Monthly Archives: June 2012

Library Highlights: Law & Technology

I Know Who You Are and I Saw What You Did: Social Networks and the Death of Privacy
Lori Andrews
HM851 .A66 2011
From the Publisher: Social networks are the defining cultural movement of our time, empowering us in constantly evolving ways. We can all now be reporters, alerting the world to breaking news, participating in crowd-sourced scientific research, and helping the police solve crimes. Social networks have even helped to bring down governments, but they have also greatly accelerated the erosion of our personal privacy rights. As leading expert on social networks and privacy Lori Andrews shows through ground- breaking in-depth research and a host of stunning stories of abuses, as we work and chat and shop and date (and even sometimes have sex) over the Web, we are opening ourselves up to increasingly intrusive, relentless, and anonymous surveillance—by employers, schools, lawyers, the police, and aggressive data aggregator services that compile an astonishing amount of information about us and sell it to any and all takers. But the legal system cannot be counted on to protect us—in the thousands of cases brought to trial by those whose rights have been violated, judges have most often ruled against them. That is why in addition to providing the best expert advice about protecting ourselves, Andrews pro- poses that we must all become supporters of a Constitution for the Web, which she has drafted and introduces in this book. Now is the time to join her and take action—the very future of privacy is at stake.

Legal Aspects of Managing Technology
Lee B. Burgunder
KF1890.H53 B87 2011
From the Publisher: This book is designed for businesspersons working with technological innovations in any field, including business, management, computer science, engineering, architecture, biology, or law. It focuses on integral technology law topics with substantial attention paid to the wide range of controversial issues regarding intellectual property rights, and coverage of all other key topics such as e-commerce, privacy, antitrust, and biotechnology. Its goal is not to make readers legal experts; rather it is too allow managers to understand the fundamental legal issues pertinent to technology management so that they can competently create strategic plans in consultation with their attorneys.

That Used to Be Us: How America Fell Behind in the World It Invented and How We Can Come Back
Thomas L. Friedman and Michael Mandelbaum
BF408 .F747 2011
From the Publisher: In That Used to Be Us, Thomas L. Friedman, one of our most influential columnists, and Michael Mandelbaum, one of our leading foreign policy thinkers, offer both a wake-up call and a call to collective action. They analyze the four challenges we face—globalization, the revolution in in- formation technology, the nation’s chronic deficits, and our pattern of excessive energy consumption— and spell out what we need to do now to sustain the American dream and preserve American power in the world. They explain how the end of the Cold War blinded the nation to the need to address these issues seriously, and how China’s educational successes, industrial might, and technological prowess remind us of the ways in which “that used to be us.” They explain how the paralysis of our political sys- tem and the erosion of key American values have made it impossible for us to carry out the policies the country urgently needs.

The Real ID Act: Privacy and Government Surveillance
William Eyre
KF4791 .E97 2011
From the Publisher: Civil society in the United States in the 21st century has seen the abandonment of American concepts of individual freedom, privacy, expression and autonomy. Eyre ex- amines the Real ID Act in this context, as an example of laws passed since September 2001 restricting civil liberties. The Real ID Act facilitates the current and future surveillance regime. Real IDs and the database(s) to which they are linked represent a de facto national ID system facilitating monitoring citizens’ movements, speech and political activities when fully operational. The Real ID Act is examined as an unfunded mandate and vehicle for unconstitutional abridgement of First Amendment guarantees including political expression.

Computer Games and Virtual Worlds: a New Frontier in Intellectual Property Law
Ross A. Dannenberg … [et al.], editors.
KF3024.C6 C625 2010
From the Publisher: As the uses and ubiquity of video games and virtual worlds expand, the legal issues they raise grow more complex and commonplace. These issues include the traditional areas of intellectual property law, namely, copyright, trademark, patent and trade secrets, as affected by contractual issues arising from the end user licensing agreements (EULA) and terms of service (ToS) promulgated by each video game and virtual world proprietor. This book explores and discusses how to obtain these traditional rights in the non-traditional settings of video game and virtual world environments, and serves as a primer for legal practitioners researching these emerging legal issues. Each chapter addresses, in order, end user license agreements, copyrights, patents, trademarks, and trade secrets, as addressed by U.S. law. The book also includes a commentary on international legal issues stemming from the multi-national user-base and foreign operation of many virtual worlds.

Principles of Cybercrime
Jonathan Clough, Monash University, Victoria
K5215 .C58 2010
From the Publisher: We live in a digital age. The proliferation of digital technology, and the convergence of computing and communication devices, has transformed the way in which we socialize and do business. While overwhelmingly positive, there has also been a dark side to these developments. Proving the maxim that crime follows opportunity, virtually every advance has been accompanied by a corresponding niche to be exploited for criminal purposes; so-called ‘cybercrimes’. Whether it be fraud, child pornography, stalking, criminal copyright infringement or attacks on computers themselves, criminals will find ways to exploit new technology. The challenge for all countries is to ensure their criminal laws keep pace. The challenge is a global one, and much can be learned from the experience of other jurisdictions. Focusing on Australia, Canada, the UK and the US, this book provides a comprehensive analysis of the legal principles that apply to the prosecution of cybercrimes.