Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Internet--Law and legislation (2)
- Right of privacy (2)
- Apple Computer Inc. (1)
- Broadband communication systems (1)
- Cyberterrorism (1)
-
- Data protection--Law and Legislation (1)
- Data protection--Law and legislation (1)
- Deterrence (Strategy) (1)
- Due process of law (1)
- Electronic data processing (1)
- Electronic information resources (1)
- Electronic records (1)
- European Union (1)
- Freedom of speech (1)
- Human rights (1)
- Information commons (1)
- Information networks—Law and legislation (1)
- Intellectual property (1)
- Jurisdiction (1)
- Law enforcement (1)
- Libel and slander (1)
- Military law (1)
- National security (1)
- National security--Law and legislation (1)
- Self-defense (International law) (1)
- Telecommunication--Law and legislation (1)
- Terrorism--Prevention (1)
- Transborder data flow--Law and legislation (1)
Articles 1 - 6 of 6
Full-Text Articles in Law
Ships Passing In The Night: The Communications Act And The Convergence On Broadband, Stuart Minor Benjamin
Ships Passing In The Night: The Communications Act And The Convergence On Broadband, Stuart Minor Benjamin
Faculty Scholarship
The Communications Act of 1934 and its amendments (the “Act”), and the regulations implementing them, have been enormously important to traditional telephony, broadcasting, and multichannel video. Meanwhile, the internet is barely mentioned in the Act. It thus might seem reasonable to conclude that the Act stands as a colossus and that the argument for overhauling it has grown much stronger as the Telecommunications Act of 1996 (the “1996 Act”) becomes ever more outdated. In this Article I suggest otherwise. Specifically, I make three claims—one descriptive, one a bit speculative, and one normative. The descriptive claim is that significant portions of …
Social Justice And Silicon Valley: A Perspective On The Apple-Fbi Case And The “Going Dark” Debate, Charles J. Dunlap Jr.
Social Justice And Silicon Valley: A Perspective On The Apple-Fbi Case And The “Going Dark” Debate, Charles J. Dunlap Jr.
Faculty Scholarship
No abstract provided.
"Cybervandalism" Or "Digital Act Of War?" America's Muddled Approach To Cyber Incidents Will Not Deter More Crises, Charles J. Dunlap Jr.
"Cybervandalism" Or "Digital Act Of War?" America's Muddled Approach To Cyber Incidents Will Not Deter More Crises, Charles J. Dunlap Jr.
Faculty Scholarship
If experts say a "malicious [cyber] code"' has "similar effects" to a "physical bomb,"' and that code actually causes "a stunning breach of global internet stability," is it really accurate to call that event merely an instance of a "cyber attack"?
Moreover, can you really expect to deter state and non-state actors from employing such code and similarly hostile cyber methodologies if all they think that they are risking is being labeled as a cyber-vandal subject only to law enforcement measures? Or might they act differently if it were made clear to them that such activity is considered an "armed …
Sharing By Design: Data And Decentralized Commons, Jorge L. Contreras, Jerome H. Reichman
Sharing By Design: Data And Decentralized Commons, Jorge L. Contreras, Jerome H. Reichman
Faculty Scholarship
Ambitious international data-sharing initiatives have existed for years in fields such as genomics, earth science, and astronomy. But to realize the promise of large-scale sharing of scientific data, intellectual property (IP), data privacy, national security, and other legal and policy obstacles must be overcome. While these issues have attracted significant attention in the corporate world, they have been less appreciated in academic and governmental settings, where solving issues of legal interoperability among data pools in different jurisdictions has taken a back seat to addressing technical challenges. Yet failing to account for legal and policy issues at the outset of a …
Aiming At The Wrong Target: The "Audience Targeting" Test For Personal Jurisdiction In Internet Defamation Cases, Sarah H. Ludington
Aiming At The Wrong Target: The "Audience Targeting" Test For Personal Jurisdiction In Internet Defamation Cases, Sarah H. Ludington
Faculty Scholarship
In Young v. New Haven Advocate, 315 F.3d 256 (4th Cir. 2002), the Fourth Circuit crafted a jurisdictional test for Internet defamation that requires the plaintiff to show that the defendant specifically targeted an audience in the forum state for the state to exercise jurisdiction. This test relies on the presumption that the Internet — which is accessible everywhere — is targeted nowhere; it strongly protects foreign libel defendants who have published on the Internet from being sued outside of their home states. Other courts, including the North Carolina Court of Appeals, have since adopted or applied the test. The …
Privacy And Law Enforcement In The European Union: The Data Retention Directive, Francesca Bignami
Privacy And Law Enforcement In The European Union: The Data Retention Directive, Francesca Bignami
Faculty Scholarship
This paper examines a recent twist in EU data protection law. In the 1990s, the European Union was still primarily a market-creating organization and data protection in the European Union was aimed at rights abuses by market actors. Since the terrorist attacks of New York, Madrid, and London, however, cooperation on fighting crime has accelerated. Now, the challenge for the European Union is to protect privacy in its emerging system of criminal justice. This paper analyzes the first EU law to address data privacy in crime-fighting—the Data Retention Directive. Based on a detailed examination of the Directive’s legislative history, the …