Open Access. Powered by Scholars. Published by Universities.®

Computer Law Commons

Open Access. Powered by Scholars. Published by Universities.®

2556 Full-Text Articles 2177 Authors 954645 Downloads 74 Institutions

All Articles in Computer Law

Faceted Search

2556 full-text articles. Page 1 of 58.

It Stands To Reason: An Argument For Article Iii Standing Based On The Threat Of Future Harm In Data Breach Litigation, John Biglow 2016 University of Minnesota Law School

It Stands To Reason: An Argument For Article Iii Standing Based On The Threat Of Future Harm In Data Breach Litigation, John Biglow

Minnesota Journal of Law, Science & Technology

No abstract provided.


Generic Pharmaceuticals And The "Unfortunate Hand" Dealt To Harmed Consumers: The Emerging State Court Resistance, Arlen W. Langvardt 2016 Indiana University

Generic Pharmaceuticals And The "Unfortunate Hand" Dealt To Harmed Consumers: The Emerging State Court Resistance, Arlen W. Langvardt

Minnesota Journal of Law, Science & Technology

No abstract provided.


3d Printers, Physical Viruses, And The Regulation Of Cloud Supercomputing In The Era Of Limitless Design, Peter Jensen-Haxel 2016 University of Minnesota Law School

3d Printers, Physical Viruses, And The Regulation Of Cloud Supercomputing In The Era Of Limitless Design, Peter Jensen-Haxel

Minnesota Journal of Law, Science & Technology

No abstract provided.


The Connected State Of Things: A Lawyer’S Survival Guide In An Internet Of Things World, Antigone Peyton 2016 Cloudigy Law PLLC

The Connected State Of Things: A Lawyer’S Survival Guide In An Internet Of Things World, Antigone Peyton

Catholic University Journal of Law and Technology

No abstract provided.


Decrypting Our Security: A Bipartisan Argument For A Rational Solution To The Encryption Challenge, Jamil N. Jaffer, Daniel J. Rosenthal 2016 George Mason University Law School

Decrypting Our Security: A Bipartisan Argument For A Rational Solution To The Encryption Challenge, Jamil N. Jaffer, Daniel J. Rosenthal

Catholic University Journal of Law and Technology

No abstract provided.


Rats, Traps, And Trade Secrets, Elizabeth A. Rowe 2016 University of Florida Levin School of Law

Rats, Traps, And Trade Secrets, Elizabeth A. Rowe

Elizabeth A Rowe

Technology has facilitated both the amount of trade secrets that are now stored electronically, and the rise of cyber intrusions. Together, this has created a storm perfectly ripe for economic espionage. Cases involving unknown or anonymous offenders who may not be in the United States and who steal trade secrets using remote access tools (“RATs”) are especially problematic. This Article is the first to address and place trade secret misappropriation within the larger backdrop of cybersecurity. First, it argues that systemic issues related to technology will continue to make legislative and judicial solutions suboptimal for cyber misappropriation. Second, it explores ...


Moving Beyond “Reasonable”: Clarifying The Ftc’S Use Of Its Unfairness Authority In Data Security Enforcement Actions, Timothy E. Deal 2016 Fordham University School of Law

Moving Beyond “Reasonable”: Clarifying The Ftc’S Use Of Its Unfairness Authority In Data Security Enforcement Actions, Timothy E. Deal

Fordham Law Review

Data security breaches, which compromise private consumer information, seem to be an ever-increasing threat. To stem this tide, the Federal Trade Commission (FTC) has relied upon its authority to enforce the prohibition against unfair business practices under section 5 of the Federal Trade Commission Act (“section 5”) to hold companies accountable when they fail to employ data security measures that could prevent breaches. Specifically, the FTC brings enforcement actions when it finds that companies have failed to implement “reasonable” data security measures. However, companies and scholars argue that the FTC has not provided adequate notice of which data security practices ...


Personal Data For Decisional Purposes In The Age Of Analytics: From An Individual To A Collective Dimension Of Data Protection, Alessandro Mantelero 2016 Polytechnic University of Turin

Personal Data For Decisional Purposes In The Age Of Analytics: From An Individual To A Collective Dimension Of Data Protection, Alessandro Mantelero

Alessandro Mantelero

In the big data era, new technologies and powerful analytics make it possible to collect and analyse large amounts of data in order to identify patterns in the behaviour of groups, communities and even entire countries.
Existing case law and regulations are inadequate to address the potential risks and issues related to this change of paradigm in social investigation. This is due to the fact that both the right to privacy and the more recent right to data protection are protected as individual rights. The social dimension of these rights has been taken into account by courts and policymakers in ...


Transfer Pricing Challenges In The Cloud, Orly Mazur 2016 Southern Methodist University Dedman School of Law

Transfer Pricing Challenges In The Cloud, Orly Mazur

Boston College Law Review

Cloud computing has fundamentally changed how companies operate. Companies have quickly adapted by moving their businesses to the cloud, but international tax standards have failed to follow suit. As a result, taxpayers and tax administrations confront significant tax challenges in applying outdated tax principles to this new environment. One particular area that raises perplexing tax issues is the transfer pricing rules. The transfer pricing rules set forth the intercompany price a cloud service provider must charge an affiliate using its cloud services, which ultimately affects the determination of the jurisdiction in which the company’s profits are taxed. This Article ...


Rats, Traps, And Trade Secrets, Elizabeth A. Rowe 2016 University of Florida Levin School of Law

Rats, Traps, And Trade Secrets, Elizabeth A. Rowe

Boston College Law Review

Technology has facilitated both the amount of trade secrets that are now stored electronically, and the rise of cyber intrusions. Together, this has created a storm perfectly ripe for economic espionage. Cases involving unknown or anonymous offenders who may not be in the United States and who steal trade secrets using remote access tools (“RATs”) are especially problematic. This Article is the first to address and place trade secret misappropriation within the larger backdrop of cybersecurity. First, it argues that systemic issues related to technology will continue to make legislative and judicial solutions suboptimal for cyber misappropriation. Second, it explores ...


Passing The Virtual Buck: How The Ninth Circuit Used Contributory Trademark Law To Expand Liability For Web Hosts, Alessandra Backus 2016 University of Georgia School of Law

Passing The Virtual Buck: How The Ninth Circuit Used Contributory Trademark Law To Expand Liability For Web Hosts, Alessandra Backus

Journal of Intellectual Property Law

No abstract provided.


Book Review: Digital Crime And Forensic Science In Cyberspace (By P. Kanellis, E. Kiountouzis, N. Kolokotronis, And D. Martakos), Gary Kessler 2016 Embry-Riddle Aeronautical University - Daytona Beach

Book Review: Digital Crime And Forensic Science In Cyberspace (By P. Kanellis, E. Kiountouzis, N. Kolokotronis, And D. Martakos), Gary Kessler

Gary C. Kessler

"This book, according to the preface, 'is intended for those who are interested in a critical overview of what forensic science is, care about privacy issues, and wish to know what constitutes evidence for computer crime.' It goes on to say that the specific audiences for which it was written are students in academia and professionals in the industry.

If used carefully, this book does a good job at providing a snapshot of some of the current issues in digital forensics, although perhaps best aimed at information security professionals. It is a collection of 15 chapters written by authors from ...


Bringing Continuity To Cryptocurrency: Commercial Law As A Guide To The Asset Categorization Of Bitcoin, Evan Hewitt 2016 Seattle University School of Law

Bringing Continuity To Cryptocurrency: Commercial Law As A Guide To The Asset Categorization Of Bitcoin, Evan Hewitt

Seattle University Law Review

This Note will undertake to analyze bitcoin under the Uniform Commercial Code (UCC) and the Internal Revenue Code (IRC)—two important sources of commercial law—to see whether any existing asset categories adequately protect bitcoin’s commercial viability. This Note will demonstrate that although commercial law dictates that bitcoin should—nay must—be regulated as a currency in order to sustain its existence, the very definition of currency seems to preclude that from happening. Therefore, this Note will recommend that we experiment with a new type of asset that receives currency-like treatment, specifically designed for cryptocurrencies, under which bitcoin can ...


Copyright Law: Essential Cases And Materials, Alfred Yen, Joseph Liu 2016 Boston College Law School

Copyright Law: Essential Cases And Materials, Alfred Yen, Joseph Liu

Joseph P. Liu

This casebook emphasizes the essential cases and materials at the heart of copyright law. The result is a streamlined and well-organized casebook of manageable length that keeps the central themes of copyright front and center. It also provides access to a companion Web site containing an extensive library of additional modules, topics, edited cases, notes, problems, and audio-visual materials. Together these materials, along with a companion teacher's manual, allow teachers to easily customize the copyright law course to suit their specific goals. The authors have written extensively about copyright, the arts, and the impact of new technology.


Shifting Data Breach Liability: A Congressional Approach, Justin C. Pierce 2016 College of William & Mary Law School

Shifting Data Breach Liability: A Congressional Approach, Justin C. Pierce

William & Mary Law Review

No abstract provided.


Rants And Raves: Craigslist's Attempt To Stop Innovating Third-Party Web Developers With Copyright Law, Stephanie Marie Davies 2016 University of Georgia School of Law

Rants And Raves: Craigslist's Attempt To Stop Innovating Third-Party Web Developers With Copyright Law, Stephanie Marie Davies

Journal of Intellectual Property Law

No abstract provided.


I Cann't Believe It's Not Better: Why New Gtlds Aer Bad For Brand Owners And Trademark Law, Alexandra Morgan Joseph 2016 University of Georgia School of Law

I Cann't Believe It's Not Better: Why New Gtlds Aer Bad For Brand Owners And Trademark Law, Alexandra Morgan Joseph

Journal of Intellectual Property Law

No abstract provided.


Capitol Records, Inc: Holding No Public Performance Violations For Deleting Duplicative Files Off Cloud Servers And The Positive Future Implications Regarding Consumer Efficiency, Christina Chow 2016 University of Georgia School of Law

Capitol Records, Inc: Holding No Public Performance Violations For Deleting Duplicative Files Off Cloud Servers And The Positive Future Implications Regarding Consumer Efficiency, Christina Chow

Journal of Intellectual Property Law

No abstract provided.


Small Data Surveillance V. Big Data Cybersurveillance, Margaret Hu 2016 Selected Works

Small Data Surveillance V. Big Data Cybersurveillance, Margaret Hu

Margaret Hu

This Article highlights some of the critical distinctions between small data surveillance and big data cybersurveillance as methods of intelligence gathering. Specifically, in the intelligence context, it appears that “collect-it-all” tools in a big data world can now potentially facilitate the construction, by the intelligence community, of other individuals' digital avatars. The digital avatar can be understood as a virtual representation of our digital selves and may serve as a potential proxy for an actual person. This construction may be enabled through processes such as the data fusion of biometric and biographic data, or the digital data fusion of the ...


Contracting For The 'Internet Of Things'. Looking Into The Nest, Guido Noto La Diega, Ian Walden 2016 Queen Mary, University of London

Contracting For The 'Internet Of Things'. Looking Into The Nest, Guido Noto La Diega, Ian Walden

Guido Noto La Diega

The world of the ‘Internet of Things’ (‘IoT’) is just one manifestation of recent developments in information and communication technologies (‘ICTs’), closely tied to others, including ‘cloud computing’ and ‘big data’. For our purposes, the ‘Thing’ in the IoT is any physical entity capable of connectivity that directly interfaces the physical world, such as embedded devices, sensors and actuators. In considering IoT contracts, this paper adopts a case study approach, examining the complexity of IoT through the lens of a specific product: the Nest connected thermostat, part of the Nest Labs business and owned by Google. We focus on the ...


Digital Commons powered by bepress