Open Access. Powered by Scholars. Published by Universities.®

Computer Law Commons

Open Access. Powered by Scholars. Published by Universities.®

3,279 Full-Text Articles 3,046 Authors 1,294,808 Downloads 103 Institutions

All Articles in Computer Law

Faceted Search

3,279 full-text articles. Page 1 of 83.

A Slap On The Wrist: Combatting Russia’S Cyber Attack On The 2016 U.S. Presidential Election, Christina Lam 2018 Boston College Law School

A Slap On The Wrist: Combatting Russia’S Cyber Attack On The 2016 U.S. Presidential Election, Christina Lam

Boston College Law Review

On June 14, 2016, suspicions emerged that Russia launched a cyber attack on the U.S. Democratic National Committee in the midst of an extremely contentious presidential election season. The damage was extensive, occurring over a series of months and resulting in numerous leaks of highly sensitive information regarding Democratic Presidential Candidate Hillary Clinton. After it was verified that Russia was behind the cyber attack, President Barack Obama relied on general and anachronistic principles of international law to issue a grossly ineffective response. Russia’s cyber attack and the U.S. response thus highlighted the ways in which international law ...


Privacy Regulation In The Age Of Biometrics That Deal With A New World Order Of Information, Michael Monajemi 2018 University of Miami Law School

Privacy Regulation In The Age Of Biometrics That Deal With A New World Order Of Information, Michael Monajemi

University of Miami International and Comparative Law Review

No abstract provided.


A Peek Over The Great Firewall: A Breakdown Of China’S New Cybersecurity Law, Jacob Quinn 2018 Southern Methodist University

A Peek Over The Great Firewall: A Breakdown Of China’S New Cybersecurity Law, Jacob Quinn

Science and Technology Law Review

No abstract provided.


Front Matter, 2018 Southern Methodist University

Front Matter

Science and Technology Law Review

No abstract provided.


Curtailing Online Service Provider Immunity From Liability: An Advocacy For The Entension Of Roommates.Com, Corey Patton 2018 Seattle University School of Law

Curtailing Online Service Provider Immunity From Liability: An Advocacy For The Entension Of Roommates.Com, Corey Patton

Seattle University Law Review

Section 230 of the Communications Decency Act (CDA) was enacted following the controversial decision in Stratton Oakmont, Inc. v. Prodigy Servs. Co., where an interactive computer service provider was held liable for a libelous message posted by a user on one of its financial message boards. The court determined that the service provider was a “publisher” of the libelous message for the purposes of state law because it had engaged in screening and moderating of other objectionable posts on its message boards but failed to remove the libelous message in question. Because the service provider voluntarily self-policed some of the ...


The Race Is On! Regulating Self-Driving Vehicles Before They Hit The Streets, Jack Liechtung 2018 Brooklyn Law School

The Race Is On! Regulating Self-Driving Vehicles Before They Hit The Streets, Jack Liechtung

Brooklyn Journal of Corporate, Financial & Commercial Law

As the world braces itself for the unveiling of autonomous vehicles, the idea of regulation and oversight has gone largely undetected. Though some states have already begun enacting legislation ahead of the technology’s wide release, the regulatory landscape across the country is in disarray. It is imperative that both manufacturers and consumers be given some sort of uniform understanding as to how the automation is overseen throughout the manufacturing process and how liability will be levied in the case of inevitable mistakes on our nation’s roadways. This Note proposes that the National Highway Traffic Safety Administration be responsible ...


Remnants Of Net Neutrality: Policing Unlawful Content Through Broadband Providers, Aaron Lerman 2018 Brooklyn Law School

Remnants Of Net Neutrality: Policing Unlawful Content Through Broadband Providers, Aaron Lerman

Brooklyn Journal of Corporate, Financial & Commercial Law

The 2015 Open Internet Order, released by The Federal Communication Commission (FCC), introduced sweeping, new rules that promised to preserve an equal and open Internet to consumers. These rules, otherwise known as “Net Neutrality,” prohibited broadband and internet service providers from impairing, blocking, or throttling access to “lawful content” online. But with a new administration and agenda, the FCC’s 2017 Restoring Internet Freedom Order repealed Net Neutrality. Since then, various states have pushed back against the repeal, with some adopting their own versions of the 2015 Open Internet Order’s Net Neutrality, keeping most of the rule language intact ...


Rise Of The Intelligent Information Brokers: Role Of Computational Law Applications In Administering The Dynamic Cybersecurity Threat Surface In Iot, Eran Kahana 2018 University of Minnesota Law School

Rise Of The Intelligent Information Brokers: Role Of Computational Law Applications In Administering The Dynamic Cybersecurity Threat Surface In Iot, Eran Kahana

Minnesota Journal of Law, Science & Technology

No abstract provided.


Emerging Technologies Challenging Current Legal Paradigms, W. Keith Robinson 2018 Southern Methodist University Dedman School of Law

Emerging Technologies Challenging Current Legal Paradigms, W. Keith Robinson

Minnesota Journal of Law, Science & Technology

No abstract provided.


Out Of Thin Air: Trade Secrets, Cybersecurity, And The Wrongful Acquisition Tort, Sharon Sandeen 2018 Mitchell Hamline School of Law

Out Of Thin Air: Trade Secrets, Cybersecurity, And The Wrongful Acquisition Tort, Sharon Sandeen

Minnesota Journal of Law, Science & Technology

No abstract provided.


Securing The Internet Of Healthcare, Scott J. Shackelford, Michael Mattioli, Steve Myers, Austin Brady 2018 Indiana University Maurer School of Law

Securing The Internet Of Healthcare, Scott J. Shackelford, Michael Mattioli, Steve Myers, Austin Brady

Minnesota Journal of Law, Science & Technology

No abstract provided.


Rewriting The "Book Of The Machine": Regulatory And Liability Issues For The Internet Of Things, Jane Kirtley, Scott Memmel 2018 University of Minnesota Law School

Rewriting The "Book Of The Machine": Regulatory And Liability Issues For The Internet Of Things, Jane Kirtley, Scott Memmel

Minnesota Journal of Law, Science & Technology

No abstract provided.


Biotechnology's Great Divide: Strengthening The Relationship Between Patent Law And Bioethics In The Age Of Crispr-Cas9, Hannah M. Mosby 2018 University of Minnesota Law School

Biotechnology's Great Divide: Strengthening The Relationship Between Patent Law And Bioethics In The Age Of Crispr-Cas9, Hannah M. Mosby

Minnesota Journal of Law, Science & Technology

No abstract provided.


Governing Behind The Cloud: Is Transparency Too "Burdensome" In The Digital Age?, Sam Louwagie 2018 University of Minnesota Law School

Governing Behind The Cloud: Is Transparency Too "Burdensome" In The Digital Age?, Sam Louwagie

Minnesota Journal of Law, Science & Technology

No abstract provided.


No Good Deed Goes Unpunished: The Duties Held By Malware Researchers, Penetration Testers, And "White Hat" Hackers, Jon Watkins 2018 University of Minnesota Law School

No Good Deed Goes Unpunished: The Duties Held By Malware Researchers, Penetration Testers, And "White Hat" Hackers, Jon Watkins

Minnesota Journal of Law, Science & Technology

No abstract provided.


Contents, ADFSL 2018 Embry-Riddle Aeronautical University

Contents, Adfsl

Annual ADFSL Conference on Digital Forensics, Security and Law

No abstract provided.


Front Matter, ADFSL 2018 Embry-Riddle Aeronautical University

Front Matter, Adfsl

Annual ADFSL Conference on Digital Forensics, Security and Law

No abstract provided.


The Naked Truth: Insufficient Coverage For Revenge Porn Victims At State Law And The Proposed Federal Legislation To Adequately Redress Them, Meghan Fay 2018 Boston College Law School

The Naked Truth: Insufficient Coverage For Revenge Porn Victims At State Law And The Proposed Federal Legislation To Adequately Redress Them, Meghan Fay

Boston College Law Review

The distribution of revenge porn is a cyber-bullying phenomenon that has proliferated on the Internet. The nonconsensual sharing of sexually explicit photographs and videos causes irreparable harm to revenge porn victims. The current state of the law, however, does little to redress the damage. Tort claims are often unsuccessful because many victims do not have the resources necessary to initiate a lawsuit. Furthermore, federal law grants operators of revenge porn websites immunity from state tort claims. In an effort to fill this gap in the law, many states have made changes or additions to their criminal statutes. To date, thirty-eight ...


No Harm, No Foul: The Fourth Circuit Struggles With The "Injury-In-Fact" Requirement To Article Iii Standing In Data Breach Class Actions, Brandon Ferrick 2018 Boston College Law School

No Harm, No Foul: The Fourth Circuit Struggles With The "Injury-In-Fact" Requirement To Article Iii Standing In Data Breach Class Actions, Brandon Ferrick

Boston College Law Review

On February 6, 2017, in Beck v. McDonald, the United States Court of Appeals for the Fourth Circuit held that the increased risk of future identity theft created by two data breaches was too speculative to constitute an injury-in-fact for the purposes of Article III standing. The court surveyed the split between its sister circuits and determined that, without allegations that a thief deliberately targeted information, misused, or attempted to misuse that personal information, the risk of identity theft was not sufficiently high so as to meet the injury-in-fact requirement of Article III standing. This Comment examines the Fourth Circuit ...


A Survey Of Lawyers’ Cyber Security Practises In Western Australia, Craig Valli, Mike Johnstone, Rochelle Fleming 2018 Edith Cowan University

A Survey Of Lawyers’ Cyber Security Practises In Western Australia, Craig Valli, Mike Johnstone, Rochelle Fleming

Annual ADFSL Conference on Digital Forensics, Security and Law

This paper reports on the results of a survey that is the initial phase of an action research project being conducted with the Law Society of Western Australia. The online survey forms a baseline for the expression of a targeted training regime aimed at improving the cyber security awareness and posture of the membership of the Society. The full complement of over 3000 members were given the opportunity to participate in the survey, with 122 members responding in this initial round. The survey was designed to elicit responses about information technology use and the awareness of good practices with respect ...


Digital Commons powered by bepress