Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Law

Technology Law, J. Douglas Cuthbertson, Glen L. Gross Nov 2002

Technology Law, J. Douglas Cuthbertson, Glen L. Gross

University of Richmond Law Review

No abstract provided.


The Legislative Response To The Evolution Of Computer Viruses, Mark R. Colombell Jan 2002

The Legislative Response To The Evolution Of Computer Viruses, Mark R. Colombell

Richmond Journal of Law & Technology

On July 19, 2001, and again on July 31, 2001, the United States Government was attacked by a worm. The Code Red worm, a malevolent computer program, spread across the Internet impacting thousands of computers globally. The initial target of the Code Red worm was the White House website. Just days after the terrorist attacks in New York, Washington D.C., and Pennsylvania on September 11, the Nimda virus was unleashed on the Internet. By consuming up to ten percent of the Internet's capacity, Nimda quickly received the distinction as the worst computer infestation to date.


Letter From The Editor, John Joseph Meadows Jan 2002

Letter From The Editor, John Joseph Meadows

Richmond Journal of Law & Technology

Welcome, readers, to the ninth year of publication at the Richmond Journal of Law and Technology. The entire Journal Editorial Board and Staff are pleased to report that our inundation with submissions since last Spring has permitted us to be quite choosy in selecting articles for this Issue and we hope you will enjoy them and find them to be insightful and current.


In Search Of A Balance Between Police Power And Privacy In The Cybercrime Treaty, D.C. Kennedy Jan 2002

In Search Of A Balance Between Police Power And Privacy In The Cybercrime Treaty, D.C. Kennedy

Richmond Journal of Law & Technology

Imagine that you wake up one morning, turn on your computer, and open an e-mail message with a catchy phrase in the subject line. Immediately after opening the e-mail’s attachment, your personal computer is severely damaged. Obviously having a bad day, you head to your job as an attorney for a multinational corporation. By the time you arrive at work, there has been damage to company computers across the globe. The monetary costs of the damage, coupled with the downtime, are astronomical. The CEO of your company is furious. You hope to diffuse the situation by informing your boss that …