Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 7 of 7

Full-Text Articles in Law

Disloyal Computer Use And The Computer Fraud And Abuse Act: Narrowing The Scope, Greg Pollaro Aug 2010

Disloyal Computer Use And The Computer Fraud And Abuse Act: Narrowing The Scope, Greg Pollaro

Duke Law & Technology Review

Congress drafted the Computer Fraud and Abuse Act (CFAA) to protect government interest computers from malicious attacks by hackers. As computer use has expanded in the years since its enactment, the CFAA has similarly expanded to cover a number of computer-related activities. This iBrief discusses the extension of the CFAA into the employer/employee context, suggests that this goes beyond the Act's express purpose, compares the different approaches taken by the circuit courts in applying the CFAA to disloyal computer use by employees, and argues that the more recent approach taken by the Ninth Circuit provides a better model for determining …


Substantially Justified? The U.S. Government’S Use Of Name-Check Technologies In Naturalization Procedures, H. Jin Cho Jun 2010

Substantially Justified? The U.S. Government’S Use Of Name-Check Technologies In Naturalization Procedures, H. Jin Cho

Duke Law & Technology Review

The U.S. Citizenship and Immigration Services relies upon the Federal Bureau of Investigation to administer the National Name Check Program, which conducts background checks on applicants for naturalization. Backlogs have led to long delays for aspiring citizens and significant legal problems for the government.

This iBrief examines the First Circuit’s ruling in Aronov v. Napolitano that an eighteen-month delay in adjudicating a naturalization application was substantially justified. While the government’s inefficiency can be explained partly by an understaffed bureaucracy, overwhelming evidence suggests that these problems are exacerbated by a technological infrastructure that is ill-equipped to handle the scope of the …


Cyber Warfare And The Crime Of Aggression: The Need For Individual Accountability On Tomorrow’S Battlefield, Jonathan A. Ophardt Feb 2010

Cyber Warfare And The Crime Of Aggression: The Need For Individual Accountability On Tomorrow’S Battlefield, Jonathan A. Ophardt

Duke Law & Technology Review

As cyberspace matures, the international system faces a new challenge in confronting the use of force. Non-State actors continue to grow in importance, gaining the skill and the expertise necessary to wage asymmetric warfare using non-traditional weaponry that can create devastating real-world consequences. The international legal system must adapt to this battleground and provide workable mechanisms to hold aggressive actors accountable for their actions. The International Criminal Court--the only criminal tribunal in the world with global reach--holds significant promise in addressing this threat. The Assembly of State Parties should construct the definition of aggression to include these emerging challenges. By …


Enforcing International Corrupt Practices Law, Paul D. Carrington Jan 2010

Enforcing International Corrupt Practices Law, Paul D. Carrington

Faculty Scholarship

This Essay strives to advance the current international movement to
deter the transnational corrupt practices that have long burdened the global economy and weakened governments, especially in “developing” nations. Laws made in the last decade to address this longstanding global problem have not been effectively enforced. Described here are the moderately successful efforts in the United States since 1862 to reward private citizens serving as enforcers of laws prohibiting corrupt practices. It is suggested that this American experience might be adapted by international organizations to enhance enforcement of the new public international laws.


International Movement To Deter Corruption: Should China Join?, Paul D. Carrington Jan 2010

International Movement To Deter Corruption: Should China Join?, Paul D. Carrington

Faculty Scholarship

Global concerns over the corruption of weak governments by firms engaged in transnational business are the source of an international movement that emerged in 1997. Special concern is presently directed at the weakness of enforcement of laws enacted in recent times to deter corrupt business practices in international trade that were enacted in response to that movement. One cause of weakness in law enforcement is the failure of China to share actively in those concerns and the efforts to address them. This essay will briefly record steps taken in other nations to address the concerns and the limited effectiveness of …


What Are We Doing To The Children?: An Essay On Juvenile (In)Justice, Michael E. Tigar Jan 2010

What Are We Doing To The Children?: An Essay On Juvenile (In)Justice, Michael E. Tigar

Faculty Scholarship

No abstract provided.


An Honest Services Debate, Sara Sun Beale Jan 2010

An Honest Services Debate, Sara Sun Beale

Faculty Scholarship

This commentary employs a fictional debate to explore the issues raised by the Supreme Court’s decision in Skilling v. United States, 130 S. Ct. 2896 (2010), which dramatically cut back on “honest services” prosecutions under the mail and wire fraud statutes. In response to an earlier decision by the Supreme Court reading these statutes narrowly, Congress enacted 18 U.S.C. § 1346, which extends mail and wire fraud to schemes to deprive another of “the intangible right of honest services.” In 2009 the Supreme Court granted certiorari in three cases presenting questions concerning the “honest services” provision. One of the cases …