"Early treatment of computer law was no more than the application of existing principles to novel sets of facts. Today, it has been recognized generally that computing technology does indeed give rise to unique legal problems which are not resolvable by applying existing legal principles. This is particularly apparent where transactions are carried out through the exchange of digital information rather than human interaction. The developing law which seeks to resolve these problems is at the heart of the latest edition of this book, now established as a standard text on computer law for students, practitioners, and business in general for whom information technology is an integral part of their daily activities."--BOOK JACKET.
Professor Litman's work stands out as well-researched, doctrinally solid, and always piercingly well-written.-JANE GINSBURG, Morton L. Janklow Professor of Literary and Artistic Property, Columbia UniversityLitman's work is distinctive in several respects: in her informed historical perspective on copyright law and its legislative policy; her remarkable ability to translate complicated copyright concepts and their implications into plain English; her willingness to study, understand, and take seriously what ordinary people think copyright law means; and her creativity in formulating alternatives to the copyright quagmire. -PAMELA SAMUELSON, Professor of Law and Information Management; Director of the Berkeley Center for Law & Technology, University of California, BerkeleyIn 1998, copyright lobbyists succeeded in persuading Congress to enact laws greatly expanding copyright owners' control over individuals' private uses of their works. The efforts to enforce these new rights have resulted in highly publicized legal battles between established media and new upstarts.In this enlightening and well-argued book, law professor Jessica Litman questions whether copyright laws crafted by lawyers and their lobbyists really make sense for the vast majority of us. Should every interaction between ordinary consumers and copyright-protected works be restricted by law? Is it practical to enforce such laws, or expect consumers to obey them? What are the effects of such laws on the exchange of information in a free society?Litman's critique exposes the 1998 copyright law as an incoherent patchwork. She argues for reforms that reflect common sense and the way people actually behave in their daily digital interactions.This paperback edition includes an afterword that comments on recent developments, such as the end of the Napster story, the rise of peer-to-peer file sharing, the escalation of a full-fledged copyright war, the filing of lawsuits against thousands of individuals, and the June 2005 Supreme Court decision in the Grokster case.Jessica Litman (Ann Arbor, MI) is professor of law at Wayne State University and a widely recognized expert on copyright law.
CYBERSECURITY LAW Learn to protect your clients with this definitive guide to cybersecurity law in this fully-updated third edition Cybersecurity is an essential facet of modern society, and as a result, the application of security measures that ensure the confidentiality, integrity, and availability of data is crucial. Cybersecurity can be used to protect assets of all kinds, including data, desktops, servers, buildings, and most importantly, humans. Understanding the ins and outs of the legal rules governing this important field is vital for any lawyer or other professionals looking to protect these interests. The thoroughly revised and updated Cybersecurity Law offers an authoritative guide to the key statutes, regulations, and court rulings that pertain to cybersecurity, reflecting the latest legal developments on the subject. This comprehensive text deals with all aspects of cybersecurity law, from data security and enforcement actions to anti-hacking laws, from surveillance and privacy laws to national and international cybersecurity law. New material in this latest edition includes many expanded sections, such as the addition of more recent FTC data security consent decrees, including Zoom, SkyMed, and InfoTrax. Readers of the third edition of Cybersecurity Law will also find: An all-new chapter focused on laws related to ransomware and the latest attacks that compromise the availability of data and systems New and updated sections on new data security laws in New York and Alabama, President Biden’s cybersecurity executive order, the Supreme Court’s first opinion interpreting the Computer Fraud and Abuse Act, American Bar Association guidance on law firm cybersecurity, Internet of Things cybersecurity laws and guidance, the Cybersecurity Maturity Model Certification, the NIST Privacy Framework, and more New cases that feature the latest findings in the constantly evolving cybersecurity law space An article by the author of this textbook, assessing the major gaps in U.S. cybersecurity law A companion website for instructors that features expanded case studies, discussion questions by chapter, and exam questions by chapter Cybersecurity Law is an ideal textbook for undergraduate and graduate level courses in cybersecurity, cyber operations, management-oriented information technology (IT), and computer science. It is also a useful reference for IT professionals, government personnel, business managers, auditors, cybersecurity insurance agents, and academics in these fields, as well as academic and corporate libraries that support these professions.
A thoroughly updated, comprehensive, and accessible guide to U.S. telecommunications law and policy, covering recent developments including mobile broadband issues, spectrum policy, and net neutrality. In Digital Crossroads, two experts on telecommunications policy offer a comprehensive and accessible analysis of the regulation of competition in the U.S. telecommunications industry. The first edition of Digital Crossroads (MIT Press, 2005) became an essential and uniquely readable guide for policymakers, lawyers, scholars, and students in a fast-moving and complex policy field. In this second edition, the authors have revised every section of every chapter to reflect the evolution in industry structure, technology, and regulatory strategy since 2005. The book features entirely new discussions of such topics as the explosive development of the mobile broadband ecosystem; incentive auctions and other recent spectrum policy initiatives; the FCC's net neutrality rules; the National Broadband Plan; the declining relevance of the traditional public switched telephone network; and the policy response to online video services and their potential to transform the way Americans watch television. Like its predecessor, this new edition of Digital Crossroads not only helps nonspecialists climb this field's formidable learning curve, but also makes substantive contributions to ongoing policy debates.
Building on innovative research undertaken by the 'Cloud Legal Project' at Queen Mary, University of London, this work analyses the key legal and regulatory issues relevant to cloud computing under European and English law.
Offering broad national coverage on an array of topics, Natural Resources Law, Fourth Edition conveys the drama behind resource disputes and policy and the love-of-place. Most cases are introduced with a photo or map of the place, along with a context-setting paragraph. Each group of cases—both foundational cases as well as new decisions—begins with a factually rich discussion problem tailored to the cases that follow. Many problems mirror traditional essay exam questions; others raise contemporary policy issues. This highly teachable book groups readings into discrete, assignment-sized chunks of 25-40 pages, allowing coverage of 2-4 cases or one problem during each class section. The main emphasis is on primary sources, and each chapter opens with relevant statutory and regulatory sections.
This book introduces the future of criminal law. It covers every aspect of crime in the digital age, assembled together for the first time. Topics range from Internet surveillance law and the Patriot Act to computer hacking laws and the Council of Europe cybercrime convention. More and more crimes involve digital evidence, and computer crime law will be an essential area for tomorrow's criminal law practitioners. Many U.S. Attorney's Offices have started computer crime units, as have many state Attorney General offices, and any student with a background in this emerging area of law will have a leg up on the competition. This is the first law school book dedicated entirely to computer crime law. The materials are authored entirely by Orin Kerr, a new star in the area of criminal law and Internet law who has recently published articles in the Harvard Law Review, Columbia Law Review, NYU Law Review, and Michigan Law Review. The book is filled with ideas for future scholarship, including hundreds of important questions that have never been addressed in the scholarly literature. The book reflects the author's practice experience, as well: Kerr was a computer crime prosecutor at the Justice Department for three years, and the book combines theoretical insights with practical tips for working with actual cases. Students will find it easy and fun to read, and professors will find it an angaging introduction to a new world of scholarly ideas. The book is ideally suited either for a 2-credit seminar or a 3-credit course, and should appeal both to criminal law professors and those interested in cyberlaw or law and technology. No advanced knowledge of computers and the Internet is required or assumed.