Abstract
This chapter considers legal areas outside the scope of criminal law. Civil liability and civil liberties are discussed in the context of security disclosure. These are: freedom of expression/free speech, copyright, tort of negligence, defamation, illegal telecommunications interception (surveillance), privacy law, data protection and data breach notification.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsNotes
- 1.
This section borrows from Aycock and Maurushat [1].
- 2.
[2].
- 3.
[3].
- 4.
[4].
- 5.
[5].
- 6.
see Ref. [5].
- 7.
- 8.
[6].
- 9.
See footnote 8.
- 10.
[7].
- 11.
[8].
- 12.
See generally [9].
- 13.
See generally [10].
- 14.
[11].
- 15.
Correspondence with contributor to Metasploit.
- 16.
For a general overview of defamation law see Gillooly [12].
- 17.
[13].
- 18.
See [14].
- 19.
For example, [15].
- 20.
[16].
- 21.
See generally, [17].
- 22.
[18].
- 23.
The idea comes from a paper written by Romanosky et al. [19].
- 24.
For an examination of data breach notification laws from over 30 jurisdictions see Maurushat [20].
- 25.
[21].
References
Aycock J, Maurushat A (2007) Future threats. In: Virus bulletin conference
Moon R (2000) The constitutional protection of freedom of expression. University of Toronto Press, Toronto
Barendt E (2005) Freedom of speech, 2nd edn. Oxford University Press, Oxford
Maurushat A (2007) The benevolent health worm: comparing Western human-rights based ethics and confucius duty-based moral philosophy” In: Computer ethics: philosophical enquiry conference (CEPE 2007)
Colangelo A, Maurushat A (2006) “Exploring the limits of computer code as a protected form of expression: a suggested approach to encryption, computer viruses and technological protection measures” 1 McGill Law J 51: 47
Kerr I, Tacit C, Maurushat A (2002–2003) Technical protection measures: tilting at copyright’s windmill (2002–2003) vol. 34 Ottawa Law Review No. 1
Bambauer Derek E, Oliver D (2010) The hacker’s aegis (March 1 2010). Brooklyn Law School, Legal Studies Paper No. 184. Available at SSRN: http://ssrn.com/abstract=1561845 or http://dx.doi.org/10.2139/ssrn.1561845
Symantec Blog (2010) available at http://www.symantec.com/connect/blogs/copyright-violations-underground
Fleming J G (1998) The law of Torts 9th ed. L/KN30
Baudoin, Jobin (2005) Les obligations, 6th ed. Éditions Yvon Blais, Cowansville
Chandler J (2004) Security in cyberspace: combating distributed denial of service attacks. Univ Ottawa Law and Technol J 1(1–2):231–261
Gillooly M (1998) The law of defamation in Australia and New Zealand, Federation Press
Hunt N (2009) Teen guilty of facebook slur, Sunday Mail (SA). http://www.adelaidenow.com.au/news/south-australia/teen-guilty-of-facebook-slur/story-e6frea83-1225801651074. 22 Nov 2009
Walker S (2000) Media law: commentary and materials. LBC, UK
Campbell v. Mirror Group Newspaper Ltd (2004) UKHL 22
Warren and Brandeis (1890) The right to privacy, 4 Harvard law review 193
Solove DJ, Marc R, Schwartz PM (2006) Privacy, information, and technology. Aspen Publishers, Alphen
OECD (1992) Security of information system guidelines, and 2002 security guidelines available at http://www.oecd.org/document/42/0,3343,en_2649_34255_15582250_1_1_1_1,00.html
Romanosky S, Telang R, Acquisti A (2008) Do data breach disclosure laws reduce identity theft? In: Seventh workshop on the economics of information security, June 2008. These phrases are attributable to Justice Louis Brandeis 1933. http://www.brandeis.edu/investigate/sunlight. Accessed 30 Jan 2009
Maurushat A (2009) Data breach notification law across the world from California to Australia UNSWLRS 11
Ponemon Institute (2011) Global cost of a data breach (2010) available at http://www.ponemon.org/data-security
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2013 The Author(s)
About this chapter
Cite this chapter
Maurushat, A. (2013). Other Legal and Ethical Issues. In: Disclosure of Security Vulnerabilities. SpringerBriefs in Cybersecurity. Springer, London. https://doi.org/10.1007/978-1-4471-5004-6_5
Download citation
DOI: https://doi.org/10.1007/978-1-4471-5004-6_5
Published:
Publisher Name: Springer, London
Print ISBN: 978-1-4471-5003-9
Online ISBN: 978-1-4471-5004-6
eBook Packages: Computer ScienceComputer Science (R0)