- Journal Archives
- Volume 16
- Volume 15
- Volume 14
- Volume 13
- Volume 12
- Volume 11
- Volume 10
- Volume 9
- Volume 8
- Volume 7
- Volume 6
- Volume 5
- Volume 4
- Volume 3
- Volume 2
- Volume 1
Currently viewing the tag: "information security"
Case Citation: Swathi Padmanabhan, Hacking for Lulz: Employing Expert Hackers to Combat Cyber Terrorism
On October 29, 2013 By Bradlee Edmondson November 25, 2013
Swathi Padmanabhan’s (’13) Note, Hacking for Lulz: Employing Expert Hackers to Combat Cyber Terrorism, cited in federal court.Continue Reading →
California Senate Bill 568 (the “Bill”), adopted on September 23, 2013, establishes expansive privacy rights for minors in the digital world. The Bill is divided [PDF] into two main parts. The first part prohibits certain products and services from directing advertising toward minors, who are defined as natural persons under the age of 18. [...]Continue Reading →
Once again we had many news items this week, so we are posting a second round-up. We found a number of legal technology projects attempting to change the way laws are made, interpreted, and complied with far into the future.
How will lawmaking, legal education, and legal practice look in fifty [...]Continue Reading →
Feds v Silk Road; NSA tracks some Tor users; DoJ on NSLs; Samsung v Apple sanctions; A-Rod v MLB; ExxonMobil v FoxContinue Reading →
Have you ever signed into your Gmail account and noticed an advertisement in your sidebar that seems all-too-relevant to you? You may wonder: how does Google know me so well?
Well, much of that specialized treatment stems from Google’s scanning technology, which allows Google to scan your Gmail messages for keywords and concepts to identify [...]Continue Reading →
On October 2, 2013 By Patrick Tricker January 26, 2014
If prosecutors are going to effectively prosecute identity theft and stolen computer code, New York needs to upgrade its laws for the 21st Century, according to a report [PDF] released last week by a New York State task force led by Manhattan district attorney Cyrus R. Vance, Jr.
New York’s criminal code has not [...]Continue Reading →
Last week, RSA, the security division of EMC, recommended that its customers stop using a community-developed encryption algorithm standard known as Dual EC DRBG because the NSA had inserted a backdoor into that cryptographic key creation product. This move by RSA came after the NIST issued a [...]Continue Reading →
Recent Blog Posts
- An Uber Vexation Facilitates Solidarity Among Cab Companies
- ABA Urges Increased Cybersecurity Measures
- Monday Morning JETLawg
- Cellular Phone “Kill Switches”: The New Anti-Theft Legislative Trend?
- $400 Million Settlement: E-book Price-Fixing May Cost Apple Big Time
- Kramer Sues Seinfeld Staff Writer for Defamation–and Loses
Tagsadvertising antitrust Apple books career celebrities contracts copyright copyright infringement courts creative content criminal law entertainment Facebook FCC film/television financial First Amendment games Google government intellectual property internet JETLaw journalism lawsuits legislation media medicine Monday Morning JETLawg music NFL patents privacy progress publicity rights radio social networking sports Supreme Court of the United States (SCOTUS) technology telecommunications trademarks Twitter U.S. Constitution