Open Access. Powered by Scholars. Published by Universities.®

Computer Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Discipline
Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 3331 - 3360 of 4589

Full-Text Articles in Computer Law

Carousel Fraud In The Eu: A Digital Vat Solution, Richard Thompson Ainsworth May 2006

Carousel Fraud In The Eu: A Digital Vat Solution, Richard Thompson Ainsworth

Faculty Scholarship

Recent reports from the UK's Office for National Statistics estimate (as of May 11, 2006) that Missing Trader Intra-community Fraud (MTIC) may exceed 10 billion pounds this year.

Carousel fraud, a variant of MTIC where the same goods are sold over and over again, exploits the lingering non-certified, non-digital attributes of the EU VAT. The UK believes that carousel fraud cost the Exchequer between 1.12 and 1.9 billion pounds in the 2004-05 financial year. This article proposes that carousel fraud be eliminated in the EU through selective insertion of Digital VAT functionality into the present system. In other words, it …


Privacy And Access To Public Records In The Information Age, Sol Bermann May 2006

Privacy And Access To Public Records In The Information Age, Sol Bermann

ExpressO

Online public record access brings a wealth of benefits ranging from greater government access and accountability to increased cost-savings and efficiencies. However, due to the presence of highly sensitive, personal data, an increase in public records access also brings potential dangers, including heightened risk of identity theft and frivolous snooping into the affairs of others.

Historically, public records have had some measure of public accessibility in order to empower citizens with the ability to observe the goings-on of government, leading to greater government accountability. Until the rise of the internet, citizens have had their privacy protected through practical obscurity (the …


Paper Session V: Forensic Software Tools For Cell Phone Subscriber Identity Modules, Wayne Jansen, Rick Ayers Apr 2006

Paper Session V: Forensic Software Tools For Cell Phone Subscriber Identity Modules, Wayne Jansen, Rick Ayers

Annual ADFSL Conference on Digital Forensics, Security and Law

Cell phones and other handheld devices incorporating cell phone capabilities (e.g., smart phones) are ubiquitous. Besides placing calls, cell phones allow users to perform other tasks such as text messaging and phonebook entry management. When cell phones and cellular devices are involved in a crime or other incident, forensic specialists require tools that allow the proper retrieval and speedy examination of data present on the device. For devices conforming to the Global System for Mobile Communications (GSM) standards, certain data such as dialed numbers, text messages, and phonebook entries are maintained on a Subscriber Identity Module (SIM). This paper gives …


Paper Session V: Steganography And Terrorist Communications - Current Information And Trends - Tools, Analysis And Future Directions In Steganalysis In Context With Terrorists And Other Criminals, William Eyre, Marcus Rogers Apr 2006

Paper Session V: Steganography And Terrorist Communications - Current Information And Trends - Tools, Analysis And Future Directions In Steganalysis In Context With Terrorists And Other Criminals, William Eyre, Marcus Rogers

Annual ADFSL Conference on Digital Forensics, Security and Law

In ancient times, users communicated using steganography, “…derived from the Greek words steganos, meaning ‘covered’, and graphein, meaning ‘to write.’” (Singh, 1999, p.5) Steganography facilitates secret, undetected communication. In modern times, in the context of the Global War on Terror, national intelligence and law enforcement agencies need tools to detect hidden information (steganography) in various types of media, most specifically to uncover the placement of hidden information in images. This paper will look at steganography in general terms, presenting the theory of some common steganographic techniques and touching on some theoretical work in steganography. Then a discussion of how to …


Paper Session Iv: Toward Understanding Digital Forensics As A Profession: Defining Curricular Needs (***Research In Process ***), Michelle Wolf, Alan Shafer, Michael Gendron Apr 2006

Paper Session Iv: Toward Understanding Digital Forensics As A Profession: Defining Curricular Needs (***Research In Process ***), Michelle Wolf, Alan Shafer, Michael Gendron

Annual ADFSL Conference on Digital Forensics, Security and Law

This research paper presents research in process which attempts to define the common body of knowledge (CBK) of digital forensics. Digital forensics is not well defined not does it have a generally accepted CBK. The first three phases of completed research, in a four-phase research process are discussed. The early results have created a preliminary CBK, and final validation is underway.


Paper Session Iv: Development And Delivery Of Coursework - The Legal/Regulatory/Policy Environment Of Cyberforensics, John W. Bagby, John C. Ruhnka Apr 2006

Paper Session Iv: Development And Delivery Of Coursework - The Legal/Regulatory/Policy Environment Of Cyberforensics, John W. Bagby, John C. Ruhnka

Annual ADFSL Conference on Digital Forensics, Security and Law

This paper describes a cyber-forensics course that integrates important public policy and legal issues as well as relevant forensic techniques. Cyber-forensics refers to the amalgam of multi-disciplinary activities involved in the identification, gathering, handling, custody, use and security of electronic files and records, involving expertise from the forensic domain, and which produces evidence useful in the proof of facts for both commercial and legal activities. The legal and regulatory environment in which electronic discovery takes place is of critical importance to cyber-forensics experts because the legal process imposes both constraints and opportunities for the effective use of evidence gathered through …


Paper Session Iii: Research Brief: A Curriculum For Teaching Information Technology Investigative Techniques For Auditors, Grover S. Kearns, Elizabeth V. Mulig Apr 2006

Paper Session Iii: Research Brief: A Curriculum For Teaching Information Technology Investigative Techniques For Auditors, Grover S. Kearns, Elizabeth V. Mulig

Annual ADFSL Conference on Digital Forensics, Security and Law

Recent prosecutions of highly publicized white-collar crimes combined with public outrage have resulted in heightened regulation and greater emphasis on systems of internal control. Because both white-collar and cybercrimes are usually perpetrated through computers, auditors’ knowledge of information technology (IT) is now more vital than ever. However, preserving digital evidence and investigative techniques, which can be essential to fraud examinations, are not skills frequently taught in accounting programs. Furthermore, many students are not instructed in the use of computer assisted auditing tools and techniques – applications that might uncover fraudulent activity. Only a limited number of university-level accounting classes provide …


Paper Session Ii: Forensic Scene Documentation Using Mobile Technology, Ibrahim Baggili Apr 2006

Paper Session Ii: Forensic Scene Documentation Using Mobile Technology, Ibrahim Baggili

Annual ADFSL Conference on Digital Forensics, Security and Law

This paper outlines a framework for integrating forensic scene documentation with mobile technology. Currently there are no set standards for documenting a forensic scene. Nonetheless, there is a conceptual framework that forensic scientists and engineers use that includes note taking, scene sketches, photographs, video, and voice interview recordings. This conceptual framework will be the basis that a mobile forensic scene documentation software system is built on. A mobile software system for documenting a forensic scene may help in standardizing forensic scene documentation by regulating the data collection and documentation processes for various forensic disciplines.


Identity Theft And Consumer Protection: Finding Sensible Approaches To Safeguard Personal Data In The United States And Canada, Kamaal Zaidi Apr 2006

Identity Theft And Consumer Protection: Finding Sensible Approaches To Safeguard Personal Data In The United States And Canada, Kamaal Zaidi

ExpressO

This paper examines identity theft in both the United States and Canada. Various examples of commercial fraud and scams are discussed in the context of a growing trend of identity thieves assuming identities of innocent consumers. As such, various pieces of legislation and consumer initiatives (involving online consumer complaint mechanisms)in U.S. and Canadian jurisdictions are highlighted to demonstrate the pursuit towards broader consumer protection of personal data used in daily commercial transactions. The author argues that these modern efforts to safeguard consumers from identity theft is a progressive measure that will continue to afford increasing protections for consumer personal data, …


Opening Bottlenecks: On Behalf Of Mandated Network Neutrality, Bill D. Herman Apr 2006

Opening Bottlenecks: On Behalf Of Mandated Network Neutrality, Bill D. Herman

ExpressO

This paper calls for mandated “network neutrality,” the principle that broadband service providers (BSPs) should generally treat all nondestructive data equally. Without such a mandate, BSPs will likely begin charging content providers for the right to send data at the fastest speeds available. The present frequency with which BSPs block some data entirely will also likely increase.

Neutral networks are preferable for two key reasons. First, they spawn innovation, as illustrated by the explosive online innovation to date. Second, neutral networks better distribute communication power, promoting First Amendment values. Extant and likely future acts of discrimination erode both goals. The …


The Spy Act: Ditching Damages As An Element Of Liability For On-Line Conduct Between Private Parties?, Andrew T. Braff Apr 2006

The Spy Act: Ditching Damages As An Element Of Liability For On-Line Conduct Between Private Parties?, Andrew T. Braff

Washington Journal of Law, Technology & Arts

The question of how to stymie the proliferation of spyware on computers has been a recurring topic of debate in Congress and in the technology industry. With the passage of the SPY ACT (H.R. 29) a high probability, this article highlights its prohibitions, with particular emphasis on how they change current legal regimes. Most federal computer statutes—insofar as they address actions victimizing private citizens—require damage to the computer. In addition, one of the elements of common law trespass to chattel is damage. Whether intended or not, the SPY ACT subtly introduces a strict liability component into federal computer and Internet …


Ests Under Canadian Patent Law: Useful Or Not?, Natalie C. Bellefeuille Apr 2006

Ests Under Canadian Patent Law: Useful Or Not?, Natalie C. Bellefeuille

Canadian Journal of Law and Technology

The following discussion will examine the utility requirement for patentability in the context of EST patents. Part I will provide background information regarding the utility requirement under patent law and will explain why it has been difficult to apply to ESTs. Part II will briefly examine how other jurisdictions, in particular the United States, have addressed the difficul- ties associated with applying the current utility require- ment to biological materials, in particular ESTs. Part III will look at how Canadian courts have interpreted and applied the utility requirement for patentability, and will suggest that ESTs have sufficient value to the …


E-Commerce Legislation And Materials In Canada: Lois Sur Le Commerce Électronique Au Canada Et Documents Connexes By Sunny Handa, Claude Marseille & Martin Sheehan (Markham, Ont.: Lexisnexis Butterworths, 2005), John D. Gregory Apr 2006

E-Commerce Legislation And Materials In Canada: Lois Sur Le Commerce Électronique Au Canada Et Documents Connexes By Sunny Handa, Claude Marseille & Martin Sheehan (Markham, Ont.: Lexisnexis Butterworths, 2005), John D. Gregory

Canadian Journal of Law and Technology

This hefty volume is a useful compendium of the basic source materials for the law of electronic commerce in Canada. It offers the text of all the general-purpose legislation that removes legal barriers to the use of electronic communications, for all jurisdictions in the country. It then takes a dozen related areas of law, from domain names to taxation, from competition law to consumer protection, from security to standards, and offers a quick overview and the key documents applicable to each. In each case the commentary is in English then in French, and where the texts are available in both …


It Waste Management In Canada: From Cost Recovery To Resource Conservation?, Meinhard Doelle Apr 2006

It Waste Management In Canada: From Cost Recovery To Resource Conservation?, Meinhard Doelle

Canadian Journal of Law and Technology

The volume, composition and management of solid waste generated by households, governments, the commercial sector, and industry have all changed dramatically over the past century. Household waste contained mainly organic material a hundred years ago. Today, both residential and commercial waste is a complex mix of organics, plastics, paper products, metals and a variety of toxic material. Historically, individual households looked after their own waste, through efforts such as composting and burning. Over the past century, with significant increases in volume of waste generated, municipalities have taken over primary responsibility for solid waste management, initially mainly for aesthetic and sanitary …


Personal Medical Information: Privacy Or Personal Data Protection?, Wilhelm Peekhaus Apr 2006

Personal Medical Information: Privacy Or Personal Data Protection?, Wilhelm Peekhaus

Canadian Journal of Law and Technology

Some of the existing literature concerning the privacy of health information seems to suggest that medical information has a particularly special nature; either through its oft-cited association with dignity or the need for its ‘‘unobstructed’’ use by health care practitioners for a variety of reasons. It is against such a backdrop that this paper will review and compare a number of legislative mechanisms that have been designed to meet the challenge of safeguarding the privacy of personal information without completely hindering the continued flow of information required by economic and health care systems. An attempt will be made to situate …


Common Law Property Metaphors On The Internet: The Real Problem With The Doctrine Of Cybertrespass, Shyamkrishna Balganesh Apr 2006

Common Law Property Metaphors On The Internet: The Real Problem With The Doctrine Of Cybertrespass, Shyamkrishna Balganesh

All Faculty Scholarship

The doctrine of cybertrespass represents one of the most recent attempts by courts to apply concepts and principles from the real world to the virtual world of the Internet. A creation of state common law, the doctrine essentially involved extending the tort of trespass to chattels to the electronic world. Consequently, unauthorized electronic interferences are deemed trespassory intrusions and rendered actionable. The present paper aims to undertake a conceptual study of the evolution of the doctrine, examining the doctrinal modifications courts were required to make to mould the doctrine to meet the specificities of cyberspace. It then uses cybertrespass to …


Producers And Consumers In Eu E-Commerce Law, Banu Sit Apr 2006

Producers And Consumers In Eu E-Commerce Law, Banu Sit

Canadian Journal of Law and Technology

Rapid growth of technology in the last decades has given rise to electronic commerce (e-commerce) as a new mode of commerce. This new commerce environment has many characteristics that affect commercial relationships and parties. Of these characteristics, global and borderless commercial activity and the intangible nature of communication can be singled out.

From a legal perspective, e-commerce has developed new modes, of contract formation, performance of contracts for intangible goods, as well as payment. In this new borderless and transient sphere, certain interests of parties involved in commercial activities as buyers or sellers are in need of protection. In particular, …


How Much Spam Can Can-Spam Can? – Evaluating The Effectiveness Of The Can-Spam Act In The Wake Of White Buffalo Ventures V. University Of Texas, Fay Katayama Mar 2006

How Much Spam Can Can-Spam Can? – Evaluating The Effectiveness Of The Can-Spam Act In The Wake Of White Buffalo Ventures V. University Of Texas, Fay Katayama

ExpressO

No abstract provided.


Front Matter Mar 2006

Front Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Back Matter Mar 2006

Back Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Masthead Mar 2006

Masthead

Journal of Digital Forensics, Security and Law

No abstract provided.


Vol. Ix, Tab 46 - Ex. 8 - Email From Emily White, Emily White Mar 2006

Vol. Ix, Tab 46 - Ex. 8 - Email From Emily White, Emily White

Rosetta Stone v. Google (Joint Appendix)

Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?


Buried Online: State Laws That Limit E-Commerce In Caskets, Jerry Ellig, Asheesh Agarwal Mar 2006

Buried Online: State Laws That Limit E-Commerce In Caskets, Jerry Ellig, Asheesh Agarwal

ExpressO

Consumers seeking to purchase caskets online could benefit from the Supreme Court’s 2005 decision that states cannot discriminate against interstate direct wine shipment. Federal courts have reached conflicting conclusions when asked whether state laws requiring casket sellers to be licensed funeral directors violate the U.S. Constitution’s Due Process Clause. In Powers v. Harris, the 10th Circuit even offered an unprecedented ruling that economic protectionism is a legitimate state interest that can justify otherwise unconstitutional policies. In Granholm v. Heald, however, the Supreme Court declared that discriminatory barriers to interstate wine shipment must be justified by a legitimate state interest, and …


Criminalizing Internet Gambling: Should The Federal Government Keep Bluffing Or Fold?, Wesley S. Ashton Mar 2006

Criminalizing Internet Gambling: Should The Federal Government Keep Bluffing Or Fold?, Wesley S. Ashton

ExpressO

This paper first describes the various mechanical aspects of Internet gambling, and then reviews the U.S. criminal laws that apply to gambling conducted online. As part of this review, several criminal and civil cases involving Internet gambling activities are discussed. Lastly, how the rapidly changing gambling landscape in the United States and the world may effect future federal lawmaking efforts for controlling Internet gambling is considered.


Opting Out: Procedural Fair Use, Michael R. Mattioli Mar 2006

Opting Out: Procedural Fair Use, Michael R. Mattioli

ExpressO

This article explores the advantages of opt-out plans, and identifies a critical shortcoming in Copyright’s doctrine of Fair Use. The discussion is fueled by a current controversy: In December of 2004, Google, Inc. announced its plan to digitally scan thousands of copyrighted books as part of a massive new digital indexing service. Hedging against possible litigation, Google provided a free and easy opt-out procedure for authors who didn’t want their books scanned. Despite this measure, two major authors’ groups have sued Google, claiming the opt-out plan imposes an unfair burden. This article explores the fairness of established opt-outs in contract …


Vol. Vi, Tab 38 - Ex. 32 - Language Learning In The United States Of America, Rosetta Stone Mar 2006

Vol. Vi, Tab 38 - Ex. 32 - Language Learning In The United States Of America, Rosetta Stone

Rosetta Stone v. Google (Joint Appendix)

Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?


Online Boilerplate: Would Mandatory Website Disclosure Of E-Standard Terms Backfire?, Robert A. Hillman Mar 2006

Online Boilerplate: Would Mandatory Website Disclosure Of E-Standard Terms Backfire?, Robert A. Hillman

Cornell Law Faculty Publications

No abstract provided.


The Secret Is Out: Patent Law Preempts Mass Market License Terms Barring Reverse Engineering For Interoperability Purposes, Daniel Laster Feb 2006

The Secret Is Out: Patent Law Preempts Mass Market License Terms Barring Reverse Engineering For Interoperability Purposes, Daniel Laster

ExpressO

As patent protection has emerged to protect software, courts and commentators have mistakenly focused on copyright law and overlooked the centrality of patent preemption to limit contract law where a mass market license which prohibits reverse engineering (RE) for purposes of developing interoperable products leads to patent-like protection. Review of copyright fair use cases on RE and Congress’s policy favoring RE for interoperability purposes in the Digital Millennium Copyright Act reinforce the case for patent preemption. Also, the fundamental freedom to RE embodied in state trade secret law, coupled with federal patent and copyright law and policies, cumulatively should override …


Choice In Government Software Procurement: A Winning Combination, Mclean Sieverding Feb 2006

Choice In Government Software Procurement: A Winning Combination, Mclean Sieverding

ExpressO

Governments are such significant purchasers of IT products and services that their purchasing decisions have a substantial impact on the world’s IT marketplace. This fact calls into question the wisdom of decisions by a few policymakers (on national, state, and local levels) around the world that have sought to require that governmental procurement officials give varying degrees of preference to open source software (OSS) when evaluating competing software solutions, claiming, among other things, that such preferences are justified because OSS is cheaper and more interoperable than proprietary software and needs government handicapping in order to enter the market to compete …


Book Review: Digital Crime And Forensic Science In Cyberspace, Gary C. Kessler Jan 2006

Book Review: Digital Crime And Forensic Science In Cyberspace, Gary C. Kessler

Journal of Digital Forensics, Security and Law

This issue presents the first Book Review column for the JDFSL. It is an experiment to broaden the services that the journal provides to readers, so we are anxious to get your reaction. Is the column useful and interesting? Should we include more than one review per issue? Should we also review products? Do you have suggested books/products for review and/or do you want to write a review? All of this type of feedback -- and more -- is appreciated. Please feel free to send comments to Gary Kessler (gary.kessler@champlain.edu) or Glenn Dardick (gdardick@dardick.net).