Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 7 of 7

Full-Text Articles in Law

Insurance And Enterprise: Cyber Insurance For Ransomware, Tom Baker, Anja Shortland Dec 2022

Insurance And Enterprise: Cyber Insurance For Ransomware, Tom Baker, Anja Shortland

All Faculty Scholarship

Selling insurance gives insurers an incentive to manage insured risks. The “insurance as governance” literature demonstrates that insurers often make insurance conditional on ex ante risk reduction or mitigation. But insurance governs in support of enterprise, not security for its own sake. Tight underwriting inhibits enterprise – not only for insured businesses but also the business of insurance. This paper highlights ex post loss reduction as a form of insurance-based governance. Drawing on interviews with industry insiders, we explore how insurers addressed the evolving problems of moral hazard, uncertainty, and correlated losses since the 1990s. We find that cyber insurance …


The Government Behind Insurance Governance: Lessons For Ransomware, Tom Baker, Anja Shortland Nov 2022

The Government Behind Insurance Governance: Lessons For Ransomware, Tom Baker, Anja Shortland

All Faculty Scholarship

The insurance as governance literature focuses on the ability of private enterprises to collectively regulate, pool, and distribute risks. This paper analyzes how governments support insurance markets to maintain insurability and limit risks to society. We propose a new conceptual framework grouping government interventions into three dimensions: regulation of risky activity, public investment in risk reduction, and co-insurance. We apply this framework to six case studies, describing insurance markets’ reliance on public support in more analytically precise terms. We analyze how mature insurance markets overcame insurability challenges akin to those currently presented by extortive cybercrime. Private governance struggled when markets …


The Pivotal Role Of International Human Rights Law In Defeating Cybercrime: Amid A (Un-Backed) Global Treaty On Cybercrime, Professor Fatemah Albader Nov 2022

The Pivotal Role Of International Human Rights Law In Defeating Cybercrime: Amid A (Un-Backed) Global Treaty On Cybercrime, Professor Fatemah Albader

Vanderbilt Journal of Transnational Law

On May 26, 2021, the General Assembly of the United Nations adopted a resolution approving the drafting of a new global treaty on cybercrime, which commenced in February 2022. The proposed UN agreement on cybercrime regulation has garnered significant criticism among the international community, namely by state delegates, human rights advocates, and nongovernmental organizations. Fears stem from the belief that such a treaty would be used to legitimize abusive practices and undermine fundamental human rights. National cybercrime laws already unduly restrict human rights. However, at a time where the global community has moved toward a digital world, it becomes even …


Ip Addresses And Expeditious Disclosure Of Identity In India, Prashant Iyengar Sep 2022

Ip Addresses And Expeditious Disclosure Of Identity In India, Prashant Iyengar

Indian Journal of Law and Technology

Concomitant with the proliferation of cybercrime in India has been the use of Internet Protocol (IP) addresses by law enforcement agencies to track down criminals. While useful in many situations, the potential for misuse of this information raises important concerns for the privacy of individuals online. This note reviews the statutory mechanisms regulating the retention and disclosure of IP addresses by internet companies in India. It identifies and analyses the four broad sources to which the regime of IP Address disclosure by Internet Service Providers (ISP) may be traced: under the (i) operating licenses issued under the Telegrah Act, 1885, …


New Crimes Under The Information Technology (Amendment) Act, Amlan Mohanty Sep 2022

New Crimes Under The Information Technology (Amendment) Act, Amlan Mohanty

Indian Journal of Law and Technology

This paper delineates the legislative response to cyber crime in India with an analysis of the Information Technology (Amendment) Act, 2008 focussing on the new crimes introduced by the amendment, on the touchstone of cyber crime legislative standards across jurisdictions. Thus, a brief look at the jurisprudential basis for criminalisation of cyberspace activities has been undertaken, following which, the new crimes have been examined section-wise. The paper uses the theoretical framework set out in the first section to probe the various problems that the Amendment Act poses in light of bad drafting and lack of understanding in the area.


Institutional Doxing And Attribution: Searching For Solutions To A Law-Free Zone, Kimberlee Styple Jan 2022

Institutional Doxing And Attribution: Searching For Solutions To A Law-Free Zone, Kimberlee Styple

Georgia Journal of International & Comparative Law

No abstract provided.


Fifth-Dimensional Warfare And National Security In Canada: Situating Microdeviation Theory Within C-59: An Act Respecting National Security Matters, Hayden Slight Jan 2022

Fifth-Dimensional Warfare And National Security In Canada: Situating Microdeviation Theory Within C-59: An Act Respecting National Security Matters, Hayden Slight

Theses and Dissertations (Comprehensive)

In an era of rapid technological change, the growing threat environment in the cyber dimension will continue to influence how a sovereign nation contends with attacks that can occur from any corner of the world. The growing adaptation and expansion of technology belonging to the Internet of Things (IoT) and the increasing prevalence of social media (Facebook, Twitter) has also influenced the spreading of attack surfaces that can become victim to exploitation by motivated parties including foreign states and terrorist groups. Against this backdrop, Canada’s own efforts to modernize and reinforce its own national security agencies resulted in the developing …