Small Business Cybersecurity: A Loophole To Consumer Data,
2022
St. Mary's University School of Law
Small Business Cybersecurity: A Loophole To Consumer Data, Matthew R. Espinosa
The Scholar: St. Mary's Law Review on Race and Social Justice
Small businesses and small minority owned businesses are vital to our nation’s economy; therefore legislation, regulation, and policy has been created in order to assist them in overcoming their economic stability issues and ensure they continue to serve the communities that rely on them. However, there is not a focus on regulating nor assisting small businesses to ensure their cybersecurity standards are up to par despite them increasingly becoming a victim of cyberattacks that yield high consequences. The external oversight and assistance is necessary for small businesses due to their lack of knowledge in implementing effective cybersecurity policies, the ...
Prospects For Legal Analytics: Some Approaches To Extracting More Meaning From Legal Texts,
2022
University of Cincinnati College of Law
Prospects For Legal Analytics: Some Approaches To Extracting More Meaning From Legal Texts, Kevin D. Ashley
University of Cincinnati Law Review
No abstract provided.
Ransomware, Cyber Sanctions, And The Problem Of Timing,
2022
New England Law | Boston
Ransomware, Cyber Sanctions, And The Problem Of Timing, Christine Abely
Boston College Law Review
This essay argues that the lack of a federal blanket prohibition against ransomware payments undermines the purpose and effectiveness of the U.S. sanctions regime. The U.S. cyber-related sanctions program suffers from an essential problem of timing: often payments to malicious cyber actors are not prohibited until those actors have been named to the Specially Designated Nationals and Blocked Persons List (SDN) maintained by the Office of Foreign Assets Control in the U.S. Department of the Treasury. Yet those actors generally are not so designated until they have been identified as malicious through a completed or attempted attack ...
A Hacker “May” Have Accessed Your Data: Can Victims Of Data Breaches Sue Before Alleging Misuse?,
2022
Boston College Law School
A Hacker “May” Have Accessed Your Data: Can Victims Of Data Breaches Sue Before Alleging Misuse?, John Landzert
Boston College Law Review
On February 4, 2021, in Tsao v. Captiva MVP Restaurant Partners, LLC, the United States Court of Appeals for the Eleventh Circuit held that the mere existence of a data breach is insufficient to grant plaintiffs standing to sue the company that exposed their personal information. By doing so, the Eleventh Circuit aligned itself with the Second, Third, Fourth, and Eighth Circuits. In contrast, the Sixth, Seventh, Ninth, and D.C. Circuits have granted standing in such cases. This Comment argues that the Eleventh Circuit properly applied Supreme Court jurisprudence at the time it decided Tsao and, in light of ...
Enter The Battleverse: China's Metaverse War,
2022
University of South Florida
Enter The Battleverse: China's Metaverse War, Josh Baughman
Military Cyber Affairs
No abstract provided.
Dirty Little Secrets: The Constitutional Feasibility Of Implementing Legislation To Compel Licensing Of Trade Secrets To End The Covid-19 Pandemic,
2022
University of Cincinnati College of Law
Dirty Little Secrets: The Constitutional Feasibility Of Implementing Legislation To Compel Licensing Of Trade Secrets To End The Covid-19 Pandemic, Noah Olson
The University of Cincinnati Intellectual Property and Computer Law Journal
No abstract provided.
Losing Dignity: Eroding Privacy Rights Of Immigrants In Technology-Based Immigration Enforcement,
2022
University of Cincinnati College of Law
Losing Dignity: Eroding Privacy Rights Of Immigrants In Technology-Based Immigration Enforcement, Inma Sumaita
The University of Cincinnati Intellectual Property and Computer Law Journal
No abstract provided.
Infringement, She Wrote: The Intellectual Property Rights Of Victims In True Crime Craze,
2022
University of Cincinnati College of Law
Infringement, She Wrote: The Intellectual Property Rights Of Victims In True Crime Craze, Laura Callihan
The University of Cincinnati Intellectual Property and Computer Law Journal
No abstract provided.
The Patentability Of Inventions With Artificial Intelligence Listed As An Inventor Following Thaler V. Hirshfeld,
2022
University of Cincinnati College of Law
The Patentability Of Inventions With Artificial Intelligence Listed As An Inventor Following Thaler V. Hirshfeld, Kaitlyn Taylor
The University of Cincinnati Intellectual Property and Computer Law Journal
No abstract provided.
Ayla Llc V. Alya Skin Pty. Ltd., 2021 Wl 38233624 (9th Cir. Aug. 27, 2021),
2022
DePaul University College of Law
Ayla Llc V. Alya Skin Pty. Ltd., 2021 Wl 38233624 (9th Cir. Aug. 27, 2021), Liya Levin
DePaul Journal of Art, Technology & Intellectual Property Law
No abstract provided.
Andy Warhol Foundation V. Goldsmith,
2022
DePaul University College of Law
Andy Warhol Foundation V. Goldsmith, Alyssa Weitkamp
DePaul Journal of Art, Technology & Intellectual Property Law
No abstract provided.
Google V. Oracle: The Recent Supreme Court Decision, How It Highlights The Inadequacies Of Shoehorning New Technology Into Intellectual Property Law, And Possible Solutions,
2022
DePaul University College of Law
Google V. Oracle: The Recent Supreme Court Decision, How It Highlights The Inadequacies Of Shoehorning New Technology Into Intellectual Property Law, And Possible Solutions, Claire Price
DePaul Journal of Art, Technology & Intellectual Property Law
No abstract provided.
Updating The Section 230 Safe Harbor Provision In A New Age Of Social Media Platforms,
2022
DePaul University College of Law
Updating The Section 230 Safe Harbor Provision In A New Age Of Social Media Platforms, Arnold Owusu
DePaul Journal of Art, Technology & Intellectual Property Law
No abstract provided.
Strategies To Deter Child Pornography In The Absence Of A Mandatory Encryption Back Door: Tipster Programs, A Licensed Researcher System, Compelled Password Production, & Private Surveillance,
2022
DePaul University
Strategies To Deter Child Pornography In The Absence Of A Mandatory Encryption Back Door: Tipster Programs, A Licensed Researcher System, Compelled Password Production, & Private Surveillance, Anthony Volini, Farzana Ahmed
DePaul Journal of Art, Technology & Intellectual Property Law
No abstract provided.
Government, Big Tech, And Individual Liberty,
2022
Liberty University
Government, Big Tech, And Individual Liberty, Romaine Miller, Johnny B. Davis
Helm's School of Government Conference
The thesis is that the first principles of the Founding Fathers express in the Declaration give the proper guidance for dealing with the impact of high tech on individual liberty.
Beacons: A Viable Solution To The Ever-Evolving Problem Of Corporate Data Breaches,
2022
Northwestern Pritzker School of Law
Beacons: A Viable Solution To The Ever-Evolving Problem Of Corporate Data Breaches, Lauren Fiotakis
Northwestern Journal of Technology and Intellectual Property
In an increasingly virtual world, data breaches continuously plague large corporations. These companies have few options to keep their data out of the hands of persistent hackers, who often discover ways around any safeguards that may be in place. It seems as though any measures companies are currently able to employ merely delay the inevitable breach that will bring with it the potential loss of both customers’ data and their faith in the privacy and security of their information. These attacks can be debilitating to corporations; thus, it seems only fair to provide them the ability to take active measures ...
Cybercrimes And The Rule Of Law In West-Africa: The Republic Of Cote D’Ivoire As A Case-Study.,
2022
Golden Gate University School of Law
Cybercrimes And The Rule Of Law In West-Africa: The Republic Of Cote D’Ivoire As A Case-Study., John N. Adu
Theses and Dissertations
Since becoming independent nations in the 60s, West-African countries have enacted laws and regulations with the goals of ensuring peace and justice within their respective borders. On the paper, there was no difference between the justice systems of those newly independent nations and the justice systems of their former masters.
Unfortunately, the rule of law in West-African nations since gaining independence, has not always been followed for a myriad of social, cultural, political, and economic reasons. Most justice systems in West-Africa including in Cote d’Ivoire are deeply corrupted, thus rendering the goal of a peaceful society through a fair ...
Proposed L-Shape Pattern On Ufs Acm For Risk Analysis,
2022
Shri Rawatpura Sarkar University, Raipur, India
Proposed L-Shape Pattern On Ufs Acm For Risk Analysis, Abhishek Asthana, Padma Lochan Pradhan Dr
Journal of Digital Forensics, Security and Law
At this cloud age, there is tremendous growth in business, services, resources, and cloud technology. This growth comes with a risk of unsafe, unordered, and uncertainty due to unauthorized access and theft of confidential propriety data. Our objective is to model around Read, Write and Execute to resolve these unordered, unsafe, and uncertain issues. We will develop a L-Shape pattern model matching UFS ACM to minimize the accessibilities based on RIGHT & ROLE of the resources and maximize the quality of services for safety and high availability. The preventive, detective, corrective (PDC) services are the major roles for all levels of ...
The Hydraulics Of Intermediary Liability Regulation,
2022
Cleveland State University
The Hydraulics Of Intermediary Liability Regulation, Ben Horton
Cleveland State Law Review
The intermediary immunity created by Section 230 probably protects claims based on the non-legal harms of hate speech and misinformation as well as a European-style proportionality system of content moderation better than a more “legalized” intermediary liability regime would. Contrasting the existing non-copyright content moderation systems with empirical research on the effects of the Digital Millennium Copyright Act (DMCA) shows that a comprehensive regulation of content moderation would incentivize the moderation of defamation and negligence claims at the expense of these important non-legal claims and incentivize a homogenous, categorical approach to content moderation. Furthermore, empirical research on the effects of ...
The Increased Use And Permanency Of Technology: How Those Changes Impact Attorneys’ Professional Responsibility And Ethical Obligations To Clients And Recommendations For Improvement,
2022
University of Miami Law School
The Increased Use And Permanency Of Technology: How Those Changes Impact Attorneys’ Professional Responsibility And Ethical Obligations To Clients And Recommendations For Improvement, Scott B. Piekarsky
University of Miami Business Law Review
No abstract provided.