NOTE: Reining in the Rogue Employee: The Fourth Circuit Limits Employee Liability Under the CFAA
By Danielle E. Sunberg | 62 Am. U. L. Rev. 1417 (2013) On January 2, 2013, the Supreme Court dismissed…
NOTE: {{FTC v. LabMD}}: FTC Jurisdiction over Information Privacy is “Plausible,” But How Far Can it Go?
By Peter S. Frecehette | 62 Am. U. L. Rev. 1401 (2013) Companies in nearly every industry collect, store, and…
COMMENT: Identity Crisis: Seeking a Unified Approach to Plaintiff Standing for Data Security Breaches of Sensitive Personal Information
By Miles L. Galbraith | 62 Am. U. L. Rev. 1365 (2013) Today, information is largely stored and transmitted electronically, raising…
TRANSCRIPT: “America the Virtual: Security, Privacy, and Interoperability in an Interconnected World
By Ivan K. Fong & David G. Delaney | 62 Am. U. L. Rev. 1131 (2013) It is no exaggeration…
Toward Cyberpeace: Managing Cyberattacks Through Polycentric Governance
By Scott J. Shackelford | 62 Am. U. L. Rev. 1273 (2013) Views range widely about the seriousness of cyberattacks…
Hacker’s Delight: Law Firm Risk and Liability in the Cyber Age
By Michael McNerney & Emilian Papadopoulos | 62 Am. U. L. Rev. 1243 (2012) In October 2012, former Secretary of…
When Cyberweapons End Up on Private Networks: Third Amendment Implications for Cybersecurity Polity
By Alan Butler | 62 Am. U. L. Rev. 1203 (2013) In the summer of 2010, Microsoft reported a new…
Regulating Information Security in the Government Contracting Industry: Will the Rising Tide Lift all the Boats?
By Keir X. Bancroft | 62 Am. U. L. Rev. 1145 (2013) The government is strengthening cyber and information security regulations…
FOREWARD: Mapping Today’s Cybersecurity Landscape
By Jorge L. Contreras, Laura DeNards, & Melanie Teplinsky | 62 Am. U. L. Rev. 1113 (2013) Cyberthreats recently…