Open Access. Powered by Scholars. Published by Universities.®

International Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 25 of 25

Full-Text Articles in International Law

Collective Data Rights And Their Possible Abuse, Asaf Lubin Jan 2023

Collective Data Rights And Their Possible Abuse, Asaf Lubin

Articles by Maurer Faculty

No abstract provided.


The Law And Politics Of Ransomware, Asaf Lubin Oct 2022

The Law And Politics Of Ransomware, Asaf Lubin

Articles by Maurer Faculty

What do Lady Gaga, the Royal Zoological Society of Scotland, the city of Valdez in Alaska, and the court system of the Brazilian state of Rio Grande do Sul all have in common? They have all been victims of ransomware attacks, which are growing both in number and severity. In 2016, hackers perpetrated roughly four thousand ransomware attacks a day worldwide, a figure which was already alarming. By 2020, however, ransomware attacks reached a staggering number, between 20,000 and 30,000 per day in the United States alone. That is a ransomware attack every eleven seconds, each of which cost victims …


The Right To Privacy And Data Protection In Times Of Armed Conflict, Asaf Lubin, Russell Buchan Jan 2022

The Right To Privacy And Data Protection In Times Of Armed Conflict, Asaf Lubin, Russell Buchan

Books & Book Chapters by Maurer Faculty

Contemporary warfare yields a profound impact on the rights to privacy and data protection. Technological advances in the fields of electronic surveillance, predictive algorithms, big data analytics, user-generated evidence, artificial intelligence, cloud storage, facial recognition, and cryptography are redefining the scope, nature, and contours of military operations. Yet, international humanitarian law offers very few, if any, lex specialis rules for the lawful processing, analysis, dissemination, and retention of personal information. This edited anthology offers a pioneering account of the current and potential future application of digital rights in armed conflict.

In Part I Mary Ellen O’Connell, Tal Mimran and Yuval …


Indiana Law’S Lubin, Sun Help Advise Kosovo Government On Country’S Cybersecurity Act, James Owsley Boyd Dec 2021

Indiana Law’S Lubin, Sun Help Advise Kosovo Government On Country’S Cybersecurity Act, James Owsley Boyd

Keep Up With the Latest News from the Law School (blog)

No abstract provided.


Cyber Law And Espionage Law As Communicating Vessels, Asaf Lubin Jan 2018

Cyber Law And Espionage Law As Communicating Vessels, Asaf Lubin

Books & Book Chapters by Maurer Faculty

Professor Lubin's contribution is "Cyber Law and Espionage Law as Communicating Vessels," pp. 203-225.

Existing legal literature would have us assume that espionage operations and “below-the-threshold” cyber operations are doctrinally distinct. Whereas one is subject to the scant, amorphous, and under-developed legal framework of espionage law, the other is subject to an emerging, ever-evolving body of legal rules, known cumulatively as cyber law. This dichotomy, however, is erroneous and misleading. In practice, espionage and cyber law function as communicating vessels, and so are better conceived as two elements of a complex system, Information Warfare (IW). This paper therefore first draws …


"We Only Spy On Foreigners": The Myth Of A Universal Right To Privacy And The Practice Of Foreign Mass Surveillance, Asaf Lubin Jan 2018

"We Only Spy On Foreigners": The Myth Of A Universal Right To Privacy And The Practice Of Foreign Mass Surveillance, Asaf Lubin

Articles by Maurer Faculty

The digital age brought with it a new epoch in global political life, one neatly coined by Professor Philip Howard as the “pax technica.” In this new world order, government and industry are “tightly bound” in technological and security arrangements that serve to push forward an information and cyber revolution of unparalleled magnitude. While the rise of information technologies tells a miraculous story of triumph over the physical constraints that once shackled mankind, these very technologies are also the cause of grave concern. Intelligence agencies have been recently involved in the exercise of global indiscriminate surveillance, which purports to go …


We And Cyberlaw: The Spatial Unity Of Constitutional Orders, Hans Lindahl Jul 2013

We And Cyberlaw: The Spatial Unity Of Constitutional Orders, Hans Lindahl

Indiana Journal of Global Legal Studies

This paper scrutinizes the fundamental assumption governing Gunther Teubner's theory of societal constitutionalism, namely that societal constitutions are ultimately about the regulation of inclusion and exclusion in global function systems. While endorsing the central role of inclusion/exclusion in constitutions, societal or otherwise, I argue that inclusion and exclusion are primordial categories of collective action, rather than functional categories. As a result, the self-closure which gives rise to a legal collective is spatial as much as it is temporal, and subjective no less than material. Inasmuch as legal orders must establish who ought to do what, where, and when, this entails, …


The Expansion Of Trademark Rights In Europe, Irina Pak Apr 2013

The Expansion Of Trademark Rights In Europe, Irina Pak

IP Theory

No abstract provided.


The Granting Clause And Intellectual Property Rights Management In Open-Source Software Licensing, Vikrant N. Vasudeva Apr 2013

The Granting Clause And Intellectual Property Rights Management In Open-Source Software Licensing, Vikrant N. Vasudeva

IP Theory

No abstract provided.


Data Protection Principles For The 21st Century, Fred H. Cate, Peter Cullen, Viktor Mayer-Schonberger Jan 2013

Data Protection Principles For The 21st Century, Fred H. Cate, Peter Cullen, Viktor Mayer-Schonberger

Books & Book Chapters by Maurer Faculty

This paper proposes revisions to the OECD Guidelines that include basic changes essential for the protection of individual privacy in the 21st century, while avoiding unnecessary restrictions on uses of personal information that are increasingly important.


Nato, Cyber Defense, And International Law, David P. Fidler, Richard Pregent, Alex Vandurme Jan 2013

Nato, Cyber Defense, And International Law, David P. Fidler, Richard Pregent, Alex Vandurme

Articles by Maurer Faculty

Cybersecurity threats pose challenges to individuals, corporations, states, and intergovernmental organizations. The emergence of these threats also presents international cooperation on security with difficult tasks. This essay analyzes how cybersecurity threats affect the North Atlantic Treaty Organization (NATO), which is arguably the most important collective defense alliance in the world.1 NATO has responded to the cyber threat in policy and operational terms (Part I), but approaches and shifts in cybersecurity policies create problems for NATO— problems that NATO principles, practices, and politics exacerbate in ways that will force NATO to address cyber threats more aggressively than it has done so …


Why Copyright Falls Behind The Requirement For Protecting Graphic User Interfaces: Case Studies On Limitations Of Copyright Protection For Guis In China, Ling Jin, Yihong Ying Oct 2012

Why Copyright Falls Behind The Requirement For Protecting Graphic User Interfaces: Case Studies On Limitations Of Copyright Protection For Guis In China, Ling Jin, Yihong Ying

IP Theory

No abstract provided.


Should Cyber Exploitation Ever Constitute A Demonstration Of Hostile Intent That May Violate Un Charter Provisions Prohibiting The Threat Or Use Of Force?, Anna Wortham May 2012

Should Cyber Exploitation Ever Constitute A Demonstration Of Hostile Intent That May Violate Un Charter Provisions Prohibiting The Threat Or Use Of Force?, Anna Wortham

Federal Communications Law Journal

More and more, the United States and other countries rely on complex infrastructures that are primarily controlled by information technology. Although extremely destructive cyber threats and attacks against nations are a reality, the laws governing cyber exploitation have not kept pace with this threat. Because the United States and other nations may use cyber capabilities offensively as well as defensively, it is important that the laws for engaging in such cyber conflict be well defined. Currently, it seems unlikely that cyber exploitation can ever be regarded as a threat or use of force under the UN Charter because it is …


Openness, Intellectual Property And Standardization In The European Ict Sector, Carl Mair Jan 2012

Openness, Intellectual Property And Standardization In The European Ict Sector, Carl Mair

IP Theory

No abstract provided.


Human Rights -- Latin America, Indigenous Peoples -- Latin America, Neoliberalism -- Latin America, Ethnicity.Gov: Global Governance, Indigenous Peoples, And The Right To Prior Consultation In Social Minefields, César Rodríguez-Garavito Jan 2011

Human Rights -- Latin America, Indigenous Peoples -- Latin America, Neoliberalism -- Latin America, Ethnicity.Gov: Global Governance, Indigenous Peoples, And The Right To Prior Consultation In Social Minefields, César Rodríguez-Garavito

Indiana Journal of Global Legal Studies

This article explores law's protagonism and effects in contemporary conflicts over development, natural resource extraction, and indigenous peoples' rights. It focuses on the sociolegal site where these conflicts have been most visible and acute: consultations with indigenous peoples prior to the undertaking of economic projects that affect them. I argue that legal disputes over prior consultation are part of a broader process of juridification of ethnic claims, which I call "ethnicity.gov." I examine the plurality of public and private regulations involved in this process and trace their affinity with the procedural logic of neoliberal global governance. I further argue that …


Love Thy Neighbor: The Tampere Convention As Global Legislation, Allison Rahrig Jul 2010

Love Thy Neighbor: The Tampere Convention As Global Legislation, Allison Rahrig

Indiana Journal of Global Legal Studies

The Internet, 24-hour news sources, and a host of other telecommunications advances have allowed global citizens to become instantaneously informed. With the privilege of real-time updates and acute awareness of the world's events comes the responsibility of being more than a passive observer. Specifically, this Note focuses on the technological improvements in communication during natural disasters-improvements that can be used to assist and aid the victims of catastrophes. In the aftermath of a natural disaster, the country affected is rarely able to provide for its citizens; tsunamis, hurricanes, tornadoes, and earthquakes can (and often do) cripple an entire nation. This …


Privacy By Deletion: The Need For A Global Data Deletion Principle, Benjamin J. Keele Jan 2009

Privacy By Deletion: The Need For A Global Data Deletion Principle, Benjamin J. Keele

Indiana Journal of Global Legal Studies

With global personal information flows increasing, efforts have been made to develop principles to standardize data protection regulations. However, no set of principles has yet achieved universal adoption. This note proposes a principle mandating that personal data be securely destroyed when it is no longer necessary for the purpose for which it was collected. Including a data deletion principle in future data protection standards will increase respect for individual autonomy and decrease the risk of abuse of personal data. Though data deletion is already practiced by many data controllers, including it in legal data protection mandates will further the goal …


Globalization Of Legal Practice In The Internet Age, Leonard Bierman, Michael A. Hitt Jan 2007

Globalization Of Legal Practice In The Internet Age, Leonard Bierman, Michael A. Hitt

Indiana Journal of Global Legal Studies

The Internet's global reach has had a significant impact on the legal profession. This essay explains a few of the key developments in this area, including: competition fueled by outsourcing legal work to lower-wage earning lawyers around the world, "virtual work" changing client interaction and attorney work schedules, law firm reputation as a result of information availability on the Internet, work-product monitoring and the commoditization of legal services, and work force diversity spurred by the influence of international clients.

Globalization of The Legal Profession, Symposium. Indiana University School of Law-Bloomington, April 6, 2006


Prescriptive Jurisdiction Over Internet Activity: The Need To Define And Establish The Boundaries Of Cyberliberty, Samuel F. Miller Jul 2003

Prescriptive Jurisdiction Over Internet Activity: The Need To Define And Establish The Boundaries Of Cyberliberty, Samuel F. Miller

Indiana Journal of Global Legal Studies

No abstract provided.


The Changing Face Of Privacy Protection In The European Union And The United States, Fred H. Cate Jan 1999

The Changing Face Of Privacy Protection In The European Union And The United States, Fred H. Cate

Articles by Maurer Faculty

Among the wide variety of national and multinational legal regimes for protecting privacy, two dominant models have emerged, reflecting two very different approaches to the control of information. The European Union has enacted a sweeping data protection directive that imposes significant restrictions on most data collection, processing, dissemination, and storage activities, not only within Europe, but throughout the world if the data originates in a member state. The United States has taken a very different approach that extensively regulates government processing of data, while facilitating private, market-based initiatives to address private sector data processing.

Under the EU data protection directive, …


Controlling World Wide Web Links, Property Rights, Access Rights And Unfair Competition, Chris Reed Oct 1998

Controlling World Wide Web Links, Property Rights, Access Rights And Unfair Competition, Chris Reed

Indiana Journal of Global Legal Studies

No abstract provided.


Domain Names, Globalization, And Internet Governance, Marshall Leaffer Oct 1998

Domain Names, Globalization, And Internet Governance, Marshall Leaffer

Indiana Journal of Global Legal Studies

No abstract provided.


Cyberspatial Sovereignties: Offshore Finance, Digital Cash, And The Limits Of Liberalism, Bill Maurer Apr 1998

Cyberspatial Sovereignties: Offshore Finance, Digital Cash, And The Limits Of Liberalism, Bill Maurer

Indiana Journal of Global Legal Studies

No abstract provided.


Cyberspace, Sovereignty, Jurisdiction, And Modernism, Joel Trachtman Apr 1998

Cyberspace, Sovereignty, Jurisdiction, And Modernism, Joel Trachtman

Indiana Journal of Global Legal Studies

No abstract provided.


International Jurisdiction In Cyberspace: Which States May Regulate The Internet?, Stephan Wilske, Teresa Schiller Dec 1997

International Jurisdiction In Cyberspace: Which States May Regulate The Internet?, Stephan Wilske, Teresa Schiller

Federal Communications Law Journal

The Internet now reaches 60 million users in 160 countries, with the number increasing each year. Although cyberspace has been viewed as a self-regulating entity controlled by no government, this myth is being destroyed as the global Internet community expands. With this expansion comes a question: Who has the authority to regulate cyberspace? Given that decisions about the Internet reach far beyond national borders, the answer to this question is unknown, but certainly has broad implications. Traditional laws of international jurisdiction, including jurisdiction to prescribe, jurisdiction to adjudicate, and jurisdiction to enforce, offer some clear answers. However, further development of …