Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 4 of 4
Full-Text Articles in Law
Vigilantes V. Pirates: The Rumble Over Peer-To-Peer Technology Hits The House Floor, Christopher Fazekas
Vigilantes V. Pirates: The Rumble Over Peer-To-Peer Technology Hits The House Floor, Christopher Fazekas
Duke Law & Technology Review
Content providers are using the digital rights management technology contained in this product to protect the integrity of their content ("Secure Content") so that their intellectual property, including copyright, in such content is not misappropriated... if you elect to download a license from the Internet which enables your use of Secure Content, Microsoft may, in conjunction with such license, also download onto your computer such security updates that a secure content owner has requested that Microsoft distribute.
Protecting The Homeland By Exemption: Why The Critical Infrastructure Information Act Of 2002 Will Degrade The Freedom Of Information Act, Brett Stohs
Duke Law & Technology Review
To protect against "cyberterror," the House version of the Homeland Security Act exempts information related to the nation's critical infrastructure from the Freedom of Information Act disclosure requirements. The proposed exemption unnecessarily threatens public access to vital information about health and safety information; information the Freedom of Information Act was designed to guarantee.
Closed Circuit Television For Inside Your Head: Blanket Traffic Data Retention And The Emergency Anti-Terrorism Legislation, Caspar Bowden
Closed Circuit Television For Inside Your Head: Blanket Traffic Data Retention And The Emergency Anti-Terrorism Legislation, Caspar Bowden
Duke Law & Technology Review
Caspar Bowden, Director of the Foundation for Information Policy Research (FIPR), explains the technical and legal context of unprecedented new surveillance capabilities, with particular reference to the UK's Regulation of Investigatory Powers (RIP) Act 2000. He discusses why these powers are unlikely to be effective in detecting or disrupting the communications of terrorist cells or organized crime, but present significant new threats to the security, privacy, and freedom of expression of the law-abiding.
Cracking The Code To Privacy: How Far Can The Fbi Go?, Angela Murphy
Cracking The Code To Privacy: How Far Can The Fbi Go?, Angela Murphy
Duke Law & Technology Review
As the Nation continues to deal with the fallout of the events of September 11th, it must continue to decide what limits on privacy will be sacrificed in order to allow the government to tighten its security efforts. Who would have guessed that in this crazy post-September 11th world, the latest champion of Constitutional freedoms would be a reputed mobster?