Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Internet (4)
- Privacy (4)
- Data protection (3)
- Espionage (3)
- Globalization (3)
-
- Sovereignty (Political science) (3)
- Cybersecurity (2)
- Cyberspace (2)
- Data Protection (2)
- European Union (2)
- GPL (2)
- Intellectual property (2)
- International law (2)
- Jurisdiction (2)
- Sovereignty (2)
- Trademarks (2)
- 516 U.S. 233 (1)
- A better License for Open Source Software (1)
- AG Colomer (1)
- Access Rights (1)
- Advertising function (1)
- Anais-anais (1)
- Apache License (1)
- Arsenal Football Club plc v. Reed (1)
- Article 3(9) (1)
- Article 5(1) (1)
- Article 72 (1)
- Article 73 (1)
- Article 75 (1)
- Artistic License (1)
- Publication Year
- Publication
- Publication Type
Articles 1 - 25 of 25
Full-Text Articles in International Law
Collective Data Rights And Their Possible Abuse, Asaf Lubin
Collective Data Rights And Their Possible Abuse, Asaf Lubin
Articles by Maurer Faculty
No abstract provided.
The Law And Politics Of Ransomware, Asaf Lubin
The Law And Politics Of Ransomware, Asaf Lubin
Articles by Maurer Faculty
What do Lady Gaga, the Royal Zoological Society of Scotland, the city of Valdez in Alaska, and the court system of the Brazilian state of Rio Grande do Sul all have in common? They have all been victims of ransomware attacks, which are growing both in number and severity. In 2016, hackers perpetrated roughly four thousand ransomware attacks a day worldwide, a figure which was already alarming. By 2020, however, ransomware attacks reached a staggering number, between 20,000 and 30,000 per day in the United States alone. That is a ransomware attack every eleven seconds, each of which cost victims …
The Right To Privacy And Data Protection In Times Of Armed Conflict, Asaf Lubin, Russell Buchan
The Right To Privacy And Data Protection In Times Of Armed Conflict, Asaf Lubin, Russell Buchan
Books & Book Chapters by Maurer Faculty
Contemporary warfare yields a profound impact on the rights to privacy and data protection. Technological advances in the fields of electronic surveillance, predictive algorithms, big data analytics, user-generated evidence, artificial intelligence, cloud storage, facial recognition, and cryptography are redefining the scope, nature, and contours of military operations. Yet, international humanitarian law offers very few, if any, lex specialis rules for the lawful processing, analysis, dissemination, and retention of personal information. This edited anthology offers a pioneering account of the current and potential future application of digital rights in armed conflict.
In Part I Mary Ellen O’Connell, Tal Mimran and Yuval …
Indiana Law’S Lubin, Sun Help Advise Kosovo Government On Country’S Cybersecurity Act, James Owsley Boyd
Indiana Law’S Lubin, Sun Help Advise Kosovo Government On Country’S Cybersecurity Act, James Owsley Boyd
Keep Up With the Latest News from the Law School (blog)
No abstract provided.
Cyber Law And Espionage Law As Communicating Vessels, Asaf Lubin
Cyber Law And Espionage Law As Communicating Vessels, Asaf Lubin
Books & Book Chapters by Maurer Faculty
Professor Lubin's contribution is "Cyber Law and Espionage Law as Communicating Vessels," pp. 203-225.
Existing legal literature would have us assume that espionage operations and “below-the-threshold” cyber operations are doctrinally distinct. Whereas one is subject to the scant, amorphous, and under-developed legal framework of espionage law, the other is subject to an emerging, ever-evolving body of legal rules, known cumulatively as cyber law. This dichotomy, however, is erroneous and misleading. In practice, espionage and cyber law function as communicating vessels, and so are better conceived as two elements of a complex system, Information Warfare (IW). This paper therefore first draws …
"We Only Spy On Foreigners": The Myth Of A Universal Right To Privacy And The Practice Of Foreign Mass Surveillance, Asaf Lubin
Articles by Maurer Faculty
The digital age brought with it a new epoch in global political life, one neatly coined by Professor Philip Howard as the “pax technica.” In this new world order, government and industry are “tightly bound” in technological and security arrangements that serve to push forward an information and cyber revolution of unparalleled magnitude. While the rise of information technologies tells a miraculous story of triumph over the physical constraints that once shackled mankind, these very technologies are also the cause of grave concern. Intelligence agencies have been recently involved in the exercise of global indiscriminate surveillance, which purports to go …
We And Cyberlaw: The Spatial Unity Of Constitutional Orders, Hans Lindahl
We And Cyberlaw: The Spatial Unity Of Constitutional Orders, Hans Lindahl
Indiana Journal of Global Legal Studies
This paper scrutinizes the fundamental assumption governing Gunther Teubner's theory of societal constitutionalism, namely that societal constitutions are ultimately about the regulation of inclusion and exclusion in global function systems. While endorsing the central role of inclusion/exclusion in constitutions, societal or otherwise, I argue that inclusion and exclusion are primordial categories of collective action, rather than functional categories. As a result, the self-closure which gives rise to a legal collective is spatial as much as it is temporal, and subjective no less than material. Inasmuch as legal orders must establish who ought to do what, where, and when, this entails, …
The Expansion Of Trademark Rights In Europe, Irina Pak
The Expansion Of Trademark Rights In Europe, Irina Pak
IP Theory
No abstract provided.
The Granting Clause And Intellectual Property Rights Management In Open-Source Software Licensing, Vikrant N. Vasudeva
The Granting Clause And Intellectual Property Rights Management In Open-Source Software Licensing, Vikrant N. Vasudeva
IP Theory
No abstract provided.
Data Protection Principles For The 21st Century, Fred H. Cate, Peter Cullen, Viktor Mayer-Schonberger
Data Protection Principles For The 21st Century, Fred H. Cate, Peter Cullen, Viktor Mayer-Schonberger
Books & Book Chapters by Maurer Faculty
This paper proposes revisions to the OECD Guidelines that include basic changes essential for the protection of individual privacy in the 21st century, while avoiding unnecessary restrictions on uses of personal information that are increasingly important.
Nato, Cyber Defense, And International Law, David P. Fidler, Richard Pregent, Alex Vandurme
Nato, Cyber Defense, And International Law, David P. Fidler, Richard Pregent, Alex Vandurme
Articles by Maurer Faculty
Cybersecurity threats pose challenges to individuals, corporations, states, and intergovernmental organizations. The emergence of these threats also presents international cooperation on security with difficult tasks. This essay analyzes how cybersecurity threats affect the North Atlantic Treaty Organization (NATO), which is arguably the most important collective defense alliance in the world.1 NATO has responded to the cyber threat in policy and operational terms (Part I), but approaches and shifts in cybersecurity policies create problems for NATO— problems that NATO principles, practices, and politics exacerbate in ways that will force NATO to address cyber threats more aggressively than it has done so …
Why Copyright Falls Behind The Requirement For Protecting Graphic User Interfaces: Case Studies On Limitations Of Copyright Protection For Guis In China, Ling Jin, Yihong Ying
Why Copyright Falls Behind The Requirement For Protecting Graphic User Interfaces: Case Studies On Limitations Of Copyright Protection For Guis In China, Ling Jin, Yihong Ying
IP Theory
No abstract provided.
Should Cyber Exploitation Ever Constitute A Demonstration Of Hostile Intent That May Violate Un Charter Provisions Prohibiting The Threat Or Use Of Force?, Anna Wortham
Federal Communications Law Journal
More and more, the United States and other countries rely on complex infrastructures that are primarily controlled by information technology. Although extremely destructive cyber threats and attacks against nations are a reality, the laws governing cyber exploitation have not kept pace with this threat. Because the United States and other nations may use cyber capabilities offensively as well as defensively, it is important that the laws for engaging in such cyber conflict be well defined. Currently, it seems unlikely that cyber exploitation can ever be regarded as a threat or use of force under the UN Charter because it is …
Openness, Intellectual Property And Standardization In The European Ict Sector, Carl Mair
Openness, Intellectual Property And Standardization In The European Ict Sector, Carl Mair
IP Theory
No abstract provided.
Human Rights -- Latin America, Indigenous Peoples -- Latin America, Neoliberalism -- Latin America, Ethnicity.Gov: Global Governance, Indigenous Peoples, And The Right To Prior Consultation In Social Minefields, César Rodríguez-Garavito
Human Rights -- Latin America, Indigenous Peoples -- Latin America, Neoliberalism -- Latin America, Ethnicity.Gov: Global Governance, Indigenous Peoples, And The Right To Prior Consultation In Social Minefields, César Rodríguez-Garavito
Indiana Journal of Global Legal Studies
This article explores law's protagonism and effects in contemporary conflicts over development, natural resource extraction, and indigenous peoples' rights. It focuses on the sociolegal site where these conflicts have been most visible and acute: consultations with indigenous peoples prior to the undertaking of economic projects that affect them. I argue that legal disputes over prior consultation are part of a broader process of juridification of ethnic claims, which I call "ethnicity.gov." I examine the plurality of public and private regulations involved in this process and trace their affinity with the procedural logic of neoliberal global governance. I further argue that …
Love Thy Neighbor: The Tampere Convention As Global Legislation, Allison Rahrig
Love Thy Neighbor: The Tampere Convention As Global Legislation, Allison Rahrig
Indiana Journal of Global Legal Studies
The Internet, 24-hour news sources, and a host of other telecommunications advances have allowed global citizens to become instantaneously informed. With the privilege of real-time updates and acute awareness of the world's events comes the responsibility of being more than a passive observer. Specifically, this Note focuses on the technological improvements in communication during natural disasters-improvements that can be used to assist and aid the victims of catastrophes. In the aftermath of a natural disaster, the country affected is rarely able to provide for its citizens; tsunamis, hurricanes, tornadoes, and earthquakes can (and often do) cripple an entire nation. This …
Privacy By Deletion: The Need For A Global Data Deletion Principle, Benjamin J. Keele
Privacy By Deletion: The Need For A Global Data Deletion Principle, Benjamin J. Keele
Indiana Journal of Global Legal Studies
With global personal information flows increasing, efforts have been made to develop principles to standardize data protection regulations. However, no set of principles has yet achieved universal adoption. This note proposes a principle mandating that personal data be securely destroyed when it is no longer necessary for the purpose for which it was collected. Including a data deletion principle in future data protection standards will increase respect for individual autonomy and decrease the risk of abuse of personal data. Though data deletion is already practiced by many data controllers, including it in legal data protection mandates will further the goal …
Globalization Of Legal Practice In The Internet Age, Leonard Bierman, Michael A. Hitt
Globalization Of Legal Practice In The Internet Age, Leonard Bierman, Michael A. Hitt
Indiana Journal of Global Legal Studies
The Internet's global reach has had a significant impact on the legal profession. This essay explains a few of the key developments in this area, including: competition fueled by outsourcing legal work to lower-wage earning lawyers around the world, "virtual work" changing client interaction and attorney work schedules, law firm reputation as a result of information availability on the Internet, work-product monitoring and the commoditization of legal services, and work force diversity spurred by the influence of international clients.
Globalization of The Legal Profession, Symposium. Indiana University School of Law-Bloomington, April 6, 2006
Prescriptive Jurisdiction Over Internet Activity: The Need To Define And Establish The Boundaries Of Cyberliberty, Samuel F. Miller
Prescriptive Jurisdiction Over Internet Activity: The Need To Define And Establish The Boundaries Of Cyberliberty, Samuel F. Miller
Indiana Journal of Global Legal Studies
No abstract provided.
The Changing Face Of Privacy Protection In The European Union And The United States, Fred H. Cate
The Changing Face Of Privacy Protection In The European Union And The United States, Fred H. Cate
Articles by Maurer Faculty
Among the wide variety of national and multinational legal regimes for protecting privacy, two dominant models have emerged, reflecting two very different approaches to the control of information. The European Union has enacted a sweeping data protection directive that imposes significant restrictions on most data collection, processing, dissemination, and storage activities, not only within Europe, but throughout the world if the data originates in a member state. The United States has taken a very different approach that extensively regulates government processing of data, while facilitating private, market-based initiatives to address private sector data processing.
Under the EU data protection directive, …
Controlling World Wide Web Links, Property Rights, Access Rights And Unfair Competition, Chris Reed
Controlling World Wide Web Links, Property Rights, Access Rights And Unfair Competition, Chris Reed
Indiana Journal of Global Legal Studies
No abstract provided.
Domain Names, Globalization, And Internet Governance, Marshall Leaffer
Domain Names, Globalization, And Internet Governance, Marshall Leaffer
Indiana Journal of Global Legal Studies
No abstract provided.
Cyberspatial Sovereignties: Offshore Finance, Digital Cash, And The Limits Of Liberalism, Bill Maurer
Cyberspatial Sovereignties: Offshore Finance, Digital Cash, And The Limits Of Liberalism, Bill Maurer
Indiana Journal of Global Legal Studies
No abstract provided.
Cyberspace, Sovereignty, Jurisdiction, And Modernism, Joel Trachtman
Cyberspace, Sovereignty, Jurisdiction, And Modernism, Joel Trachtman
Indiana Journal of Global Legal Studies
No abstract provided.
International Jurisdiction In Cyberspace: Which States May Regulate The Internet?, Stephan Wilske, Teresa Schiller
International Jurisdiction In Cyberspace: Which States May Regulate The Internet?, Stephan Wilske, Teresa Schiller
Federal Communications Law Journal
The Internet now reaches 60 million users in 160 countries, with the number increasing each year. Although cyberspace has been viewed as a self-regulating entity controlled by no government, this myth is being destroyed as the global Internet community expands. With this expansion comes a question: Who has the authority to regulate cyberspace? Given that decisions about the Internet reach far beyond national borders, the answer to this question is unknown, but certainly has broad implications. Traditional laws of international jurisdiction, including jurisdiction to prescribe, jurisdiction to adjudicate, and jurisdiction to enforce, offer some clear answers. However, further development of …