Open Access. Powered by Scholars. Published by Universities.®

Computer Law Commons

Open Access. Powered by Scholars. Published by Universities.®

International Law

PDF

2013

Articles 1 - 14 of 14

Full-Text Articles in Computer Law

The Uncharted Waters Of Cyberspace: Applying The Principles Of International Maritime Law To The Problem Of Cybersecurity, William M. Stahl Oct 2013

The Uncharted Waters Of Cyberspace: Applying The Principles Of International Maritime Law To The Problem Of Cybersecurity, William M. Stahl

Georgia Journal of International & Comparative Law

No abstract provided.


International Cryptography Regulation And The Global Information Economy, Nathan Saper Sep 2013

International Cryptography Regulation And The Global Information Economy, Nathan Saper

Northwestern Journal of Technology and Intellectual Property

With the meteoric rise of the Internet and e-commerce in the 1990s came great attention to the problems and opportunities associated with cryptography. Throughout that decade, the United States and many foreign countries debated and experimented with various forms of cryptography regulation, and attempts were made at international harmonization. Since then, however, policy-making activity around cryptography has slowed, if not halted altogether, leaving individuals and companies to face a bewildering array of regulations—or, in many cases, to face regulations that are extraordinarily unclear and haphazardly applied.

This Note seeks to introduce the reader to the issue of international cryptography regulation …


Mind The Gap: Explaining Problems With International Law Where Cybersecurity And Critical Infrastructure Protection Meet, David P. Fidler Jul 2013

Mind The Gap: Explaining Problems With International Law Where Cybersecurity And Critical Infrastructure Protection Meet, David P. Fidler

Articles by Maurer Faculty

No abstract provided.


In The Middle: Creating A Middle Road Between U.S. And Eu Data Protection Policies, Carolyn Hoang Apr 2013

In The Middle: Creating A Middle Road Between U.S. And Eu Data Protection Policies, Carolyn Hoang

Journal of the National Association of Administrative Law Judiciary

The first section of this paper examines the historical differences that have led to the American approach to privacy and the European approach to privacy. The second section will examine the current U.S. model, and the third section will examine the EU model. Next, the fourth section will compare and contrast the two models. Finally, the last section will argue that the U.S. should have a regulatory agency and describe how that should look and run.


The Granting Clause And Intellectual Property Rights Management In Open-Source Software Licensing, Vikrant N. Vasudeva Apr 2013

The Granting Clause And Intellectual Property Rights Management In Open-Source Software Licensing, Vikrant N. Vasudeva

IP Theory

No abstract provided.


Private Fair Use: Strengthening Polish Copyright Protection Of Online Works By Looking To U.S. Copyright Law, Michal Pekala Mar 2013

Private Fair Use: Strengthening Polish Copyright Protection Of Online Works By Looking To U.S. Copyright Law, Michal Pekala

Michal Pekala

No abstract provided.


Corresponding Evolution: International Law And The Emergence Of Cyber Warfare, Bradley Raboin Mar 2013

Corresponding Evolution: International Law And The Emergence Of Cyber Warfare, Bradley Raboin

Journal of the National Association of Administrative Law Judiciary

No abstract provided.


Privacy, Transparency & Google's Blurred Glass, Jonathan I. Ezor Feb 2013

Privacy, Transparency & Google's Blurred Glass, Jonathan I. Ezor

Jonathan I. Ezor

No matter the context or jurisdiction, one concept underlies every view of the best practices in data privacy: transparency. The mandate to disclose what personal information is collected, how it is used, and with whom and for what purpose it is shared, is essential to enable informed consent to the collection, along with the other user rights that constitute privacy best practices. Google, which claims to support and offer transparency, is increasingly opaque about its many products and services and the information they collect for it, posing a significant privacy concern.


Data Protection Principles For The 21st Century, Fred H. Cate, Peter Cullen, Viktor Mayer-Schonberger Jan 2013

Data Protection Principles For The 21st Century, Fred H. Cate, Peter Cullen, Viktor Mayer-Schonberger

Books & Book Chapters by Maurer Faculty

This paper proposes revisions to the OECD Guidelines that include basic changes essential for the protection of individual privacy in the 21st century, while avoiding unnecessary restrictions on uses of personal information that are increasingly important.


The Need For International Laws Of War To Include Cyber Attacks Involving State And Non-State Actors, Christopher D. Deluca Jan 2013

The Need For International Laws Of War To Include Cyber Attacks Involving State And Non-State Actors, Christopher D. Deluca

Pace International Law Review Online Companion

This article argues that existing international laws of war are inadequate and need to be adjusted and clearly defined to include cyber attacks involving state and non-state actors. Part II of this article describes the different forms and increasing use of cyber attacks in international conflicts. Part III focuses on the importance and relevance of non-state actors in the international community and today’s asymmetric battlefield. Part IV discusses the applicability of current international laws of war to cyber attacks. Part V of this article suggests ways in which current international law can be improved to include and regulate cyber attacks …


Adequate Attribution: A Framework For Developing A National Policy For Private Sector Use Of Active Defense, Shane Mcgee, Randy V. Sabett, Anand Shah Jan 2013

Adequate Attribution: A Framework For Developing A National Policy For Private Sector Use Of Active Defense, Shane Mcgee, Randy V. Sabett, Anand Shah

Journal of Business & Technology Law

No abstract provided.


Nato, Cyber Defense, And International Law, David P. Fidler, Richard Pregent, Alex Vandurme Jan 2013

Nato, Cyber Defense, And International Law, David P. Fidler, Richard Pregent, Alex Vandurme

Articles by Maurer Faculty

Cybersecurity threats pose challenges to individuals, corporations, states, and intergovernmental organizations. The emergence of these threats also presents international cooperation on security with difficult tasks. This essay analyzes how cybersecurity threats affect the North Atlantic Treaty Organization (NATO), which is arguably the most important collective defense alliance in the world.1 NATO has responded to the cyber threat in policy and operational terms (Part I), but approaches and shifts in cybersecurity policies create problems for NATO— problems that NATO principles, practices, and politics exacerbate in ways that will force NATO to address cyber threats more aggressively than it has done so …


Jurisdiction In Relation To Online Cross-Border Infringements - The Code And The Law, Ulf Maunsbach Dec 2012

Jurisdiction In Relation To Online Cross-Border Infringements - The Code And The Law, Ulf Maunsbach

Ulf Maunsbach

During recent years the European Court of Justice (ECJ) has proven to be increasingly active in relation to cross-border intellectual property disputes. The relevant cases cover a wide range of issues, from advertisement through use of keywords, to copyright-related issues involved in making protected material available through the Internet. All in all, it might be said that the Internet era has finally reached the Court of Justice. A similar development is visible in Swedish courts. This provides for an unlimited amount of material for further discussion. In this paper I would like to provide a short summary of the recent …


Oportunidades Para Las Empresas Dentro De La Omc, Rodolfo C. Rivas Rea Esq. Dec 2012

Oportunidades Para Las Empresas Dentro De La Omc, Rodolfo C. Rivas Rea Esq.

Rodolfo C. Rivas

The author provides a brief overview of the World Trade Organization (WTO), the International Monetary Fund (IMF) and the World Bank (WB) by explaining the context of their interrelationship. Afterwards, the author delves into a brief analysis of Mexico’s role in the International Trade arena and concludes by describing the paths through which the private sector can benefit from the WTO.///////////////////////////////////////////////////////////////////////////////////////El autor pone en contexto la interrelación entre la Organización Mundial del Comercio (OMC) el Banco Mundial (BM) y el Fondo Monetario Internacional (FMI). Posteriormente, el autor describe brevemente el rol de México dentro de las instituciones de Comercio Internacional …