You are here: Fairness.com > Resources > Law & Justice > Internet / Cyberspace Law

Internet / Cyberspace Law

Search only Internet / Cyberspace Law, and everything underneath:

Articles and Resources

Date Fairness.com Resource Read it at:
Jan 09, 2011 Twitter Shines a Spotlight on Secret F.B.I. Subpoenas

QUOTE: THE news that federal prosecutors have demanded that the microblogging site Twitter provide the account details of people connected to the WikiLeaks case, including its founder, Julian Assange, isn’t noteworthy because the government’s request was unusual or intrusive. It is noteworthy because it became public.... the government — in the course of conducting inquiries — has been able to look through much of the information without the knowledge of the people being investigated.

New York Times
Oct 05, 2009 Virtual world disputes heading for real courtrooms

QUOTE: Just as the digital revolution has facilitated piracy and copyright theft in other spheres, those who make a living running businesses in Second Life have seen their profits eroded by users who have found ways to copy their intellectual property (IP).

New Scientist
Oct 02, 2009 Soldiers' Data Still Being Downloaded Overseas, Firm Says: Sensitive Information Found by Using 'Peer to Peer' File-Sharing Software

QUOTE: The personal data of tens of thousands of U.S. soldiers -- including those in the Special Forces -- continue to be downloaded by unauthorized computer users in countries such as China and Pakistan, despite Army assurances that it would try to fix the problem...

Washington Post
Sep 22, 2009 Netflix Prize 2: (Privacy) Apocalypse Now?

QUOTE: security researchers found a way to link the anonymous movie recommendations with data from other sites in order to identify individual Netflix users.

Ars Technica
Sep 19, 2009 Cybersecurity Plan Doesn't Breach Employee Privacy, Administration Says

QUOTE: The Obama administration has agreed with its predecessor that a special surveillance program to monitor federal Internet traffic for malicious intrusions does not violate the privacy rights of government employees or others they communicate with.

Washington Post
Sep 18, 2009 Threat Level Privacy, Crime and Security Online Court: Disloyal Computing Is Not Illegal (Threat Level)

QUOTE: A federal appeals court says employees are not liable for damages under anti-hacking laws for accessing their employers’ computers for disloyal purposes.

Wired
Sep 12, 2009 A Legal Battle: Online Attitude vs. Rules of the Bar

QUOTE: And with thousands of blogs and so many lawyers online, legal ethics experts say that collisions between the freewheeling ways of the Internet and the tight boundaries of legal discourse are inevitable...

New York Times
Sep 07, 2009 Password Hackers Are Slippery To Collar

QUOTE: "This is an important point that people haven't grasped," said Peter Eckersley, a staff technologist for the Electronic Frontier Foundation in San Francisco. "We've been using e-mail for years, and it's been insecure all that time.... If you have any hacker who is competent and spends the time and targets you, he's going to get you."

Washington Post
Aug 31, 2009 How we’re losing our privacy online

QUOTE: As we slip further into the Internet era, they [computer experts] argue that we are every day surrendering more of the private us to the public domain

Christian Science Monitor
Aug 27, 2009 ACLU chapter flags Facebook app privacy (The Social)

QUOTE: The Northern California chapter of the American Civil Liberties Union has put out a campaign designed to raise awareness of the privacy implications of Facebook's developer platform.

CNET
Aug 25, 2009 Businesses Reluctant to Report Online Banking Fraud (Security Fix)

QUOTE: many victimized companies [of online banking fraud] are reluctant to come forward out of fear of retribution by their bank.

Washington Post
Aug 25, 2009 ISPs, rights groups react to gov't P2P proposals (Intellectual property Toolkit)

QUOTE: The [United Kingdom] Department of Business, Innovation and Skills (BIS) proposed on Tuesday that disconnection should be considered in the case of those who persistently share copyrighted material online.

Aug 20, 2009 Google lawsuit dispels the Web’s oldest tradition: anonymity (Horizons Blog)

QUOTE: Disguised in comforting anonymity, bloggers and online commenters can type some pretty nasty things... However, the masquerade ball may have just ended.

Christian Science Monitor
Aug 18, 2009 Three Alleged Hackers Indicted in Large Identity-Theft Case

QUOTE: A federal grand jury has indicted three people on charges of hacking into the files of the credit and debit card processing giant Heartland Payment Systems last year in what the Justice Department is calling the largest identity-theft case ever prosecuted.

Washington Post
Aug 13, 2009 Privacy Regulations Bedevil Medical Social Media Efforts

QUOTE: To truly participate in social media, healthcare organizations need to allow other people to leave comments on the organizations' content. But that's difficult to reconcile with HIPAA and other government privacy regulations...

InformationWeek
Aug 07, 2009 Professor Main Target of Assault on Twitter

QUOTE: The cyberattacks Thursday and Friday on Twitter and other popular Web services disrupted the lives of hundreds of millions of Internet users, but the principal target appeared to be one man: a 34-year-old economics professor from the republic of Georgia.

New York Times
Aug 06, 2009 5 lessons from the dark side of cloud computing

QUOTE: While many companies are considering moving applications to the cloud, the security of the third-party services still leaves much to be desired, security experts warned attendees at last week's Black Hat Security Conference.

CIO Magazine
Aug 05, 2009 Responsible Twittering: The company's security issues are well-known, but users also need to be more responsible about what they tweet.

QUOTE: While this [network hacking] highlights the risks associated with applications in the cloud, it isn't the only security risk associated with Twitter. In addition there are risks with people spoofing other identities, risks of people disclosing sensitive data and people creating risks by talking about some of their activities.

Forbes
Aug 01, 2009 Halted ’03 Iraq Plan Illustrates U.S. Fear of Cyberwar Risk ("Cyberwar" part 6)

QUOTE: the [cyber]attack [on Saddam Hussein's bank accounts and government funds] never got the green light. Bush administration officials worried that the effects would not be limited to Iraq but would instead create worldwide financial havoc... Fears of such collateral damage are at the heart of the debate as the Obama administration and its Pentagon leadership struggle to develop rules and tactics for carrying out attacks in cyberspace.

New York Times
Jul 29, 2009 Congress: File Sharing Leaks Sensitive Government Data

QUOTE: Sensitive files including Secret Service safehouse locations, military rosters, and IRS tax returns can still be found on file-sharing networks...

CBS News
Jul 28, 2009 The Future of Cyber Security: What Are the Rules of Engagement? (Duel Perspectives)

QUOTE: In a battle where the militarized zone exists solely in the ether(net) and where anyone can wield the cyber-equivalent of a 10-ton bomb, how do we fight, let alone find, the enemy? What standard of proof will be used to determine the origin of an anonymous attack?

Wired
Jul 28, 2009 The Future of Cyber Security: Hackers Have Grown Up (Duel Perspectives)

QUOTE: In the old days, hackers were mostly kids and college-age acolytes sowing their wild oats before joining the establishment. Today, the best hackers have the skill and discipline of the best legitimate programmers and security gurus. They're using mind-bending obfuscation techniques to deliver malicious code from hacked websites undetected.

Wired
Jul 22, 2009 White House Mulls ID Management Approach: The Obama administration seeks input as it moves cautiously to develop a strategy for digital identities.

QUOTE: In a report on cybersecurity policy issued in May, the White House said that creating "an identity management vision that addresses privacy and civil liberties" would be an action item in the President's cybersecurity strategy.

InformationWeek
Jul 17, 2009 New Zealand moves forward with child porn filtering system

QUOTE: The blacklist currently contains 7,000 salacious websites that the [New Zealand] government claims serve up child porn, but there's no way to verify this claim because the list remains under tight lock and key.

Ars Technica
Jul 07, 2009 Is Cybersquatting Against the Law? When is it OK to buy up an expired domain name? (Explainer)

QUOTE: Cybersquatting, the practice of buying up a domain in order to profit from a trademarked name, is prohibited under the 1999 Anticybersquatting Consumer Protection Act... The First Amendment makes it legal to grab even a famous person's domain name in some situations:...

Slate
Jun 25, 2009 Registrars under fire in domain disputes: Are domain registrars making money from cybersquatters at the expense of legitimate brands? If so, why isn't ICANN stopping it?

QUOTE: [Sarah] Deutsche says that all of the companies Verizon has sued for cybersquatting are domain-name registrars that have been accredited by the Internet Corporation for Assigned Names and Numbers...

Computerworld
Apr 16, 2009 Internet regulation in France: Trois strikes and you're out

QUOTE: The French government is trying to pass a harsh new law that would cut off internet access for people who download pirated music and films.

Economist
Apr 14, 2009 PIN Crackers Nab Holy Grail of Bank Card Security

QUOTE: Hackers have crossed into new frontiers by devising sophisticated ways to steal large amounts of personal identification numbers, or PINs, protecting credit and debit cards, says an investigator.

Wired
Mar 17, 2009 Privacy Group Asks F.T.C. to Investigate Google (Bits)

QUOTE: The Electronic Privacy Information Center asked the Federal Trade Commission on Tuesday to investigate the privacy and security safeguards of Gmail, Google Docs and other so-called cloud computing services offered by Google...

New York Times
May 15, 2008 Woman indicted in deadly MySpace hoax

QUOTE: Prosecutors allege that Drew and the others violated MySpace's terms of service by using false information to create the account so they could "harass, abuse or harm" Meier, according to the indictment.

CNN (Cable News Network)
Aug 17, 2006 Internet Domain Agency Renews U.S. Contract

QUOTE: Icann’s relationship with the United States government has been a continuing source of friction for other countries, some of which protest that the link politicizes what is essentially a neutral global computer network.

New York Times
Aug 07, 2005 The Rise of the Digital Thugs

QUOTE: Law enforcement authorities and computer security specialists warn that new breeds of white-collar criminals are on the prowl: corporate stalkers who are either computer-savvy extortionists, looking to shake down companies for large bribes, or malicious competitors who are trying to gain an upper hand in the marketplace.

New York Times
Oct 08, 2002 Privacy groups target Amazon again

QUOTE: Two privacy groups are urging state and federal regulators to force Amazon.com to live up to its privacy promises.

CNET
Sep 19, 2002 Wireless hitchhikers branded as thieves

QUOTE: Phone maker Nokia has come down strongly against warchalking. It has condemned as theft the placing of chalk symbols on walls and pavements at places where people can use wireless net access.

British Broadcasting Corporation (BBC)
Sep 18, 2002 Watchdogs launch attack on filter law

QUOTE: Free speech proponents are stepping up their fight against Internet filtering in schools, waging a grassroots campaign against a law that requires Web blocking as a condition of federal funding.

New York Times
Sep 17, 2002 Sorry, Cynthia, But You Left Yourself Exposed

QUOTE: "All I have is a Web site," Cynthia says. "It was just a private thing." Private? On the World Wide Web?

Washington Post
May 27, 2002 A Libel Suit May Establish E-Jurisdiction

QUOTE: Advocates of free speech and news media lawyers worry that if the district court decision stands, online publishers could be sued for defamation in any state or country that an online article is read.

New York Times
Mar 13, 2002 Chained melodies

QUOTE: Copyright-holding corporations are pushing new laws and computer-crippling technologies in their war on piracy. But can anything keep geeks from copying the music and movies they crave?

Salon
Oct 23, 2001 No Apologies? The RIAA Says It's Misunderstood

ABSTRACT: The recording industry denies it lobbied Congress to add anti-piracy technology measures into the anti-terrorism bill.

ZDnet
Sep 27, 2001 Living Under An Electronic Eye

QUOTE: The most mundane aspects of a person's life are now recorded digitally....can potentially be scooped up by law enforcement officials and later presented in a courtroom.

New York Times
Sep 21, 2001 Cyberlaw Journal: Concern Over Proposed Changes in Internet Surveillance

QUOTE: "...federal agents under the proposed law could very easily -- and without making a showing of probable cause -- get a list of "everyone you send e-mail to, when you sent it, who replied to you, how long the messages were, whether they had attachments, as well as where you went online."

New York Times
Jul 30, 2001 Jail Time in the Digital Age

ABSTRACT: Making it a crime to crack that technology, whether or not the use of that ability would be a copyright violation, is to delegate lawmaking to code writers.

New York Times
May 23, 2001 Impermissible Links: Part Two On the Legalities of Linking

QUOTE: ...linking without permission....scenarios that are likely to provoke "cease & desist" letters...

Online Journalism Review (OJR)
May 15, 2001 Teachers Expelled In Test Scandal Deserve No Pity

QUOTE: ...somehow flipped our notions of child and adult responsibility. We hold kids to inflexible and idiotic zero tolerance rules...while we let grown-ups off easy for making a "mistake."

Washington Post
May 14, 2001 Attention, E-mail Snoops

QUOTE: As managers...you have every right to monitor your company's e-mail. But just because you can legally do it, is it ethical for you to read your subordinates' messages?

Fortune
May 08, 2001 High-tech Vigilantes Face Legal Threat

QUOTE: If a company launches a counter-attack after detecting a hacker, it could inflict damage on a third party....This raises issues of legal liability for any damage caused...

ZDnet
May 01, 2001 Legal Issues for Dealing with Application Service Providers (ASPs)

QUOTE: ...ASPs raise special legal issues that any business should address before signing up for service.

Gigalaw.com
Mar 21, 2001 Licensed to Link

ABSTRACT: Buyer Beware: With Linking Comes Liability

Online Journalism Review (OJR)
Jan 01, 1111 Staying Out of Trouble Online

QUOTE: The Internet isn't some lawless subculture that exists outside of the "real" world. What you and your employees do online counts. Your business should have a written Internet Use Policy in place to help minimize the legal risks that could embroil you in unneeded litigation.

DeWitt Grossman
Jan 01, 1111 Can You Believe What You Read on the Web?

QUOTE: Now the U.S. government is considering requiring people who write about products or services on the Internet to inform readers if they received compensation.