A student-run resource for reliable reports on the latest law and technology news

Archive for the ‘Cyberlaw’ Category

Injunction Imposed in Volkswagen Car Hacking Case: Public Safety Favored Over Transparency
By Jonathan Sapp – Edited by Alex Shank

A British high court enjoined Flavio Garcia from publishing an academic paper that sought to expose weaknesses in Volkswagen’s automobile security systems. In the paper, Garcia revealed secret codes used to activate the ignition systems of several luxury vehicles. The court’s ruling is the latest in the battle against researchers using hacking to expose security systems’ flaws.

Read More...

Posted On Aug - 10 - 2013 Comments Off READ FULL POST

Leaked NSA Memos Reveal More on Data Collection Procedures
By Katie Mullen – Edited by Michelle Sohn

Last weekend, the Guardian leaked two more National Security Agency (“NSA”) documents regarding the NSA’s recently uncovered surveillance program. The first document details procedures used to target “non-U.S. persons” believed to be located outside the United States. The second document describes minimization procedures the NSA uses in collecting data under Section 702 of the amended Foreign Intelligence Surveillance Act (“FISA”), 50 U.S.C. 1881 (2012).

Read More...

Posted On Jun - 28 - 2013 Comments Off READ FULL POST

Leaked Surveillance Programs Reveal Large-Scale Data Collection
By Michelle Sohn – Edited by Katie Mullen

Last week, the Guardian revealed two top-secret U.S. programs—Verizon metadata collection and PRISM—that allow the National Security Agency (“NSA”) to conduct domestic surveillance on a massive and unprecedented scale. The U.S. Foreign Intelligence Surveillance Court ordered Verizon to provide the NSA with “telephony metadata.” The PRISM program allows the government direct access to participating companies’ servers.

Read More...

Posted On Jun - 15 - 2013 Comments Off READ FULL POST

Trailblazing Email Privacy Bill Proposed in Texas
Mary Grinman – Edited by Natalie Kim

On May 27, 2013, the Texas State Senate and House signed H.B. 2268. The legislation requires state law enforcement agents to secure a warrant before accessing emails and other “electronic customer data.” H.B. 2268 at 3–4. It also permits warrants on out-of-state service providers that do business with a Texas resident in certain circumstances. Id. at 9. The bill closes the loophole of the 1986 Electronic Communications Privacy Act (ECPA), which allows warrantless access to emails opened or older than 180 days.

Read More...

Posted On Jun - 8 - 2013 Comments Off READ FULL POST

Unwanted Exposure: Civil and Criminal Liability for Revenge Porn Hosts and Posters

Written by: Susanna Lichter
Edited by: Suzanne Van Arsdale

Hollie Toups, the first named plaintiff in Toups v. GoDaddy, was harassed for weeks after nude pictures of her appeared on the website Texxxan.com alongside her real name and a link to her Facebook profile. When Toups requested that Texxxan.com remove the pictures, she was told by the website that they could help in exchange for her credit card information.[i] Texxxan.com is a “revenge porn” or “involuntary porn” website.[ii]

Read More...

Posted On May - 28 - 2013 2 Comments READ FULL POST
  • RSS
  • Facebook
  • Twitter
  • GooglePlay
invisalign-braces

3D Systems and Forml

By Yixuan Long – Edited by Yaping Zhang 3D Systems, Inc., ...

91ea09a6535666e18ca3c56f731f67ef_400x400

Privacy Concerns in

By Sabreena Khalid – Edited by Insue Kim Following scandals earlier ...

free-speech

San Francisco Court

By Jens Frankenreiter – Edited by Henry Thomas S. Louis Martin ...

European union concept, digital illustration.

EU Unitary Patent Sy

By Saukshmya Trichi – Edited by Ashish Bakshi Advocate General’s Opinion ...

computer-typing1

California Sex Offen

By Jesse Goodwin – Edited by Michael Shammas Doe v. Harris, ...