Internet Law by Tom W. Bell |
Ch. 08: Encryption |
||||||||
Prior Chapter | Title Page | Next Chapter | Email Listserve | ||||||
Table of Contents Ch. Subject 01: Course Management 02: Introduction 03: "Law" Online 04: Free Speech 05: Privacy 06: Trespass to Chattels 07: Intellectual Property 08: Encryption A. Case Law B. Commentary 09: Hacking 10: Commerce 11: Jurisdiction 12: Lawyers Online 13: Review |
A. Case LawDo encryption export regulations represent unconstitutional restrictions on free speech, reasonable restrictions on dangerous munitions, or something else? Junger v. Daley, 209 F.3d 481 (6th Cir. 2000) (reversing trial court's finding that encryption source code is not speech protected by the First Amendment and remanding in light of amendments to encryption export regulations) [an alternate source] Bernstein v. U.S. Dep't of Justice, 176 F.3d 1132 (9th Cir. 1999) (affirming summary judgment granted to plaintiff alleging that encryption export regulations violated First Amendment) [an alternate source], opinion withdrawn and rehearing en banc ordered, 192 F.3d 1308 (9th Cir. 1999) Notes
Useful Resources and Optional Reading
|
Assignment
Bell's Class 23: Please read the materials in Ch.08. |
|||||||
B. CommentaryDoes strong encryption represent a necessary means of protecting our rights online, a powerful tool for terrorists and criminals, or something else? Dinah PoKempner, Encryption in the Service of Human Rights (August 1, 1997) Tim C. May, The Crypto Anarchist Manifesto (c. 1994) Useful Resources and Optional Reading
|
|||||||||
Prior Chapter | Top of Page | Next Chapter | Email Listserve | ||||||
(C) 2001-05 Tom W. Bell. All rights reserved. Fully attributed noncommercial use of this document permitted if accompanied by this paragraph.
|