- Journal Archives
- Volume 16
- Volume 15
- Volume 14
- Volume 13
- Volume 12
- Volume 11
- Volume 10
- Volume 9
- Volume 8
- Volume 7
- Volume 6
- Volume 5
- Volume 4
- Volume 3
- Volume 2
- Volume 1
Currently viewing the tag: "information security"
Case Citation: Swathi Padmanabhan, Hacking for Lulz: Employing Expert Hackers to Combat Cyber Terrorism
On October 29, 2013 By Bradlee Edmondson November 25, 2013
Swathi Padmanabhan’s (’13) Note, Hacking for Lulz: Employing Expert Hackers to Combat Cyber Terrorism, cited in federal court.Continue Reading →
California Senate Bill 568 (the “Bill”), adopted on September 23, 2013, establishes expansive privacy rights for minors in the digital world. The Bill is divided [PDF] into two main parts. The first part prohibits certain products and services from directing advertising toward minors, who are defined as natural persons under the age of 18. [...]Continue Reading →
Once again we had many news items this week, so we are posting a second round-up. We found a number of legal technology projects attempting to change the way laws are made, interpreted, and complied with far into the future.
How will lawmaking, legal education, and legal practice look in fifty [...]Continue Reading →
Feds v Silk Road; NSA tracks some Tor users; DoJ on NSLs; Samsung v Apple sanctions; A-Rod v MLB; ExxonMobil v FoxContinue Reading →
Have you ever signed into your Gmail account and noticed an advertisement in your sidebar that seems all-too-relevant to you? You may wonder: how does Google know me so well?
Well, much of that specialized treatment stems from Google’s scanning technology, which allows Google to scan your Gmail messages for keywords and concepts to identify [...]Continue Reading →
On October 2, 2013 By Patrick Tricker January 26, 2014
If prosecutors are going to effectively prosecute identity theft and stolen computer code, New York needs to upgrade its laws for the 21st Century, according to a report [PDF] released last week by a New York State task force led by Manhattan district attorney Cyrus R. Vance, Jr.
New York’s criminal code has not [...]Continue Reading →
Last week, RSA, the security division of EMC, recommended that its customers stop using a community-developed encryption algorithm standard known as Dual EC DRBG because the NSA had inserted a backdoor into that cryptographic key creation product. This move by RSA came after the NIST issued a [...]Continue Reading →
Recent Blog Posts
- Should the NFL Take a Page from the ABA’s Disciplinary Playbook?
- Monday Morning JETLawg
- Producers Cited with Willful Safety Violations Following On-Set Tragedy
- Was the NFL’s Extension of Ray Rice’s Suspension Lawful?
- An Ocean Full of Pirates: The Criminal Sentencing of Internet File Sharing
- Microsoft Acquires Maker of Minecraft for $2.5 Billion
Tagsadvertising antitrust Apple books career celebrities contracts copyright copyright infringement courts creative content criminal law entertainment Facebook FCC film/television financial First Amendment games Google government intellectual property internet JETLaw journalism lawsuits legislation media medicine Monday Morning JETLawg music NFL patents privacy progress publicity rights radio social networking sports Supreme Court of the United States (SCOTUS) technology telecommunications trademarks Twitter U.S. Constitution