The Provision of Means: Dual Use Goods & Corporate Liability
This is Part III of a series on the Doe v. Cisco case pending in the Northern District of California and involving claims that Cisco should be liable for aiding and abetting the Chinese Government’s...
View ArticleYahoo! End-to-End email preview promises greater protection for journalists
Read more » about Yahoo! End-to-End email preview promises greater protection for journalistsAuthor(s): Tom LowenthalPublication Date: March 30, 2015Publication Type: Other WritingGood news for...
View ArticleAn Evening with Valarie Kaur
Cultural Events Board is proud to announce that Valarie Kaur will be the first out-of-state Sikh American to come speak to our campus regarding hate crimes against Sikh and Muslim American following...
View ArticleLunch Timer with Peter Asaro and Sarah Tang – Non-Military Drones: What Laws...
For more information visit: https://citp.princeton.edu/event/lunch-timer-asaro-tang/Location: Bowl 001, Robertson HallFood and discussion begin at 12:15 pm. Open to current Princeton faculty, fellows...
View ArticleChina's CNNIC issues false certificates in serious breach of crypto trust
Read more » about China's CNNIC issues false certificates in serious breach of crypto trustAuthor(s): Tom LowenthalPublication Date: March 31, 2015Publication Type: Other Writing
View ArticleYik Yak & Social Media Trends
Visit WYPR.org to listen to the podcast. Social media is full of hurtful, racist and sometimes threatening speech. We take a look at the hyper-localized and anonymous culture of social media apps and...
View Article(C) More Entertainment for Broadcasters: The European Court of Justice on...
A few days ago, the European Court of Justice (ECJ) decided C More Entertainment AB v Linus Sandberg. This is the last episode of the linking saga, previously discussed by the ECJ in Svensson and...
View Article2015 Parliament of the World’s Religions
CIS Residential Fellow Valarie Kaur featured speaker! For more information and to register visit: http://www.parliamentofreligions.org/index.cfm?n=35&sn=14October 15, 2015Read more » about 2015...
View ArticlePrivacy in the Age of Pervasive Surveillance
Ours is a time of ubiquitous surveillance. Our actions online and in public are routinely monitored, both with and without our consent, using the “smart” devices we’ve embraced as the tools of modern...
View ArticleDrones, The Weaponized Web And A Look Inside The Bush White House
On this week’s FAST FORWARD, FOX Business Network’s Jo Ling Kent looks at how China may be weaponizing foreign web traffic. Also, are we taking steps closer to commercialized drones? We speak with...
View ArticleAfter GamerGate, Congress Is Grappling With Online Abuse
Date published: April 15, 2015"Danielle Citron, a professor at the University of Maryland School of Law and author of Hate Crimes in Cyberspace, told BuzzFeed News that while the norm-changing force of...
View ArticleConference explores regulating robots in the near future
Date published: April 15, 2015"Ryan Calo, assistant professor of law at the UW School of Law, is clear about the significance of We Robot, an annual conference on robotics law and policy. “There will...
View ArticleNetwork Neutrality Toolkit
Date published: April 15, 2015"Of course, what must be noted here is that absolute network neutrality is not a beneficial concept either. A certain level of discrimination is necessary for the network...
View ArticleFair Use In The Digital Age: The Ongoing Influence of Campbell v....
For more information and to register visit the UW Law School website. Thursday, April 166-8pm, Speakers' Dinner at the Watertown Hotel, 4242 Roosevelt Way NE, Seattle, WA 98105 Read more » about Fair...
View ArticleTaking Responsibility for One’s Own Data Privacy and Security–Is it Possible,...
For more information and to register visit the CTIC website. 8:30 – 9:00 a.m. Breakfast and Registration9:00 – 9:15 a.m.Welcome and Opening RemarksRead more » about Taking Responsibility for One’s Own...
View ArticleHate Crimes in Cyberspace
Most Internet users are familiar with trolling—aggressive, foul-mouthed posts designed to elicit angry responses in a site’s comments. Less familiar but far more serious is the way some use networked...
View ArticleWhy you have the right to obscurity
Author(s): Woodrow HartzogPublication Date: April 15, 2015Publication Type: Other WritingCo-authored with Evan Selinger.Some people argue that the Digital Age has eviscerated obscurity. They say shifts...
View ArticleTechnologists oppose CISA/information sharing bills
Today we sent a letter to lawmakers expressing security experts' opposition to the Cybersecurity Information Sharing Act (CISA) as well as two other pending bills that purport to be about security...
View ArticleDear Mark Zuckerberg, Facebook is not, and should not be the internet
Date published: April 16, 2015""I think zero-rating is the next big threat to innovation and free speech online," says Barbara van Schewick, a professor at Stanford Law School. "It distorts...
View ArticleBelgian Court Says That ISPs Must Not Pay a Copyright Levy to Collective...
On March 13, 2015, the Distric Court of Brussels decided that Internet Service Providers (ISPs) should not pay a copyright levy for communicating to the public the repertoire of SABAM, the Belgian...
View Article