Every year, I complete a new supplement to my Computer Crime Law casebook that includes the latest cases as well as the latest statutes. I recently handed in the materials for the 2017 Supplement, and ...
Moves by several European countries to tighten laws against computer hacking worry security professionals, who often use the same tools as hackers but for legitimate purposes. The U.K. and Germany are ...
The federal Computer Fraud and Abuse Act (CFAA) and the Stored Communications Act (SCA) were enacted to protect U.S. businesses and individuals from computer hacking and industrial espionage. In ...
Employee rights to privacy are balanced against employers' rights to monitor business operations. Technological advances present complex new privacy issues and the legal system is still trying to ...
Legal and IT experts have made submissions to the government’s call for views on the current rules around the use of computer evidence in court, which closes today. The wider public understanding of ...
Two U.S. lawmakers have introduced a bill that would prevent the Department of Justice from prosecuting people for violating terms of service for Web-based products ...
Live Science on MSN
Science history: Computer scientist lays out 'Moore's law,' guiding chip design for a half century — Dec. 2, 1964
At a small local chapter meeting of a professional society, Gordon Moore's talk laid out the rudiments of what would become ...
Campaigners celebrate as security minister Dan Jarvis commits to amending the outdated Computer Misuse Act to protect ...
U.S. District Judge Mark Walker in June issued a preliminary injunction to block the law (HB 3), agreeing with the industry ...
For some people, all math problems are difficult. But for computer scientists, most math problems are easy. The computer does all the work. Sometimes, though, problems come along that even computers ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results