kindles of users who had already purchased the offending texts. Two of those users, Justin Gawronski and Antoine Bruguier, claimed that Amazon.com had violated the Computer Fraud and Abuse Act (CFAA) by accessing their Kindles without authorization. The plaintiffs also relied on other causes of action, including breach of contract and trespass to chattels. Although the dispute quickly settled, the Gawronski lawsuit remains a useful case study that shows why the CFAA is a useful protection for consumers. Recently, …
Privacy By Deletion: The Need For A Global Data Deletion Principle, Benjamin J. Keele
Privacy By Deletion: The Need For A Global Data Deletion Principle, Benjamin J. Keele
Indiana Journal of Global Legal Studies
With global personal information flows increasing, efforts have been made to develop principles to standardize data protection regulations. However, no set of principles has yet achieved universal adoption. This note proposes a principle mandating that personal data be securely destroyed when it is no longer necessary for the purpose for which it was collected. Including a data deletion principle in future data protection standards will increase respect for individual autonomy and decrease the risk of abuse of personal data. Though data deletion is already practiced by many data controllers, including it in legal data protection mandates will further the goal …
Maintaining Government Accountability: Calls For A "Public Use" Beyond Eminent Domain, Gregory S. Knapp
Maintaining Government Accountability: Calls For A "Public Use" Beyond Eminent Domain, Gregory S. Knapp
Indiana Law Journal
No abstract provided.
Prescriptive Jurisdiction Over Internet Activity: The Need To Define And Establish The Boundaries Of Cyberliberty, Samuel F. Miller
Prescriptive Jurisdiction Over Internet Activity: The Need To Define And Establish The Boundaries Of Cyberliberty, Samuel F. Miller
Indiana Journal of Global Legal Studies
No abstract provided.
The Changing Face Of Privacy Protection In The European Union And The United States, Fred H. Cate
The Changing Face Of Privacy Protection In The European Union And The United States, Fred H. Cate
Articles by Maurer Faculty
Among the wide variety of national and multinational legal regimes for protecting privacy, two dominant models have emerged, reflecting two very different approaches to the control of information. The European Union has enacted a sweeping data protection directive that imposes significant restrictions on most data collection, processing, dissemination, and storage activities, not only within Europe, but throughout the world if the data originates in a member state. The United States has taken a very different approach that extensively regulates government processing of data, while facilitating private, market-based initiatives to address private sector data processing.
Under the EU data protection directive, …
Controlling World Wide Web Links, Property Rights, Access Rights And Unfair Competition, Chris Reed
Controlling World Wide Web Links, Property Rights, Access Rights And Unfair Competition, Chris Reed
Indiana Journal of Global Legal Studies
No abstract provided.
Domain Names, Globalization, And Internet Governance, Marshall Leaffer
Domain Names, Globalization, And Internet Governance, Marshall Leaffer
Indiana Journal of Global Legal Studies
No abstract provided.
Cyberspatial Sovereignties: Offshore Finance, Digital Cash, And The Limits Of Liberalism, Bill Maurer
Cyberspatial Sovereignties: Offshore Finance, Digital Cash, And The Limits Of Liberalism, Bill Maurer
Indiana Journal of Global Legal Studies
No abstract provided.
Cyberspace, Sovereignty, Jurisdiction, And Modernism, Joel Trachtman
Cyberspace, Sovereignty, Jurisdiction, And Modernism, Joel Trachtman
Indiana Journal of Global Legal Studies
No abstract provided.
Computers As Agents: A Proposed Approach To Revised U.C.C. Article 2, John P. Fischer
Computers As Agents: A Proposed Approach To Revised U.C.C. Article 2, John P. Fischer
Indiana Law Journal
No abstract provided.
Fixation On Fixation: Why Imposing Old Copyright Law On New Technology Will Not Work, Douglas J. Mason
Fixation On Fixation: Why Imposing Old Copyright Law On New Technology Will Not Work, Douglas J. Mason
Indiana Law Journal
No abstract provided.
The Computer As Advocate: An Approach To Computer-Generated Displays In The Courtroom, Mario Borelli
The Computer As Advocate: An Approach To Computer-Generated Displays In The Courtroom, Mario Borelli
Indiana Law Journal
No abstract provided.
Law In Cyberspace, Fred H. Cate
Smart Agenting, Barry Diller
The Patentability Of Computer Programs: Merrill Lynch's Patent For A Financial Services System, Lynne B. Allen
The Patentability Of Computer Programs: Merrill Lynch's Patent For A Financial Services System, Lynne B. Allen
Indiana Law Journal
No abstract provided.