Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Internet Law (6)
- Computer Law (4)
- International Law (4)
- Legislation (4)
- Constitutional Law (3)
-
- Rule of Law (3)
- Science and Technology Law (3)
- Administrative Law (2)
- Banking and Finance Law (2)
- Bankruptcy Law (2)
- Business Organizations Law (2)
- Civil Law (2)
- Civil Procedure (2)
- Conflict of Laws (2)
- Construction Law (2)
- Contracts (2)
- Courts (2)
- Criminal Law (2)
- Criminal Procedure (2)
- Family Law (2)
- Government Contracts (2)
- Health Law and Policy (2)
- Insurance Law (2)
- International Trade Law (2)
- Jurisprudence (2)
- Law and Economics (2)
- Law and Philosophy (2)
- Institution
- Publication
- Publication Type
Articles 1 - 8 of 8
Full-Text Articles in Privacy Law
Sanksi Hukuman Mati Bagi Penyalahguna Narkotika Dalam Perspektif Ham Berdasarkan Konstitusi, Dharma Rozali Azhar D
Sanksi Hukuman Mati Bagi Penyalahguna Narkotika Dalam Perspektif Ham Berdasarkan Konstitusi, Dharma Rozali Azhar D
"Dharmasisya” Jurnal Program Magister Hukum FHUI
The death penalty is a legal act that is legitimized by the state. In the context of the constitution, the death penalty has created a contradiction in the norms in Article 28 I paragraph (1) and Article 28 J paragraph (1) and paragraph (2) which specifically focus on the right to life as a fundamental right that is very fundamental and divine in nature and the right to life of people. others who also may not be removed by anyone on purpose for any reason. The death penalty in the context of narcotics does not aim to repay crime for …
Stars, Stripes, And Surveillance: The United States' Failure To Regulate Data Privacy, Sam Begland
Stars, Stripes, And Surveillance: The United States' Failure To Regulate Data Privacy, Sam Begland
American University Law Review
In the wake of the United States Supreme Court’s devastating decision to strip Americans of their constitutional right to abortion in Dobbs v. Jackson Women’s Health Organization, data privacy is more salient than ever. Without adequate data regulations, state governments and anti-abortion activists alike can harass and prosecute pregnant people attempting to exercise their bodily autonomy. This comment argues that the United States has violated its obligations under the International Covenant on Civil and Political Rights (ICCPR) Article 17 by failing to protect against interference with the use and collection of reproductive health data. Further, this comment analyzes interpretations of …
Tinjauan Yuridis Dalam Penyelesaian Pelanggaran Ham Berat Melalui Komisi Kebenaran Dan Rekonsiliasi Di Afrika Selatan Dan Indonesia, Tshana Erfandi
Tinjauan Yuridis Dalam Penyelesaian Pelanggaran Ham Berat Melalui Komisi Kebenaran Dan Rekonsiliasi Di Afrika Selatan Dan Indonesia, Tshana Erfandi
"Dharmasisya” Jurnal Program Magister Hukum FHUI
Several countries are currently developing a solution to the problem by establishing a particular commission. The commission works outside the courts, parliament and executive. In Indonesia, In Indonesia. The People's Consultative Assembly set a stipulation regarding the establishment of the National Center for Truth and Reconciliation: (NCTR) in 2000. This stipulation has the intent and purpose for national unity to identify existing problems, determine the conditions that must be made in order to achieve national reconciliation and establish policy direction as a guide to carry out the consolidation of unity of a nation. Whereas in South Africa, the National Center …
Can Social Media Corporations Be Held Liable Under International Law For Human Rights Atrocities?, Juliana Palmieri
Can Social Media Corporations Be Held Liable Under International Law For Human Rights Atrocities?, Juliana Palmieri
Pace International Law Review
This article examines the relevant international law associated with genocide and hate speech and examines whether there are any legal grounds to hold a corporation liable for how people chose to use its product or service in relation to human rights violations. The analysis begins with a brief overview of international criminal and human rights law, relevant treaties, jurisdictional issues, and the legal theories of corporate criminal liability and complicity. Because current international law provides no clear answer, this article proposes that international courts use a balancing test which evaluates a non-exclusive list of ten main factors.
Platforms, Encryption, And The Cfaa: The Case Of Whatsapp V Nso Group, Jonathon Penney, Bruce Schneier
Platforms, Encryption, And The Cfaa: The Case Of Whatsapp V Nso Group, Jonathon Penney, Bruce Schneier
Articles, Book Chapters, & Popular Press
End-to-end encryption technology has gone mainstream. But this wider use has led hackers, cybercriminals, foreign governments, and other threat actors to employ creative and novel attacks to compromise or workaround these protections, raising important questions as to how the Computer Fraud and Abuse Act (CFAA), the primary federal anti-hacking statute, is best applied to these new encryption implementations. Now, after the Supreme Court recently narrowed the CFAA’s scope in Van Buren and suggested it favors a code-based approach to liability under the statute, understanding how best to theorize sophisticated code-based access barriers like end-to-end encryption, and their circumvention, is now …
Politics Of Adversarial Machine Learning, Kendra Albert, Jonathon Penney, Bruce Schneier, Ram Shankar Siva Kumar
Politics Of Adversarial Machine Learning, Kendra Albert, Jonathon Penney, Bruce Schneier, Ram Shankar Siva Kumar
Articles, Book Chapters, & Popular Press
In addition to their security properties, adversarial machine-learning attacks and defenses have political dimensions. They enable or foreclose certain options for both the subjects of the machine learning systems and for those who deploy them, creating risks for civil liberties and human rights. In this paper, we draw on insights from science and technology studies, anthropology, and human rights literature, to inform how defenses against adversarial attacks can be used to suppress dissent and limit attempts to investigate machine learning systems. To make this concrete, we use real-world examples of how attacks such as perturbation, model inversion, or membership inference …
Privacy And Legal Automation: The Dmca As A Case Study, Jonathon Penney
Privacy And Legal Automation: The Dmca As A Case Study, Jonathon Penney
Articles, Book Chapters, & Popular Press
Advances in artificial intelligence, machine learning, computing capacity, and big data analytics are creating exciting new possibilities for legal automation. At the same time, these changes pose serious risks for civil liberties and other societal interests. Yet, existing scholarship is narrow, leaving uncertainty on a range of issues, including a glaring lack of systematic empirical work as to how legal automation may impact people’s privacy and freedom. This article addresses this gap with an original empirical analysis of the Digital Millennium Copyright Act (DMCA), which today sits at the forefront of algorithmic law due to its automated enforcement of copyright …
Advancing Human Rights-By-Design In The Dual-Use Technology Industry, Jonathon Penney, Sarah Mckune, Lex Gill, Ronald Deibert
Advancing Human Rights-By-Design In The Dual-Use Technology Industry, Jonathon Penney, Sarah Mckune, Lex Gill, Ronald Deibert
Articles, Book Chapters, & Popular Press
It is no secret that technology companies have greased the wheels for human rights abuses around the world — backed by a global web of private sector support and investment that has yielded significant financial returns. For example, the University of Toronto's Citizen Lab recently published research analyzing the use of Internet filtering technology developed by Canadian company Netsweeper in ten countries globally — Afghanistan, Bahrain, India, Kuwait, Pakistan, Qatar, Somalia, Sudan, United Arab Emirates, and Yemen — and concluded these uses likely violated international human rights law. Products like Netsweeper’s Internet filtering systems are often referred to as "dual …