- Journal Archives
- Volume 19
- Volume 18
- Volume 17
- Volume 16
- Volume 15
- Volume 14
- Volume 13
- Volume 12
- Volume 11
- Volume 10
- Volume 9
- Volume 8
- Volume 7
- Volume 6
- Volume 5
- Volume 4
- Volume 3
- Volume 2
- Volume 1
- 2016-2017 Symposium
- 2015-2016 Symposium
- 2014-2015 Symposium
- 2013-2014 Symposium
- 2012-2013 Symposium
- 2011-2012 Symposium
- 2010-2011 Symposium
- 2009-2010 Symposium
- 2008-2009 Symposium
- 2007-2008 Symposium
Currently viewing the tag: "information security"
Case Citation: Swathi Padmanabhan, Hacking for Lulz: Employing Expert Hackers to Combat Cyber Terrorism
On October 29, 2013 By Bradlee Edmondson November 25, 2013
Swathi Padmanabhan’s (’13) Note, Hacking for Lulz: Employing Expert Hackers to Combat Cyber Terrorism, cited in federal court.Continue Reading →
California Senate Bill 568 (the “Bill”), adopted on September 23, 2013, establishes expansive privacy rights for minors in the digital world. The Bill is divided [PDF] into two main parts. The first part prohibits certain products and services from directing advertising toward minors, who are defined as natural persons under the age of 18. [...]Continue Reading →
Once again we had many news items this week, so we are posting a second round-up. We found a number of legal technology projects attempting to change the way laws are made, interpreted, and complied with far into the future.
How will lawmaking, legal education, and legal practice look in fifty [...]Continue Reading →
Feds v Silk Road; NSA tracks some Tor users; DoJ on NSLs; Samsung v Apple sanctions; A-Rod v MLB; ExxonMobil v FoxContinue Reading →
Have you ever signed into your Gmail account and noticed an advertisement in your sidebar that seems all-too-relevant to you? You may wonder: how does Google know me so well?
Well, much of that specialized treatment stems from Google’s scanning technology, which allows Google to scan your Gmail messages for keywords and concepts to identify [...]Continue Reading →
On October 2, 2013 By Patrick Tricker January 26, 2014
If prosecutors are going to effectively prosecute identity theft and stolen computer code, New York needs to upgrade its laws for the 21st Century, according to a report [PDF] released last week by a New York State task force led by Manhattan district attorney Cyrus R. Vance, Jr.
New York’s criminal code has not [...]Continue Reading →
Recent Blog Posts
- Will Trump’s Department of Justice Continue the 100% Licensing Fight?
- Court Software: A New Hurdle for the Legitimacy of the Criminal Justice System
- President Trump’s Executive Order and the Technology Community
- Recapping JETLaw’s 2017 Symposium!
- Meitu: fun new app or serious threat to your privacy?
- Tweet Typos and the Presidential Records Act
Tagsadvertising antitrust Apple books career celebrities contracts copyright copyright infringement courts creative content criminal law entertainment Facebook FCC film/television financial First Amendment games Google government intellectual property internet JETLaw journalism lawsuits legislation media medicine Monday Morning JETLawg music NFL patents privacy progress publicity rights radio social networking sports Supreme Court of the United States (SCOTUS) technology telecommunications trademarks Twitter U.S. Constitution