Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Computer networks (1)
- Computer servers (1)
- Consumers (1)
- Data security (1)
- Disclaimers (1)
-
- Electronic Communications Privacy Act (1)
- Electronic commerce (1)
- Email (1)
- Federal Wiretap Act (1)
- History (1)
- Industries (1)
- Internet (1)
- Liability (1)
- Mail (1)
- Misrepresentation (1)
- Privacy (1)
- Product security (1)
- Risk (1)
- Search warrants (1)
- Searches (1)
- Seizures (1)
- Software (1)
- Stored Communications Act (1)
- Telecommunications (1)
- Telephones (1)
- Warranties (1)
- Websites (1)
- Wiretapping (1)
Articles 1 - 2 of 2
Full-Text Articles in Law
The Need For Revisions To The Law Of Wiretapping And Interception Of Email, Robert A. Pikowsky
The Need For Revisions To The Law Of Wiretapping And Interception Of Email, Robert A. Pikowsky
Michigan Telecommunications & Technology Law Review
I argue that a person's privacy interest in his email is the same as his privacy interest in a telephone conversation. Moreover, the privacy interest in email remains unchanged regardless of whether it is intercepted in transmission or covertly accessed from the recipient's mailbox. If one accepts this assumption, it follows that the level of protection against surveillance by law enforcement officers should be the same[...] As technology continues to blur the distinction between wire and electronic communication, it becomes apparent that a new methodology must be developed in order to provide logical and consistent protection to private communications. The …
Snake-Oil Security Claims The Systematic Misrepresentation Of Product Security In The E-Commerce Arena, John R. Michener, Steven D. Mohan, James B. Astrachan, David R. Hale
Snake-Oil Security Claims The Systematic Misrepresentation Of Product Security In The E-Commerce Arena, John R. Michener, Steven D. Mohan, James B. Astrachan, David R. Hale
Michigan Telecommunications & Technology Law Review
The modern commercial systems and software industry in the United States have grown up in a snake-oil salesman's paradise. The largest sector of this industry by far is composed of standard commercial systems that are marketed to provide specified functionality (e.g. Internet web server, firewall, router, etc.) Such products are generally provided with a blanket disclaimer stating that the purchaser must evaluate the suitability of the product for use, and that the user assumes all liability for product behavior. In general, users cannot evaluate and cannot be expected to evaluate the security claims of a product. The ability to analyze …