Taking a Hard Look at the Vulnerabilities Equities Process and its National Security Implications

by Mimansa Ambastha (L.L.M. 2019) Modern information technology is intrinsically full of vulnerabilities, from software coding/algorithms to hardware … Continue Reading

Bug Bounty Programs as a Corporate Governance “Best Practice” Mechanism

By Amit Elazari Bar On, Adv., LL.M., Doctoral Law Student (J.S.D.), UC Berkeley School of Law, CTSP Fellow, … Continue Reading

From Jurisdictional Battles to Crypto Wars: Brazilian Courts v. WhatsApp

By: Jacqueline de Souza Abreu Jacqueline de Souza Abreu (@jacqueabreu) is Project Lead at InternetLab, a São Paulo-based law and … Continue Reading

An Unprincipled Future? The Conflict Between FIPPs and the Internet of Things

Contemporary consumer privacy law in the United States is largely based on the Fair Information Practice Principles (FIPPs). … Continue Reading

Internet Governance in the Age of Surveillance

If the Internet international archives will register 2013 as the year of Edward Snowden and the disclosure of … Continue Reading

Internet "Kill Switch" Legislation: Can Obama Turn Off the Internet?

During the recent revolution in Egypt, the government disabled Internet access throughout the country with the flip of … Continue Reading