NOTE: Reining in the Rogue Employee: The Fourth Circuit Limits Employee Liability Under the CFAA

By Danielle E. Sunberg  | 62 Am. U. L. Rev. 1417 (2013)   On January 2, 2013, the Supreme Court dismissed…

By amunlawreview

NOTE: {{FTC v. LabMD}}: FTC Jurisdiction over Information Privacy is “Plausible,” But How Far Can it Go?

By Peter S. Frecehette | 62 Am. U. L. Rev. 1401 (2013)  Companies in nearly every industry collect, store, and…

By amunlawreview

COMMENT: Identity Crisis: Seeking a Unified Approach to Plaintiff Standing for Data Security Breaches of Sensitive Personal Information

By Miles L. Galbraith  | 62 Am. U. L. Rev. 1365 (2013)  Today, information is largely stored and transmitted electronically, raising…

By amunlawreview

TRANSCRIPT: “America the Virtual: Security, Privacy, and Interoperability in an Interconnected World

By Ivan K. Fong & David G. Delaney | 62 Am. U. L. Rev. 1131 (2013) It is no exaggeration…

By amunlawreview

Toward Cyberpeace: Managing Cyberattacks Through Polycentric Governance

By Scott J. Shackelford | 62 Am. U. L. Rev. 1273 (2013) Views range widely about the seriousness of cyberattacks…

By amunlawreview

Hacker’s Delight: Law Firm Risk and Liability in the Cyber Age

By Michael McNerney & Emilian Papadopoulos | 62 Am. U. L. Rev. 1243 (2012) In October 2012, former Secretary of…

By amunlawreview

When Cyberweapons End Up on Private Networks: Third Amendment Implications for Cybersecurity Polity

By Alan Butler | 62 Am. U. L. Rev. 1203 (2013) In the summer of 2010, Microsoft reported a new…

By amunlawreview

Regulating Information Security in the Government Contracting Industry: Will the Rising Tide Lift all the Boats?

By Keir X. Bancroft  | 62 Am. U. L. Rev. 1145 (2013)  The government is strengthening cyber and information security regulations…

By amunlawreview

FOREWARD: Mapping Today’s Cybersecurity Landscape

By Jorge L. Contreras, Laura DeNards, & Melanie Teplinsky | 62 Am. U. L. Rev. 1113 (2013) Cyberthreats recently…

By amunlawreview