Skip to main content

Other Legal and Ethical Issues

  • Chapter
  • First Online:
  • 1503 Accesses

Part of the book series: SpringerBriefs in Cybersecurity ((BRIEFSCYBER))

Abstract

This chapter considers legal areas outside the scope of criminal law. Civil liability and civil liberties are discussed in the context of security disclosure. These are: freedom of expression/free speech, copyright, tort of negligence, defamation, illegal telecommunications interception (surveillance), privacy law, data protection and data breach notification.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    This section borrows from Aycock and Maurushat [1].

  2. 2.

    [2].

  3. 3.

    [3].

  4. 4.

    [4].

  5. 5.

    [5].

  6. 6.

    see Ref. [5].

  7. 7.

    This section is based on Refs. [1] and [6].

  8. 8.

    [6].

  9. 9.

    See footnote 8.

  10. 10.

    [7].

  11. 11.

    [8].

  12. 12.

    See generally [9].

  13. 13.

    See generally [10].

  14. 14.

    [11].

  15. 15.

    Correspondence with contributor to Metasploit.

  16. 16.

    For a general overview of defamation law see Gillooly [12].

  17. 17.

    [13].

  18. 18.

    See [14].

  19. 19.

    For example, [15].

  20. 20.

    [16].

  21. 21.

    See generally, [17].

  22. 22.

    [18].

  23. 23.

    The idea comes from a paper written by Romanosky et al. [19].

  24. 24.

    For an examination of data breach notification laws from over 30 jurisdictions see Maurushat [20].

  25. 25.

    [21].

References

  1. Aycock J, Maurushat A (2007) Future threats. In: Virus bulletin conference

    Google Scholar 

  2. Moon R (2000) The constitutional protection of freedom of expression. University of Toronto Press, Toronto

    Google Scholar 

  3. Barendt E (2005) Freedom of speech, 2nd edn. Oxford University Press, Oxford

    Google Scholar 

  4. Maurushat A (2007) The benevolent health worm: comparing Western human-rights based ethics and confucius duty-based moral philosophy” In: Computer ethics: philosophical enquiry conference (CEPE 2007)

    Google Scholar 

  5. Colangelo A, Maurushat A (2006) “Exploring the limits of computer code as a protected form of expression: a suggested approach to encryption, computer viruses and technological protection measures” 1 McGill Law J 51: 47

    Google Scholar 

  6. Kerr I, Tacit C, Maurushat A (2002–2003) Technical protection measures: tilting at copyright’s windmill (2002–2003) vol. 34 Ottawa Law Review No. 1

    Google Scholar 

  7. Bambauer Derek E, Oliver D (2010) The hacker’s aegis (March 1 2010). Brooklyn Law School, Legal Studies Paper No. 184. Available at SSRN: http://ssrn.com/abstract=1561845 or http://dx.doi.org/10.2139/ssrn.1561845

  8. Symantec Blog (2010) available at http://www.symantec.com/connect/blogs/copyright-violations-underground

  9. Fleming J G (1998) The law of Torts 9th ed. L/KN30

    Google Scholar 

  10. Baudoin, Jobin (2005) Les obligations, 6th ed. Éditions Yvon Blais, Cowansville

    Google Scholar 

  11. Chandler J (2004) Security in cyberspace: combating distributed denial of service attacks. Univ Ottawa Law and Technol J 1(1–2):231–261

    Google Scholar 

  12. Gillooly M (1998) The law of defamation in Australia and New Zealand, Federation Press

    Google Scholar 

  13. Hunt N (2009) Teen guilty of facebook slur, Sunday Mail (SA). http://www.adelaidenow.com.au/news/south-australia/teen-guilty-of-facebook-slur/story-e6frea83-1225801651074. 22 Nov 2009

  14. Walker S (2000) Media law: commentary and materials. LBC, UK

    Google Scholar 

  15. Campbell v. Mirror Group Newspaper Ltd (2004) UKHL 22

    Google Scholar 

  16. Warren and Brandeis (1890) The right to privacy, 4 Harvard law review 193

    Google Scholar 

  17. Solove DJ, Marc R, Schwartz PM (2006) Privacy, information, and technology. Aspen Publishers, Alphen

    Google Scholar 

  18. OECD (1992) Security of information system guidelines, and 2002 security guidelines available at http://www.oecd.org/document/42/0,3343,en_2649_34255_15582250_1_1_1_1,00.html

  19. Romanosky S, Telang R, Acquisti A (2008) Do data breach disclosure laws reduce identity theft? In: Seventh workshop on the economics of information security, June 2008. These phrases are attributable to Justice Louis Brandeis 1933. http://www.brandeis.edu/investigate/sunlight. Accessed 30 Jan 2009

  20. Maurushat A (2009) Data breach notification law across the world from California to Australia UNSWLRS 11

    Google Scholar 

  21. Ponemon Institute (2011) Global cost of a data breach (2010) available at http://www.ponemon.org/data-security

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Alana Maurushat .

Rights and permissions

Reprints and permissions

Copyright information

© 2013 The Author(s)

About this chapter

Cite this chapter

Maurushat, A. (2013). Other Legal and Ethical Issues. In: Disclosure of Security Vulnerabilities. SpringerBriefs in Cybersecurity. Springer, London. https://doi.org/10.1007/978-1-4471-5004-6_5

Download citation

  • DOI: https://doi.org/10.1007/978-1-4471-5004-6_5

  • Published:

  • Publisher Name: Springer, London

  • Print ISBN: 978-1-4471-5003-9

  • Online ISBN: 978-1-4471-5004-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics