exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 21 of 21 RSS Feed

Files

DMCA_unintended_v4.pdf
Posted Apr 14, 2006
Site eff.org

Unintended Consequences: Seven Years under the DMCA - This document collects a number of reported cases where the anti-circumvention provisions of the DMCA have been invoked not against pirates, but against consumers, scientists, and legitimate competitors.

tags | paper
SHA-256 | 9b4867ac6e0d711e6186f442c0e61ee8a8772a69c991704e1f8c49ac85df8787
2600-lessons.htm
Posted Feb 2, 2002
Authored by Bill Reilly | Site denmarket.dk

Lessons Learned from the 2600 DeCSS Case - Linking Rules for "Hacking" and Other Alternative Websites. This article will look at the courts linking arguments and suggest ways that web sites can avoid legal problems.

tags | paper, web
SHA-256 | f2fb33c81e15f0c1db494db8d72bd7cd57b1e9c19ef8269af04bccfebd496d25
Port_scanning.doc
Posted Jan 31, 2002
Authored by Bill Reilly | Site denmarket.dk

Port Scanning: Is it illegal? This paper discusses the one federal court ruling on this point.

tags | paper
SHA-256 | d953aed84b17bf0bfc1516817b7b83a26b86bc83564dee0cc846e17efcdf9723
dmca-intl.doc
Posted Jan 31, 2002
Authored by Bill Reilly | Site denmarket.dk

Write Code Go to Jail: A look at the DMCA criminal liability for non-US software developers.This article will explain the relevant criminal provisions of the DMCA, and explore how the US Attorney has applied the law to foreign software developers. Finally, taking both into consideration, I will suggest theoretical suggestions for non-US firms facing such dilemmas.

tags | paper
SHA-256 | 89d04ff0df31286a8ad49ce73fa3250dc08070a52936c9d072202ba9dc694ced
patriot.doc
Posted Jan 31, 2002
Authored by Bill Reilly | Site denmarket.dk

The Impact of the USA Patriot Act on Network Security Practice - The patriot act contains some of the most substantial changes to U.S. federal cybercrime laws since the last major revisions of 1996. Many of these changes will have a direct impact on the way networked firms prepare and react to cybercrime incidents.

tags | paper
SHA-256 | 2e606400bdc9a1ca4683b05b6a9d12e07493064e660d390022d45736e35a273c
bbslibel.txt
Posted Oct 1, 1999

Defamation Liability of Computerized Bulletin Board Operators and Problems of Proof: A discussion of the libel and slander laws, and how they apply to bulletin board operators

tags | paper
SHA-256 | 179ba1fb59daac03db06ca0494d1a1076780152b8e5bdecadc299d1ee81b290f
cfa.txt
Posted Oct 1, 1999

Complete text of the Computer Fraud and Abuse Act of 1986, 18 USC 1030

tags | paper
SHA-256 | 9dbdbb006d4d707d5f39b367ee4c764b911fc890b0be344fb2318685f525ab43
copyrfaq.txt
Posted Oct 1, 1999

Frequently Asked Questions About Copyright

tags | paper
SHA-256 | d311c391f6ee7effc4ab9675f9e33ab16164a103d787e3caf378d08bb055274f
cubby.txt
Posted Oct 1, 1999

Cubby v CompuServe: The complete text of the judge's decision in the Cubby v CompuServe libel case, in which CompuServe was found not to be responsible for material posted on one of their bulletin boards

tags | paper
SHA-256 | 5c5d5bd3dbb9dd2eb6334325a5daadf88b7a14d30a21a859b883d041c7b18f8d
ecpa.txt
Posted Oct 1, 1999

Complete text of the Electronic Communications Privacy Act of 1986, United States Public Law 99-508

tags | paper
SHA-256 | beb467cd43a1bdec2fb7d9d8ef54cee152bd1420abb4913bc3d90be4c38602d9
elaw.ps
Posted Oct 1, 1999

E-Law: Legal Issues Affecting Computer Information Systems and System Operator Liability. First appeared in the Albany Law Journal of Science and Technology, Volume 3, Number 1

tags | paper
SHA-256 | 647ed0dd3b8a9aa468ece89eb86998f5a637a0713b356fe837ac6980347bb383
ethics.ps
Posted Oct 1, 1999

Are Computer Hacker Break-ins Ethical? Lists and refutes many of the reasons given to justify computer break-ins

tags | paper
SHA-256 | 3ee08853b065820c16ae62633ba15150f86b6d518b0673ed07efef11861e79b4
ferpa.txt
Posted Oct 1, 1999

The complete text of the US Family Educational Right to Privacy Act (the Buckley Amendment), 20 USC

tags | paper
SHA-256 | 8a9b6e270a14bc31d97a6c93f5932f9596710164db08f7aec11d3ccd2141ae22
frlaw.txt
Posted Oct 1, 1999

Information about the computer crime laws in France

tags | paper
SHA-256 | 1d886d56e35e42ebf29c68b4428e7aced7b46ef6cafb8c17fe4134757f2a2251
libel.txt
Posted Oct 1, 1999

Internet Libel: Is the Provider Responsible? An examination of the Cubby v Compuserve case as it applies to Internet service providers

tags | paper
SHA-256 | 3f1fc9cd91edbfecea62ca8d635e4e171a2ed03c48abf63cdd11e859f7311c62
mailpriv.txt
Posted Oct 1, 1999

Computer Electronic Mail and Privacy: A discussion of the Electronic Communications Privacy Act as it applies to electronic mail

tags | paper
SHA-256 | fc3a14a4ff033ee33bde5cc7413a548ab3588f83c81ec24d380a0b9c97c0c25e
musings.ps
Posted Oct 1, 1999

Some Musings on Ethics and Computer Break-Ins: A discussion of ethics and responsibility, particularly as they pertain to the Internet Worm of November, 1988

tags | paper, worm
SHA-256 | 421d437d5fd1ec0e1a4a1a40b1be9773191e9d448b1d687274e5bdc9e7ce584d
privacy.txt
Posted Oct 1, 1999

Complete text of the Privacy Act of 1974 and Amendments, 5 USC 552a

tags | paper
SHA-256 | b26f4a1db6e51f9b2ade6d6902621036c8b9e8310852b5febcf6bd667492faf4
sentence.txt
Posted Oct 1, 1999

Revised Computer Crime Sentencing Guidelines A description of the new federal sentencing guidelines that address the Computer Fraud and Abuse Act

tags | paper
SHA-256 | 6061ff9b365894bdd9f510b24e6f1cdae662eec3cfee0221071e030672c2f46a
simson.ps
Posted Oct 1, 1999

An Introduction to Computer Security for Lawyers: A number of articles serving to introduce lawyers to the concepts behind computer security

tags | paper
SHA-256 | eef6f249bdd1cef082130ca74a43fbf609d7b9784fe8a5236ec59e6ce5ca421a
statelaw.txt
Posted Oct 1, 1999

Computer crime laws, listed by state

tags | paper
SHA-256 | 12df9f4ea1c3087242c5b86a33c5462268a55d72929e72ec8c7fed00213ffa28
Page 1 of 1
Back1Next

Top Authors In Last 30 Days

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close