Main Page: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
Line 1: | Line 1: | ||
*[[Basics of the Law]] | |||
Laws, statutes, regulations, common law, stare decisis, treaties, and the interactions between them | |||
Issues of local, state, federal, and international laws | |||
Jurisdiction related issues | |||
*[[Basic Legal Skills]] | |||
IRAC | IRAC | ||
Case Briefing | Case Briefing | ||
Line 9: | Line 9: | ||
Critical Reading | Critical Reading | ||
Citation | Citation | ||
*[[Basics of the Internet infrastructure]] | |||
History of the Internet | History of the Internet | ||
Physical structure of the Internet | Physical structure of the Internet | ||
Governance of the Internet | Governance of the Internet | ||
*[[Contracts]] | |||
Basics of contract law | Basics of contract law | ||
Common examples of contracts, e.g., employment agreements, work for hire. | Common examples of contracts, e.g., employment agreements, work for hire. | ||
*[[Policy Issues]] | |||
Privacy | Privacy | ||
Freedom of speech | Freedom of speech | ||
Open internet / Net neutrality | Open internet / Net neutrality | ||
*[[Intellectual property law]] | |||
Copyright | Copyright | ||
Trademark and unfair business | Trademark and unfair business | ||
Patent | Patent | ||
*[[Substantive Internet, Machine, Privacy, and Computer Laws]] | |||
The Computer Fraud and Abuse Act (CFAA) | The Computer Fraud and Abuse Act (CFAA) | ||
Health Insurance Portability and Accountability Act (HIPPA) | Health Insurance Portability and Accountability Act (HIPPA) | ||
Line 34: | Line 32: | ||
Laws dealing with protection of private information, e.g., social security numbers, credit cards | Laws dealing with protection of private information, e.g., social security numbers, credit cards | ||
We will study other sets of laws, too, depending on class interest | We will study other sets of laws, too, depending on class interest | ||
*[[Ethics of Internet and Machine|Ethics]] | |||
Basic ethical dilemmas | Basic ethical dilemmas | ||
Whitehat versus blackhat | Whitehat versus blackhat | ||
Whistle blowing | Whistle blowing | ||
*[[Dealing with employees and internal business relations]] | |||
Employee privacy | Employee privacy | ||
Intellectual property issues with employees and organizations | Intellectual property issues with employees and organizations | ||
*[[Dealing with third parties]] | |||
Subpoenas | Subpoenas | ||
National Security Letters | National Security Letters |
Revision as of 21:37, 2 July 2021
Laws, statutes, regulations, common law, stare decisis, treaties, and the interactions between them Issues of local, state, federal, and international laws Jurisdiction related issues
IRAC Case Briefing Critical Thinking Critical Reading Citation
History of the Internet Physical structure of the Internet Governance of the Internet
Basics of contract law Common examples of contracts, e.g., employment agreements, work for hire.
Privacy Freedom of speech Open internet / Net neutrality
Copyright Trademark and unfair business Patent
The Computer Fraud and Abuse Act (CFAA) Health Insurance Portability and Accountability Act (HIPPA) Americans with Disabilities Act (ADA Digital Millennium Copyright Act (DMCA) Criminal laws Laws dealing with protection of private information, e.g., social security numbers, credit cards We will study other sets of laws, too, depending on class interest
Basic ethical dilemmas Whitehat versus blackhat Whistle blowing
Employee privacy Intellectual property issues with employees and organizations
Subpoenas National Security Letters Requirements for safeguarding data for, and from, third parties Litigation basics