Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Biennial Symposium (1)
- Buspirone Patent and Antitrust Litigation (1)
- CMA (1)
- Code Red (1)
- CompuServe Inc. v. Cyber Promotions (1)
-
- Computer Fraud and Abuse Act of 1986 (1)
- Computer Misuse Act (1)
- Computer Virus Eradication Act (1)
- Computer crimes (1)
- Council of Europe (1)
- Electronic commerce (1)
- Electronic notices (1)
- FOIA (1)
- GILC (1)
- Global Internet Liberty Campaign (1)
- He Doctrine of Equivalents and Prosecution History Estoppel: The Supreme Court Supports Flexibility Over Certaintiy in Patent Cases in Festo v. SMC (1)
- I LOVE YOU virus (1)
- ICCPR (1)
- ISPs (1)
- International Covenant on Civil and Political Rights (1)
- Internet privacy (1)
- Microsoft (1)
- N Search of a Balance Between Police Power and Privacy in the Cybercrime Treaty (1)
- NIIPA (1)
- PDPA (1)
- Patent (1)
- Patent filing (1)
- Personal Data Privacy Act (1)
- Sovereign Domains A Declaration of Independence of ccTLDs from Foreign Control (1)
- Technology (1)
Articles 1 - 4 of 4
Full-Text Articles in Law
Technology Law, J. Douglas Cuthbertson, Glen L. Gross
Technology Law, J. Douglas Cuthbertson, Glen L. Gross
University of Richmond Law Review
No abstract provided.
The Legislative Response To The Evolution Of Computer Viruses, Mark R. Colombell
The Legislative Response To The Evolution Of Computer Viruses, Mark R. Colombell
Richmond Journal of Law & Technology
On July 19, 2001, and again on July 31, 2001, the United States Government was attacked by a worm. The Code Red worm, a malevolent computer program, spread across the Internet impacting thousands of computers globally. The initial target of the Code Red worm was the White House website. Just days after the terrorist attacks in New York, Washington D.C., and Pennsylvania on September 11, the Nimda virus was unleashed on the Internet. By consuming up to ten percent of the Internet's capacity, Nimda quickly received the distinction as the worst computer infestation to date.
Letter From The Editor, John Joseph Meadows
Letter From The Editor, John Joseph Meadows
Richmond Journal of Law & Technology
Welcome, readers, to the ninth year of publication at the Richmond Journal of Law and Technology. The entire Journal Editorial Board and Staff are pleased to report that our inundation with submissions since last Spring has permitted us to be quite choosy in selecting articles for this Issue and we hope you will enjoy them and find them to be insightful and current.
In Search Of A Balance Between Police Power And Privacy In The Cybercrime Treaty, D.C. Kennedy
In Search Of A Balance Between Police Power And Privacy In The Cybercrime Treaty, D.C. Kennedy
Richmond Journal of Law & Technology
Imagine that you wake up one morning, turn on your computer, and open an e-mail message with a catchy phrase in the subject line. Immediately after opening the e-mail’s attachment, your personal computer is severely damaged. Obviously having a bad day, you head to your job as an attorney for a multinational corporation. By the time you arrive at work, there has been damage to company computers across the globe. The monetary costs of the damage, coupled with the downtime, are astronomical. The CEO of your company is furious. You hope to diffuse the situation by informing your boss that …