Essays on Computer Law


Book Description




Computer Crime Law


Book Description

This book introduces the future of criminal law. It covers every aspect of crime in the digital age, assembled together for the first time. Topics range from Internet surveillance law and the Patriot Act to computer hacking laws and the Council of Europe cybercrime convention. More and more crimes involve digital evidence, and computer crime law will be an essential area for tomorrow's criminal law practitioners. Many U.S. Attorney's Offices have started computer crime units, as have many state Attorney General offices, and any student with a background in this emerging area of law will have a leg up on the competition. This is the first law school book dedicated entirely to computer crime law. The materials are authored entirely by Orin Kerr, a new star in the area of criminal law and Internet law who has recently published articles in the Harvard Law Review, Columbia Law Review, NYU Law Review, and Michigan Law Review. The book is filled with ideas for future scholarship, including hundreds of important questions that have never been addressed in the scholarly literature. The book reflects the author's practice experience, as well: Kerr was a computer crime prosecutor at the Justice Department for three years, and the book combines theoretical insights with practical tips for working with actual cases. Students will find it easy and fun to read, and professors will find it an angaging introduction to a new world of scholarly ideas. The book is ideally suited either for a 2-credit seminar or a 3-credit course, and should appeal both to criminal law professors and those interested in cyberlaw or law and technology. No advanced knowledge of computers and the Internet is required or assumed.




Transforming the Law


Book Description

"In response to the current upsurge of interest in commercially exploiting expert systems in law, Part III re-presents Susskind's original research and development work in this area." "In the final part of the book, Susskind looks beyond legal practice to the justice system more generally, concentrating on the impact of IT on judges, the courts, and society."--BOOK JACKET.




Cybersecurity Law


Book Description

CYBERSECURITY LAW Learn to protect your clients with this definitive guide to cybersecurity law in this fully-updated third edition Cybersecurity is an essential facet of modern society, and as a result, the application of security measures that ensure the confidentiality, integrity, and availability of data is crucial. Cybersecurity can be used to protect assets of all kinds, including data, desktops, servers, buildings, and most importantly, humans. Understanding the ins and outs of the legal rules governing this important field is vital for any lawyer or other professionals looking to protect these interests. The thoroughly revised and updated Cybersecurity Law offers an authoritative guide to the key statutes, regulations, and court rulings that pertain to cybersecurity, reflecting the latest legal developments on the subject. This comprehensive text deals with all aspects of cybersecurity law, from data security and enforcement actions to anti-hacking laws, from surveillance and privacy laws to national and international cybersecurity law. New material in this latest edition includes many expanded sections, such as the addition of more recent FTC data security consent decrees, including Zoom, SkyMed, and InfoTrax. Readers of the third edition of Cybersecurity Law will also find: An all-new chapter focused on laws related to ransomware and the latest attacks that compromise the availability of data and systems New and updated sections on new data security laws in New York and Alabama, President Biden’s cybersecurity executive order, the Supreme Court’s first opinion interpreting the Computer Fraud and Abuse Act, American Bar Association guidance on law firm cybersecurity, Internet of Things cybersecurity laws and guidance, the Cybersecurity Maturity Model Certification, the NIST Privacy Framework, and more New cases that feature the latest findings in the constantly evolving cybersecurity law space An article by the author of this textbook, assessing the major gaps in U.S. cybersecurity law A companion website for instructors that features expanded case studies, discussion questions by chapter, and exam questions by chapter Cybersecurity Law is an ideal textbook for undergraduate and graduate level courses in cybersecurity, cyber operations, management-oriented information technology (IT), and computer science. It is also a useful reference for IT professionals, government personnel, business managers, auditors, cybersecurity insurance agents, and academics in these fields, as well as academic and corporate libraries that support these professions.




Essays on the Visualisation of Legal Informatics


Book Description

Both legal scholars and computer scientists will be curious to know how the gap between law and computing can be bridged. The law, and also jurisprudence, is based on language, and is mainly textual. Every syntactic system has its semantic range, and so does language, which in law achieves a high degree of professional precision. The use of visualisations is a syntactic supplement and opens up a new understanding of legal forms. This understanding was reinforced by the paradigm shift from textual law to legal informatics, in which visual formal notations are decisive. The authors have been dealing with visualisation approaches for a long time and summarise them here for discussion. In this book, a multiphase transformation from the legal domain to computer code is explored. The authors consider law enforcement by computer. The target view is that legal machines are legal actors that are capable of triggering institutional facts. In the visualisation of statutory law, an approach called Structural Legal Visualisation is presented. Specifically, the visualisation of legal meaning is linked with tertium comparationis, the third part of the comparison. In a legal documentation system, representing one legal source with multiple documents is viewed as a granularity problem. The authors propose to supplement legislative documents ex ante with explicit logic-oriented information in the form of a mini thesaurus. In contrast to so-called strong relations such as synonymy, antonymy and hypernymy/hyponymy, one should consider weak relations: (1) dialectical relations, a term of dialectical antithesis; (2) context relations; and (3) metaphorical relations, which means the use of metaphors for terms. The chapters trace topics such as the distinction between knowledge visualisation and knowledge representation, the visualisation of Hans Kelsen’s Pure Theory of Law, the separation of law and legal science, legal subsumption, legal relations, legal machines, encapsulation, compliance, transparency, standard cases and hard cases.




Code


Book Description

There's a common belief that cyberspace cannot be regulated-that it is, in its very essence, immune from the government's (or anyone else's) control.Code argues that this belief is wrong. It is not in the nature of cyberspace to be unregulable; cyberspace has no "nature." It only has code-the software and hardware that make cyberspace what it is. That code can create a place of freedom-as the original architecture of the Net did-or a place of exquisitely oppressive control.If we miss this point, then we will miss how cyberspace is changing. Under the influence of commerce, cyberpsace is becoming a highly regulable space, where our behavior is much more tightly controlled than in real space.But that's not inevitable either. We can-we must-choose what kind of cyberspace we want and what freedoms we will guarantee. These choices are all about architecture: about what kind of code will govern cyberspace, and who will control it. In this realm, code is the most significant form of law, and it is up to lawyers, policymakers, and especially citizens to decide what values that code embodies.




How to Write Law Essays and Exams


Book Description

This work provides students at all levels with a practical and proven method of analysing and answering essay and exam questions so that they can maximise their potential. The book provides a framework for analysing legal problems, and teaches students how to identify relevant legal authorities, distinguish and harmonise conflicting legal precedents and evaluate the applicability of the law to the facts of the question in hand. It can be used by students at any stage of their legal education and will teach skills that will continue to be of use in the workplace. A practical guide, the text includes cases and worked examples, enabling students to adopt good essay writing techniques.




Law for Computer Scientists and Other Folk


Book Description

This book introduces law to computer scientists and other folk. Computer scientists develop, protect, and maintain computing systems in the broad sense of that term, whether hardware (a smartphone, a driverless car, a smart energy meter, a laptop, or a server), software (a program, an application programming interface or API, a module, code), or data (captured via cookies, sensors, APIs, or manual input). Computer scientists may be focused on security (e.g. cryptography), or on embedded systems (e.g. the Internet of Things), or on data science (e.g. machine learning). They may be closer to mathematicians or to electrical or electronic engineers, or they may work on the cusp of hardware and software, mathematical proofs and empirical testing. This book conveys the internal logic of legal practice, offering a hands-on introduction to the relevant domains of law, while firmly grounded in legal theory. It bridges the gap between two scientific practices, by presenting a coherent picture of the grammar and vocabulary of law and the rule of law, geared to those with no wish to become lawyers but nevertheless required to consider the salience of legal rights and obligations. Simultaneously, this book will help lawyers to review their own trade. It is a volume on law in an onlife world, presenting a grounded argument of what law does (speech act theory), how it emerged in the context of printed text (philosophy of technology), and how it confronts its new, data-driven environment. Book jacket.







George Fletcher's Essays on Criminal Law


Book Description

This volume collects, for the first time, a selection of criminal law scholar George Fletcher's most famous previously published shorter works as well as some that are less known but equally important. Each of the twelve essays by Fletcher is paired with one or more new critical commentaries on that essay. These critical commentaries trace the impact of the respective essay in the development of the criminal law and assess its future significance.