Open Access. Powered by Scholars. Published by Universities.®

Computer Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 19 of 19

Full-Text Articles in Computer Law

Uso Social Del Suelo Ejidal Y Comunal Para El Desarrollo Equilibrado De Las Áreas Urbanas Del Estado De Puebla, Bruno L. Costantini García Nov 2010

Uso Social Del Suelo Ejidal Y Comunal Para El Desarrollo Equilibrado De Las Áreas Urbanas Del Estado De Puebla, Bruno L. Costantini García

Bruno L. Costantini García

De origen, difundir los diversos esquemas permitidos por la Ley para posibilitar la realización de proyectos con fines inmobiliarios, a efecto de que los núcleos agrarios y sus integrantes se beneficien equitativamente de la urbanización de sus tierras, coadyuvando con ello al desarrollo urbano planificado y ordenado de los centros de población del Estado de Puebla; como consecuencia, impulsar el desarrollo habitacional equilibrado de éste. Eliminar el circulo.- “necesidad de tierra – asentamiento irregular – solución de conflicto”, mediante la planeación socioeconómico de los núcleos agrarios ejidales y comunales, a fin de diseñar un mecanismo eficaz que satisfaga las necesidades …


Llm Cyberlaw: Information Technology, Law And Society, Subhajit Basu Oct 2010

Llm Cyberlaw: Information Technology, Law And Society, Subhajit Basu

Subhajit Basu

LLM in Cyberlaw: information technology, law and society enables you to develop knowledge and skills in relation to the legal rules regulating cyberlaw activity in the UK and Europe, and at a global level.


Los Derechos De Autor Y El Dominio Público, Rodolfo C. Rivas Rea Esq. Sep 2010

Los Derechos De Autor Y El Dominio Público, Rodolfo C. Rivas Rea Esq.

Rodolfo C. Rivas

The author discusses the subtle differences between Copyright and Author's Rights. Then he goes into analyzing the different ways a work can become part of the public domain and how it varies from jurisdiction to jurisdiction and from time to time.////////////////////////////////////////////////////El autor analiza las sutiles diferencias entre los derechos de autor y el copyright. Posteriormente se adentra en el análisis de las formas en las que una obra entra dentro del dominio público, y como estas varían dependiendo del territorio y de la época.


A Fair Use Project For Australia: Copyright Law And Creative Freedom, Matthew Rimmer Sep 2010

A Fair Use Project For Australia: Copyright Law And Creative Freedom, Matthew Rimmer

Matthew Rimmer

This essay provides a critical assessment of the Fair Use Project based at the Stanford Center for Internet and Society. In evaluating the efficacy of the Fair Use Project, it is worthwhile considering the litigation that the group has been involved in, and evaluating its performance. Part 1 outlines the history of the Stanford Center for Internet and Society, and the aims and objectives of the Fair Use Project. Part 2 considers the litigation in Shloss v. Sweeney over a biography concerning Lucia Joyce, the daughter of the avant-garde literary great, James Joyce. Part 3 examines the dispute over the …


Delimitación Téorica Del Delito Penal Fiscal, Bruno L. Costantini García Jul 2010

Delimitación Téorica Del Delito Penal Fiscal, Bruno L. Costantini García

Bruno L. Costantini García

Anális de los elementos constitutivos del delito fiscal, la acción delictiva, los grados de ejecución, la consumación y los responsables.

Pretende distinguir el delito penal común del delito penal fiscal con base en sus elementos y pretende aportar una reflexión de la criminalización del delito fiscal en nuestros tiempos, usado por la Autoridad Hacendaria como un medio de represíón y de opresión de los derechos del contribuyente.


La Globalización De La Legislación Cambiaria, Bruno L. Costantini García Jun 2010

La Globalización De La Legislación Cambiaria, Bruno L. Costantini García

Bruno L. Costantini García

No abstract provided.


New Rules On Consumer Protection Against Personal Data Breaches And Spam, Panagiotis Kitsos, Paraskevi Pappas May 2010

New Rules On Consumer Protection Against Personal Data Breaches And Spam, Panagiotis Kitsos, Paraskevi Pappas

Panagiotis Kitsos

On 25 November 2009, the European Parliament and Council adopted a new legislation to revise the regulatory framework for the electronic communications sector. This new “package” of Directives includes Directive 2009/136/EC, which amends earlier Directive 2002/58/EC in the fields of 1. mandatory notification of personal data security breaches 2. consent requirements for cookies and 3. anti-spamming measures by ISPs. The scope of the Directive is to enhance the protection of consumers privacy and personal data in the electronic communications sector, through strengthened security-related provisions and improved enforcement mechanisms by the NRAs. In particular Τhe provisions of the new directive require …


Protección De Datos Personales, Bruno L. Costantini García, Norma E. Pimentel Méndez Apr 2010

Protección De Datos Personales, Bruno L. Costantini García, Norma E. Pimentel Méndez

Bruno L. Costantini García

Introducción a la regulación de la protección de datos personales en México.


Saving Journalism From Itself? Hot News, Copyright Fair Use And News Aggregation, Joseph Liu Apr 2010

Saving Journalism From Itself? Hot News, Copyright Fair Use And News Aggregation, Joseph Liu

Joseph P. Liu

Served as a panelist at a conference at Harvard Law School on "Journalism's Digital Transition: Unique Legal Challenges and Opportunities," sponsored by the Berkman Center for Internet and Society.


An Illustration Of Hashing And Its Effect On Illegal File Content In The Digital Age, Stephen Hoffman Apr 2010

An Illustration Of Hashing And Its Effect On Illegal File Content In The Digital Age, Stephen Hoffman

Stephen P. Hoffman

I aim to show, through practical examples, that computer forensics techniques such as the use of hash values are inherently flawed in tracking illegal computer files. First, I describe the underlying theory of hashing algorithms and hash values, as well as explain that several U.S. government agencies keep detailed file databases in order to track or detect illegal files, e.g. pirated media or child pornography. These databases include the file’s unique hash values. Then, I provide real examples of hash values using MD5 and SHA-1 hashing algorithms to show how extremely minor alterations to a computer file produce radically different …


Derecho De La Seguridad Social En México, Bruno L. Costantini García Feb 2010

Derecho De La Seguridad Social En México, Bruno L. Costantini García

Bruno L. Costantini García

Breve presentación del Derecho de la Segurida Social en México.

¿Qué es?

¿Cómo funciona?

¿Su aplicación?


The Copenhagen Accord And Climate Innovation Centres, Matthew Rimmer Jan 2010

The Copenhagen Accord And Climate Innovation Centres, Matthew Rimmer

Matthew Rimmer

After much hue and cry, the Copenhagen negotiations over intellectual property and climate change ended in a stalemate and an impasse. There was a gulf between the views of intellectual property maximalists who demanded strong protection of intellectual property rights in respect of clean technologies; and nation states and civil society groups calling for special measures to facilitate technology transfer. As a result, the Copenhagen Accord did contain any text on intellectual property and climate change. Nonetheless, the Copenhagen Accord does, though, contain an important compromise. The text provides for a technology mechanism, which envisages a network of Climate Innovation …


Civilians In Cyberwarfare: Casualties, Susan W. Brenner, Leo L. Clarke Jan 2010

Civilians In Cyberwarfare: Casualties, Susan W. Brenner, Leo L. Clarke

Susan Brenner

This article is a sequel to Civilians in Cyberwarfare: Conscripts, to be published by the Vanderbilt Journal of Transnational Law. Conscripts addresses the essential role of civilians as participants in cyberwarfare. Here, we explore the potential losses cyberwarfare might cause to civilian entities, including multi-national corporations, utilities, universities and local governments. We explain why cyberwarfare presents unique risks and requires unique executive responses. We also analyze how civilians should manage specific legal liability, political and reputational risks. Finally, we consider whether civilians can expect compensation if the federal government imposes new regulations, appropriates intellectual property, or even conscripts entire businesses …


Civilians In Cyberwarfare: Conscripts, Susan W. Brenner, Leo L. Clarke Jan 2010

Civilians In Cyberwarfare: Conscripts, Susan W. Brenner, Leo L. Clarke

Susan Brenner

Civilians will play an integral role in cyberwar because civilian-owned and –operated entities will be a primary target in cyberwarfare. An attacker’s goal in cyberwar is not to capture physical territory but to erode, even destroy, the target nation’s viability as an economy and, indeed, as a sovereign entity. To do that, a cyberattacker will target the companies that own and operate aspects of the victim nation’s critical infrastructure; those civilians will need to be incorporated into a defensive cyberwarfare response structure if such a response is to be effective. We explain why the use of civilians is essential and …


Context Is Everything: Sociality And Privacy In Online Social Network Sites, Ronald Leenes Jan 2010

Context Is Everything: Sociality And Privacy In Online Social Network Sites, Ronald Leenes

Ronald Leenes

Social Network Sites (SNSs) pose many privacy issues. Apart from the fact that privacy in an online social network site may sound like an oxymo- ron, significant privacy issues are caused by the way social structures are currently handled in SNSs. Conceptually different social groups are generally conflated into the singular notion of ‘friend’. This chapter argues that attention should be paid to the social dynamics of SNSs and the way people handle social contexts. It shows that SNS technology can be designed to support audience segregation, which should mitigate at least some of the privacy issues in Social Network …


Fixing Ram Copies, Aaron K. Perzanowski Jan 2010

Fixing Ram Copies, Aaron K. Perzanowski

Aaron K. Perzanowski

Scholars, litigants, and courts have debated the status of so-called “RAM copies” - instantiations of copyrighted works in the random access memory of computing devices - for decades. The Second Circuit’s decision in Cartoon Network v. CSC Holdings has recently reignited the controversy over these putative copies. There the court held that CSC did not create copies within the meaning of the Copyright Act when it buffered fleeting segments of television programs. In many respects, the Second Circuit’s holding is a straightforward application of the Act’s nested definitions of “copies” and “fixed.” But because the court declined to apply the …


An Evolutionary Study Of Cloud Computing Services Privacy Terms, Konstantinos Stylianou Jan 2010

An Evolutionary Study Of Cloud Computing Services Privacy Terms, Konstantinos Stylianou

Konstantinos Stylianou

This paper presents an empirical study on the evolution of privacy terms of cloud computing services. The purpose is to see whether the transition to cloud computing also means that users are bound by more intrusive terms of use that pose a greater threat to their privacy. In that direction several typical cloud services (e.g. GoogleDocs, Amazon EC2) are examined from their start of operation till today and numerous versions of their privacy terms are juxtaposed in an effort to pinpoint and interpret the differences between them. The paper concludes that with the spread of cloud computing services more and …


An Interpretive Framework For Narrower Immunity Under Section 230 Of The Communications Decency Act, Gregory M. Dickinson Jan 2010

An Interpretive Framework For Narrower Immunity Under Section 230 Of The Communications Decency Act, Gregory M. Dickinson

Gregory M Dickinson

Almost all courts to interpret Section 230 of the Communications Decency Act have construed its ambiguously worded immunity provision broadly, shielding Internet intermediaries from tort liability so long as they are not the literal authors of offensive content. Although this broad interpretation effects the basic goals of the statute, it ignores several serious textual difficulties and mistakenly extends protection too far by immunizing even direct participants in tortious conduct.

This analysis, which examines the text and history of Section 230 in light of two strains of pre-Internet vicarious liability defamation doctrine, concludes that the immunity provision of Section 230, though …


Dr. Generative Or: How I Learned To Stop Worrying And Love The Iphone, James Grimmelmann, Paul Ohm Dec 2009

Dr. Generative Or: How I Learned To Stop Worrying And Love The Iphone, James Grimmelmann, Paul Ohm

James Grimmelmann

In The Future of the Internet--And How to Stop It, Jonathan Zittrain argues that the Internet has succeeded because it is uniquely "generative": individuals can use it in ways its creators never imagined. This Book Review uses the Apple II and the iPhone--the hero and the villain of the story as Zittrain tells it--to show both the strengths and the weaknesses of his argument. Descriptively and normatively, Zittrain has nailed it. Generativity elegantly combines prior theories into a succinct explanation of the technical characteristics that make the Internet what it is, and the book offers a strong argument that preserving …