Open Access. Powered by Scholars. Published by Universities.®

Computer Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Computer Law

Taxing The New With The Old: Capturing The Value Of Data With The Corporate Income Tax In Virginia, Coleman H. Cheeley Dec 2023

Taxing The New With The Old: Capturing The Value Of Data With The Corporate Income Tax In Virginia, Coleman H. Cheeley

University of Richmond Law Review

The Commonwealth of Virginia markets itself as “The Largest Data Center Market in the World.”In 2019, the Northern Virginia market alone was the largest in the United States by inventory, with room to grow. In 2021, data centers in Northern Virginia required an estimated 1,686 megawatts of power; that number is expected to increase by 200 megawatts in the near future, reflecting data centers currently under development. For reference, in 2022, it was estimated that more than 100 homes could be powered by one megawatt of solar power in Virginia. Historically, data centers have been located in the Commonwealth due …


Digital Technology And Analog Law: Cellular Location Data, The Third-Party Doctrine, And The Law's Need To Evolve, Justin Hill Mar 2017

Digital Technology And Analog Law: Cellular Location Data, The Third-Party Doctrine, And The Law's Need To Evolve, Justin Hill

University of Richmond Law Review

No abstract provided.


Enhancing Cybersecurity In The Private Sector By Means Of Civil Liability Lawsuits - The Connie Francis Effect, Jeffrey F. Addicott Mar 2017

Enhancing Cybersecurity In The Private Sector By Means Of Civil Liability Lawsuits - The Connie Francis Effect, Jeffrey F. Addicott

University of Richmond Law Review

The purpose of this article is to explore the threats posed by

cybersecurity breaches, outline the steps taken by the government

to address those threats in the private sector economy, and

call attention to the ultimate solution, which will most certainly

spur private businesses to create a more secure cyber environment

for the American people-a Connie Francis-styled cyber civil

action lawsuit.


New Technology, Old Defenses: Internet Sting Operations And Attempt Liability, Audrey Rogers Jan 2004

New Technology, Old Defenses: Internet Sting Operations And Attempt Liability, Audrey Rogers

University of Richmond Law Review

No abstract provided.


Technology Law, J. Douglas Cuthbertson, Glen L. Gross Nov 2002

Technology Law, J. Douglas Cuthbertson, Glen L. Gross

University of Richmond Law Review

No abstract provided.


Virginia's Response To Computer Abuses: An Act In Five Crimes, Daniel R. Burk Jan 1984

Virginia's Response To Computer Abuses: An Act In Five Crimes, Daniel R. Burk

University of Richmond Law Review

The threat depicted in War Games has been both rebuked as impossible and highlighted as much closer to the realm of possibility than even the creators of the movie may have surmised. Regardless of the actual possibility of a creative mind breaking through the security of the North America Air Defense Command computer with an auto-dialing modem and the simple password "JOSHUA" the adventures of the curious "hackers" and the singularly-directed criminal have been widely publicized and have captured both the fear and respect of computer owners throughout the country.