Open Access. Powered by Scholars. Published by Universities.®

Computer Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 26 of 26

Full-Text Articles in Computer Law

What's The Harm? Federalism, The Separation Of Powers, And Standing In Data Breach Litigation, Grayson Wells Apr 2021

What's The Harm? Federalism, The Separation Of Powers, And Standing In Data Breach Litigation, Grayson Wells

Indiana Law Journal

This Comment will argue that the Supreme Court should analyze standing in data breach litigation under a standard that is deferential to state statutory and common law. Specifically, federal standing analysis should look to state law when determining whether an injury is concrete such that the injury-in-fact requirement is met. Some argue that allowing more data breach cases to proceed to the merits could lead to an explosion of successful litigation and settlements, burdening the federal courts and causing economic losses for the breached businesses. These concerns may be valid. But if state law provides a remedy to the harm …


Global Cybersecurity, Surveillance, And Privacy: The Obama Administration's Conflicted Legacy, Peter Margulies Aug 2017

Global Cybersecurity, Surveillance, And Privacy: The Obama Administration's Conflicted Legacy, Peter Margulies

Indiana Journal of Global Legal Studies

To analyze the Obama administration's cyber efforts, this Article proposes a paradigm of stewardship with both discursive and structural dimensions. Discursive stewardship refers to the Executive's openness to dialogue with other stakeholders. Structural stewardship refers to the domestic and transnational distribution of decisional authority, including checks and balances that guard against the excesses of unilateral action. The Article concludes that the Obama administration made substantial progress in each of these realms. However, the outsized role of law enforcement agendas and dearth of clearly articulated checks on transnational surveillance drove headwinds that limited forward movement.


A Comprehensive Empirical Study Of Data Privacy, Trust, And Consumer Autonomy, Jay P. Kesan, Carol M. Hayes, Masooda N. Bashir Jan 2016

A Comprehensive Empirical Study Of Data Privacy, Trust, And Consumer Autonomy, Jay P. Kesan, Carol M. Hayes, Masooda N. Bashir

Indiana Law Journal

Modern society is driven by data. Data storage is practically unlimited with today’s technology, and analytical tools make it easy to find patterns and make predictions in a way that is very useful for private businesses and governments. These uses of digital data can raise considerable privacy issues that are of great concern to consumers. In this Article, we present and analyze the results of an extensive survey that we conducted to explore what people know, what people do, and what people want when it comes to privacy online.

Our survey is the first comprehensive examination of the intersection of …


Furtive Encryption: Power, Trusts, And The Constitutional Cost Of Collective Surveillance, Jeffrey L. Vagle Jan 2015

Furtive Encryption: Power, Trusts, And The Constitutional Cost Of Collective Surveillance, Jeffrey L. Vagle

Indiana Law Journal

Recent revelations of heretofore secret U.S. government surveillance programs have sparked national conversations about their constitutionality and the delicate balance between security and civil liberties in a constitutional democracy. Among the revealed policies asserted by the National Security Agency (NSA) is a provision found in the “minimization procedures” required under section 702 of the Foreign Intelligence Surveillance Act of 1978. This provision allows the NSA to collect and keep indefinitely any encrypted information collected from domestic communications—including the communications of U.S. citizens. That is, according to the U.S. government, the mere fact that a U.S. citizen has encrypted her electronic …


A New Approach To Digital Reader Privacy; State Regulations And Their Protection Of Digital Book Data, Andrew A. Proia Oct 2013

A New Approach To Digital Reader Privacy; State Regulations And Their Protection Of Digital Book Data, Andrew A. Proia

Indiana Law Journal

No abstract provided.


The Granting Clause And Intellectual Property Rights Management In Open-Source Software Licensing, Vikrant N. Vasudeva Apr 2013

The Granting Clause And Intellectual Property Rights Management In Open-Source Software Licensing, Vikrant N. Vasudeva

IP Theory

No abstract provided.


Data Protection Principles For The 21st Century, Fred H. Cate, Peter Cullen, Viktor Mayer-Schonberger Jan 2013

Data Protection Principles For The 21st Century, Fred H. Cate, Peter Cullen, Viktor Mayer-Schonberger

Books & Book Chapters by Maurer Faculty

This paper proposes revisions to the OECD Guidelines that include basic changes essential for the protection of individual privacy in the 21st century, while avoiding unnecessary restrictions on uses of personal information that are increasingly important.


Nato, Cyber Defense, And International Law, David P. Fidler, Richard Pregent, Alex Vandurme Jan 2013

Nato, Cyber Defense, And International Law, David P. Fidler, Richard Pregent, Alex Vandurme

Articles by Maurer Faculty

Cybersecurity threats pose challenges to individuals, corporations, states, and intergovernmental organizations. The emergence of these threats also presents international cooperation on security with difficult tasks. This essay analyzes how cybersecurity threats affect the North Atlantic Treaty Organization (NATO), which is arguably the most important collective defense alliance in the world.1 NATO has responded to the cyber threat in policy and operational terms (Part I), but approaches and shifts in cybersecurity policies create problems for NATO— problems that NATO principles, practices, and politics exacerbate in ways that will force NATO to address cyber threats more aggressively than it has done so …


Why Copyright Falls Behind The Requirement For Protecting Graphic User Interfaces: Case Studies On Limitations Of Copyright Protection For Guis In China, Ling Jin, Yihong Ying Oct 2012

Why Copyright Falls Behind The Requirement For Protecting Graphic User Interfaces: Case Studies On Limitations Of Copyright Protection For Guis In China, Ling Jin, Yihong Ying

IP Theory

No abstract provided.


An End To End-To-End? A Review Essay Of Barbara Van Schewick’S Internet Architecture And Innovation, Adam Candeub May 2012

An End To End-To-End? A Review Essay Of Barbara Van Schewick’S Internet Architecture And Innovation, Adam Candeub

Federal Communications Law Journal

Amidst much controversy, the FCC released its landmark "network neutrality" order in December 2010. This regulation prohibits Internet service providers, such as Verizon or Comcast, from discriminating in favor of traffic or content that they own or with which they are affiliated. Professor Barbara van Schewick's recently published book, Internet Architecture and Innovation, could not be timelier. Employing a variety of economic and technical arguments, van Schewick defends the type of regulation the FCC passed as necessary to preserve the Internet's potential for innovation. My central critique of Internet Architecture is its deployment of economic theories on one side of …


Openness, Intellectual Property And Standardization In The European Ict Sector, Carl Mair Jan 2012

Openness, Intellectual Property And Standardization In The European Ict Sector, Carl Mair

IP Theory

No abstract provided.


Restraining Amazon.Com's Orwellian Potential: The Computer Fraud And Abuse Act As Consumer Rights Legislation, Alicia C. Sanders Mar 2011

Restraining Amazon.Com's Orwellian Potential: The Computer Fraud And Abuse Act As Consumer Rights Legislation, Alicia C. Sanders

Federal Communications Law Journal

In 2009, Amazon.com decided to correct a potential copyright violation by deleting e-books by George Orwell and Ayn Rand from the Kindles of users who had already purchased the offending texts. Two of those users, Justin Gawronski and Antoine Bruguier, claimed that Amazon.com had violated the Computer Fraud and Abuse Act (CFAA) by accessing their Kindles without authorization. The plaintiffs also relied on other causes of action, including breach of contract and trespass to chattels. Although the dispute quickly settled, the Gawronski lawsuit remains a useful case study that shows why the CFAA is a useful protection for consumers. Recently, …


Privacy By Deletion: The Need For A Global Data Deletion Principle, Benjamin J. Keele Jan 2009

Privacy By Deletion: The Need For A Global Data Deletion Principle, Benjamin J. Keele

Indiana Journal of Global Legal Studies

With global personal information flows increasing, efforts have been made to develop principles to standardize data protection regulations. However, no set of principles has yet achieved universal adoption. This note proposes a principle mandating that personal data be securely destroyed when it is no longer necessary for the purpose for which it was collected. Including a data deletion principle in future data protection standards will increase respect for individual autonomy and decrease the risk of abuse of personal data. Though data deletion is already practiced by many data controllers, including it in legal data protection mandates will further the goal …


Maintaining Government Accountability: Calls For A "Public Use" Beyond Eminent Domain, Gregory S. Knapp Jul 2008

Maintaining Government Accountability: Calls For A "Public Use" Beyond Eminent Domain, Gregory S. Knapp

Indiana Law Journal

No abstract provided.


Prescriptive Jurisdiction Over Internet Activity: The Need To Define And Establish The Boundaries Of Cyberliberty, Samuel F. Miller Jul 2003

Prescriptive Jurisdiction Over Internet Activity: The Need To Define And Establish The Boundaries Of Cyberliberty, Samuel F. Miller

Indiana Journal of Global Legal Studies

No abstract provided.


The Changing Face Of Privacy Protection In The European Union And The United States, Fred H. Cate Jan 1999

The Changing Face Of Privacy Protection In The European Union And The United States, Fred H. Cate

Articles by Maurer Faculty

Among the wide variety of national and multinational legal regimes for protecting privacy, two dominant models have emerged, reflecting two very different approaches to the control of information. The European Union has enacted a sweeping data protection directive that imposes significant restrictions on most data collection, processing, dissemination, and storage activities, not only within Europe, but throughout the world if the data originates in a member state. The United States has taken a very different approach that extensively regulates government processing of data, while facilitating private, market-based initiatives to address private sector data processing.

Under the EU data protection directive, …


Controlling World Wide Web Links, Property Rights, Access Rights And Unfair Competition, Chris Reed Oct 1998

Controlling World Wide Web Links, Property Rights, Access Rights And Unfair Competition, Chris Reed

Indiana Journal of Global Legal Studies

No abstract provided.


Domain Names, Globalization, And Internet Governance, Marshall Leaffer Oct 1998

Domain Names, Globalization, And Internet Governance, Marshall Leaffer

Indiana Journal of Global Legal Studies

No abstract provided.


Cyberspatial Sovereignties: Offshore Finance, Digital Cash, And The Limits Of Liberalism, Bill Maurer Apr 1998

Cyberspatial Sovereignties: Offshore Finance, Digital Cash, And The Limits Of Liberalism, Bill Maurer

Indiana Journal of Global Legal Studies

No abstract provided.


Cyberspace, Sovereignty, Jurisdiction, And Modernism, Joel Trachtman Apr 1998

Cyberspace, Sovereignty, Jurisdiction, And Modernism, Joel Trachtman

Indiana Journal of Global Legal Studies

No abstract provided.


Computers As Agents: A Proposed Approach To Revised U.C.C. Article 2, John P. Fischer Apr 1997

Computers As Agents: A Proposed Approach To Revised U.C.C. Article 2, John P. Fischer

Indiana Law Journal

No abstract provided.


Fixation On Fixation: Why Imposing Old Copyright Law On New Technology Will Not Work, Douglas J. Mason Oct 1996

Fixation On Fixation: Why Imposing Old Copyright Law On New Technology Will Not Work, Douglas J. Mason

Indiana Law Journal

No abstract provided.


The Computer As Advocate: An Approach To Computer-Generated Displays In The Courtroom, Mario Borelli Apr 1996

The Computer As Advocate: An Approach To Computer-Generated Displays In The Courtroom, Mario Borelli

Indiana Law Journal

No abstract provided.


Law In Cyberspace, Fred H. Cate Jan 1996

Law In Cyberspace, Fred H. Cate

Articles by Maurer Faculty

No abstract provided.


Smart Agenting, Barry Diller Dec 1994

Smart Agenting, Barry Diller

Federal Communications Law Journal

No abstract provided.


The Patentability Of Computer Programs: Merrill Lynch's Patent For A Financial Services System, Lynne B. Allen Oct 1984

The Patentability Of Computer Programs: Merrill Lynch's Patent For A Financial Services System, Lynne B. Allen

Indiana Law Journal

No abstract provided.