Open Access. Powered by Scholars. Published by Universities.®
- Publication
Articles 1 - 2 of 2
Full-Text Articles in Law
Hey! You! Get Off Of My Cloud: Defining And Protecting The Metes And Bounds Of Privacy, Security, And Property In Cloud Computing, Timothy D. Martin
Hey! You! Get Off Of My Cloud: Defining And Protecting The Metes And Bounds Of Privacy, Security, And Property In Cloud Computing, Timothy D. Martin
Timothy D Martin
Cloud computing is a growing force in today’s interconnected technological world. It allows people and organizations to purchase computing power and resources on an as-needed, pay-as-you-go basis. Users can employ it to satisfy modest needs, such as simple word-processing tasks, or to create large-scale enterprise applications delivered on the web. But cloud computing raises questions of functionality, security, confidentiality, ethics, enforcement, and data ownership. The lack of a clear body of law defining and regulating law enforcement’s access to electronic data and ability to prosecute related crimes creates other risks and erodes confidence in cloud computing. This paper begins with …
The Federal Response To A Tragic Teen Suicide: The Stretching Of A Statute To Punish Cyber-Harassment, The Groundbreaking Trial, Implications For Everyone, And Suggestions For The Future., John M. Ivancie
John M Ivancie Jr.
This paper revolves around the novel use of the federal Computer Fraud and Abuse Act to prosecute a Missouri woman, who, with her high-school-aged daughter, and a teenage employee created a fake MySpace.com account to get information about, and harass the daughter’s teen-aged friend. This harassment eventually led to that young girls suicide. No local law was broken by the trio’s actions, and thus, there was nothing local law-enforcement authorities could do. Federal prosecutors in California did respond and charged the mother under the Computer Fraud and Abuse Act, a Federal anti-hacking statute. The way prosecutors used the statute is …