Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Privacy Law (34)
- Computer Law (31)
- Internet Law (20)
- Science and Technology Law (19)
- Consumer Protection Law (8)
-
- Business Organizations Law (7)
- Communications Law (7)
- Computer Sciences (6)
- Information Security (6)
- Law and Society (6)
- Physical Sciences and Mathematics (6)
- Administrative Law (5)
- Contracts (5)
- Health Law and Policy (5)
- Intellectual Property Law (5)
- Comparative and Foreign Law (4)
- Constitutional Law (4)
- National Security Law (4)
- Legislation (3)
- Business (2)
- Business Administration, Management, and Operations (2)
- Commercial Law (2)
- Courts (2)
- Criminal Law (2)
- Databases and Information Systems (2)
- E-Commerce (2)
- First Amendment (2)
- International Law (2)
- Law and Economics (2)
- Institution
-
- University of Michigan Law School (13)
- Boston University School of Law (10)
- Chicago-Kent College of Law (8)
- George Washington University Law School (5)
- Duke Law (4)
-
- William & Mary Law School (4)
- Cornell University Law School (3)
- Maurer School of Law: Indiana University (3)
- The Catholic University of America, Columbus School of Law (3)
- University of Colorado Law School (3)
- Selected Works (2)
- University of Miami Law School (2)
- University of Pittsburgh School of Law (2)
- Vanderbilt University Law School (2)
- City University of New York (CUNY) (1)
- Cleveland State University (1)
- Columbia Law School (1)
- Embry-Riddle Aeronautical University (1)
- Fordham Law School (1)
- Georgetown University Law Center (1)
- Maurice A. Deane School of Law at Hofstra University (1)
- National Law School of India University (1)
- Saint Louis University School of Law (1)
- SelectedWorks (1)
- Singapore Management University (1)
- St. Mary's University (1)
- Touro University Jacob D. Fuchsberg Law Center (1)
- U.S. Naval War College (1)
- University of New Hampshire (1)
- University of Oklahoma College of Law (1)
- Publication Year
- Publication
-
- Faculty Scholarship (9)
- Chicago-Kent Law Review (8)
- Michigan Telecommunications & Technology Law Review (7)
- GW Law Faculty Publications & Other Works (5)
- Articles by Maurer Faculty (3)
-
- Duke Journal of Comparative & International Law (3)
- Michigan Law Review (3)
- Michigan Technology Law Review (3)
- Publications (3)
- Articles (2)
- Catholic University Law Review (2)
- Cornell International Law Journal (2)
- University of Miami Law Review (2)
- Vanderbilt Journal of Entertainment & Technology Law (2)
- Books (1)
- Catholic University Journal of Law and Technology (1)
- Cornell Law Faculty Publications (1)
- Duke Law Journal (1)
- Edward A. Morse (1)
- Faculty Publications (1)
- Fordham Law Review (1)
- Georgetown Law Faculty Publications and Other Works (1)
- Hofstra Law Review (1)
- Indian Journal of Law and Technology (1)
- International Law Studies (1)
- Jared A. Harshbarger (1)
- Journal of Digital Forensics, Security and Law (1)
- Journal of Law and Health (1)
- Oklahoma Law Review (1)
- Publications and Research (1)
- Publication Type
- File Type
Articles 61 - 83 of 83
Full-Text Articles in Law
Best Practices And The State Of Information Security, Kevin Cronin
Best Practices And The State Of Information Security, Kevin Cronin
Chicago-Kent Law Review
The forces of globalization, together with widely available industry standards and best practices, and heightened state legislative activity, are driving the U.S. towards a more unified approach to data security. But the success of this unified approach requires more than free market efficiency and innovation. In order to maintain a state of evolutionary equilibrium in the global information economy, the U.S. must move from a fragmented approach towards data security and privacy standards, towards a more comprehensive set of standards with new penalties and effective enforcement, to better reflect the inherent value of personal data in today's global marketplace.
Patenting Cryptographic Technology, Greg Vetter
Patenting Cryptographic Technology, Greg Vetter
Chicago-Kent Law Review
The policy concerns intersecting patent law and cryptographic technology relate to the technology's beneficial uses in securing information in a commercial and social fabric that increasingly relies on computing and electronic communications for its makeup. The presence of patenting in a technology can impact diffusion of interoperable technology. Standardized embeddable cryptography facilitates its supply. Patent law for several decades has waxed and waned in its embrace of software implemented inventions rooted in abstract ideas such as the mathematics and mathematical algorithms underlying modern cryptography. This article documents the growth of cryptographic patenting. Then, in light of this growth and patent …
Data Collection And Leakage, Philip Howard, Kris Erickson
Data Collection And Leakage, Philip Howard, Kris Erickson
Chicago-Kent Law Review
Every year millions of digital records containing personally identifiable information are exposed. When are malicious hackers to blame, and when is it organizational malfeasance? Which kinds of organizations—private firms, government agencies, or educational institutions—lose the most data? With over 1.9 billion records lost (on average that's 9 records per U.S. adult), a surprising number of breaches can be attributed to organizational practices.
Trade Secrets, Data Security And Employees, Elizabeth Rowe
Trade Secrets, Data Security And Employees, Elizabeth Rowe
Chicago-Kent Law Review
This essay argues that data security is important to the protection of trade secret information, and that trusted employees on the inside pose the biggest threat to the protection of trade secrets. While investments in technical measures such as firewalls and encryption are important, it is also necessary for companies to consider the internal threats from employees when creating corporate security programs. Ultimately, a more comprehensive approach that includes technical and human elements, as well as consideration of inside and outside threats is likely to be more effective in the battle to secure data.
Returning To A Principled Basis For Data Protection, Gus Hosein
Returning To A Principled Basis For Data Protection, Gus Hosein
Chicago-Kent Law Review
Society must remain conscious of both pragmatic and principle-based rationales for information security rules. The identity card debate in the United Kingdom provides an example of exactly why a governmental information security approach that is sensitive to civil liberties would be the best approach to data protection. In contrast, we should be cautious of a balancing test that places security in parity with civil liberties and, therefore, erroneously allows pragmatism to triumph over principle.
Optimal Hackback, Jay P. Kesan, Ruperto Majuca
Optimal Hackback, Jay P. Kesan, Ruperto Majuca
Chicago-Kent Law Review
Professor Jay Kesan from the University of Illinois College of Law, in joint work with Ruperto Majuca of the University of Illinois Department of Economics, argue in favor of legal rules that allow "hacking [data] back" in certain business circumstances. They analyze the strategic interaction between the hacker and the attacked company or individual and conclude that neither total prohibition nor unrestrained permission of hack-back is optimal. Instead, they argue that when other alternatives such as criminal enforcement and litigation are ineffective, self-defense is the best response to cybercrime because there is a high likelihood of correctly attacking the criminal, …
Information Security, Contract And Liability, Jennifer Chandler
Information Security, Contract And Liability, Jennifer Chandler
Chicago-Kent Law Review
Various common provisions in software end user license agreements undermine cyber security. These include anti-benchmarking provisions and broad exclusions of liability. These short comments suggest that courts and legislatures should take steps to limit the enforceability of contractual provisions that undermine cyber security.
Reasons Why We Should Amend The Constitution To Protect Privacy, Deborah Pierce
Reasons Why We Should Amend The Constitution To Protect Privacy, Deborah Pierce
Chicago-Kent Law Review
Threats to consumer privacy are many, and varied. Some threats come from corporate entities such as data aggregators and social networking sites; while others come from panoptics government surveillance systems such as Secure Flight. Not only can the data be compromised, but consumers may be adversely affected by incorrect information in their files. The time may be right to explicitly protect privacy via a constitutional amendment to the U.S. Constitution.
The U.S. Discovery-Eu Privacy Directive Conflict: Constructing A Three-Tiered Compliance Strategy, Carla L. Reyes
The U.S. Discovery-Eu Privacy Directive Conflict: Constructing A Three-Tiered Compliance Strategy, Carla L. Reyes
Duke Journal of Comparative & International Law
No abstract provided.
Dos And Don'ts Of Data Breach And Information Security Policy, Fred H. Cate, Martin E. Abrams, Paula J. Bruening, Orson Swindle
Dos And Don'ts Of Data Breach And Information Security Policy, Fred H. Cate, Martin E. Abrams, Paula J. Bruening, Orson Swindle
Articles by Maurer Faculty
No abstract provided.
Privacy Protection: When Is “Adequate” Actually Adequate?, Nikhil S. Palekar
Privacy Protection: When Is “Adequate” Actually Adequate?, Nikhil S. Palekar
Duke Journal of Comparative & International Law
No abstract provided.
E-Contract Doctrine 2.0: Standard Form Contracting In The Age Of Online User Participation , Shmuel I. Becher, Tal Z. Zarsky
E-Contract Doctrine 2.0: Standard Form Contracting In The Age Of Online User Participation , Shmuel I. Becher, Tal Z. Zarsky
Michigan Telecommunications & Technology Law Review
The growing popularity of e-commerce transactions revives the perennial question of consumer contract law: should non-salient provisions of consumer standard form contracts be enforced? With the focus presently on an ex-ante analysis, scholars debate whether consumers can and should read standardized terms at the time of contracting. In today's information age, such a focus might be misguided. The online realm furnishes various tools, so-called "Web 2.0" applications, which encourage the flow of information from experienced to prospective consumers. This Article, therefore, reframes the analysis of online consumer contracts while taking into account this new flow of information. In doing so, …
When Mobile Phones Are Rfid-Equipped - Finding E.U.-U.S. Solutions To Protect Consumer Privacy And Facilitate Mobile Commerce, Nancy J. King
When Mobile Phones Are Rfid-Equipped - Finding E.U.-U.S. Solutions To Protect Consumer Privacy And Facilitate Mobile Commerce, Nancy J. King
Michigan Telecommunications & Technology Law Review
New mobile phones have been designed to include delivery of mobile advertising and other useful location-based services, but have they also been designed to protect consumers' privacy? One of the key enabling technologies for these new types of phones and new mobile services is Radio Frequency Identification (RFID), a wireless communication technology that enables the unique identification of tagged objects. In the case of RFID-enabled mobile phones, the personal nature of the devices makes it very likely that, by locating a phone, businesses will also be able to locate its owner. Consumers are currently testing new RFID-enabled phones around the …
Opinionated Software, Meiring De Villiers
Opinionated Software, Meiring De Villiers
Vanderbilt Journal of Entertainment & Technology Law
Information security is an important and urgent priority in the computer systems of corporations, governments, and private users. Malevolent software, such as computer viruses and worms, constantly threatens the confidentiality, integrity, and availability of digital information. Virus detection software announces the presence of a virus in a program by issuing a virus alert. A virus alert presents two conflicting legal issues. A virus alert, as a statement on an issue of great public concern, merits protection under the First Amendment. The reputational interest of a plaintiff disparaged by a virus alert, on the other hand, merits protection under the law …
Information Security Breaches: Looking Back & Thinking Ahead, Fred H. Cate
Information Security Breaches: Looking Back & Thinking Ahead, Fred H. Cate
Articles by Maurer Faculty
No abstract provided.
Information Governance: A Model For Security In Medical Practice, Patricia A. Williams
Information Governance: A Model For Security In Medical Practice, Patricia A. Williams
Journal of Digital Forensics, Security and Law
Information governance is becoming an important aspect of organisational accountability. In consideration that information is an integral asset of most organisations, the protection of this asset will increasingly rely on organisational capabilities in security. In the medical arena this information is primarily sensitive patient-based information. Previous research has shown that application of security measures is a low priority for primary care medical practice and that awareness of the risks are seriously underestimated. Consequently, information security governance will be a key issue for medical practice in the future. Information security governance is a relatively new term and there is little existing …
'Code' And The Slow Erosion Of Privacy, Bert-Jaap Koops, Ronald Leenes
'Code' And The Slow Erosion Of Privacy, Bert-Jaap Koops, Ronald Leenes
Michigan Telecommunications & Technology Law Review
The notion of software code replacing legal code as a mechanism to control human behavior--"code as law"--is often illustrated with examples in intellectual property and freedom of speech. This Article examines the neglected issue of the impact of "code as law" on privacy. To what extent is privacy-related "code" being used, either to undermine or to enhance privacy? On the basis of cases in the domains of law enforcement, national security, E-government, and commerce, it is concluded that technology rarely incorporates specific privacy-related norms. At the same time, however, technology very often does have clear effects on privacy, as it …
Snake-Oil Security Claims The Systematic Misrepresentation Of Product Security In The E-Commerce Arena, John R. Michener, Steven D. Mohan, James B. Astrachan, David R. Hale
Snake-Oil Security Claims The Systematic Misrepresentation Of Product Security In The E-Commerce Arena, John R. Michener, Steven D. Mohan, James B. Astrachan, David R. Hale
Michigan Telecommunications & Technology Law Review
The modern commercial systems and software industry in the United States have grown up in a snake-oil salesman's paradise. The largest sector of this industry by far is composed of standard commercial systems that are marketed to provide specified functionality (e.g. Internet web server, firewall, router, etc.) Such products are generally provided with a blanket disclaimer stating that the purchaser must evaluate the suitability of the product for use, and that the user assumes all liability for product behavior. In general, users cannot evaluate and cannot be expected to evaluate the security claims of a product. The ability to analyze …
The Emergence Of Website Privacy Norms, Steven A. Hetcher
The Emergence Of Website Privacy Norms, Steven A. Hetcher
Michigan Telecommunications & Technology Law Review
Part I of the Article will first look at the original privacy norms that emerged at the Web's inception in the early 1990s. Two groups have been the main contributors to the emergence of these norms; the thousands of commercial websites on the early Web, on the one hand, and the millions of users of the early Web, on the other hand. The main structural feature of these norms was that websites benefitted through the largely unrestricted collection of personal data while consumers suffered injury due to the degradation of their personal privacy from this data collection. In other words, …
Database Protection: Resolving The U.S. Database Dilemma With An Eye Toward International Protection, Michael Freno
Database Protection: Resolving The U.S. Database Dilemma With An Eye Toward International Protection, Michael Freno
Cornell International Law Journal
No abstract provided.
Establishing A Legitimate Expectation Of Privacy In Clickstream Data, Gavin Skok
Establishing A Legitimate Expectation Of Privacy In Clickstream Data, Gavin Skok
Michigan Telecommunications & Technology Law Review
This Article argues that Web users should enjoy a legitimate expectation of privacy in clickstream data. Fourth Amendment jurisprudence as developed over the last half-century does not support an expectation of privacy. However, reference to the history of the Fourth Amendment and the intent of its drafters reveals that government investigation and monitoring of clickstream data is precisely the type of activity the Framers sought to limit. Courts must update outdated methods of expectation of privacy analysis to address the unique challenges posed by the Internet in order to fulfill the Amendment's purpose. Part I provides an overview of the …
Encryption’S Importance To Economic And Infrastructure Security, F. Lynn Mcnulty
Encryption’S Importance To Economic And Infrastructure Security, F. Lynn Mcnulty
Duke Journal of Comparative & International Law
No abstract provided.
Personal Privacy In The Computer Age: The Challenge Of A New Technology In An Information-Oriented Society, Arthur R. Miller
Personal Privacy In The Computer Age: The Challenge Of A New Technology In An Information-Oriented Society, Arthur R. Miller
Michigan Law Review
The purpose of this Article is to survey the new technology's implications for personal privacy and to evaluate the contemporary common-law and statutory pattern relating to data-handling. In the course of this examination, it will appraise the existing framework's capacity to deal with the problems created by society's growing awareness of the primordial character of information. The Article is intended to be suggestive; any attempt at definitiveness would be premature. Avowedly, it was written with the bias of one who believes that the new information technology has enormous long-range societal implications and who is concerned about the consequences of the …