Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Technology (2)
- Access to data (1)
- Content moderation (1)
- Criminal law (1)
- Cryptocurrency (1)
-
- Cyber investigations (1)
- Cyber operations (1)
- Data localization (1)
- Digital revolution (1)
- Federal Rule of Criminal Procedure 41 (1)
- Global Network Initiative Principles (1)
- Hacking (1)
- Information Security (1)
- Information conflict (1)
- Information policy (1)
- International law (1)
- Internet (1)
- Manila Principles (1)
- National security (1)
- Online (1)
- Privacy (1)
- Ransomware (1)
- Santa Clara Principles (1)
- Surveillance (1)
- Telecommunications (1)
Articles 1 - 7 of 7
Full-Text Articles in Law
Data Localization And Government Access To Data Stored Abroad: Discussion Paper 2, Shanzay Pervaiz, Alex Joel
Data Localization And Government Access To Data Stored Abroad: Discussion Paper 2, Shanzay Pervaiz, Alex Joel
Joint PIJIP/TLS Research Paper Series
The Centre for Information Policy Leadership (CIPL) and Tech, Law & Security Program (TLS) have been collaborating on a project regarding data localization policies. As data localization is increasingly gaining traction, we seek to understand the different dimensions of the impacts and effectiveness of these policies. As part of this collaboration—CIPL published a paper on the “real life” business, societal, and consumer impacts of data localization policies and TLS published the present paper on whether data localization measures are legally effective in achieving one of their main ostensible purposes, i.e., to prevent foreign government access to data.
Combating Ransomware: One Year On, V. Gerard Comizio, Gary Corn, William Deckelman, Karl Hopkins, Mark Hughes, Patrick Mccarty, Sujit Raman, Kurt Sanger, Ari Schwartz, Melanie Teplinsky, Jackson Colling
Combating Ransomware: One Year On, V. Gerard Comizio, Gary Corn, William Deckelman, Karl Hopkins, Mark Hughes, Patrick Mccarty, Sujit Raman, Kurt Sanger, Ari Schwartz, Melanie Teplinsky, Jackson Colling
Joint PIJIP/TLS Research Paper Series
No abstract provided.
Content Governance In The Shadows: How Telcos & Other Internet Infrastructure Companies "Moderate" Online Content, Prem M. Trivedi
Content Governance In The Shadows: How Telcos & Other Internet Infrastructure Companies "Moderate" Online Content, Prem M. Trivedi
Joint PIJIP/TLS Research Paper Series
No abstract provided.
Widening The Lens On Content Moderation, Jenna Ruddock, Justin Sherman
Widening The Lens On Content Moderation, Jenna Ruddock, Justin Sherman
Joint PIJIP/TLS Research Paper Series
No abstract provided.
Good Health And Good Privacy Go Hand-In-Hand (Originally Published By Jnslp), Jennifer Daskal
Good Health And Good Privacy Go Hand-In-Hand (Originally Published By Jnslp), Jennifer Daskal
Joint PIJIP/TLS Research Paper Series
No abstract provided.
Covert Deception, Strategic Fraud, And The Rule Of Prohibited Intervention (Originally Published As Part Of The Hoover Institution’S Aegis Series), Gary Corn
Joint PIJIP/TLS Research Paper Series
No abstract provided.
Transnational Government Hacking, Jennifer C. Daskal
Transnational Government Hacking, Jennifer C. Daskal
Joint PIJIP/TLS Research Paper Series
No abstract provided.