1,775,619 research outputs found

    The fusion of law and information technology

    Get PDF
    In information society, legal norm communications have been never established in certain fields for a long time. That is, a few legal norms have never obeyed in the fields. Above all, legal norms which relate to data protection, information contents and information security, would often infringed. Most violation would be conducted by using information technologies. Information technologies would often be used in these infringing incidents. It can be said that these infringing incidents would have never been conducted without information technology. These infringing incidents include hacking actions, personal data abuse, personal information disclosure, unauthorized access, infringing copyrights, infringing privacy rights, and so on. A way of preventing those infringements is to raise the level of punishment against the violators. But, it will prove to be disappointing. Furthermore, it would be an ex post facto measure to the last. It would be needed to invent an ex ante measure, if it is possible. As the ex ante measure, the author proposes a fusion of law and information technology. An information technology will lead people to a lawful deed when they conduct actions in using computers and networks. They say that information technology cures information technology. After all, the fusion will aim at realizing laws, and it will contribute to recover a social justice

    Law and technology security standard

    Get PDF
    The author will deal with the relationship between law and technology from the viewpoint of technology security standard. One of the relationships can be found in that law has been providing a security level of technology. They have been saying that law would often follow technology. Law is too slow to adapt the changing technology through the advancement of technology. Above all, information technology has an electronic rapidity and a legislation technology has a paper one. There might be a big estrangement between law and technology. However, law must provide a security standard of technology. The standard must be based on a relative security level. The relative level would premise on the ordinary, lawful and ethical use of technology. Most technology has been opened to the public without any technology impact assessment. Technology would have some defect, which the producers have overlooked. As a result, the users might often meet with the accidents caused on the defects. Then law should provide a technology security standard to exclude the defects from the users’ viewpoint as secure as possible. The security standard must be reflected on the architecture standard of technology. The architecture standard may be a yardstick whether the creators can evade the responsibility for the accidents. The standard would also premise on the ordinary, lawful and ethical use of technology. The ordinary use means that the users should use normally technology within the extent of the architecture standard. The ethical use means that the users should use technology being conscious of the defects in order to avoid accidents. The relative security level may be the sum of the architecture standard and the ethical use of technology

    Response to the consultation ‘Regulating On-line Gambling in the EU: Recent Developments and Current Challenges from the Internal Market Standpoint'

    Get PDF
    This is a collaborative submission from a group of academics based in the UK with expertise in information technology law and related areas. The preparation of this response has been funded by the Information Technology Think Tank, which is supported by the Arts and Humanities Research Council and led by the SCRIPT/AHRC Centre for Research in Intellectual Property and Technology, University of Edinburgh. This response has been prepared by Abhilash Nair and Dinusha Mendis

    BILETA Response to IPO consultation to changes to penalties for online copyright infringement

    Get PDF
    Felipe Romero-Moreno, & James G H Griffin, 'BILETA Response to the UK IPO Consultation on Changes to Penalties for Online Copyright Infringement', August 2015.This is a collaborative submission from a group of academics based in the UK with expertise in Information technology law and related areas. The preparation of the response has been funded by the British and Irish Law Education Law and Technology Association (BILETA http://www.bileta.ac.uk/Home/). This response has been prepared by Dr. Felipe Romero Moreno (University of Hertfordshire) and Dr. James Griffin (University of Exeter). It has been approved by the Executive of BILETA and is therefore submitted on behalf of BILETASubmitted Versio

    HIT News Brief: Crosswalk of Quality Measures Between AF4Q 3.0 Conditions/Procedures and the Meaningful Use of Health Information Technology

    Get PDF
    Provides a chart of the clinical quality measures on which providers and hospitals eligible for incentives must report to demonstrate their meaningful use of health information technology under the 2010 healthcare reform law

    Lex Informatica: The Formulation of Information Policy Rules through Technology

    Get PDF
    Historically, law and government regulation have established default rules for information policy, including constitutional rules on freedom of expression and statutory rights of ownership of information. This Article will show that for network environments and the Information Society, however, law and government regulation are not the only source of rule-making. Technological capabilities and system design choices impose rules on participants. The creation and implementation of information policy are embedded in network designs and standards as well as in system configurations. Even user preferences and technical choices create overarching, local default rules. This Article argues, in essence, that the set of rules for information flows imposed by technology and communication networks form a “Lex Informatica” that policymakers must understand, consciously recognize, and encourage

    CSI Las Vegas: Privacy, Policing, and Profiteering in Casino Structured Intelligence

    Get PDF
    This Article argues that the intricate, vast amounts of consumer information compiled through casino structured intelligence require greater protection and oversight in the contexts of both bankruptcy and law enforcement. Section II examines the various types of casino technology and information gathering that casinos perform. Section III considers the available protections of private information in terms of security breaches, law enforcement sharing, and sales in the context of a bankruptcy. Section IV discusses additional safeguards and ethical concerns that should be considered as casinos continue to increase their data mining efforts. Finally, Section V concludes that, minimally, consumers are entitled to more candid disclosures and a meaningful opportunity to protect their own privacy
    corecore