Quantcast
Channel: Law + Informatics Institute » Counterfeiting
Browsing all 10 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Business Law Today Features Rich Array of Cyberspace Issues

In the December 2011 of Business Law Today, The Cyberspace Law Section has weighed in with a series of articles discussing critical issues for online legislation, policy and security. The first is my...

View Article



Image may be NSFW.
Clik here to view.

PROTECT IP Act may be open to some Reasonable Amendments

In response to concerted objections to aspects of the PROTECT IP Act, legislation sponsor Senator Patrick Leahy (D-Vt.) announced by radio and press release that the sponsors may eliminate a...

View Article

Image may be NSFW.
Clik here to view.

Cybersecurity Act of 2012 Puts Focus on the Shadow Wars

On February 14, 2012, a 205 page comprehensive new Cybersecurity Act of 2012was introduced in the Senate to address the growing concerns about cyber-warfare, cybersecurity, and cyber-terrorism. The...

View Article

Image may be NSFW.
Clik here to view.

Two days until NKU Law Review Symposium on Law & Informatics

The Northern Kentucky Law Review will host the inaugural Law & Informatics Symposium on March 1-2, 2012, presented in association with the NKU Chase Law & Informatics. Offering cutting edge...

View Article

Image may be NSFW.
Clik here to view.

New CRS Reports Highlight Legislation for Cybersecurity

As noted in Eric Ficher, Federal Laws Relating to Cybersecurity: Discussion of Proposed Revisions, (June 29, 2012) (CRS Report R42114) (full-text), cybersecurity is a “somewhat fuzzy subject.” Yet it...

View Article


Image may be NSFW.
Clik here to view.

Fourth Circuit Joins Ninth in Limiting CFAA – Setting Stage for More Action

In 1986, Congress amended its earlier attempt to combat computer crime with the Computer Fraud and Abuse Act of 1986. It was further expanded in 2001 under the USA Patriot Act. The CFAA serves as both...

View Article

Image may be NSFW.
Clik here to view.

Join over 300 professionals before space runs out at NKU Security Symposium

 The NKU Security Symposium with the inclusion of the legal track takes place this Friday. It will be a great opportunity to cross-train with security and privacy professionals, programmers, IT...

View Article

Image may be NSFW.
Clik here to view.

New York Times disclosure of cyber-attacks should pave way for greater...

Seal of the White House Office of Homeland Security, which was formed by executive order on October 8, 2001,http://www.whitehouse.gov/news/releases/2001/10/20011008-2.html and later grew into the...

View Article


Image may be NSFW.
Clik here to view.

Cyber Defense Strategies and Responsibilities for Industry Call for Papers...

The Northern Kentucky Law Review and Salmon P. Chase College of Law seek submissions for the third annual Law + Informatics Symposium on February 27-28, 2014. 2014 Law + Informatics Symposium on Cyber...

View Article


Image may be NSFW.
Clik here to view.

Blame Congress’ Patriot Act not the NSA or FBI

When self-proclaimed whistle blower, Edward Snowden disclosed a PowerPoint presentation allegedly detailing the Prism computer system[1] at the heart of foreign data collection program, he set off a...

View Article
Browsing all 10 articles
Browse latest View live




Latest Images