81818app手机版下载

Open Access. Powered by Scholars. Published by Universities.®

Computer Law Commons

Open Access. Powered by Scholars. Published by Universities.®

3,803 Full-Text Articles 3,546 Authors 1,637,661 Downloads 118 Institutions

All Articles in Computer Law

Faceted Search

3,803 full-text articles. Page 1 of 104.

Table Of Contents, Seattle University Law Review 2020 Seattle University School of Law

Table Of Contents, Seattle University Law Review

Seattle University Law Review

81818app手机版下载Table of Contents


Cryptography, Passwords, Privacy, And The Fifth Amendment, Gary C. Kessler, Ann M. Phillips 2020 Gary Kessler Associates / Embry-Riddle Aeronautical University - Daytona Beach

Cryptography, Passwords, Privacy, And The Fifth Amendment, Gary C. Kessler, Ann M. Phillips

Journal of Digital Forensics, Security and Law

Military-grade cryptography has been widely available at no cost for personal and commercial use since the early 1990s. Since the introduction of Pretty Good Privacy (PGP), more and more people encrypt files and devices, and we are now at the point where our smartphones are encrypted by default. While this ostensibly provides users with a high degree of privacy, compelling a user to provide a password has been interpreted by some courts as a violation of our Fifth Amendment protections, becoming an often insurmountable hurdle to law enforcement lawfully executing a search warrant. This paper will explore some of the ...


“My Computer Is My Castle”: New Privacy Frameworks To Regulate Police Hacking, Ivan Škorvánek, Bert-Jaap Koops, Bryce Clayton Newell, Andrew Roberts 2020 Brigham Young University Law School 81818app手机版下载

“My Computer Is My Castle”: New Privacy Frameworks To Regulate Police Hacking, Ivan Škorvánek, Bert-Jaap Koops, Bryce Clayton Newell, Andrew Roberts

BYU Law Review

81818app手机版下载Several countries have recently introduced laws allowing the police to hack into suspects’ computers. Legislators recognize that police hacking is highly intrusive to personal privacy but consider it justified by the increased use of encryption and mobile computing—both of which challenge traditional investigative methods. Police hacking also exemplifies a major challenge to the way legal systems deal with, and conceptualize, privacy. Existing conceptualizations of privacy and privacy rights do not always adequately address the types and degrees of intrusion into individuals’ private lives that police hacking powers enable.

Traditional privacy pillars such as the home and secrecy of communications ...


A Two-Stage Model For Social Network Investigations In Digital Forensics, Anne David, Sarah Morris, Gareth Appleby-Thomas 2020 Cranfield University

A Two-Stage Model For Social Network Investigations In Digital Forensics, Anne David, Sarah Morris, Gareth Appleby-Thomas

Journal of Digital Forensics, Security and Law

81818app手机版下载This paper proposes a two-stage model for identifying and contextualizing features from artefacts created as a result of social networking activity. This technique can be useful in digital investigations and is based on understanding and the deconstruction of the processes that take place prior to, during and after user activity; this includes corroborating artefacts. Digital Investigations are becoming more complex due to factors such as, the volume of data to be examined; different data formats; a wide range of sources for digital evidence; the volatility of data and the limitations of some of the standard digital forensic tools. This paper ...


Is Data Localization A Solution For Schrems Ii?, Anupam Chander 2020 Georgetown University Law Center

Is Data Localization A Solution For Schrems Ii?, Anupam Chander

Georgetown Law Faculty Publications and Other Works

For the second time this decade, the Court of Justice of the European Union has struck a blow against the principal mechanisms for personal data transfer to the United States. In Data Protection Commissioner v Facebook Ireland, Maximillian Schrems, the Court declared the EU-US Privacy Shield invalid and placed significant hurdles to the process of transferring personal data from the European Union to the United States via the mechanism of Standard Contractual Clauses. Many have begun to suggest data localization as the solution to the problem of data transfer; that is, don’t transfer the data at all. I argue ...


Testimony Of Joshua D. Sarnoff Senate Judiciary Committee, Ip Subcommittee June 4, 2019, Joshua D. Sarnoff 2020 DePaul University College of Law

Testimony Of Joshua D. Sarnoff Senate Judiciary Committee, Ip Subcommittee June 4, 2019, Joshua D. Sarnoff

DePaul Journal of Art, Technology & Intellectual Property Law

81818app手机版下载No abstract provided.


Regents Of Univ. Of California V. Broad Inst., Inc., 903 F.3d 1286 (Fed. Cir. 2018), Ali Albazzaz 2020 DePaul University College of Law

Regents Of Univ. Of California V. Broad Inst., Inc., 903 F.3d 1286 (Fed. Cir. 2018), Ali Albazzaz

DePaul Journal of Art, Technology & Intellectual Property Law

No abstract provided.


A Note On Mayo Foundation For Medical Education And Research V. Iancu, Florence Montarmani 2020 DePaul University College of Law

A Note On Mayo Foundation For Medical Education And Research V. Iancu, Florence Montarmani

DePaul Journal of Art, Technology & Intellectual Property Law

81818app手机版下载No abstract provided.


What's Going On With Copyright Trolls?, Edward Grahovec 2020 DePaul University College of Law

What's Going On With Copyright Trolls?, Edward Grahovec

DePaul Journal of Art, Technology & Intellectual Property Law

No abstract provided.


The Constitutionality Of The Hear Act: Empowering American Courts To Return Holocaust-Era Artwork And Honor History, Jennifer A. Kreder, Virginia L. Schell 2020 Northern Kentucky University - Salmon P. Chase College of Law

The Constitutionality Of The Hear Act: Empowering American Courts To Return Holocaust-Era Artwork And Honor History, Jennifer A. Kreder, Virginia L. Schell

DePaul Journal of Art, Technology & Intellectual Property Law

No abstract provided.


The First Amendment And Data Privacy: Securing Data Privacy Laws That Withstand Constitutional Muster, Kathryn Peyton 2020 Pepperdine University

The First Amendment And Data Privacy: Securing Data Privacy Laws That Withstand Constitutional Muster, Kathryn Peyton

Pepperdine Law Review

Given the growing ubiquity of digital technology’s presence in people’s lives today, it is becoming increasingly more necessary to secure data privacy protections. People interact with technology constantly, ranging from when engaging in business activates, such as corresponding through emails or doing research online, to more innocuous activities like driving, shopping, or talking with friends and family. The advances in technology have made possible the creation of digital trails whenever someone interacts with such technology. Companies aggregate data from data trails and use predictive analytics to create detailed profiles about citizen-consumers. This information is typically used for profit ...


Should Judges Have A Duty Of Tech Competence?, John G. Browning 2020 Spencer Fane LLP 81818app手机版下载

Should Judges Have A Duty Of Tech Competence?, John G. Browning

St. Mary's Journal on Legal Malpractice & Ethics

In an era in which lawyers are increasingly held to a higher standard of “tech competence” in their representation of clients, shouldn’t we similarly require judges to be conversant in relevant technology? Using real world examples of judicial missteps with or refusal to use technology, and drawn from actual cases and judicial disciplinary proceedings, this Article argues that in today’s Digital Age, judicial technological competence is necessary. At a time when courts themselves have proven vulnerable to cyberattacks, and when courts routinely tackle technology related issues like data privacy and the admissibility of digital evidence, Luddite judges are ...


Networks Of Empathy, Thomas E. Kadri 2020 University of Georgia School of Law

Networks Of Empathy, Thomas E. Kadri

Utah Law Review

Digital abuse is on the rise. People increasingly use technology to perpetrate and exacerbate abusive conduct like stalking and harassment, manipulating digital tools to control and harm their victims. By some accounts, 95% of domestic-abuse cases involve technology, while a sizeable chunk of the U.S. population now admits to having suffered or perpetrated serious abuse online. To make matters worse, people often trivialize digital abuse or underestimate its prevalence. Even among those who do appreciate its severity, there remains ample disagreement about how to address it.

Although law can be a powerful tool to regulate digital abuse, legal responses ...


Busting Myths And Dispelling Doubts About Covid-19, Mark FINDLAY 2020 Singapore Management University

Busting Myths And Dispelling Doubts About Covid-19, Mark Findlay

Research Collection School Of Law

81818app手机版下载The Centre for AI and Data Governance (CAIDG) at Singapore Management University (SMU) has embarked over past months on a programme of research designed to confront concerns about the pandemic and its control. Our interest is primarily directed to the ways in which AI-assisted technologies and mass data sharing have become a feature of pandemic control strategies. We want to know what impact these developments are having on community confidence and health safety. In developing this work, we have come across many myths that need busting.


The Abraham L. Pomerantz Lecture: Investor Protection In The Digital Age, Kara M. Stein 2020 Brooklyn Law School

The Abraham L. Pomerantz Lecture: Investor Protection In The Digital Age, Kara M. Stein

Brooklyn Law Review

On September 24, 2019, Kara M. Stein delivered the following keynote address at the 17th annual Abraham L. Pomerantz Lecture at Brooklyn Law School. The Pomerantz Lecture is sponsored by the Brooklyn Law Review and the Center for the Study of Business Law and Regulation at Brooklyn Law School. Kara M. Stein served as Commissioner of the U.S. Securities and Exchange Commission (SEC) from August 9, 2013 until January 2, 2019. Commissioner Stein was appointed by President Barack Obama and confirmed unanimously by the U.S. Senate.


Debugging Irs Notice 2014-21: Creating A Viable Cryptocurrency Taxation Plan, Alex Ankier 2020 Brooklyn Law School 81818app手机版下载

Debugging Irs Notice 2014-21: Creating A Viable Cryptocurrency Taxation Plan, Alex Ankier

Brooklyn Law Review

81818app手机版下载In 2014, the Internal Revenue Service (IRS) issued Notice 2014-21 in an attempt to address issues with cryptocurrency taxation, essentially reaching the conclusion that cryptocurrency must be treated like property for purposes of taxation. In the time since the IRS pronouncement, several academics have called for an alternative treatment known as “currency treatment.” Each treatment inadequately addresses the comprehensive issues surrounding cryptocurrency because they offer wholesale treatment to nuanced issues with valid concerns from each side. To truly allow this emerging industry to flourish and gain societal acceptance, artful policymaking is required. This note provides an example of such policymaking ...


The Criminal, Regulatory, And Civil Issues Surrounding Intellectual Property And Cybersecurity, Ernest Edward Badway, Christie McGuinness 2020 Brooklyn Law School

The Criminal, Regulatory, And Civil Issues Surrounding Intellectual Property And Cybersecurity, Ernest Edward Badway, Christie Mcguinness

Brooklyn Journal of Corporate, Financial & Commercial Law

Cyber-attacks have affected all organizations and individual consumers. Dissemination of relevant information and attention to strong information security practices is an important tool in fighting this cyber “pandemic.” Additionally, the legal and regulatory liability companies face from cyber-attacks as well as general strategies and practical solutions companies may implement to protect against cyber-intrusions and respond effectively in the event of an attack are considered. There are many iterations of cyber-crime, and we address the various methods cybercriminals use and the many ways cyber-attacks can take place, as well as the entities and victims affected. Moreover, the legal liability and regulatory ...


Saving Small Business From The Big Impact Of Data Breach: A Tiered Federal Approach To Data Protection Law, Nadia Udeshi 2020 Brooklyn Law School 81818app手机版下载

Saving Small Business From The Big Impact Of Data Breach: A Tiered Federal Approach To Data Protection Law, Nadia Udeshi

Brooklyn Journal of Corporate, Financial & Commercial Law

81818app手机版下载Small businesses provide a significant positive impact on the American economy. However, the current fragmented federal and state data protection and breach notification legal scheme puts the viability of small businesses at risk. While the probability of data breaches occurring continues to increase, small businesses lack the financial and technological resources to contend with the various state and federal laws that impose different monetary penalties and remedial requirements in the event of such breaches. To preserve the viability of small businesses, Congress should enact a centralized, multi-tiered federal data protection and breach notification framework that preempts state laws, imposes minimum ...


Literature Review: How U.S. Government Documents Are Addressing The Increasing National Security Implications Of Artificial Intelligence, Bert Chapman 2020 Purdue University

Literature Review: How U.S. Government Documents Are Addressing The Increasing National Security Implications Of Artificial Intelligence, Bert Chapman

Libraries Faculty and Staff Scholarship and Research

This article emphasizes the increasing importance of artificial intelligence (AI) in military and national security policy making. It seeks to inform interested individuals about the proliferation of publicly accessible U.S. government and military literature on this multifaceted topic. An additional objective of this endeavor is encouraging greater public awareness of and participation in emerging public policy debate on AI's moral and national security implications..


What’S In The Cloud? - An Examination Of The Impact Of Cloud Storage Usage On The Browser Cache., Graeme Horsman 2020 Teesside University

What’S In The Cloud? - An Examination Of The Impact Of Cloud Storage Usage On The Browser Cache., Graeme Horsman

Journal of Digital Forensics, Security and Law

Cloud storage is now a well established and popular service adopted by many individuals, often at limited or no cost. It provides users with the ability to store content on a cloud service provider’s infrastructure offering the benefit of redundancy, reliability, security, flexibility of access and the potential assumed liability of the provider for data loss within the contexts of a licensing agreement. Consequently, this form of remote storage provides a regulatory challenge as content which once resided upon a seized digital exhibit, available for scrutiny during a digital forensic investigatory, may no longer be present where attempting to ...