{"title":"A Voluntary Cybersecurity Framework Is Unworkable- Government Must Crack the Whip","authors":"Robert Gyenes","doi":"10.5195/TLP.2014.146","DOIUrl":"https://doi.org/10.5195/TLP.2014.146","url":null,"abstract":"","PeriodicalId":185385,"journal":{"name":"Pittsburgh Journal of Technology Law & Policy","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115862052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Era of Rapid Change: The Abdication of Cash & the FTC's Unfairness Authority","authors":"E. Freedman","doi":"10.5195/TLP.2014.149","DOIUrl":"https://doi.org/10.5195/TLP.2014.149","url":null,"abstract":"","PeriodicalId":185385,"journal":{"name":"Pittsburgh Journal of Technology Law & Policy","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127397931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"What Does It Take to Survive a Breach in Today’s High- Risk World? When Your Prevention Fails (and It’s Going to Fail), What Do You Do?","authors":"S. M. Angelo","doi":"10.5195/TLP.2014.145","DOIUrl":"https://doi.org/10.5195/TLP.2014.145","url":null,"abstract":"In this article, Scott Angelo provides a thoughtful analysis of cybersecurity issues companies currently face and discusses the steps companies can take to effectively minimize the risk of a breach and protect against breach liability.","PeriodicalId":185385,"journal":{"name":"Pittsburgh Journal of Technology Law & Policy","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133994135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cyber-Takings: The War on Crime Moves into the Cloud","authors":"L. McIntyre","doi":"10.5195/TLP.2014.148","DOIUrl":"https://doi.org/10.5195/TLP.2014.148","url":null,"abstract":"","PeriodicalId":185385,"journal":{"name":"Pittsburgh Journal of Technology Law & Policy","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134055511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Introduction: Cybersecurity in Pittsburgh","authors":"Kevin D. Ashley","doi":"10.5195/TLP.2014.143","DOIUrl":"https://doi.org/10.5195/TLP.2014.143","url":null,"abstract":"This article provides a brief introduction to cybersecurity issues in the Pittsburgh region and introduces the student article series.","PeriodicalId":185385,"journal":{"name":"Pittsburgh Journal of Technology Law & Policy","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123123554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Spring 2014 Table of Contents and Publication Information","authors":"Chris Schlag","doi":"10.5195/TLP.2014.150","DOIUrl":"https://doi.org/10.5195/TLP.2014.150","url":null,"abstract":"","PeriodicalId":185385,"journal":{"name":"Pittsburgh Journal of Technology Law & Policy","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123408214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Too Much Too Soon? A Case for Hesitancy in the Passage of State and Federal Password Protection Laws","authors":"Megan Davis","doi":"10.5195/TLP.2014.142","DOIUrl":"https://doi.org/10.5195/TLP.2014.142","url":null,"abstract":"Recently, significant attention has been given to employers’ concern and involvement over employees’ use of social media. The amount of attention given to social media has resulted in a number of proposed federal laws and multiple state laws discussing employers’ involvement and participation in employees’ social media use. The purpose of this note is to advocate for a more hesitant legislative stance toward social media password protection laws in an effort to avoid unnecessarily over-legislating in an area of privacy law that is still developing. While the author does not make an outright rejection of such legislation, the author argues that the speed and political vigor with which lawmakers are moving forward with such statutes raises the risk of statutory ambiguity, confusion amongst affected parties, and unnecessary burdens on employers. The note provides a thorough review of current trends in employers asking for social media login information, current legislation protecting employees’ social media use, and proposed legislation meant to combat an employer’s ability to obtain social media information.","PeriodicalId":185385,"journal":{"name":"Pittsburgh Journal of Technology Law & Policy","volume":"80 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126022678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Argument for States to Outlaw 'Revenge Porn' and for Congress to Amend 47 U.S.C. §230: How Our Current Laws Do Little to Protect Victims","authors":"C. Martinez","doi":"10.5195/TLP.2014.141","DOIUrl":"https://doi.org/10.5195/TLP.2014.141","url":null,"abstract":"This note examines the intersection of law and technology as it relates to the issue of revenge porn. Revenge porn comes in many forms but most commonly refers to the online posting of sexually explicit photos or videos of past lovers, without their consent, after the relationship has ended. The author explains how the current legal framework has left many victims without legal recourse to punish those who have posted their intimate photos or videos without consent, and few options to have their images removed from the internet once they have been posted. The note argues that in order to protect victims, states should make laws to criminalize the posting of revenge porn and the Communications Decency Act should be amended to give victims the power to have their images removed from websites.","PeriodicalId":185385,"journal":{"name":"Pittsburgh Journal of Technology Law & Policy","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114407564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"From Gray to Green-Using Algal Biofuels to Change the Energy Landscape of Southwestern Pennsylvania","authors":"R. Hammond","doi":"10.5195/TLP.2013.134","DOIUrl":"https://doi.org/10.5195/TLP.2013.134","url":null,"abstract":"","PeriodicalId":185385,"journal":{"name":"Pittsburgh Journal of Technology Law & Policy","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-02-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122187569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Internet Control or Internet Censorship? Comparing the Control Models of China, Singapore, and the United States to Guide Taiwan’s Choice","authors":"Jeffrey Li","doi":"10.5195/TLP.2013.131","DOIUrl":"https://doi.org/10.5195/TLP.2013.131","url":null,"abstract":"Internet censorship refers to a government’s unjustified scrutiny and control of online speech or government-approved control measures. The danger of Internet censorship is its chilling effect and substantial harm on free speech, a cornerstone of democracy, in cyberspace. This article compares China’s blocking and filtering system, Singapore’s class license system, and the United States’ government-private partnership model and identifies the features of each model. This article also explores the pros and cons of each model under international human rights standards. By finding lessons from each of the models, this article contends that Taiwan should retain its current minimal Internet control model. Further, Taiwan should fix flaws in its current Internet control system, including the private partnership model adopted by the Copyright Act, to be consistent with Article19.3 of the ICCPR.","PeriodicalId":185385,"journal":{"name":"Pittsburgh Journal of Technology Law & Policy","volume":"6 11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-02-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128011779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}