Unintended Consequences: Seven Years under the DMCA - This document collects a number of reported cases where the anti-circumvention provisions of the DMCA have been invoked not against pirates, but against consumers, scientists, and legitimate competitors.
9b4867ac6e0d711e6186f442c0e61ee8a8772a69c991704e1f8c49ac85df8787
Lessons Learned from the 2600 DeCSS Case - Linking Rules for "Hacking" and Other Alternative Websites. This article will look at the courts linking arguments and suggest ways that web sites can avoid legal problems.
f2fb33c81e15f0c1db494db8d72bd7cd57b1e9c19ef8269af04bccfebd496d25
Port Scanning: Is it illegal? This paper discusses the one federal court ruling on this point.
d953aed84b17bf0bfc1516817b7b83a26b86bc83564dee0cc846e17efcdf9723
Write Code Go to Jail: A look at the DMCA criminal liability for non-US software developers.This article will explain the relevant criminal provisions of the DMCA, and explore how the US Attorney has applied the law to foreign software developers. Finally, taking both into consideration, I will suggest theoretical suggestions for non-US firms facing such dilemmas.
89d04ff0df31286a8ad49ce73fa3250dc08070a52936c9d072202ba9dc694ced
The Impact of the USA Patriot Act on Network Security Practice - The patriot act contains some of the most substantial changes to U.S. federal cybercrime laws since the last major revisions of 1996. Many of these changes will have a direct impact on the way networked firms prepare and react to cybercrime incidents.
2e606400bdc9a1ca4683b05b6a9d12e07493064e660d390022d45736e35a273c
Defamation Liability of Computerized Bulletin Board Operators and Problems of Proof: A discussion of the libel and slander laws, and how they apply to bulletin board operators
179ba1fb59daac03db06ca0494d1a1076780152b8e5bdecadc299d1ee81b290f
Complete text of the Computer Fraud and Abuse Act of 1986, 18 USC 1030
9dbdbb006d4d707d5f39b367ee4c764b911fc890b0be344fb2318685f525ab43
Frequently Asked Questions About Copyright
d311c391f6ee7effc4ab9675f9e33ab16164a103d787e3caf378d08bb055274f
Cubby v CompuServe: The complete text of the judge's decision in the Cubby v CompuServe libel case, in which CompuServe was found not to be responsible for material posted on one of their bulletin boards
5c5d5bd3dbb9dd2eb6334325a5daadf88b7a14d30a21a859b883d041c7b18f8d
Complete text of the Electronic Communications Privacy Act of 1986, United States Public Law 99-508
beb467cd43a1bdec2fb7d9d8ef54cee152bd1420abb4913bc3d90be4c38602d9
E-Law: Legal Issues Affecting Computer Information Systems and System Operator Liability. First appeared in the Albany Law Journal of Science and Technology, Volume 3, Number 1
647ed0dd3b8a9aa468ece89eb86998f5a637a0713b356fe837ac6980347bb383
Are Computer Hacker Break-ins Ethical? Lists and refutes many of the reasons given to justify computer break-ins
3ee08853b065820c16ae62633ba15150f86b6d518b0673ed07efef11861e79b4
The complete text of the US Family Educational Right to Privacy Act (the Buckley Amendment), 20 USC
8a9b6e270a14bc31d97a6c93f5932f9596710164db08f7aec11d3ccd2141ae22
Information about the computer crime laws in France
1d886d56e35e42ebf29c68b4428e7aced7b46ef6cafb8c17fe4134757f2a2251
Internet Libel: Is the Provider Responsible? An examination of the Cubby v Compuserve case as it applies to Internet service providers
3f1fc9cd91edbfecea62ca8d635e4e171a2ed03c48abf63cdd11e859f7311c62
Computer Electronic Mail and Privacy: A discussion of the Electronic Communications Privacy Act as it applies to electronic mail
fc3a14a4ff033ee33bde5cc7413a548ab3588f83c81ec24d380a0b9c97c0c25e
Some Musings on Ethics and Computer Break-Ins: A discussion of ethics and responsibility, particularly as they pertain to the Internet Worm of November, 1988
421d437d5fd1ec0e1a4a1a40b1be9773191e9d448b1d687274e5bdc9e7ce584d
Complete text of the Privacy Act of 1974 and Amendments, 5 USC 552a
b26f4a1db6e51f9b2ade6d6902621036c8b9e8310852b5febcf6bd667492faf4
Revised Computer Crime Sentencing Guidelines A description of the new federal sentencing guidelines that address the Computer Fraud and Abuse Act
6061ff9b365894bdd9f510b24e6f1cdae662eec3cfee0221071e030672c2f46a
An Introduction to Computer Security for Lawyers: A number of articles serving to introduce lawyers to the concepts behind computer security
eef6f249bdd1cef082130ca74a43fbf609d7b9784fe8a5236ec59e6ce5ca421a
Computer crime laws, listed by state
12df9f4ea1c3087242c5b86a33c5462268a55d72929e72ec8c7fed00213ffa28