I’m teaching a module on Internet Law and Governance at Seton Hall Law School again this semester. Here is some of the introductory material for this week, including a video lecture I created: For our first class, we will discuss some basic principles of Internet “governance.” I put “governance” in quotes here because, as you […]
Kaspersky Lab released a report on June 15 on the “XDedic” marketplace. According to the report, “xDedic” is a trading platform where cybercriminals can purchase any of over 70,000 hacked servers from all around the internet. It appears to be run by a Russian-speaking group of hackers. The report includes screenshots of the XDedic user dashboard, […]
Here are my Powerpoints from the NJICLE Cybersecurity Conference this week on Data Breach Litigation and the Economic Loss Doctrine.
Here are my Powerpoints from the NJICLE Cybersecurity Conference this week on Cybersecurity for Law Firms.
You may have heard of “ICANN” in connection with procedures for resolving domain name disputes. What you may not realize is that ICANN is at the heart of “Internet governance,” and that even today there is a heated dispute about whether the United States government should retain any ongoing oversight of ICANN’s functions. “ICANN” stands […]
Over the past few months there has been a flurry of sometimes contradictory activity concerning the government’s ability to access electronic information in the course of a criminal investigation. This article highlights three recent proposals that show how the broader policy debate is playing out at the level of specific legal rules. Changes to the […]
The scope of the risk and uncertainty involved in data breaches and other cybersecurity incidents suggests that insurance should play a key role in any organization’s risk management strategy. The specialty cyber risk insurance market is rapidly developing, although not yet mature. Among other ambiguities, there is relatively little case law interpreting either traditional or […]
Here is a copy of the Order from U.S. Magistrate Judge Sheri Pym in California requiring Apple to render “reasonable technical assistance” to the FBI in obtaining access to an iPhone used by one the San Bernardino terror shooters. I have previously argued that, under appropriate circumstances and pursuant to a search warrant, the government should […]
Here is Part 2 of my Internet Law and Governance video series.
Here is Part 1 in my video series on Internet Law and Governance.