Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 8 of 8

Full-Text Articles in Law

What's The Big Hurry? The Urgency Of Data Breach Notification, Ellen Cornelius Oct 2018

What's The Big Hurry? The Urgency Of Data Breach Notification, Ellen Cornelius

Homeland Security Publications

No abstract provided.


Data Protection In The Internet: National Rapporteur (Singapore), Ee-Ing Ong Jul 2018

Data Protection In The Internet: National Rapporteur (Singapore), Ee-Ing Ong

Research Collection Yong Pung How School Of Law

National report on Singapore's data protection laws, including the Personal Data Protection Act, and how data protection laws are implemented and enforced in Singapore.


The Battlefield Of Tomorrow, Today: Can A Cyberattack Ever Rise To An “Act Of War?”, Christopher M. Sanders May 2018

The Battlefield Of Tomorrow, Today: Can A Cyberattack Ever Rise To An “Act Of War?”, Christopher M. Sanders

Utah Law Review

In a sense, war has not changed. The end results will always remain the same: death and destruction; even if that destruction is not fully tangible. The results may be instantaneous, or they may be delayed. It is only the means implemented to achieve these destructive ends that evolve. Cyberwarfare is a product of that evolution. Most importantly, we must always remain abreast of evolution and the changes in warfare in order to effectively and efficiently respond to new attacks, and to prevent them as well.

This Note sheds light on recent evolution in warfare. It enlightens the reader of …


“Private” Cybersecurity Standards? Cyberspace Governance, Multistakeholderism, And The (Ir)Relevance Of The Tbt Regime, Shin-Yi Peng Apr 2018

“Private” Cybersecurity Standards? Cyberspace Governance, Multistakeholderism, And The (Ir)Relevance Of The Tbt Regime, Shin-Yi Peng

Cornell International Law Journal

We are now living in a hyper-connected world, with a myriad of devices continuously linked to the Internet. Our growing dependence on such devices exposes us to a variety of cybersecurity threats. This ever-increasing connectivity means that vulnerabilities can be introduced at any phase of the software development cycle. Cybersecurity risk management, therefore, is more important than ever to governments at all developmental stages as well as to companies of all sizes and across all sectors. The awareness of cybersecurity threats affects the importance placed on the use of standards and certification as an approach.


Risk And Anxiety: A Theory Of Data Breach Harms, Danielle K. Citron, Daniel Solove Mar 2018

Risk And Anxiety: A Theory Of Data Breach Harms, Danielle K. Citron, Daniel Solove

Faculty Scholarship

In lawsuits about data breaches, the issue of harm has confounded courts. Harm is central to whether plaintiffs have standing to sue in federal court and whether their claims are viable. Plaintiffs have argued that data breaches create a risk of future injury from identity theft or fraud and that breaches cause them to experience anxiety about this risk. Courts have been reaching wildly inconsistent conclusions on the issue of harm, with most courts dismissing data breach lawsuits for failure to allege harm. A sound and principled approach to harm has yet to emerge, resulting in a lack of consensus …


Cybersecurity And Tax Reform, Michael Hatfield Jan 2018

Cybersecurity And Tax Reform, Michael Hatfield

Indiana Law Journal

INTRODUCTION

I. THE PAST AND FUTURE OF THE IRS AS A CYBERATTACK TARGET

A. IRS AS A CYBERATTACK TARGET

B. THE FUTURE OF THE IRS AS A CYBERATTACK TARGET1. INFORMATION TECHNOLOGY

2. TAX INFORMATION

3. TYPES OF FUTURE ATTACKS

II. THE IRSWILL FAIL TO IMPLEMENT ADEQUATE CYBERSECURITY

A. VERY POOR HISTORY OF IMPROVING TECHNOLOGY

B. INADEQUATE FUNDING

C. INABILITY TO RECRUIT AND RETAIN EXPERTS

D. TOOMANY USERS

E. CYBERSECURITY IS DIFFICULT

III. BETTER DIGITAL TECHNOLOGY IS NOT THE GOAL

A. SLOWING THE USE OF DIGITAL TECHNOLOGY

B. CYBERSECURITY AND TAX REFORM

1. PAY-AS-YOU-EARN (PAYE)

2. SIMPLIFIED INCOME TAX

3. PURIFIED …


Ng9-1-1, Cybersecurity, And Contributions To The Model Framework For A Secure National Infrastructure, Andrew Jackson Coley Jan 2018

Ng9-1-1, Cybersecurity, And Contributions To The Model Framework For A Secure National Infrastructure, Andrew Jackson Coley

Catholic University Journal of Law and Technology

9-1-1 call networks form the foundation of emergency communications infrastructure. However, a lack of funding and taking such networks for granted has led to a gradual yet predictable outdating of this critical infrastructure. Fortunately, recent efforts have acknowledged as such, and dedicated public safety officials have worked to update 9-1-1 systems to Next Generation 9-1-1 (NG9-1-1).
NG9-1-1 is an IP-based network with 21stcentury technology capable of handling increased call volume, more resilient networks, and providing significantly more data to first responders, among litany of other advancements. With this much needed advancement comes the responsibilities of ensuring a secure …


The Industrial Internet Of Things: Risks, Liabilities, And Emerging Legal Issues, Mauricio Paez, Kerianne Tobitsch Jan 2018

The Industrial Internet Of Things: Risks, Liabilities, And Emerging Legal Issues, Mauricio Paez, Kerianne Tobitsch

NYLS Law Review

No abstract provided.