Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Series

Cybersecurity

Discipline
Institution
Publication Year
Publication

Articles 1 - 30 of 108

Full-Text Articles in Law

Law School News: Rwu Graduates Encouraged To 'Be Fearless' And To Always 'Seek Knowledge', Mel Thibeault May 2024

Law School News: Rwu Graduates Encouraged To 'Be Fearless' And To Always 'Seek Knowledge', Mel Thibeault

Life of the Law School (1993- )

No abstract provided.


Roger Williams University Commencement Exercises : Class Of 2024 : May 17, 2024, Roger Williams University May 2024

Roger Williams University Commencement Exercises : Class Of 2024 : May 17, 2024, Roger Williams University

School of Law Commencement (1996- )

No abstract provided.


Law School News: Elisabeth D'Amelio Chosen As Class Of 2024 Graduate Student Commencement Speaker 5-14-24, Jordan J. Phelan May 2024

Law School News: Elisabeth D'Amelio Chosen As Class Of 2024 Graduate Student Commencement Speaker 5-14-24, Jordan J. Phelan

Life of the Law School (1993- )

No abstract provided.


Shields Up For Software, Derek E. Bambauer, Melanie J. Teplinsky Dec 2023

Shields Up For Software, Derek E. Bambauer, Melanie J. Teplinsky

UF Law Faculty Publications

This Article contends that the National Cybersecurity Strategy's software liability regime should incorporate two safe harbors. The first would shield software creators and vendors from liability for decisions related to design, implementation, and maintenance, as long as those choices follow enumerated best practices. The second—the “inverse safe harbor”—would have the opposite effect: coders and distributors who engaged in defined worst practices would automatically become liable. This Article explains the design, components, and justifications for these twin safe harbors. The software safe harbors are key parts of the overall design of the new liability regime and work in tandem with the …


Two Visions Of Digital Sovereignty, Sujit Raman Sep 2023

Two Visions Of Digital Sovereignty, Sujit Raman

Joint PIJIP/TLS Research Paper Series

No abstract provided.


Cyber Plungers: Colonial Pipeline And The Case For An Omnibus Cybersecurity Legislation, Asaf Lubin Jul 2023

Cyber Plungers: Colonial Pipeline And The Case For An Omnibus Cybersecurity Legislation, Asaf Lubin

Articles by Maurer Faculty

The May 2021 ransomware attack on Colonial Pipeline was a wake-up call for a federal administration slow to realize the dangers that cybersecurity threats pose to our critical national infrastructure. The attack forced hundreds of thousands of Americans along the east coast to stand in endless lines for gas, spiking both prices and public fears. These stressors on our economy and supply chains triggered emergency proclamations in four states, including Georgia. That a single cyberattack could lead to a national emergency of this magnitude was seen by many as proof of even more crippling threats to come. Executive Director of …


Law School News: Rwu Alumni Named To Pbn's 2023 40 Under Forty List 7/5/2023, Stacey Pacheco Jul 2023

Law School News: Rwu Alumni Named To Pbn's 2023 40 Under Forty List 7/5/2023, Stacey Pacheco

Life of the Law School (1993- )

No abstract provided.


Commencement Exercises Roger Williams University Class Of 2023, Roger Williams University, Roger Williams University School Of Law Jun 2023

Commencement Exercises Roger Williams University Class Of 2023, Roger Williams University, Roger Williams University School Of Law

School of Law Commencement (1996- )

No abstract provided.


Optimizing Cybersecurity Risk In Medical Cyber-Physical Devices, Christopher S. Yoo, Bethany Lee Apr 2023

Optimizing Cybersecurity Risk In Medical Cyber-Physical Devices, Christopher S. Yoo, Bethany Lee

All Faculty Scholarship

Medical devices are increasingly connected, both to cyber networks and to sensors collecting data from physical stimuli. These cyber-physical systems pose a new host of deadly security risks that traditional notions of cybersecurity struggle to take into account. Previously, we could predict how algorithms would function as they drew on defined inputs. But cyber-physical systems draw on unbounded inputs from the real world. Moreover, with wide networks of cyber-physical medical devices, a single cybersecurity breach could pose lethal dangers to masses of patients.

The U.S. Food and Drug Administration (FDA) is tasked with regulating medical devices to ensure safety and …


Securing Patent Law, Charles Duan Jan 2023

Securing Patent Law, Charles Duan

Articles in Law Reviews & Other Academic Journals

A vigorous conversation about intellectual property rights and national security has largely focused on the defense role of those rights, as tools for responding to acts of foreign infringement. But intellectual property, and patents in particular, also play an arguably more important offense role. Foreign competitor nations can obtain and assert U.S. patents against U.S. firms and creators. Use of patents as an offense strategy can be strategically coordinated to stymie domestic innovation and technological progress. This Essay considers current and possible future practices of patent exploitation in this offense setting, with a particular focus on China given the nature …


Newsletter, Fall 2022 Oct 2022

Newsletter, Fall 2022

Newsletter

No abstract provided.


Newsletter, Winter 2022 Jan 2022

Newsletter, Winter 2022

Newsletter

No abstract provided.


The Failure Of Data Security Law, Daniel J. Solove, Woodrow Hartzog Jan 2022

The Failure Of Data Security Law, Daniel J. Solove, Woodrow Hartzog

GW Law Faculty Publications & Other Works

In this book chapter, we survey the law and policy of data security and analyze its strengths and weaknesses. Broadly speaking, there are three types of data security laws: (1) breach notification laws; (2) security safeguards laws that require substantive measures to protect security; and (3) private litigation under various causes of action. We argue that despite some small successes, the law is generally failing to combat the data security threats we face.

Breach notification laws merely require organizations to provide transparency about data breaches, but the laws don’t provide prevention or a cure. Security safeguards laws are often enforced …


An Overview Of Privacy Law In 2022, Daniel J. Solove, Paul M. Schwartz Jan 2022

An Overview Of Privacy Law In 2022, Daniel J. Solove, Paul M. Schwartz

GW Law Faculty Publications & Other Works

Chapter 1 of PRIVACY LAW FUNDAMENTALS (6th edition, IAPP 2022) provides an overview of information privacy law circa 2022. The chapter summarizes the common themes in privacy laws and discusses the various types of laws (federal, constitutional, state, international). It contains a list and brief summary of the most significant U.S. federal privacy laws. The heart of the chapter is an historical timeline of major developments in the law of privacy and data security, including key cases, enactments of laws, major regulatory developments, influential publications, and other significant events. The chapter also contains a curated list of important treatises and …


Platforms, Encryption, And The Cfaa: The Case Of Whatsapp V Nso Group, Jonathon Penney, Bruce Schneier Jan 2022

Platforms, Encryption, And The Cfaa: The Case Of Whatsapp V Nso Group, Jonathon Penney, Bruce Schneier

Articles, Book Chapters, & Popular Press

End-to-end encryption technology has gone mainstream. But this wider use has led hackers, cybercriminals, foreign governments, and other threat actors to employ creative and novel attacks to compromise or workaround these protections, raising important questions as to how the Computer Fraud and Abuse Act (CFAA), the primary federal anti-hacking statute, is best applied to these new encryption implementations. Now, after the Supreme Court recently narrowed the CFAA’s scope in Van Buren and suggested it favors a code-based approach to liability under the statute, understanding how best to theorize sophisticated code-based access barriers like end-to-end encryption, and their circumvention, is now …


Breached! Why Data Security Law Fails And How To Improve It (Chapter 1), Daniel J. Solove, Woodrow Hartzog Jan 2022

Breached! Why Data Security Law Fails And How To Improve It (Chapter 1), Daniel J. Solove, Woodrow Hartzog

GW Law Faculty Publications & Other Works

Digital connections permeate our lives—and so do data breaches. Given that we must be online for basic communication, finance, healthcare, and more, it is remarkable how difficult it is to secure our personal information. Despite the passage of many data security laws, data breaches are increasing at a record pace. In their book, BREACHED! WHY DATA SECURITY LAW FAILS AND HOW TO IMPROVE IT (Oxford University Press 2022), Professors Daniel Solove and Woodrow Hartzog argue that the law fails because, ironically, it focuses too much on the breach itself.

Drawing insights from many fascinating stories about data breaches, Solove and …


Indiana Law’S Lubin, Sun Help Advise Kosovo Government On Country’S Cybersecurity Act, James Owsley Boyd Dec 2021

Indiana Law’S Lubin, Sun Help Advise Kosovo Government On Country’S Cybersecurity Act, James Owsley Boyd

Keep Up With the Latest News from the Law School (blog)

No abstract provided.


Securities Law: Overview And Contemporary Issues, Neal Newman, Lawrence J. Trautman Dec 2021

Securities Law: Overview And Contemporary Issues, Neal Newman, Lawrence J. Trautman

Faculty Scholarship

This is not your grandfather’s SEC anymore. Rapid technological change has resulted in novel regulatory issues and challenges, as law and policy struggles to keep pace. The U.S. Securities and Exchange Commission (SEC) reports that “the U.S. capital markets are the deepest, most dynamic, and most liquid in the world. They also have evolved to become increasingly fast and extraordinarily complex. It is our job to be responsive and innovative in the face of significant market developments and trends.” With global markets increasingly interdependent and interconnected and, “as technological advancements and commercial developments have changed how our securities markets operate, …


It's Time To Reform The U.S. Vulnerabilities Equities Process, Amy Gaudion Sep 2021

It's Time To Reform The U.S. Vulnerabilities Equities Process, Amy Gaudion

Faculty Scholarly Works

No abstract provided.


Eu Privacy Law And U.S. Surveillance: Solving The Problem Of Transatlantic Data Transfers, Peter Margulies Mar 2021

Eu Privacy Law And U.S. Surveillance: Solving The Problem Of Transatlantic Data Transfers, Peter Margulies

Law Faculty Scholarship

No abstract provided.


Persuasion About/Without International Law: The Case Of Cybersecurity Norms, Steven R. Ratner Jan 2021

Persuasion About/Without International Law: The Case Of Cybersecurity Norms, Steven R. Ratner

Book Chapters

International law on cybersecurity is characterized by at best a thin consensus on the existence of rules, their meaning, and the desirability and content of new rules. This legal landscape results in a unique pattern of argumentation and persuasion by states and non-state actors both in advocating for a regulatory scheme for cyber activity and in reacting to malicious cyber acts. By examining argumentation in the absence of a generally agreed legal framework, this chapter seeks to provide new insights into the motivations for and effects of international legal argumentation in shaping debates and behavior. After describing the legal landscape …


Recognizing The Role Of Inspectors General In The U.S. Government's Cybersecurity Restructuring Task, Amy Gaudion Jan 2021

Recognizing The Role Of Inspectors General In The U.S. Government's Cybersecurity Restructuring Task, Amy Gaudion

Faculty Scholarly Works

Months prior to the 2015 public disclosure of a data breach at the U.S. government’s Office of Personnel and Management (OPM), the Office of the Inspector General for OPM issued a report that identified significant deficiencies and material weaknesses in a number of the agency’s information systems and IT security programs. In response to the 2020 SolarWinds supply chain hack, attributed to Russia, calls are underway for inspectors general to conduct audits and inspections and to review prior inspector general assessments of information systems and vulnerabilities at federal agencies. The use of inspectors general to assess information system vulnerabilities and …


Fedaccounts: Digital Dollars, John Crawford, Lev Menand, Morgan Ricks Jan 2021

Fedaccounts: Digital Dollars, John Crawford, Lev Menand, Morgan Ricks

Faculty Scholarship

We are entering a new monetary era. Central banks around the world – spurred by the development of privately controlled digital currencies as well as competition from other central banks – have been studying, building, and, in some cases, issuing central bank digital currency (“CBDC”).

Although digital fiat currency is one of the hottest topics in macroeconomics and central banking today, the discussion has largely overlooked the most straightforward and appealing strategy for implementing a U.S. dollar-based CBDC: expanding access to bank accounts that the Federal Reserve already offers to a small, favored set of clients. These accounts consist of …


The Law And Policy Of Client-Side Scanning (Originally Published By Lawfare), Paul Rosenzweig Aug 2020

The Law And Policy Of Client-Side Scanning (Originally Published By Lawfare), Paul Rosenzweig

Joint PIJIP/TLS Research Paper Series

No abstract provided.


Cybersecurity-The Internet Of Things, Amy J. Ramson Jul 2020

Cybersecurity-The Internet Of Things, Amy J. Ramson

Open Educational Resources

With 38.5 billion smart devices in existence in 2020 and increasing every year, the potential for security breaches in the Internet of things is also escalating at a dramatic pace. The goal of this team activity is to facilitate team work, critical thinking, and presentation skills in the area of cybersecurity and the Internet of Things. Students will be grouped into two teams. As a team, they will analyze cases about security cameras and smart dolls through the questions presented in the activity. They will present their analysis to the class.


Cybersecurity-Corporate Espionage, Amy J. Ramson Jul 2020

Cybersecurity-Corporate Espionage, Amy J. Ramson

Open Educational Resources

The goals of this team activity in the area of criminal law, cybersecurity and cyber crime are to facilitate team work, critical thinking and presentation skills. Students will be grouped into two teams. As a team, they will analyze cases about corporate espionage committed by nation states and industry competitors through the questions presented in the activity. They will present their analysis to the class.


Cybersecurity-Fake News, Amy J. Ramson Jul 2020

Cybersecurity-Fake News, Amy J. Ramson

Open Educational Resources

This goals of this activity are to facilitate team work, critical thinking, and presentation skills in the area of cybersecurity and fake news. Students will be grouped into two teams. As a team, they will choose and analyze cases and ethical questions about fake news through the questions presented in the activity. They will present their analysis to the class.


Cybersecurity-The Silk Road Market, Amy J. Ramson Jul 2020

Cybersecurity-The Silk Road Market, Amy J. Ramson

Open Educational Resources

This presentation is about the Silk Road Market, one of the largest cases of illegal drug activity on the dark web, that the federal government has prosecuted. Beyond discussing the case, the presentation adds general facts about the US Department of Justice, the FBI and the DEA, and federal sentencing. The case discussion includes information about: Ross Ulbricht the creator and head of the market; how the Silk Road operated; the involvement of the FBI and DEA; the trial; the fourth amendment violations alleged by the defense; and the sentencing.


Cybersecurity-Cybercrime-The Legal Environment, Amy J. Ramson Jul 2020

Cybersecurity-Cybercrime-The Legal Environment, Amy J. Ramson

Open Educational Resources

This presentation covers the legal environment of cybercrime to date. It addresses: the challenges of law enforcement; federal government vs. sate jurisdiction of cybercrime; law enforcement department and agencies which handle cybercrime; criminal statutes and privacy statutes.


Law School News: Distinguished Research Professor: John Chung 05-24-2020, Michael M. Bowden May 2020

Law School News: Distinguished Research Professor: John Chung 05-24-2020, Michael M. Bowden

Life of the Law School (1993- )

No abstract provided.