Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 8 of 8
Full-Text Articles in Law
What's The Big Hurry? The Urgency Of Data Breach Notification, Ellen Cornelius
What's The Big Hurry? The Urgency Of Data Breach Notification, Ellen Cornelius
Homeland Security Publications
No abstract provided.
Data Protection In The Internet: National Rapporteur (Singapore), Ee-Ing Ong
Data Protection In The Internet: National Rapporteur (Singapore), Ee-Ing Ong
Research Collection Yong Pung How School Of Law
National report on Singapore's data protection laws, including the Personal Data Protection Act, and how data protection laws are implemented and enforced in Singapore.
The Battlefield Of Tomorrow, Today: Can A Cyberattack Ever Rise To An “Act Of War?”, Christopher M. Sanders
The Battlefield Of Tomorrow, Today: Can A Cyberattack Ever Rise To An “Act Of War?”, Christopher M. Sanders
Utah Law Review
In a sense, war has not changed. The end results will always remain the same: death and destruction; even if that destruction is not fully tangible. The results may be instantaneous, or they may be delayed. It is only the means implemented to achieve these destructive ends that evolve. Cyberwarfare is a product of that evolution. Most importantly, we must always remain abreast of evolution and the changes in warfare in order to effectively and efficiently respond to new attacks, and to prevent them as well.
This Note sheds light on recent evolution in warfare. It enlightens the reader of …
“Private” Cybersecurity Standards? Cyberspace Governance, Multistakeholderism, And The (Ir)Relevance Of The Tbt Regime, Shin-Yi Peng
“Private” Cybersecurity Standards? Cyberspace Governance, Multistakeholderism, And The (Ir)Relevance Of The Tbt Regime, Shin-Yi Peng
Cornell International Law Journal
We are now living in a hyper-connected world, with a myriad of devices continuously linked to the Internet. Our growing dependence on such devices exposes us to a variety of cybersecurity threats. This ever-increasing connectivity means that vulnerabilities can be introduced at any phase of the software development cycle. Cybersecurity risk management, therefore, is more important than ever to governments at all developmental stages as well as to companies of all sizes and across all sectors. The awareness of cybersecurity threats affects the importance placed on the use of standards and certification as an approach.
Risk And Anxiety: A Theory Of Data Breach Harms, Danielle K. Citron, Daniel Solove
Risk And Anxiety: A Theory Of Data Breach Harms, Danielle K. Citron, Daniel Solove
Faculty Scholarship
In lawsuits about data breaches, the issue of harm has confounded courts. Harm is central to whether plaintiffs have standing to sue in federal court and whether their claims are viable. Plaintiffs have argued that data breaches create a risk of future injury from identity theft or fraud and that breaches cause them to experience anxiety about this risk. Courts have been reaching wildly inconsistent conclusions on the issue of harm, with most courts dismissing data breach lawsuits for failure to allege harm. A sound and principled approach to harm has yet to emerge, resulting in a lack of consensus …
Cybersecurity And Tax Reform, Michael Hatfield
Cybersecurity And Tax Reform, Michael Hatfield
Indiana Law Journal
INTRODUCTION
I. THE PAST AND FUTURE OF THE IRS AS A CYBERATTACK TARGET
A. IRS AS A CYBERATTACK TARGET
B. THE FUTURE OF THE IRS AS A CYBERATTACK TARGET1. INFORMATION TECHNOLOGY
2. TAX INFORMATION
3. TYPES OF FUTURE ATTACKS
II. THE IRSWILL FAIL TO IMPLEMENT ADEQUATE CYBERSECURITY
A. VERY POOR HISTORY OF IMPROVING TECHNOLOGY
B. INADEQUATE FUNDING
C. INABILITY TO RECRUIT AND RETAIN EXPERTS
D. TOOMANY USERS
E. CYBERSECURITY IS DIFFICULT
III. BETTER DIGITAL TECHNOLOGY IS NOT THE GOAL
A. SLOWING THE USE OF DIGITAL TECHNOLOGY
B. CYBERSECURITY AND TAX REFORM
1. PAY-AS-YOU-EARN (PAYE)
2. SIMPLIFIED INCOME TAX
3. PURIFIED …
Ng9-1-1, Cybersecurity, And Contributions To The Model Framework For A Secure National Infrastructure, Andrew Jackson Coley
Ng9-1-1, Cybersecurity, And Contributions To The Model Framework For A Secure National Infrastructure, Andrew Jackson Coley
Catholic University Journal of Law and Technology
9-1-1 call networks form the foundation of emergency communications infrastructure. However, a lack of funding and taking such networks for granted has led to a gradual yet predictable outdating of this critical infrastructure. Fortunately, recent efforts have acknowledged as such, and dedicated public safety officials have worked to update 9-1-1 systems to Next Generation 9-1-1 (NG9-1-1).
NG9-1-1 is an IP-based network with 21stcentury technology capable of handling increased call volume, more resilient networks, and providing significantly more data to first responders, among litany of other advancements. With this much needed advancement comes the responsibilities of ensuring a secure …
The Industrial Internet Of Things: Risks, Liabilities, And Emerging Legal Issues, Mauricio Paez, Kerianne Tobitsch
The Industrial Internet Of Things: Risks, Liabilities, And Emerging Legal Issues, Mauricio Paez, Kerianne Tobitsch
NYLS Law Review
No abstract provided.