Open Access. Powered by Scholars. Published by Universities.®

Computer Law Commons

Open Access. Powered by Scholars. Published by Universities.®

3,229 Full-Text Articles 2,989 Authors 1,294,808 Downloads 102 Institutions

All Articles in Computer Law

Faceted Search

3,229 full-text articles. Page 1 of 80.

Cybersecurity And The Rights Of The Internet User In France, Jennifer Cross 2018 Augusta Judicial Circuit Law Office of the Public Defender

Cybersecurity And The Rights Of The Internet User In France, Jennifer Cross

Georgia Journal of International & Comparative Law

No abstract provided.


Crashed Software: Assessing Product Liability For Software Defects In Automated Vehicles, Sunghyo Kim 2018 Duke Law

Crashed Software: Assessing Product Liability For Software Defects In Automated Vehicles, Sunghyo Kim

Duke Law & Technology Review

Automated vehicles will not only redefine the role of drivers, but also present new challenges in assessing product liability. In light of the increased risks of software defects in automated vehicles, this Note will review the current legal and regulatory framework related to product liability and assess the challenges in addressing on-board software defects and cybersecurity breaches from both the consumer and manufacturer perspective. While manufacturers are expected to assume more responsibility for accidents as vehicles become fully automated, it can be difficult to determine the scope of liability regarding unexpected software defects. On the other hand, consumers face new ...


Symbols, Systems, And Software As Intellectual Property: Time For Contu, Part Ii?, Timothy K. Armstrong 2018 University of Cincinnati College of Law

Symbols, Systems, And Software As Intellectual Property: Time For Contu, Part Ii?, Timothy K. Armstrong

Michigan Telecommunications and Technology Law Review

The functional nature of computer software underlies two propositions that were, until recently, fairly well settled in intellectual property law: first, that software, like other utilitarian articles, may qualify for patent protection; and second, that the scope of copyright protection for software is comparatively limited. Both propositions have become considerably shakier as a result of recent court decisions. Following Alice Corp. v. CLS Bank Int’l, 134 S. Ct. 2347 (2014), the lower courts have invalidated many software patents as unprotectable subject matter. Meanwhile, Oracle America v. Google Inc., 750 F.3d 1339 (Fed. Cir. 2014) extended far more expansive ...


Unfaithful But Not Without Privacy Protections: The Seventh Circuit Addresses When Courts Should Consider An E-Mail Interception Unlawful In Epstein V. Epstein, Joseph Noreña 2018 Boston College Law School

Unfaithful But Not Without Privacy Protections: The Seventh Circuit Addresses When Courts Should Consider An E-Mail Interception Unlawful In Epstein V. Epstein, Joseph Noreña

Boston College Law Review

On December 14, 2016, the United States Court of Appeals for the Seventh Circuit, in Epstein v. Epstein, held that contemporaneousness is not a determinative factor at the pleadings stage of a claim for the unlawful interception of electronic communications under the Federal Wiretap Act (“FWA”). In so doing, the Seventh Circuit partly departed from the way in which other Federal Circuit Courts had previously considered the statutory language of the FWA, specifically the definitions of “electronic communication” and “intercept” under 18 U.S.C. § 2510(4), (12). This Comment argues that the Seventh Circuit’s holding that contemporaneousness is ...


The Face-Off Between Data Privacy And Discovery: Why U.S. Courts Should Respect Eu Data Privacy Law When Considering The Production Of Protected Information, Samantha Cutler 2018 Boston College Law School

The Face-Off Between Data Privacy And Discovery: Why U.S. Courts Should Respect Eu Data Privacy Law When Considering The Production Of Protected Information, Samantha Cutler

Boston College Law Review

When foreign parties involved in U.S. litigation are ordered to produce information that is protected by EU data privacy law, they are caught in an unfortunate “Catch-22.” Historically, U.S. courts have pointed to the unlikelihood of sanctions for data privacy law violations to justify these orders. EU data privacy law, however, has recently undergone several shifts in favor of tougher rules and significantly increased sanctions. Additionally, EU regulators are now more vigilant and active in enforcing these laws. These developments, combined with the benefits of international judicial respect and the intrinsic value of privacy, mean that U.S ...


The Pragmatic Disappointment Of State Preemption: The 2016 Defend Trade Secrets Act And Its Failure To Protect Employee Whistleblowers From Federal Computer Crime Law, Kristine Craig 2018 Notre Dame Law School

The Pragmatic Disappointment Of State Preemption: The 2016 Defend Trade Secrets Act And Its Failure To Protect Employee Whistleblowers From Federal Computer Crime Law, Kristine Craig

Journal of Legislation

No abstract provided.


The Court Must Play Its Interpretative Role: Defending The Defend Trade Secrets Act’S Extraterritorial Reach, Jada M. Colon 2018 University of Cincinnati College of Law

The Court Must Play Its Interpretative Role: Defending The Defend Trade Secrets Act’S Extraterritorial Reach, Jada M. Colon

The University of Cincinnati Intellectual Property and Computer Law Journal

The exact reach of the Defend Trade Secrets Act’s extraterritoriality provision has yet to be interpreted by the courts. If United States securities, trademark, and antitrust law serves as any indication of what is to be expected, the Defend Trade Secrets Act may be subject to an inconsistent array of interpretation. When faced with interpreting the extraterritorial scope of the Defend Trade Secrets Act for the first time, the court must set a strong precedent by enacting a single, uniform effects test that will not falter when applied in different circumstances and by different circuits. Courts interpreting United States ...


Fool Me Once: Regulating "Fake News" And Other Online Advertising, Abby Wood, Ann M. Ravel, Irina Dykhne 2018 University of Southern California

Fool Me Once: Regulating "Fake News" And Other Online Advertising, Abby Wood, Ann M. Ravel, Irina Dykhne

University of Southern California Legal Studies Working Paper Series

A lack of transparency for online political advertising has long been a problem in American political campaigns. Disinformation attacks that American voters have experienced since the 2016 campaign have made the need for regulatory action more pressing.

Platforms desire self-regulation and have only recently come around to supporting transparency regulations. While government must not regulate the content of political speech, it can, and should, force transparency into the process. We propose several interventions aimed at transparency. Most importantly, campaign finance regulators should require platforms to store and make available ads run on their platforms, as well as the audience at ...


Privacy, Screened Out: Analyzing The Threat To Individual Privacy Rights And Fifth Amendment Protections In State V. Stahl, Jesse Coulon 2018 Boston College Law School

Privacy, Screened Out: Analyzing The Threat To Individual Privacy Rights And Fifth Amendment Protections In State V. Stahl, Jesse Coulon

Boston College Law Review

Courts across the United States have applied Fifth Amendment protections to passcodes, as long as those passcodes are not a foregone conclusion. In order for a court to determine that a passcode is a forgone conclusion, and thus not testimonial in nature, the prosecution must show that they knew the existence, possession, and authenticity of the evidence that would be discovered by the compelled passcode, before the passcode is compelled. The foregone conclusion doctrine was established, and had been used, to balance the need of law enforcement to gather incriminating evidence while still protecting defendants’ Fifth Amendment rights. In 2016 ...


Accessible Reliable Tax Advice, Emily Cauble 2018 DePaul University College of Law

Accessible Reliable Tax Advice, Emily Cauble

University of Michigan Journal of Law Reform

Unsophisticated taxpayers who lack financial resources are disadvantaged by a shortage of adequate tax advice. The IRS does not have the resources to answer all questions asked, and the IRS’s informal advice comes with no guarantee as to its accuracy and offers the taxpayer no protection when it is mistaken. Furthermore, non-IRS sources of advice have not sufficiently filled the void left by a lack of satisfactory IRS guidance. These biases against unsophisticated taxpayers have been noted by existing literature. This Article contributes to existing literature by proposing several novel reform measures to assist unsophisticated taxpayers.

First, with respect ...


Front Matter, 2018 Embry-Riddle Aeronautical University

Front Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Masthead, 2018 Embry-Riddle Aeronautical University

Masthead

Journal of Digital Forensics, Security and Law

No abstract provided.


Preface, 2018 Embry-Riddle Aeronautical University

Preface

Journal of Digital Forensics, Security and Law

No abstract provided.


Back Matter, 2018 Embry-Riddle Aeronautical University

Back Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Drone Forensic Analysis Using Open Source Tools, M A Hannan Bin Azhar, Thomas Edward Allen Barton, Tasmina Islam 2018 Canterbury Christ Chruch University

Drone Forensic Analysis Using Open Source Tools, M A Hannan Bin Azhar, Thomas Edward Allen Barton, Tasmina Islam

Journal of Digital Forensics, Security and Law

Carrying capabilities of drones and their easy accessibility to public have led to an increase in crimes committed using drones in recent years. For this reason, the need for forensic analysis of drones captured from the crime scenes and the devices used for these drones is also paramount. This paper presents the extraction and identification of important artefacts from the recorded flight data as well as the associated mobile devices using open source tools and some basic scripts developed to aid the analysis of two popular drone systems- the DJI Phantom 3 Professional and Parrot AR. Drone 2.0. Although ...


Testing Memory Forensics Tools For The Macintosh Os X Operating System, Charles B. Leopard, Neil C. Rowe, Michael R. McCarrin 2018 U.S. Naval Postgraduate School

Testing Memory Forensics Tools For The Macintosh Os X Operating System, Charles B. Leopard, Neil C. Rowe, Michael R. Mccarrin

Journal of Digital Forensics, Security and Law

Memory acquisition is essential to defeat anti-forensic operating-system features and investigate cyberattacks that leave little or no evidence in secondary storage. The forensic community has developed tools to acquire physical memory from Apple’s Macintosh computers, but they have not much been tested. This work tested three major OS X memory-acquisition tools. Although the tools could capture system memory accurately, the open-source tool OSXPmem appeared advantageous in size, reliability, and support for memory configurations and versions of the OS X operating system.


Hierarchical Bloom Filter Trees For Approximate Matching, David Lillis, Frank Breitinger, Mark Scanlon 2018 University College Dublin

Hierarchical Bloom Filter Trees For Approximate Matching, David Lillis, Frank Breitinger, Mark Scanlon

Journal of Digital Forensics, Security and Law

Bytewise approximate matching algorithms have in recent years shown significant promise in detecting files that are similar at the byte level. This is very useful for digital forensic investigators, who are regularly faced with the problem of searching through a seized device for pertinent data. A common scenario is where an investigator is in possession of a collection of "known-illegal" files (e.g. a collection of child abuse material) and wishes to find whether copies of these are stored on the seized device. Approximate matching addresses shortcomings in traditional hashing, which can only find identical files, by also being able ...


Subscription Information, 2018 Embry-Riddle Aeronautical University

Subscription Information

Journal of Digital Forensics, Security and Law

No abstract provided.


Cover, 2018 Embry-Riddle Aeronautical University

Cover

Journal of Digital Forensics, Security and Law

No abstract provided.


Table Of Contents, 2018 Embry-Riddle Aeronautical University

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


Digital Commons powered by bepress