Part of the Computer Law Commons

Works in Computer Law

2023

Intellectual Property and Strategic Competition with China, Charles Duan
Charles Duan

Data Localization and Government Access to Data Stored Abroad: Discussion Paper 2, Shanzay Pervaiz, Alex Joel
Joint PIJIP/TLS Research Paper Series

PDF

Intellectual Property and Strategic Competition with China, Charles Duan
Popular Media

Content Governance in the Shadows: How Telcos & Other Internet Infrastructure Companies "Moderate" Online Content, Prem M. Trivedi
Joint PIJIP/TLS Research Paper Series

PDF

Combating Ransomware: One Year On, V. Gerard Comizio, Gary Corn, William Deckelman, Karl Hopkins, Mark Hughes, Patrick McCarty, Sujit Raman, Kurt Sanger, Ari Schwartz, Melanie Teplinsky, Jackson Colling
Joint PIJIP/TLS Research Paper Series

PDF

2022

Transnational Government Hacking, Jennifer C. Daskal
Jennifer Daskal

Good Health and Good Privacy Go Hand-in-Hand (Originally published by JNSLP), Jennifer Daskal
Jennifer Daskal

2021

Widening the Lens on Content Moderation, Jenna Ruddock, Justin Sherman
Joint PIJIP/TLS Research Paper Series

PDF

2020

Good Health and Good Privacy Go Hand-in-Hand (Originally published by JNSLP), Jennifer Daskal
Joint PIJIP/TLS Research Paper Series

PDF

Covert Deception, Strategic Fraud, and the Rule of Prohibited Intervention (Originally published as part of the Hoover Institution’s Aegis Series), Gary Corn
Joint PIJIP/TLS Research Paper Series

PDF

Hearing on "21st Century Trade Barriers: Protectionist Cross Border Data Flow Policies Impact on U.S. Jobs," Subcommittee on Digital Commerce and Consumer Protection, Jennifer Daskal
Jennifer Daskal

Elusiveness and Evolution: Mass-Market Licenses Under Proposed U.C.C. Article 2B, Walter Effross
Walter Effross

Statute of Frauds, Notice, and the Parol Evidence Rules, Walter Effross
Walter Effross

Identifying Horizontal Price Fixing in the Electronic Marketplace, Jonathan Baker
Jonathan B. Baker

Computer-Related Crimes, Michael W. Carroll
Michael W. Carroll

Garbage In: Emerging Media and Regulation of Unsolicited Commercial Solicitiations, Michael W. Carroll
Michael W. Carroll

The Overlapping Web of Data, Territoriality and Sovereignty, Jennifer Daskal
Jennifer Daskal

Piracy, Privacy, and Privitization: Fictional and Legal Approaches to the Electronic Future of Cash, Walter Effross
Walter Effross

Notes on PKI and Digital Negotiability: Would the Cybercourier Carry Luggage, Walter Effross
Walter Effross

High-Tech Heroes, Virtual Villians, and Jacked-In Justice: Visions of Law and Lawyers in Cyberpunk Science Fiction, Walter Effross
Walter Effross

Assaying Computer Associates v. Altai: How Will the Golden Nugget Test Pan Out, Walter Effross
Walter Effross

The Legal Architecture of Virtual Stores: World Wide Web Sites and the Uniform Commercial Code, Walter Effross
Walter Effross

Putting the Cards before the Purse: Distinctions, Differences, and Dilemmas in the Regulation of Stored Value Card Systems, Walter Effross
Walter Effross

Withdrawal of the Reference: Rights, Rules, and Remedies for Unwelcomed Web-Linking, Walter Effross
Walter Effross

A Puzzle Even the Codebreakers Have Trouble Solving: A Clash of Interests over the Electronic Encryption Standard, Sean Flynn
Sean Flynn

A Survey of Federal Agency Rulemakers' Attitudes About E-Rulemaking, Jeffrey Lubbers
Jeffrey Lubbers

Nonexcludable Surgical Method Patents, Jonas Anderson
J. Jonas Anderson

The ASBCA's Path to the Mega ADR in Computer Sciences Corporation, Paul Williams, Reba Ann Page
Paul Williams

Cracking the Copyright Dilemma in Software Preservation: Protecting Digital Culture Through Fair Use Consensus, Peter Jaszi, Patricia Aufderheide, Brandon Butler, Krista L. Cox
Peter Jaszi

The Statute of Anne: Today and Tomorrow, Peter Jaszi, Craig Joyce, Marshall A. Leaffer, Tyler Trent Ochoa
Peter Jaszi

More than the Sum of All Parts: Taking on IP and IT Theft Through a Global Partnership, Andrew F. Popper
Andrew Popper

Nonexcludable Surgical Method Patents, Jonas Anderson
Articles in Law Reviews & Other Academic Journals

PDF

Transnational Government Hacking, Jennifer C. Daskal
Joint PIJIP/TLS Research Paper Series

PDF

The Overlapping Web of Data, Territoriality and Sovereignty, Jennifer Daskal
Contributions to Books

PDF

2019

Internet of Infringing Things: The Effect of Computer Interface Copyrights on Technology Standards, Charles Duan
Articles in Law Reviews & Other Academic Journals

PDF

Cracking the Copyright Dilemma in Software Preservation: Protecting Digital Culture Through Fair Use Consensus, Peter Jaszi, Patricia Aufderheide, Brandon Butler, Krista L. Cox
Articles in Law Reviews & Other Academic Journals

PDF

2018

Apple hat einen Plan, der die Strafverfolgung erleichtern soll,
Jennifer Daskal

The Cybersecurity 202: How Trump's Supreme Court pick could influence digital privacy, Derek Hawkins
Jennifer Daskal

Data Localization The Unintended Consequences Of Privacy Litigation, H Jacqueline Brehmer
American University Law Review

PDF

2017

Hearing on "21st Century Trade Barriers: Protectionist Cross Border Data Flow Policies Impact on U.S. Jobs," Subcommittee on Digital Commerce and Consumer Protection, Jennifer Daskal
Congressional and Other Testimony

There's No Good Decision in the Next Big Data Privacy Case, Jennifer Daskal
Popular Media

Microsoft, Trump administration clash over email searches, Mark Sherman
Jennifer Daskal

2016

Creative Commons and the New Intermediaries, Michael W. Carroll
Michael W. Carroll

PDF

Patent Injunctions and the Problem of Uniformity Cost, Michael W. Carroll
Michael W. Carroll

PDF

What's In The Box? Re-Conceptualizing Computers as Containers, Metadata as Contents of that Container, and Applying Fourth Amendment Protections, Christopher Michels
Criminal Law Practitioner

PDF

2015

The Federal Circuit and Ultramercial:Software and Business Method Patents Tumble Further Down the Rabbit Hole, Mark Patrick
American University Law Review

PDF

The Fourth Amendment in the Digital Age Symposium, Braxton Marcela
Criminal Law Practitioner

PDF

Looking for Love in the Online Age - Convicted Felons Need Not Apply: Why Bans on Felons Using Internet Dating Sites are Problematic and Could Lead to Violations of the Computer Fraud & Abuse Act, Amy Tenney
Criminal Law Practitioner

PDF

2014

More than the Sum of All Parts: Taking on IP and IT Theft Through a Global Partnership, Andrew F. Popper
Articles in Law Reviews & Other Academic Journals

PDF

2013

Giving Purpose to Your Life as a Legal Writer, David Spratt
Articles in Law Reviews & Other Academic Journals

PDF

The ASBCA's Path to the Mega ADR in Computer Sciences Corporation, Paul Williams, Reba Ann Page
Articles in Law Reviews & Other Academic Journals

PDF

2012

Barricading the Information Superhighway to Stop the Flow of Traffic: Why International Regulation of the Internet is Necessary to Prevent Sex Trafficking, Kendall Vitale
American University International Law Review

PDF

A Risk Not Worth The Reward: The Stored Communications Act And Employers’ Collection Of Employees’ And Job Applicants’ Social Networking Passwords, Nicholas D. Beadle
American University Business Law Review

PDF

2011

Federal Register 2.0: Public Participation in the Twenty-First Century, Lauren R. Dudley
Legislation and Policy Brief

PDF

Attention All Internet Users: How Proposed Amendments to the Communications Decency Act Could Save Your Reputation, Niki Blumentritt
Legislation and Policy Brief

PDF

A Survey of Federal Agency Rulemakers' Attitudes About E-Rulemaking, Jeffrey Lubbers
Contributions to Books

2010

Disincentives to Data Breach: Problems with Notification and Future Legislative Possibilities, Ross Schulman
Legislation and Policy Brief

PDF

The Statute of Anne: Today and Tomorrow, Peter Jaszi, Craig Joyce, Marshall A. Leaffer, Tyler Trent Ochoa
Articles in Law Reviews & Other Academic Journals

PDF

2008

Writer's Block, David Spratt
Articles in Law Reviews & Other Academic Journals

PDF

2005

Statute of Frauds, Notice, and the Parol Evidence Rules, Walter Effross
Contributions to Books

2004

Virtual Child Pornography: Where to Strike the Balance Between Protecting Children and Protecting Free Speech, Keith Hagg
Upper Level Writing Requirement Research Papers

1998

Withdrawal of the Reference: Rights, Rules, and Remedies for Unwelcomed Web-Linking, Walter Effross
Articles in Law Reviews & Other Academic Journals

PDF

Notes on PKI and Digital Negotiability: Would the Cybercourier Carry Luggage, Walter Effross
Articles in Law Reviews & Other Academic Journals

PDF

Elusiveness and Evolution: Mass-Market Licenses Under Proposed U.C.C. Article 2B, Walter Effross
Contributions to Books

1997

High-Tech Heroes, Virtual Villians, and Jacked-In Justice: Visions of Law and Lawyers in Cyberpunk Science Fiction, Walter Effross
Articles in Law Reviews & Other Academic Journals

PDF

Putting the Cards before the Purse: Distinctions, Differences, and Dilemmas in the Regulation of Stored Value Card Systems, Walter Effross
Articles in Law Reviews & Other Academic Journals

PDF

Piracy, Privacy, and Privitization: Fictional and Legal Approaches to the Electronic Future of Cash, Walter Effross
Articles in Law Reviews & Other Academic Journals

PDF

The Legal Architecture of Virtual Stores: World Wide Web Sites and the Uniform Commercial Code, Walter Effross
Articles in Law Reviews & Other Academic Journals

PDF

1996

Garbage In: Emerging Media and Regulation of Unsolicited Commercial Solicitiations, Michael W. Carroll
Articles in Law Reviews & Other Academic Journals

PDF

Identifying Horizontal Price Fixing in the Electronic Marketplace, Jonathan Baker
Articles in Law Reviews & Other Academic Journals

PDF

1995

A Puzzle Even the Codebreakers Have Trouble Solving: A Clash of Interests over the Electronic Encryption Standard, Sean Flynn
Articles in Law Reviews & Other Academic Journals

PDF

Computer-Related Crimes, Michael W. Carroll
Articles in Law Reviews & Other Academic Journals

PDF

1993

Assaying Computer Associates v. Altai: How Will the Golden Nugget Test Pan Out, Walter Effross
Articles in Law Reviews & Other Academic Journals

PDF