Amending The ECPA To Enable a Culture of Cybersecurity Research: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
No edit summary
 
(2 intermediate revisions by one other user not shown)
Line 7: Line 7:
Aaron J. Burstein, ''Amending the ECPA to Enable a Culture of Cybersecurity Research,'' (2008) Harvard Journal of Law and Technology, Vol. 22, No. 1.  [http://jolt.law.harvard.edu/articles/pdf/v22/22HarvJLTech167.pdf ''Web'']
Aaron J. Burstein, ''Amending the ECPA to Enable a Culture of Cybersecurity Research,'' (2008) Harvard Journal of Law and Technology, Vol. 22, No. 1.  [http://jolt.law.harvard.edu/articles/pdf/v22/22HarvJLTech167.pdf ''Web'']


[http://cyber.law.harvard.edu/cybersecurity/?title=Special:Bibliography&view=detailed&startkey=Burstein:2008&f=wikibiblio.bib ''BibTeX'']
[http://cyber.law.harvard.edu/cybersecurity/Special:Bibliography?f=wikibiblio.bib&title=Special:Bibliography&view=detailed&action=&keyword=Burstein:2008 ''BibTeX'']


==Categorization==
==Categorization==


* Issues: [[Public-Private Cooperation]]
* Issues: [[Public-Private Cooperation]]; [[Information Sharing/Disclosure]]
* Issues: [[Information Sharing/Disclosure]]


==Key Words==  
==Key Words==  
Line 25: Line 24:
==Additional Notes and Highlights==
==Additional Notes and Highlights==


Both authors are from [http://www.rand.org/ RAND corporation]. Their article provides a useful overview of the main models for modeling cybersecurity risks, as well as a stimulating critical approach to these models.
Both authors are from the [http://www.rand.org/ RAND corporation]. Their article provides a useful overview of the main models for modeling cybersecurity risks, as well as a stimulating critical approach to these models.

Latest revision as of 15:32, 9 July 2010

Full Title of Reference

Amending the ECPA to Enable a Culture of Cybersecurity Research

Full Citation

Aaron J. Burstein, Amending the ECPA to Enable a Culture of Cybersecurity Research, (2008) Harvard Journal of Law and Technology, Vol. 22, No. 1. Web

BibTeX

Categorization

Key Words

Civilian Participation, Communications Privacy Law

Synopsis

Research being conducted by computer scientists offers great promise in improving cybersecurity threats in the short and long term. Progress in cybersecurity research, however, is beset by a lack of access data from communications networks. Legally and informally protected individual privacy interests have contributed to the lack of data, as have the institutional interests of organizations that control these data. A modest research exception to federal communications privacy law would remove many of the legal barriers to sharing data with cybersecurity researchers. The basic outline of this exception is simple: allow cybersecurity researchers to obtain access to electronic communications data that the communications privacy laws would otherwise forbid, without the consent of the individuals who are parties to those communications. This reform would pose minimal risks to individuals’ communications privacy while countering many of the non-legal objections that network providers have to sharing data.

Additional Notes and Highlights

Both authors are from the RAND corporation. Their article provides a useful overview of the main models for modeling cybersecurity risks, as well as a stimulating critical approach to these models.