Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

1998

University of Washington School of Law

Computer Law

Articles 1 - 2 of 2

Full-Text Articles in Law

The Reality Of Bytes: Regulating Economic Activity In The Age Of The Internet, Michael A. Geist Jul 1998

The Reality Of Bytes: Regulating Economic Activity In The Age Of The Internet, Michael A. Geist

Washington Law Review

By utilizing both a backward and forward looking perspective, this Article develops a model conducive to better understand the Internet's legal implications on economic regulation. The model is also intended to help legislators and regulators adapt their legal and regulatory frameworks to the Internet. This Article canvasses and builds upon the burgeoning development of Internet law. It suggests that the Internet's impact on economic regulation is best understood by classifying its effects into four categories, each of which requires a different regulatory response. It also considers potential solutions for adapting economic regulation to the Internet. This Article concludes that no …


Malaysia's "Computer Crimes Act 1997" Gets Tough On Cybercrime But Fails To Advance The Development Of Cyberlaws, Donna L. Beatty Mar 1998

Malaysia's "Computer Crimes Act 1997" Gets Tough On Cybercrime But Fails To Advance The Development Of Cyberlaws, Donna L. Beatty

Washington International Law Journal

Malaysia is in the process of developing the Multimedia Super Corridor ("MSC"), a high-tech zone sometimes called "the Silicon Valley of the East." As a way of attracting investors to the MSC, Malaysia is adopting business-friendly policies and comprehensive "cyberlaws" designed to assure MSC participants that they and their technology will be protected. One of Malaysia's many goals is to be a leader in the development of cyberlaws. However, the Computer Crimes Act 1997 is too flawed to place Malaysia in that role. The Computer Crimes Act is designed to prevent computer crimes such as hacking, virus planting and the …