calendardigital-marketingit-solutionslocation-dotlogo-footertech-journal-logo-footerweb-development

Open filters Close filters

Student Podcast
October 6th, 2020
Hosts Matt Sardo ’23 and Meg Sullivan ‘ 23 follow up on last week’s coverage of TikTok’s request for an injunction to the ban of its app, and cover Epic Games’ lawsuit against Apple following the companies’ dispute over banning Fortnite from Apple’s App Store, the EU’s draft of antitrust ...
BTLJ Blog
April 22nd, 2019
by Mimansa Ambastha (L.L.M. 2019) Modern information technology is intrinsically full of vulnerabilities, from software coding/algorithms to hardware security systems. Security professionals around the world agree that no cyber technology can claim to be 100% secure against manipulation, as any piece of technology inherently presents vulnerabilities that arise due to ...
BTLJ Blog
March 22nd, 2017
By Amit Elazari Bar On, Adv., LL.M., Doctoral Law Student (J.S.D.), UC Berkeley School of Law, CTSP Fellow, Information School, UC Berkeley | March 22, 2017 In an economy where data is an emerging global currency, software vulnerabilities and security breaches are naturally a major area of concern. Data breaches’ ...
BTLJ Blog
February 13th, 2017
By: Jacqueline de Souza Abreu Jacqueline de Souza Abreu (@jacqueabreu) is Project Lead at InternetLab, a São Paulo-based law and technology research center. She holds LL.M. degrees from UC Berkeley and LMU Munich. Brazilian judicial authorities ordered that access to the U.S. messaging service WhatsApp be blocked three times within the last ...
BTLJ Blog
June 22nd, 2016
Contemporary consumer privacy law in the United States is largely based on the Fair Information Practice Principles (FIPPs). These FIPPs are conceptually challenged by the “Internet of Things,” the digital ecosystem where sensors embedded in everyday physical objects – from watches and shoes to refrigerators and roads – communicate with ...
UncategorizedBTLJ Blog
April 22nd, 2016
Cyber-crimes, such as data breaches and cyber-attacks, have posed a constant threat to the United States Government and its citizens in the post-Snowden era. A study suggests that in 2015 a total of 58 cyber-attacks occurred on US companies, which marked a significant increase from the previous year. The average cost per attack ...
BTLJ Blog
October 21st, 2013
If the Internet international archives will register 2013 as the year of Edward Snowden and the disclosure of National Security Agency (NSA) surveillance programs by the media, 2012 was all about the mobilization against a United Nations (U.N.) attempt to take over the Internet. This post recaps the legal and ...
BTLJ Blog
March 9th, 2011
During the recent revolution in Egypt, the government disabled Internet access throughout the country with the flip of a switch. Could the same thing happen in America? Practically, because the structure of the Internet in the United States is more complex and decentralized than in Egypt, it cannot be shut ...