Exploit the possiblities
Showing 1 - 21 of 21 RSS Feed

Files

DMCA_unintended_v4.pdf
Posted Apr 14, 2006
Site eff.org

Unintended Consequences: Seven Years under the DMCA - This document collects a number of reported cases where the anti-circumvention provisions of the DMCA have been invoked not against pirates, but against consumers, scientists, and legitimate competitors.

tags | paper
MD5 | a7ab86aff68329662b0f8ed36ec0c094
2600-lessons.htm
Posted Feb 2, 2002
Authored by Bill Reilly | Site denmarket.dk

Lessons Learned from the 2600 DeCSS Case - Linking Rules for "Hacking" and Other Alternative Websites. This article will look at the courts linking arguments and suggest ways that web sites can avoid legal problems.

tags | paper, web
MD5 | e7246e4af1fd2310dc0175fd77715bb3
Port_scanning.doc
Posted Jan 31, 2002
Authored by Bill Reilly | Site denmarket.dk

Port Scanning: Is it illegal? This paper discusses the one federal court ruling on this point.

tags | paper
MD5 | f460656d1d93e3259d0c723beed2a54f
dmca-intl.doc
Posted Jan 31, 2002
Authored by Bill Reilly | Site denmarket.dk

Write Code Go to Jail: A look at the DMCA criminal liability for non-US software developers.This article will explain the relevant criminal provisions of the DMCA, and explore how the US Attorney has applied the law to foreign software developers. Finally, taking both into consideration, I will suggest theoretical suggestions for non-US firms facing such dilemmas.

tags | paper
MD5 | 5ee10988f6eac31e04a18e84a2190a2f
patriot.doc
Posted Jan 31, 2002
Authored by Bill Reilly | Site denmarket.dk

The Impact of the USA Patriot Act on Network Security Practice - The patriot act contains some of the most substantial changes to U.S. federal cybercrime laws since the last major revisions of 1996. Many of these changes will have a direct impact on the way networked firms prepare and react to cybercrime incidents.

tags | paper
MD5 | 4143b34d5f1171b3f33551c491fe4918
bbslibel.txt
Posted Oct 1, 1999

Defamation Liability of Computerized Bulletin Board Operators and Problems of Proof: A discussion of the libel and slander laws, and how they apply to bulletin board operators

tags | paper
MD5 | b80c90aa36b5ea6f6fa0d7683a310e6c
cfa.txt
Posted Oct 1, 1999

Complete text of the Computer Fraud and Abuse Act of 1986, 18 USC 1030

tags | paper
MD5 | 18350bcf12dfaa58941952b8ee04d8b5
copyrfaq.txt
Posted Oct 1, 1999

Frequently Asked Questions About Copyright

tags | paper
MD5 | ce99e2a6dd969b107e9c1c4d99ccb538
cubby.txt
Posted Oct 1, 1999

Cubby v CompuServe: The complete text of the judge's decision in the Cubby v CompuServe libel case, in which CompuServe was found not to be responsible for material posted on one of their bulletin boards

tags | paper
MD5 | e42500878a19ff23bc8015ae231e9192
ecpa.txt
Posted Oct 1, 1999

Complete text of the Electronic Communications Privacy Act of 1986, United States Public Law 99-508

tags | paper
MD5 | 2124e7d975107dc732b162b224059ec9
elaw.ps
Posted Oct 1, 1999

E-Law: Legal Issues Affecting Computer Information Systems and System Operator Liability. First appeared in the Albany Law Journal of Science and Technology, Volume 3, Number 1

tags | paper
MD5 | 9d266c0758c3c47ea411190dfd824653
ethics.ps
Posted Oct 1, 1999

Are Computer Hacker Break-ins Ethical? Lists and refutes many of the reasons given to justify computer break-ins

tags | paper
MD5 | ac03e775c5341f70574ceb2aac3a73fa
ferpa.txt
Posted Oct 1, 1999

The complete text of the US Family Educational Right to Privacy Act (the Buckley Amendment), 20 USC

tags | paper
MD5 | fa608b7354dfccc3d4a519e23e08cf4a
frlaw.txt
Posted Oct 1, 1999

Information about the computer crime laws in France

tags | paper
MD5 | 5984e76004a1146d4c6163202cd35638
libel.txt
Posted Oct 1, 1999

Internet Libel: Is the Provider Responsible? An examination of the Cubby v Compuserve case as it applies to Internet service providers

tags | paper
MD5 | 2edb74d5280d4a56369aa1c3f6e2fd21
mailpriv.txt
Posted Oct 1, 1999

Computer Electronic Mail and Privacy: A discussion of the Electronic Communications Privacy Act as it applies to electronic mail

tags | paper
MD5 | 4bc91c434d0a0f3289e0046e6168c32e
musings.ps
Posted Oct 1, 1999

Some Musings on Ethics and Computer Break-Ins: A discussion of ethics and responsibility, particularly as they pertain to the Internet Worm of November, 1988

tags | paper, worm
MD5 | 5ea94c6dde8570b5cd6b9bd96d569c2b
privacy.txt
Posted Oct 1, 1999

Complete text of the Privacy Act of 1974 and Amendments, 5 USC 552a

tags | paper
MD5 | 612f2fb8ad76268dbaae52ab908b62db
sentence.txt
Posted Oct 1, 1999

Revised Computer Crime Sentencing Guidelines A description of the new federal sentencing guidelines that address the Computer Fraud and Abuse Act

tags | paper
MD5 | abcbf4bc5139ee7661991f0e2cecefa7
simson.ps
Posted Oct 1, 1999

An Introduction to Computer Security for Lawyers: A number of articles serving to introduce lawyers to the concepts behind computer security

tags | paper
MD5 | 98f332b02a772c4ae7ba8736083c0799
statelaw.txt
Posted Oct 1, 1999

Computer crime laws, listed by state

tags | paper
MD5 | dea4878c6720d58c4d0a81f7ff8a8087
Page 1 of 1
Back1Next

Top Authors In Last 30 Days

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close