(a) Federal Substantive Power. Consider notes 5 and 6 at p. 734 (and think about the concerns raised in notes 1, 2, 4, and 7 at pp. 732-35). Briefly state what you believe the answer should be to the question posed in note 6. Explain and defend your answer.
(b) Federal Procedural Limitations. Consider the bullet points at pp. 735-37 (concerning the territorial scope of federal court orders). Comment on any issue that strikes you.
2. State Power.
(a) The Dormant Commerce Clause. Consider note 2 at p. 755, and the other notes at pp. 755-60. Briefly describe or define: federal preemption, and the “dormant commerce clause.” Briefly explain how you think the question posed in note 2 is likely to be answered, and then briefly explain how you believe it should be answered.
(b) State Procedural Limits: Extraterritorial Collection of Evidence. Consider the text at pp. 760-61 and notes 4-9 at pp. 769-73, then answer the questions posed in note 11 at p. 773-74.
3. International Computer Crimes.
(a) How Far Should the U.S. Go? Consider p. 774, and notes 1-7 at 780-84, and then briefly answer the questions posed in notes 1 and 2 at p. 780-81, giving reasons to support your conclusions.
(b) What About Process—statutory? Consider the text at p. 784 and notes 1-5 at pp. 791-92 (statutory privacy outside the US), and then briefly answer the questions posed by note 2.
(c) What about Process—Constitutional (Fourth Amendment)? Consider the text at p. 792 and notes 1-7 at pp. 800-07, and then select any one of the issues raised in note 5 at pp. 804-06 (there are a number of questions, but the chief of them is probably the relationship between the standards governing foreign searches “exclusively” by the U.S. government, and foreign searches by “joint investigations.”) Can you reconcile the two sets of law?
(d) Synchronizing Computer Crime Law. Consider the text at p. 807 and notes 1-5 and 7-8 at pp. 813-18
(note: some additional facts relating to the “I love you” virus, referenced in note 7 at p. 817 were provided in the casebook in note 4 at p. 782-83).
Give an answer to the problem referenced in note 8 at p. 817-18 (and in the “alterna-tively” paragraph having to do with First Amendment issues, add the possibility of for-eign “hate crime” or “group libel” or “insult to religion” statutes as applied to prevent criticism of certain religions). NOTE: the laws of many countries in Europe, the Middle East, and elsewhere have strict penalties for matters we might not be quick to think of as “hate” crimes.
(e) The Council of Europe (COE) Convention on Cybercrime, and its Separate Pro-tocol. Consider the COE Convention, at pp. 818-24 and briefly answer the question posed by any one of notes 1, 2, or 4 at p. 824-27 (what do you think about the pro-tocol, at n. 2, that requires the criminalization of “… insulting a person… on the basis of the person’s… religion…”? and what would you think are the chances, see the question at n. 4, that the U.S. the French, the Germans [and the Iranians, Saudi Arabians, and others] would interpret that phrase “in exactly (or even roughly) the same way?” (what could possibly go wrong?)
 
D. Discussion Board Prompt (Discussion Board 10, Assigned in Week 14)
Look at the issues raised in the subparts of questions 1, 2, or 3 (you may choose to answer them as a policy question, as a legal question, or as a conundrum to be discussed) and then…
Identify (frame) the issue specifically and (i) explain why it is significant and how it might be resolved (or why it is difficult to resolve), and (ii) come to a conclusion (or explain why a conclusion is elusive).

19 comments on “Cyber security

  1. It’s amazing to pay a visit this website and reading the views of all colleagues about this post,
    while I am also eager of getting familiarity.

  2. All said and done people are still tensed about things and in fact, the tensions have
    increased in comparison to that in the olden days.

  3. When someone writes an post he/she keeps the image of a
    user in his/her mind that how a user can know it. Therefore that’s why this article is great.
    Thanks!

  4. We stumbled over here from a different page and thought I might as well check things out.
    I like what I see so i am just following you. Look forward to exploring your web
    page for a second time.

  5. Nice post. I learn something new and challenging on websites
    I stumbleupon every day. It will always be useful to read through content from other writers
    and use a little something from other sites.

  6. Right now it seems like BlogEngine is the best blogging platform available right now.
    (from what I’ve read) Is that what you are using on your blog?

  7. Hi! I could have sworn I’ve been to this site before but after
    checking through some of the post I realized it’s new to me.
    Anyways, I’m definitely delighted I found it
    and I’ll be book-marking and checking back frequently!

  8. Howdy! Do you use Twitter? I’d like to follow you if that would be okay.
    I’m undoubtedly enjoying your blog and look forward to
    new updates.

  9. What’s up to every body, it’s my first visit of this web site;
    this weblog carries awesome and actually excellent data
    designed for visitors.

  10. Thanks for your personal marvelous posting!
    I quite enjoyed reading it, you may be a great author.
    I will ensure that I bookmark your blog and will come back sometime soon. I want to
    encourage you continue your great posts, have a nice
    evening!

  11. If your husband deleted the chat history, you can also use data recovery tools to retrieve the deleted messages. Here are some commonly used data recovery tools:

Leave a Reply

Your email address will not be published. Required fields are marked *