Open Access. Powered by Scholars. Published by Universities.®

Computer Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 18 of 18

Full-Text Articles in Computer Law

Panel I: Cyber Regulation, Asaf Lubin, Gregory M. Dickinson, Thomas E. Kadri Mar 2023

Panel I: Cyber Regulation, Asaf Lubin, Gregory M. Dickinson, Thomas E. Kadri

Georgia Law Review Symposia

Panel discussion on cyber regulation with Professors Asaf Lubin, Indiana-Bloomington Law, and Gregory Dickinson, St. Thomas Law. Moderated by Georgia Law Professor Thomas Kadri.


Privacy Is Not Dead: Expressively Using Law To Push Back Against Corporate Deregulators And Meaningfully Protect Data Privacy Rights, Alexander F. Krupp Mar 2023

Privacy Is Not Dead: Expressively Using Law To Push Back Against Corporate Deregulators And Meaningfully Protect Data Privacy Rights, Alexander F. Krupp

Georgia Law Review

When the European Union’s (EU) General Data Protection Regulation (GDPR) passed in 2016, it represented the world’s first major comprehensive data privacy law and kicked off a conversation about how we think about the right to privacy in the modern age. The law granted a broad range of rights to EU citizens, including a right to have companies delete data they collect about you, a right not to have your personal information sold, and a range of other rights all geared towards individual autonomy over personal data. All the while, platform companies like Facebook (Meta), Apple, and Amazon have taken …


Institutional Doxing And Attribution: Searching For Solutions To A Law-Free Zone, Kimberlee Styple Jan 2022

Institutional Doxing And Attribution: Searching For Solutions To A Law-Free Zone, Kimberlee Styple

Georgia Journal of International & Comparative Law

No abstract provided.


Networks Of Empathy, Thomas E. Kadri Jan 2020

Networks Of Empathy, Thomas E. Kadri

Scholarly Works

Digital abuse is on the rise. People increasingly use technology to perpetrate and exacerbate abusive conduct like stalking and harassment, manipulating digital tools to control and harm their victims. By some accounts, 95% of domestic-abuse cases involve technology, while a sizeable chunk of the U.S. population now admits to having suffered or perpetrated serious abuse online. To make matters worse, people often trivialize digital abuse or underestimate its prevalence. Even among those who do appreciate its severity, there remains ample disagreement about how to address it.

Although law can be a powerful tool to regulate digital abuse, legal responses are …


All Blogs Go To Heaven: Preserving Valuable Digital Assets Without The Uniform Fiduciary Access To Digital Assets Act's Removal Of Third Party Privacy Protections, Elizabeth D. Barwick Jan 2016

All Blogs Go To Heaven: Preserving Valuable Digital Assets Without The Uniform Fiduciary Access To Digital Assets Act's Removal Of Third Party Privacy Protections, Elizabeth D. Barwick

Georgia Law Review

In the age of the Internet, most of us live our lives largely online. As such, one would expect a concomitant increase in concern for privacy, but this is not necessarily the case. It seems that the instantaneous and anonymous nature of the Internet has given rise to thoughtless sharing that simply did not exist when it was necessary to put pen to paper. Understanding that a great deal of our day-to-day activities are now carried out over the Internet, it makes sense that our families and heirs would want or need access to our accounts in the event of …


Cybersecurity On My Mind: Protecting Georgia Consumers From Data Breaches, Maggie L. Mcmichael Jan 2016

Cybersecurity On My Mind: Protecting Georgia Consumers From Data Breaches, Maggie L. Mcmichael

Georgia Law Review

In a world where vast amounts of personal information
are obtained and stored by countless organizations and
businesses in the public and private sector, data breaches,

due to negligence or nefarious hacking, are a far too
common occurrence. The results of a data breach can be
serious and widespread, from public humiliation to
identity theft and national security crises. In an effort to
protect consumers from the potentially devastating effects
of data breaches, the Federal Trade Commission has
begun to take enforcement action against businesses whose
data security practices are alleged to be unfair and
deceptive. Theoretically, states can take …


Managing Cyber Risks, Kristin N. Johnson Jan 2016

Managing Cyber Risks, Kristin N. Johnson

Georgia Law Review

Cyber risks are as pervasive as the technology that facilitates their execution. The threat of cyber attacks or plots to deploy cyber weapons against critical government entities, private businesses and domestic and international infrastructure resources creates a most significant risk management concern. Pernicious,perilous and ubiquitous, cyber risks have merged as the newest risk management frontier. While the consequences of cyber attacks against individual financial institutions may be alarming, the interconnectedness of the largest financial institutions in the global economy and their shared dependence on technology render these businesses and the systems that execute their transactions shockingly vulnerable. Because of the …


Personal Property Servitudes On The Internet Of Things, Christina Mulligan Jan 2016

Personal Property Servitudes On The Internet Of Things, Christina Mulligan

Georgia Law Review

Small appliances such as thermostats, watches, jewelry, and eyewear are now being made available with networking capability. These networked objects make up the growing Internet of Things-pieces of personal property that run software and connect to the global Internet. These products are typically governed by terms of service or end-user license agreements that create restrictions on how products can be used or transferred- restrictions which would be unenforceable if the inside of the product consisted of gears rather than processing chips. This Article explores the question of when use and transfer restrictions should be enforceable on networked appliances and other …


No. 9 - Cybersecurity And National Defense: Building A Public-Private Partnership, Rebecca H. White, C. Donald Johnson, Loch K. Johnson, Quentin E. Hodgson, Jamil Jaffer, Clete D. Johnson, Victoria Woodbine, Timothy L. Meyer, Adam Golodner, Barry Hensley, Andrea Matwyshyn, Jacob Olcott Apr 2015

No. 9 - Cybersecurity And National Defense: Building A Public-Private Partnership, Rebecca H. White, C. Donald Johnson, Loch K. Johnson, Quentin E. Hodgson, Jamil Jaffer, Clete D. Johnson, Victoria Woodbine, Timothy L. Meyer, Adam Golodner, Barry Hensley, Andrea Matwyshyn, Jacob Olcott

Occasional Papers Series

Organized and sponsored by the Dean Rusk Center for International Law and Policy, Cybersecurity and National Defense: Building a Public-Private Partnership was a daylong conference exploring issues related to the national security dimensions of cyber attacks as well as the role of the private sector in addressing cybersecurity risks. The overarching theme was the scope of public-private collaboration in addressing cybersecurity risks and the potential for future cooperation between government and the private sector. Clete D. Johnson, Chief Counsel for Cybersecurity at the Federal Communications Commission gave a lunchtime address on the FCC’s approach to communications security in the Internet …


Cyber Risks: Emerging Risk Management Concerns For Financial Institutions, Kristin N. Johnson Jan 2015

Cyber Risks: Emerging Risk Management Concerns For Financial Institutions, Kristin N. Johnson

Georgia Law Review

Rumors posit that, within the last two years, hackers caused outages, disrupting service for the two largest securities exchanges in the world-the NASDAQ and the New York Stock Exchange.

Disappointingly, regulatory reform is often backward-looking. While regulators toil to implement rules to prevent the last crisis from reocurring, new and more perilous threats evade detection. With increasing frequency, cyberattacks threaten critical infrastructure resources such as nuclear centrifuges, electrical grids, and air defense systems. Cyberattacks pose a burgeoning and underexplored universe of emerging concerns impacting areas as diverse as big-box retail stores, casual-dining chains, online retail auctions, and national security. Even …


International Cyberspace: From Borderless To Balkanized???, Beverley Earle, Gerald A. Madek Sep 2014

International Cyberspace: From Borderless To Balkanized???, Beverley Earle, Gerald A. Madek

Georgia Journal of International & Comparative Law

No abstract provided.


Digital Music Sampling And Copyright Policy - A Bittersweet Symphony? Assessing The Continued Legality Of Music Sampling In The United Kingdom, The Netherlands, And The United States, Melissa Hahn Sep 2014

Digital Music Sampling And Copyright Policy - A Bittersweet Symphony? Assessing The Continued Legality Of Music Sampling In The United Kingdom, The Netherlands, And The United States, Melissa Hahn

Georgia Journal of International & Comparative Law

No abstract provided.


Voice Over Internet Protocol: An International Approach To Regulation, Jimar Sanders Sep 2014

Voice Over Internet Protocol: An International Approach To Regulation, Jimar Sanders

Georgia Journal of International & Comparative Law

No abstract provided.


Chain-Link Confidentiality, Woodrow Hartzog Jan 2012

Chain-Link Confidentiality, Woodrow Hartzog

Georgia Law Review

Disclosing personal information online often feels like
losing control over one's data forever; but it does not have
to be that way. This Essay proposes a "chain-link
confidentiality" approach to protecting online privacy.
One of the most difficult challenges to guarding privacy in
the digital age is the protection of information once it is
exposed to other people. A chain-link confidentiality
regime would link the disclosure of personal information
to obligations to protect that information as the
information moves downstream. It would focus on the
relationships not only between the discloser of information
and the initial recipient but also between …


To Reveal Or Conceal?—An Isp’S Dilemma, Presenting A New “Anonymous Public Concern Test” For Evaluating Isp Subpoenas In Online Defamation Suits, Cayce Myers Jan 2011

To Reveal Or Conceal?—An Isp’S Dilemma, Presenting A New “Anonymous Public Concern Test” For Evaluating Isp Subpoenas In Online Defamation Suits, Cayce Myers

LLM Theses and Essays

This article proposes a new test called the “Anonymous Public Concern Test” which incorporates public concern analysis in enforcing Internet Service Provider [ISP] subpoenas in online defamation suits. Anonymous speech is an important aspect of First Amendment rights that warrants protection. Current tests used by courts to analyze whether to enforce ISP subpoenas are either too pro-plaintiff or too pro-defendant. The article’s proposed “Anonymous Public Concern Test” is the best approach in dealing with ISP subpoenas because it protects both anonymous speeches and preserves online defamation plaintiffs’ rights.


Protecting Children From The Dark Side Of The Internet, Anne Dupre, John Dayton, Christine Kiracofe Jan 2006

Protecting Children From The Dark Side Of The Internet, Anne Dupre, John Dayton, Christine Kiracofe

Scholarly Works

This article examines the history of judicial and legislative responses to the issue of consumption of pornography and other harmful materials over the Internet by children. The article begins by giving a brief overview of free speech law in the US. Next, summaries of relevant U.S. legislation and corresponding litigation on Internet free speech are given. Highlighted are: 1) the Communications Decency Act (CDA) and the U.S. Supreme Court’s response in Reno v. ACLU; 2) The Child Pornography Prevention Act (CPPA) and Ashcroft v. Free Speech Coalition; 3) the Children’s Internet Protection Act (CIPA) and United States v. American …


Securities Disclosure Regime - Challenges Posed By The Internet And Technology, Thomas Thomas Thoppil Jan 2000

Securities Disclosure Regime - Challenges Posed By The Internet And Technology, Thomas Thomas Thoppil

LLM Theses and Essays

This thesis is an effort to evaluate the structural changes that have taken place in the securities market of the United States and its impact on securities disclosure regime mandated by the Federal Securities Act. Part 2 of the thesis discusses the securities disclosure regime and its underlying economic theories. This part also traces the challenges posed by technology and takes a quick look at the argument that the traditional norms are incompatible in dealing with those challenges. Part 3 deals primarily with structural developments in the securities market over the past five years by examining some of the innovative …


Legal Aspects Of The Internet, Etienne Pichat Jan 1997

Legal Aspects Of The Internet, Etienne Pichat

LLM Theses and Essays

This thesis will explain the legal aspects of the Internet so that users who wish to protect their rights and avoid liability can log on with a better understanding of the rules of the game. This work will be divided into two chapters. The first chapter will focus on existing legal regulation of the Internet to advise users on which law is relevant, and how to solve problems of conflicts of laws in the cyberworld. It will answer the question of whether cyberspace is, or not, a "no laws land", and what kind of regulation would better fit the cyberworld. …