A student-run resource for reliable reports on the latest law and technology news

Archive for the ‘Cyberlaw’ Category

Towards Trans-Atlantic Interoperability: Scientific Research and Privacy Under the EU Data Protection Regulation

Written by: Natalie Kim
Edited by: Alex Shank

The EU is currently drafting a General Data Protection Regulation, thought to be among the toughest data protection laws in existence. This comment address the growing interoperability problem between U.S. and EU data protection law and ways of mitigating it, like reducing third-party liability loopholes, strengthened de-identification techniques and enhanced data tracking measures.

Read More...

Posted On Aug - 11 - 2013 Comments Off READ FULL POST

Injunction Imposed in Volkswagen Car Hacking Case: Public Safety Favored Over Transparency
By Jonathan Sapp – Edited by Alex Shank

A British high court enjoined Flavio Garcia from publishing an academic paper that sought to expose weaknesses in Volkswagen’s automobile security systems. In the paper, Garcia revealed secret codes used to activate the ignition systems of several luxury vehicles. The court’s ruling is the latest in the battle against researchers using hacking to expose security systems’ flaws.

Read More...

Posted On Aug - 10 - 2013 Comments Off READ FULL POST

Leaked NSA Memos Reveal More on Data Collection Procedures
By Katie Mullen – Edited by Michelle Sohn

Last weekend, the Guardian leaked two more National Security Agency (“NSA”) documents regarding the NSA’s recently uncovered surveillance program. The first document details procedures used to target “non-U.S. persons” believed to be located outside the United States. The second document describes minimization procedures the NSA uses in collecting data under Section 702 of the amended Foreign Intelligence Surveillance Act (“FISA”), 50 U.S.C. 1881 (2012).

Read More...

Posted On Jun - 28 - 2013 Comments Off READ FULL POST

Leaked Surveillance Programs Reveal Large-Scale Data Collection
By Michelle Sohn – Edited by Katie Mullen

Last week, the Guardian revealed two top-secret U.S. programs—Verizon metadata collection and PRISM—that allow the National Security Agency (“NSA”) to conduct domestic surveillance on a massive and unprecedented scale. The U.S. Foreign Intelligence Surveillance Court ordered Verizon to provide the NSA with “telephony metadata.” The PRISM program allows the government direct access to participating companies’ servers.

Read More...

Posted On Jun - 15 - 2013 Comments Off READ FULL POST

Trailblazing Email Privacy Bill Proposed in Texas
Mary Grinman – Edited by Natalie Kim

On May 27, 2013, the Texas State Senate and House signed H.B. 2268. The legislation requires state law enforcement agents to secure a warrant before accessing emails and other “electronic customer data.” H.B. 2268 at 3–4. It also permits warrants on out-of-state service providers that do business with a Texas resident in certain circumstances. Id. at 9. The bill closes the loophole of the 1986 Electronic Communications Privacy Act (ECPA), which allows warrantless access to emails opened or older than 180 days.

Read More...

Posted On Jun - 8 - 2013 Comments Off READ FULL POST
  • RSS
  • Facebook
  • Twitter
  • GooglePlay
books

Creating full-text s

Creating full-text searchable database of copyrighted works is “fair use” By ...

Hacked By Over-X

European Union Court

European Union Court of Justice Holds that Individuals Browsing Websites ...

Photo By: André Natta - CC BY 2.0

Georgia Supreme Cour

Georgia Supreme Court Takes Chan v. Ellis Appeal to Redefine ...

Icon-news

Federal Circuit Flas

By Kellen Wittkop Appeal of a contempt order for violation of ...

invisalign-braces

ITC’s review of an

ITC’s review of an ALJ’s order was not procedurally sound By ...