Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Series

2008

Faculty Articles

Technology

Articles 1 - 2 of 2

Full-Text Articles in Law

Data Security And Tort Liability, Vincent R. Johnson Jan 2008

Data Security And Tort Liability, Vincent R. Johnson

Faculty Articles

Established tort principles carefully applied to the contemporary problems of cybersecurity and identity theft can perform a key role in protecting the economic foundations of modern life. Tort law offers an appropriate legal regime for allocating the risks and spreading the costs of database intrusion-related losses. It can also create incentives, on the part of both database possessors and data subjects, to minimize the harm associated with breaches of database security.

In considering this field of tort law, it is useful to differentiate three questions. The first issue is whether database possessors have a legal duty to safeguard data subjects’ …


The Protect America Act Of 2007: A Framework For Improving Intelligence Collection In The War On Terror, Jeffrey F. Addicott, Michael T. Mccaul Jan 2008

The Protect America Act Of 2007: A Framework For Improving Intelligence Collection In The War On Terror, Jeffrey F. Addicott, Michael T. Mccaul

Faculty Articles

The most important weapon in the War on Terror is intelligence. The Protect America Act of 2007, a modification of the Foreign Intelligence Surveillance Act (FISA), was favored by Congress for providing a positive framework for ensuring the proper rule of law kept pace with changes in technology. FISA closed the intelligence gaps that had arisen because of the application of the Act to foreign persons in foreign countries.

FISA codifies in federal law the procedures associated with how electronic surveillance and searches of acquisition of foreign intelligence is conducted. In order to conduct electronic surveillance, a court order must …