Main Page: Difference between revisions

From machine net law
Jump to navigation Jump to search
No edit summary
No edit summary
Line 1: Line 1:
==Basics of the law==
*[[Basics of the Law]]
    Laws, statutes, regulations, common law, stare decisis, treaties, and the interactions between them
Laws, statutes, regulations, common law, stare decisis, treaties, and the interactions between them
    Issues of local, state, federal, and international laws
Issues of local, state, federal, and international laws
    Jurisdiction related issues
Jurisdiction related issues
==Basic Legal Skills==
*[[Basic Legal Skills]]
     IRAC
     IRAC
     Case Briefing
     Case Briefing
Line 9: Line 9:
     Critical Reading
     Critical Reading
     Citation  
     Citation  
==Basics of the Internet==
*[[Basics of the Internet infrastructure]]
   History of the Internet
   History of the Internet
     Physical structure of the Internet
     Physical structure of the Internet
     Governance of the Internet
     Governance of the Internet
==Contracts==
*[[Contracts]]
     Basics of contract law
     Basics of contract law
     Common examples of contracts, e.g., employment agreements, work for hire.
     Common examples of contracts, e.g., employment agreements, work for hire.
==Policy Issues==
*[[Policy Issues]]
     Privacy
     Privacy
     Freedom of speech
     Freedom of speech
     Open internet / Net neutrality
     Open internet / Net neutrality
 
*[[Intellectual property law]]
== Intellectual property law ==
     Copyright
     Copyright
     Trademark and unfair business
     Trademark and unfair business
     Patent
     Patent
 
*[[Substantive Internet, Machine, Privacy, and Computer Laws]]
== Substantive Laws ==
     The Computer Fraud and Abuse Act (CFAA)
     The Computer Fraud and Abuse Act (CFAA)
     Health Insurance Portability and Accountability Act (HIPPA)
     Health Insurance Portability and Accountability Act (HIPPA)
Line 34: Line 32:
     Laws dealing with protection of private information, e.g., social security numbers, credit cards
     Laws dealing with protection of private information, e.g., social security numbers, credit cards
     We will study other sets of laws, too, depending on class interest
     We will study other sets of laws, too, depending on class interest
==Ethics==
*[[Ethics of Internet and Machine|Ethics]]
     Basic ethical dilemmas
     Basic ethical dilemmas
     Whitehat versus blackhat
     Whitehat versus blackhat
     Whistle blowing
     Whistle blowing
==Dealing with employees and internal business relations==
*[[Dealing with employees and internal business relations]]
     Employee privacy
     Employee privacy
     Intellectual property issues with employees and organizations
     Intellectual property issues with employees and organizations
==Dealing with third parties==
*[[Dealing with third parties]]
     Subpoenas
     Subpoenas
     National Security Letters
     National Security Letters

Revision as of 21:37, 2 July 2021

Laws, statutes, regulations, common law, stare decisis, treaties, and the interactions between them Issues of local, state, federal, and international laws Jurisdiction related issues

   IRAC
   Case Briefing
   Critical Thinking
   Critical Reading
   Citation 
  History of the Internet
   Physical structure of the Internet
   Governance of the Internet
   Basics of contract law
   Common examples of contracts, e.g., employment agreements, work for hire.
   Privacy
   Freedom of speech
   Open internet / Net neutrality
   Copyright
   Trademark and unfair business
   Patent
   The Computer Fraud and Abuse Act (CFAA)
   Health Insurance Portability and Accountability Act (HIPPA)
   Americans with Disabilities Act (ADA
   Digital Millennium Copyright Act (DMCA)
   Criminal laws
   Laws dealing with protection of private information, e.g., social security numbers, credit cards
   We will study other sets of laws, too, depending on class interest
   Basic ethical dilemmas
   Whitehat versus blackhat
   Whistle blowing
   Employee privacy
   Intellectual property issues with employees and organizations
   Subpoenas
   National Security Letters
   Requirements for safeguarding data for, and from, third parties
   Litigation basics