September 10, 2019
Volume 16, Issue 3
If the legal profession had been able to foresee in the late 1990s and early 2000s, prior to the meteoric rise and ensuing cultural ubiquity of social media, that every tagged spring break photo, 2:00 a.m. status update, and furious wall post would one day be vulnerable to potential exposure in the cold, unforgiving light
Peter Segrist, How the Rise of Big Data and Predictive Analytics are Changing the Attorney's Duty of Competence, 16 N.C. J.L. & Tech. 527 (2015), available at http://ncjolt.org/wp-content/uploads/2015/04/Segrist_Final.pdf.
This article re-examines and revises observations made in the author’s 2009 article, Googlestroika: Privatizing Privacy. 1 Specifically, it looks to the contractual obligations and practical considerations that define how users interact not only with Google, but also with social network websites and other online service providers. Consideration is given to how an individual leaves a
Karl T. Muth, Googlestroika: Five Years Later, 16 N.C. J.L & Tech. 487 (2015), available at http://ncjolt.org/wp-content/uploads/2015/04/Muth_Final.pdf.
Designing and implementing a cybersecurity legal policy is an ambitious endeavor. This Article offers primary guidelines focusing on the national level, and uses Israel’s newly created National Cyber Bureau as a case in point. Additionally, this Article offers a cross-section comparison between the national cybersecurity policies of the United States, the United Kingdom, Canada, Japan,
Daniel Benoliel, Towards a Cybersecurity Policy Model: Israel National Cyber Bureau Case Study, 16 N.C. J.L. & Tech. 435 (2015), available at http://ncjolt.org/wp-content/uploads/2015/04/Benoliel_Final.pdf.
The North Carolina Journal of Law & Technology has adopted the Open Access Program, a part of the Scholar’s Copyright Project created by Science Commons. Authors designate the conditions under which their articles are licensed. By downloading articles, you agree to comply with the license terms specified. Please contact NC JOLT at firstname.lastname@example.org with permissions inquiries.