Advertisement

Other Legal and Ethical Issues

Chapter
Part of the SpringerBriefs in Cybersecurity book series (BRIEFSCYBER)

Abstract

This chapter considers legal areas outside the scope of criminal law. Civil liability and civil liberties are discussed in the context of security disclosure. These are: freedom of expression/free speech, copyright, tort of negligence, defamation, illegal telecommunications interception (surveillance), privacy law, data protection and data breach notification.

Keywords

Free Speech Internet Service Provider Digital Right Management Civil Liability Security Vulnerability 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    Aycock J, Maurushat A (2007) Future threats. In: Virus bulletin conferenceGoogle Scholar
  2. 2.
    Moon R (2000) The constitutional protection of freedom of expression. University of Toronto Press, TorontoGoogle Scholar
  3. 3.
    Barendt E (2005) Freedom of speech, 2nd edn. Oxford University Press, OxfordGoogle Scholar
  4. 4.
    Maurushat A (2007) The benevolent health worm: comparing Western human-rights based ethics and confucius duty-based moral philosophy” In: Computer ethics: philosophical enquiry conference (CEPE 2007) Google Scholar
  5. 5.
    Colangelo A, Maurushat A (2006) “Exploring the limits of computer code as a protected form of expression: a suggested approach to encryption, computer viruses and technological protection measures” 1 McGill Law J 51: 47Google Scholar
  6. 6.
    Kerr I, Tacit C, Maurushat A (2002–2003) Technical protection measures: tilting at copyright’s windmill (2002–2003) vol. 34 Ottawa Law Review No. 1Google Scholar
  7. 7.
    Bambauer Derek E, Oliver D (2010) The hacker’s aegis (March 1 2010). Brooklyn Law School, Legal Studies Paper No. 184. Available at SSRN: http://ssrn.com/abstract=1561845 or http://dx.doi.org/10.2139/ssrn.1561845
  8. 8.
  9. 9.
    Fleming J G (1998) The law of Torts 9th ed. L/KN30Google Scholar
  10. 10.
    Baudoin, Jobin (2005) Les obligations, 6th ed. Éditions Yvon Blais, CowansvilleGoogle Scholar
  11. 11.
    Chandler J (2004) Security in cyberspace: combating distributed denial of service attacks. Univ Ottawa Law and Technol J 1(1–2):231–261Google Scholar
  12. 12.
    Gillooly M (1998) The law of defamation in Australia and New Zealand, Federation PressGoogle Scholar
  13. 13.
    Hunt N (2009) Teen guilty of facebook slur, Sunday Mail (SA). http://www.adelaidenow.com.au/news/south-australia/teen-guilty-of-facebook-slur/story-e6frea83-1225801651074. 22 Nov 2009
  14. 14.
    Walker S (2000) Media law: commentary and materials. LBC, UKGoogle Scholar
  15. 15.
    Campbell v. Mirror Group Newspaper Ltd (2004) UKHL 22Google Scholar
  16. 16.
    Warren and Brandeis (1890) The right to privacy, 4 Harvard law review 193Google Scholar
  17. 17.
    Solove DJ, Marc R, Schwartz PM (2006) Privacy, information, and technology. Aspen Publishers, AlphenGoogle Scholar
  18. 18.
    OECD (1992) Security of information system guidelines, and 2002 security guidelines available at http://www.oecd.org/document/42/0,3343,en_2649_34255_15582250_1_1_1_1,00.html
  19. 19.
    Romanosky S, Telang R, Acquisti A (2008) Do data breach disclosure laws reduce identity theft? In: Seventh workshop on the economics of information security, June 2008. These phrases are attributable to Justice Louis Brandeis 1933. http://www.brandeis.edu/investigate/sunlight. Accessed 30 Jan 2009
  20. 20.
    Maurushat A (2009) Data breach notification law across the world from California to Australia UNSWLRS 11Google Scholar
  21. 21.
    Ponemon Institute (2011) Global cost of a data breach (2010) available at http://www.ponemon.org/data-security

Copyright information

© The Author(s) 2013

Authors and Affiliations

  1. 1.Faculty of LawThe University of New South Wales, Anzac ParadeKensington, SydneyAustralia

Personalised recommendations