Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Law

Chicago-Kent College of Law

2009

Hacking

Articles 1 - 3 of 3

Full-Text Articles in Law

Data Collection And Leakage, Philip Howard, Kris Erickson Jun 2009

Data Collection And Leakage, Philip Howard, Kris Erickson

Chicago-Kent Law Review

Every year millions of digital records containing personally identifiable information are exposed. When are malicious hackers to blame, and when is it organizational malfeasance? Which kinds of organizations—private firms, government agencies, or educational institutions—lose the most data? With over 1.9 billion records lost (on average that's 9 records per U.S. adult), a surprising number of breaches can be attributed to organizational practices.


Trade Secrets, Data Security And Employees, Elizabeth Rowe Jun 2009

Trade Secrets, Data Security And Employees, Elizabeth Rowe

Chicago-Kent Law Review

This essay argues that data security is important to the protection of trade secret information, and that trusted employees on the inside pose the biggest threat to the protection of trade secrets. While investments in technical measures such as firewalls and encryption are important, it is also necessary for companies to consider the internal threats from employees when creating corporate security programs. Ultimately, a more comprehensive approach that includes technical and human elements, as well as consideration of inside and outside threats is likely to be more effective in the battle to secure data.


Optimal Hackback, Jay P. Kesan, Ruperto Majuca Jun 2009

Optimal Hackback, Jay P. Kesan, Ruperto Majuca

Chicago-Kent Law Review

Professor Jay Kesan from the University of Illinois College of Law, in joint work with Ruperto Majuca of the University of Illinois Department of Economics, argue in favor of legal rules that allow "hacking [data] back" in certain business circumstances. They analyze the strategic interaction between the hacker and the attacked company or individual and conclude that neither total prohibition nor unrestrained permission of hack-back is optimal. Instead, they argue that when other alternatives such as criminal enforcement and litigation are ineffective, self-defense is the best response to cybercrime because there is a high likelihood of correctly attacking the criminal, …