Skip to main content

2013 | OriginalPaper | Buchkapitel

5. Other Legal and Ethical Issues

verfasst von : Alana Maurushat

Erschienen in: Disclosure of Security Vulnerabilities

Verlag: Springer London

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This chapter considers legal areas outside the scope of criminal law. Civil liability and civil liberties are discussed in the context of security disclosure. These are: freedom of expression/free speech, copyright, tort of negligence, defamation, illegal telecommunications interception (surveillance), privacy law, data protection and data breach notification.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
This section borrows from Aycock and Maurushat [1].
 
2
[2].
 
3
[3].
 
4
[4].
 
5
[5].
 
6
see Ref. [5].
 
7
This section is based on Refs. [1] and [6].
 
8
[6].
 
9
See footnote 8.
 
10
[7].
 
11
[8].
 
12
See generally [9].
 
13
See generally [10].
 
14
[11].
 
15
Correspondence with contributor to Metasploit.
 
16
For a general overview of defamation law see Gillooly [12].
 
17
[13].
 
18
See [14].
 
19
For example, [15].
 
20
[16].
 
21
See generally, [17].
 
22
[18].
 
23
The idea comes from a paper written by Romanosky et al. [19].
 
24
For an examination of data breach notification laws from over 30 jurisdictions see Maurushat [20].
 
25
[21].
 
Literatur
1.
Zurück zum Zitat Aycock J, Maurushat A (2007) Future threats. In: Virus bulletin conference Aycock J, Maurushat A (2007) Future threats. In: Virus bulletin conference
2.
Zurück zum Zitat Moon R (2000) The constitutional protection of freedom of expression. University of Toronto Press, Toronto Moon R (2000) The constitutional protection of freedom of expression. University of Toronto Press, Toronto
3.
Zurück zum Zitat Barendt E (2005) Freedom of speech, 2nd edn. Oxford University Press, Oxford Barendt E (2005) Freedom of speech, 2nd edn. Oxford University Press, Oxford
4.
Zurück zum Zitat Maurushat A (2007) The benevolent health worm: comparing Western human-rights based ethics and confucius duty-based moral philosophy” In: Computer ethics: philosophical enquiry conference (CEPE 2007) Maurushat A (2007) The benevolent health worm: comparing Western human-rights based ethics and confucius duty-based moral philosophy” In: Computer ethics: philosophical enquiry conference (CEPE 2007)
5.
Zurück zum Zitat Colangelo A, Maurushat A (2006) “Exploring the limits of computer code as a protected form of expression: a suggested approach to encryption, computer viruses and technological protection measures” 1 McGill Law J 51: 47 Colangelo A, Maurushat A (2006) “Exploring the limits of computer code as a protected form of expression: a suggested approach to encryption, computer viruses and technological protection measures” 1 McGill Law J 51: 47
6.
Zurück zum Zitat Kerr I, Tacit C, Maurushat A (2002–2003) Technical protection measures: tilting at copyright’s windmill (2002–2003) vol. 34 Ottawa Law Review No. 1 Kerr I, Tacit C, Maurushat A (2002–2003) Technical protection measures: tilting at copyright’s windmill (2002–2003) vol. 34 Ottawa Law Review No. 1
9.
Zurück zum Zitat Fleming J G (1998) The law of Torts 9th ed. L/KN30 Fleming J G (1998) The law of Torts 9th ed. L/KN30
10.
Zurück zum Zitat Baudoin, Jobin (2005) Les obligations, 6th ed. Éditions Yvon Blais, Cowansville Baudoin, Jobin (2005) Les obligations, 6th ed. Éditions Yvon Blais, Cowansville
11.
Zurück zum Zitat Chandler J (2004) Security in cyberspace: combating distributed denial of service attacks. Univ Ottawa Law and Technol J 1(1–2):231–261 Chandler J (2004) Security in cyberspace: combating distributed denial of service attacks. Univ Ottawa Law and Technol J 1(1–2):231–261
12.
Zurück zum Zitat Gillooly M (1998) The law of defamation in Australia and New Zealand, Federation Press Gillooly M (1998) The law of defamation in Australia and New Zealand, Federation Press
14.
Zurück zum Zitat Walker S (2000) Media law: commentary and materials. LBC, UK Walker S (2000) Media law: commentary and materials. LBC, UK
15.
Zurück zum Zitat Campbell v. Mirror Group Newspaper Ltd (2004) UKHL 22 Campbell v. Mirror Group Newspaper Ltd (2004) UKHL 22
16.
Zurück zum Zitat Warren and Brandeis (1890) The right to privacy, 4 Harvard law review 193 Warren and Brandeis (1890) The right to privacy, 4 Harvard law review 193
17.
Zurück zum Zitat Solove DJ, Marc R, Schwartz PM (2006) Privacy, information, and technology. Aspen Publishers, Alphen Solove DJ, Marc R, Schwartz PM (2006) Privacy, information, and technology. Aspen Publishers, Alphen
19.
Zurück zum Zitat Romanosky S, Telang R, Acquisti A (2008) Do data breach disclosure laws reduce identity theft? In: Seventh workshop on the economics of information security, June 2008. These phrases are attributable to Justice Louis Brandeis 1933. http://www.brandeis.edu/investigate/sunlight. Accessed 30 Jan 2009 Romanosky S, Telang R, Acquisti A (2008) Do data breach disclosure laws reduce identity theft? In: Seventh workshop on the economics of information security, June 2008. These phrases are attributable to Justice Louis Brandeis 1933. http://​www.​brandeis.​edu/​investigate/​sunlight. Accessed 30 Jan 2009
20.
Zurück zum Zitat Maurushat A (2009) Data breach notification law across the world from California to Australia UNSWLRS 11 Maurushat A (2009) Data breach notification law across the world from California to Australia UNSWLRS 11
Metadaten
Titel
Other Legal and Ethical Issues
verfasst von
Alana Maurushat
Copyright-Jahr
2013
Verlag
Springer London
DOI
https://doi.org/10.1007/978-1-4471-5004-6_5