1,775,619 research outputs found
The fusion of law and information technology
In information society, legal norm communications have been never established in certain fields for a long time. That is, a few legal norms have never obeyed in the fields. Above all, legal norms which relate to data protection, information contents and information security, would often infringed. Most violation would be conducted by using information technologies. Information technologies would often be used in these infringing incidents. It can be said that these infringing incidents would have never been conducted without information technology. These infringing incidents include hacking actions, personal data abuse, personal information disclosure, unauthorized access, infringing copyrights, infringing privacy rights, and so on. A way of preventing those infringements is to raise the level of punishment against the violators. But, it will prove to be disappointing. Furthermore, it would be an ex post facto measure to the last. It would be needed to invent an ex ante measure, if it is possible. As the ex ante measure, the author proposes a fusion of law and information technology. An information technology will lead people to a lawful deed when they conduct actions in using computers and networks. They say that information technology cures information technology. After all, the fusion will aim at realizing laws, and it will contribute to recover a social justice
Law and technology security standard
The author will deal with the relationship between law and technology from the viewpoint of technology security standard. One of the relationships can be found in that law has been providing a security level of technology. They have been saying that law would often follow technology. Law is too slow to adapt the changing technology through the advancement of technology. Above all, information technology has an electronic rapidity and a legislation technology has a paper one. There might be a big estrangement between law and technology. However, law must provide a security standard of technology. The standard must be based on a relative security level. The relative level would premise on the ordinary, lawful and ethical use of technology. Most technology has been opened to the public without any technology impact assessment. Technology would have some defect, which the producers have overlooked. As a result, the users might often meet with the accidents caused on the defects.
Then law should provide a technology security standard to exclude the defects from the users’ viewpoint as secure as possible. The security standard must be reflected on the architecture standard of technology. The architecture standard may be a yardstick whether the creators can evade the responsibility for the accidents.
The standard would also premise on the ordinary, lawful and ethical use of technology. The ordinary use means that the users should use normally technology within the extent of the architecture standard. The ethical use means that the users should use technology being conscious of the defects in order to avoid accidents.
The relative security level may be the sum of the architecture standard and the ethical use of technology
Response to the consultation ‘Regulating On-line Gambling in the EU: Recent Developments and Current Challenges from the Internal Market Standpoint'
This is a collaborative submission from a group of academics based in the UK with expertise in information technology law and related areas. The preparation of this response has been funded by the Information Technology Think Tank, which is supported by the Arts and Humanities Research Council and led by the SCRIPT/AHRC Centre for Research in Intellectual Property and Technology, University of Edinburgh. This response has been prepared by Abhilash Nair and Dinusha Mendis
BILETA Response to IPO consultation to changes to penalties for online copyright infringement
Felipe Romero-Moreno, & James G H Griffin, 'BILETA Response to the UK IPO Consultation on Changes to Penalties for Online Copyright Infringement', August 2015.This is a collaborative submission from a group of academics based in the UK with expertise in Information technology law and related areas. The preparation of the response has been funded by the British and Irish Law Education Law and Technology Association (BILETA http://www.bileta.ac.uk/Home/). This response has been prepared by Dr. Felipe Romero Moreno (University of Hertfordshire) and Dr. James Griffin (University of Exeter). It has been approved by the Executive of BILETA and is therefore submitted on behalf of BILETASubmitted Versio
HIT News Brief: Crosswalk of Quality Measures Between AF4Q 3.0 Conditions/Procedures and the Meaningful Use of Health Information Technology
Provides a chart of the clinical quality measures on which providers and hospitals eligible for incentives must report to demonstrate their meaningful use of health information technology under the 2010 healthcare reform law
Lex Informatica: The Formulation of Information Policy Rules through Technology
Historically, law and government regulation have established default rules for information policy, including constitutional rules on freedom of expression and statutory rights of ownership of information. This Article will show that for network environments and the Information Society, however, law and government regulation are not the only source of rule-making. Technological capabilities and system design choices impose rules on participants. The creation and implementation of information policy are embedded in network designs and standards as well as in system configurations. Even user preferences and technical choices create overarching, local default rules. This Article argues, in essence, that the set of rules for information flows imposed by technology and communication networks form a “Lex Informatica” that policymakers must understand, consciously recognize, and encourage
CSI Las Vegas: Privacy, Policing, and Profiteering in Casino Structured Intelligence
This Article argues that the intricate, vast amounts of consumer information compiled through casino structured intelligence require greater protection and oversight in the contexts of both bankruptcy and law enforcement. Section II examines the various types of casino technology and information gathering that casinos perform. Section III considers the available protections of private information in terms of security breaches, law enforcement sharing, and sales in the context of a bankruptcy. Section IV discusses additional safeguards and ethical concerns that should be considered as casinos continue to increase their data mining efforts. Finally, Section V concludes that, minimally, consumers are entitled to more candid disclosures and a meaningful opportunity to protect their own privacy
Recommended from our members
The Second Law and Rivalrous Digital Information (Or Maxwell's Demon in an Information Age)
Over thirty years ago Nicholas Georgescu-Roegen, in an extraordinary book The Entropy Law and the Economic Process opened up a whole new branch of environmental economics, exploring the impact of a fundamental, though not widely known, law of nature, the second law of thermodynamics, on the economic process. The 2nd law of thermodynamics basically says that when energy gets transformed some of it always gets wasted. No matter how efficient we make any machine it will always waste energy to some degree.
This has implications for the knowledge society. There is a widespread belief that once information is digitised it can be copied and distributed at zero marginal cost but digital information fundamentally depends on access to a source of energy. And it turns out that large data centres and servers use up a lot of energy. The big technology companies' energy bills can run into hundreds of millions of dollars. In a world facing an energy crisis that means digital information is a little more rivalrous than we originally thought..
- …