Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Internet Law (4)
- Communications Law (2)
- Criminal Law (2)
- Privacy Law (2)
- Science and Technology Law (2)
-
- State and Local Government Law (2)
- Banking and Finance Law (1)
- Business Organizations Law (1)
- Civil Law (1)
- Commercial Law (1)
- Courts (1)
- Criminal Procedure (1)
- Evidence (1)
- Fourth Amendment (1)
- Intellectual Property Law (1)
- Judges (1)
- Law and Society (1)
- Legislation (1)
- National Security Law (1)
- Supreme Court of the United States (1)
- Tax Law (1)
- Taxation-State and Local (1)
- Keyword
-
- Internet (2)
- Mobile (2)
- Technology (2)
- Access (1)
- Attempt liability (1)
-
- BSC (1)
- Banking (1)
- Base (1)
- Business (1)
- CDMA (1)
- CSLI (1)
- Capacity (1)
- Cell (1)
- Cell phone (1)
- Child porn (1)
- Child pornography (1)
- Child sex crime (1)
- Code (1)
- Computer crimes (1)
- Connectivity (1)
- Connie Frances (1)
- Constitution (1)
- Controller (1)
- Country (1)
- Crime (1)
- Criminal law (1)
- Cyber (1)
- Cybersecurity (1)
- Defenses (1)
- Doctrine (1)
Articles 1 - 6 of 6
Full-Text Articles in Computer Law
Taxing The New With The Old: Capturing The Value Of Data With The Corporate Income Tax In Virginia, Coleman H. Cheeley
Taxing The New With The Old: Capturing The Value Of Data With The Corporate Income Tax In Virginia, Coleman H. Cheeley
University of Richmond Law Review
The Commonwealth of Virginia markets itself as “The Largest Data Center Market in the World.”In 2019, the Northern Virginia market alone was the largest in the United States by inventory, with room to grow. In 2021, data centers in Northern Virginia required an estimated 1,686 megawatts of power; that number is expected to increase by 200 megawatts in the near future, reflecting data centers currently under development. For reference, in 2022, it was estimated that more than 100 homes could be powered by one megawatt of solar power in Virginia. Historically, data centers have been located in the Commonwealth due …
Digital Technology And Analog Law: Cellular Location Data, The Third-Party Doctrine, And The Law's Need To Evolve, Justin Hill
Digital Technology And Analog Law: Cellular Location Data, The Third-Party Doctrine, And The Law's Need To Evolve, Justin Hill
University of Richmond Law Review
No abstract provided.
Enhancing Cybersecurity In The Private Sector By Means Of Civil Liability Lawsuits - The Connie Francis Effect, Jeffrey F. Addicott
Enhancing Cybersecurity In The Private Sector By Means Of Civil Liability Lawsuits - The Connie Francis Effect, Jeffrey F. Addicott
University of Richmond Law Review
The purpose of this article is to explore the threats posed by
cybersecurity breaches, outline the steps taken by the government
to address those threats in the private sector economy, and
call attention to the ultimate solution, which will most certainly
spur private businesses to create a more secure cyber environment
for the American people-a Connie Francis-styled cyber civil
action lawsuit.
New Technology, Old Defenses: Internet Sting Operations And Attempt Liability, Audrey Rogers
New Technology, Old Defenses: Internet Sting Operations And Attempt Liability, Audrey Rogers
University of Richmond Law Review
No abstract provided.
Technology Law, J. Douglas Cuthbertson, Glen L. Gross
Technology Law, J. Douglas Cuthbertson, Glen L. Gross
University of Richmond Law Review
No abstract provided.
Virginia's Response To Computer Abuses: An Act In Five Crimes, Daniel R. Burk
Virginia's Response To Computer Abuses: An Act In Five Crimes, Daniel R. Burk
University of Richmond Law Review
The threat depicted in War Games has been both rebuked as impossible and highlighted as much closer to the realm of possibility than even the creators of the movie may have surmised. Regardless of the actual possibility of a creative mind breaking through the security of the North America Air Defense Command computer with an auto-dialing modem and the simple password "JOSHUA" the adventures of the curious "hackers" and the singularly-directed criminal have been widely publicized and have captured both the fear and respect of computer owners throughout the country.