Subjects -> LAW (Total: 1397 journals)
    - CIVIL LAW (30 journals)
    - CONSTITUTIONAL LAW (52 journals)
    - CORPORATE LAW (65 journals)
    - CRIMINAL LAW (28 journals)
    - CRIMINOLOGY AND LAW ENFORCEMENT (161 journals)
    - FAMILY AND MATRIMONIAL LAW (23 journals)
    - INTERNATIONAL LAW (161 journals)
    - JUDICIAL SYSTEMS (23 journals)
    - LAW (843 journals)
    - LAW: GENERAL (11 journals)

LAW (843 journals)            First | 1 2 3 4 5     

Showing 201 - 354 of 354 Journals sorted alphabetically
Evaluation Review     Hybrid Journal   (Followers: 8)
Evidence & Policy : A Journal of Research, Debate and Practice     Hybrid Journal   (Followers: 12)
Federal Law Review     Full-text available via subscription   (Followers: 48)
Feminist Legal Studies     Hybrid Journal   (Followers: 21)
feminists@law     Open Access   (Followers: 4)
Fiat Justisia     Open Access  
First Amendment Studies     Hybrid Journal  
Florida Bar News     Free  
Fordham Environmental Law Review     Open Access   (Followers: 4)
Fordham Intellectual Property, Media and Entertainment Law Journal     Open Access   (Followers: 17)
Fordham Law Review     Open Access   (Followers: 14)
Forensic Science International : Mind and Law     Open Access   (Followers: 4)
FORO. Revista de Ciencias Jurídicas y Sociales, Nueva Época     Open Access   (Followers: 2)
Frónesis     Open Access  
Geoforum     Hybrid Journal   (Followers: 25)
George Washington Law Review     Free   (Followers: 6)
Georgia State University Law Review     Open Access   (Followers: 2)
German Law Journal     Open Access   (Followers: 1)
Global Energy Law and Sustainability     Hybrid Journal  
Global Journal of Comparative Law     Hybrid Journal   (Followers: 4)
Global Labour Journal     Open Access   (Followers: 15)
Golden Gate University Environmental Law Journal     Open Access   (Followers: 3)
Golden Gate University Law Review     Open Access   (Followers: 2)
Graduate Law Journal     Open Access  
Grey Room     Hybrid Journal   (Followers: 16)
Griffith Law Review     Hybrid Journal   (Followers: 13)
GRUR International     Full-text available via subscription  
GSTF Journal of Law and Social Sciences     Open Access   (Followers: 2)
Hakam : Jurnal Kajian Hukum Islam dan Hukum Ekonomi Islam     Open Access  
Haramaya Law Review     Open Access   (Followers: 1)
Harvard Environmental Law Review     Free   (Followers: 12)
Harvard Human Rights Journal     Open Access   (Followers: 10)
Harvard Journal of Law & Public Policy     Free   (Followers: 34)
Harvard Journal of Law and Gender     Free   (Followers: 24)
Harvard Law Review     Free   (Followers: 93)
Hasanuddin Law Review     Open Access   (Followers: 2)
Hastings Law Journal     Free   (Followers: 8)
Health Matrix : The Journal of Law-Medicine     Open Access  
Helsinki Law Review     Open Access  
High Court Quarterly Review, The     Full-text available via subscription   (Followers: 3)
Hofstra Law Review     Open Access   (Followers: 2)
Horyzonty Polityki     Open Access  
Houston Law Review     Free   (Followers: 4)
Hukum Islam     Open Access  
IALS Student Law Review     Open Access   (Followers: 2)
IDÉIAS : Revista dos estudantes da Faculdade de Direito do Recife (UFPE)     Open Access  
IDP. Revista de Internet, Derecho y Politica     Open Access   (Followers: 2)
Ihering : Cuadernos de Ciencias Jurídicas y Sociales     Open Access   (Followers: 3)
Indian Law Review     Hybrid Journal  
Indiana Journal of Global Legal Studies     Full-text available via subscription  
Indiana Law Journal     Open Access   (Followers: 3)
Indigenous Law Bulletin     Full-text available via subscription   (Followers: 20)
Indigenous Peoples’ Journal of Law, Culture & Resistance     Open Access   (Followers: 2)
Indonesia Law Review     Open Access   (Followers: 2)
Indonesian Journal of Law and Society     Open Access   (Followers: 1)
Indonesian Journal of Legal and Forensic Sciences     Open Access   (Followers: 1)
Information & Communications Technology Law     Hybrid Journal   (Followers: 22)
InSURgência : revista de direitos e movimentos sociais     Open Access  
Inter: Revista de Direito Internacional e Direitos Humanos da UFRJ     Open Access  
Intergenerational Justice Review     Open Access  
International and Comparative Law Review     Open Access   (Followers: 4)
International Cybersecurity Law Review     Hybrid Journal   (Followers: 1)
International Data Privacy Law     Hybrid Journal   (Followers: 27)
International Free and Open Source Software Law Review     Open Access   (Followers: 6)
International Journal of Children's Rights     Hybrid Journal   (Followers: 22)
International Journal of Clinical Legal Education     Open Access  
International Journal of Culture and Modernity     Open Access  
International Journal of Disclosure and Governance     Hybrid Journal   (Followers: 6)
International Journal of Healthcare Policy     Hybrid Journal   (Followers: 1)
International Journal of Language & Law     Open Access   (Followers: 4)
International Journal of Law and Politics Studies     Open Access   (Followers: 1)
International Journal of Law Reconstruction     Open Access  
International Journal of Legal Information     Full-text available via subscription   (Followers: 48)
International Journal of Legal Medicine     Hybrid Journal   (Followers: 7)
International Journal of Liability and Scientific Enquiry     Hybrid Journal   (Followers: 2)
International Journal of Marine and Coastal Law     Hybrid Journal   (Followers: 18)
International Journal of Mental Health and Capacity Law     Open Access   (Followers: 1)
International Journal of Public Legal Education     Open Access  
International Journal of Punishment and Sentencing, The     Full-text available via subscription   (Followers: 8)
International Journal of Rural Law and Policy     Open Access   (Followers: 2)
International Journal of Speech Language and the Law     Hybrid Journal   (Followers: 11)
International Journal of Technology Policy and Law     Hybrid Journal   (Followers: 6)
International Journal of the Legal Profession     Hybrid Journal   (Followers: 9)
International Law Research     Open Access  
International Peacekeeping     Hybrid Journal   (Followers: 249)
International Sports Law Journal     Hybrid Journal   (Followers: 3)
International Theory: A Journal of International Politics, Law and Philosophy     Hybrid Journal   (Followers: 21)
IP Theory     Open Access   (Followers: 10)
Isonomía. Revista de Teoría y Filosofía del Derecho     Open Access  
Italian Review of Legal History     Open Access   (Followers: 3)
Iter Ad Veritatem     Open Access  
Iuris Dictio     Open Access  
Iuris Tantum Revista Boliviana de Derecho     Open Access  
Ius Canonicum     Full-text available via subscription  
Ius et Praxis     Open Access  
IUS ET SCIENTIA     Open Access  
IUSTA : Derecho, investigación, conflicto, prácticas jurídicas     Open Access  
James Cook University Law Review     Full-text available via subscription   (Followers: 4)
Jeffrey S. Moorad Sports Law Journal     Open Access   (Followers: 1)
JILS (Journal of Indonesian Legal Studies)     Open Access  
Jindal Global Law Review     Hybrid Journal  
John Marshall Law Review     Full-text available via subscription  
John Marshall Review of Intellectual Property Law     Free   (Followers: 8)
Journal for European Environmental & Planning Law     Hybrid Journal   (Followers: 5)
Journal of African Law     Full-text available via subscription   (Followers: 3)
Journal of Applied Law and Policy     Full-text available via subscription   (Followers: 3)
Journal of Banking Regulation     Hybrid Journal   (Followers: 27)
Journal of Business & Technology Law     Open Access   (Followers: 2)
Journal of Commonwealth Law and Legal Education     Hybrid Journal   (Followers: 5)
Journal of Conflict and Security Law     Hybrid Journal   (Followers: 18)
Journal of Digital Forensics, Security and Law     Open Access   (Followers: 1)
Journal of Dinamika Hukum     Open Access   (Followers: 1)
Journal of Empirical Legal Studies     Hybrid Journal   (Followers: 12)
Journal of Energy & Natural Resources Law     Hybrid Journal   (Followers: 5)
Journal of Environmental Law     Hybrid Journal   (Followers: 22)
Journal of Environmental Policy & Planning     Hybrid Journal   (Followers: 14)
Journal of European Consumer and Market Law     Hybrid Journal   (Followers: 6)
Journal of Gender, Social Policy & the Law     Open Access   (Followers: 22)
Journal of Human Security     Open Access   (Followers: 7)
Journal of Information Rights, Policy and Practice     Open Access  
Journal of Intelligent Transportation Systems: Technology, Planning, and Operations     Hybrid Journal   (Followers: 3)
Journal of International Peacekeeping     Hybrid Journal   (Followers: 213)
Journal of Intervention and Statebuilding     Hybrid Journal   (Followers: 9)
Journal of Islamic and Near Eastern Law     Open Access   (Followers: 3)
Journal of Law and Conflict Resolution     Open Access   (Followers: 4)
Journal of Law and Courts     Full-text available via subscription   (Followers: 7)
Journal of Law and Health     Open Access   (Followers: 7)
Journal of Law and Legal Reform     Open Access  
Journal of Law and Policy     Open Access   (Followers: 1)
Journal of Law and Regulation     Open Access  
Journal of Law and Religion     Full-text available via subscription   (Followers: 6)
Journal of Law and Social Policy     Open Access   (Followers: 3)
Journal of Law and Society     Hybrid Journal   (Followers: 43)
Journal of Law and the Biosciences     Open Access   (Followers: 3)
Journal of Law, Medicine & Ethics     Hybrid Journal   (Followers: 23)
Journal of Law, Policy and Globalization     Open Access   (Followers: 13)
Journal of Law, Religion and State     Hybrid Journal   (Followers: 4)
Journal of Legal Affairs and Dispute Resolution in Engineering and Construction     Full-text available via subscription   (Followers: 4)
Journal of Legal Analysis     Open Access   (Followers: 6)
Journal of Legal Anthropology     Open Access   (Followers: 1)
Journal of Legal Education     Open Access   (Followers: 7)
Journal of Legal Pluralism and Unofficial Law     Hybrid Journal   (Followers: 3)
Journal of Legal Studies     Full-text available via subscription   (Followers: 46)
Journal of Legal Studies     Open Access   (Followers: 8)
Journal of Legal Studies Education     Hybrid Journal   (Followers: 6)
Journal of Media Law     Hybrid Journal   (Followers: 7)
Journal of National Security Law & Policy     Free   (Followers: 6)
Journal of Nursing Law     Hybrid Journal   (Followers: 4)
Journal of Penal Law & Criminology     Open Access   (Followers: 2)
Journal of Perpetrator Research     Open Access   (Followers: 1)
Journal of Planning Education and Research     Hybrid Journal   (Followers: 13)
Journal of Police Crisis Negotiations     Hybrid Journal   (Followers: 10)
Journal of Politics     Full-text available via subscription   (Followers: 53)
Journal of Politics and Law     Open Access   (Followers: 9)
Journal of Property Research     Hybrid Journal   (Followers: 3)
Journal of Property, Planning and Environmental Law     Hybrid Journal   (Followers: 5)
Journal of Psychiatry & Law     Full-text available via subscription   (Followers: 10)
Journal of Supreme Court History     Hybrid Journal   (Followers: 8)
Journal of the National Association of Administrative Law Judiciary     Open Access   (Followers: 1)
Journal of Trafficking and Human Exploitation     Hybrid Journal   (Followers: 4)
Journal of Victimology and Victim Justice     Hybrid Journal  
Journal of World Energy Law & Business     Hybrid Journal   (Followers: 1)
Judicial Officers Bulletin     Full-text available via subscription   (Followers: 2)
Judicial Review     Full-text available via subscription   (Followers: 11)
Juridica International     Open Access  
Jurídicas CUC     Open Access  
Jurisdictie Jurnal Hukum dan Syariah     Open Access   (Followers: 1)
Jurisprudence     Hybrid Journal   (Followers: 17)
Jurist-Diction     Open Access  
Jurnal Akta     Open Access  
Jurnal Bina Mulia Hukum     Open Access  
Jurnal Cakrawala Hukum     Open Access  
Jurnal Cita Hukum     Open Access  
Jurnal Daulat Hukum     Open Access  
Jurnal Hukum & Pembangunan     Open Access  
Jurnal Hukum dan Pembangunan Ekonomi     Open Access  
Jurnal Hukum dan Peradilan     Open Access  
Jurnal Hukum Magnum Opus     Open Access  
Jurnal hukum Prasada     Open Access  
Jurnal Hukum Respublica     Open Access  
Jurnal Idea Hukum     Open Access  
Jurnal Ilmiah Pendidikan Pancasila dan Kewarganegaraan     Open Access  
Jurnal Jurisprudence     Open Access  
Jurnal Justisia : Jurnal Ilmu Hukum, Perundang-undangan dan Pranata Sosial     Open Access  
Jurnal Magister Hukum Udayana (Udayana Master Law Journal)     Open Access  
Jurnal Mimbar Hukum Fakultas Hukum Universitas Gadjah Mada     Open Access  
Jurnal Notariil     Open Access  
Jurnal Pembaharuan Hukum     Open Access  
Jurnal Repertorium     Open Access  
Jurnal Suara Keadilan     Open Access  
Jus Cogens : A Critical Journal of Philosophy of Law and Politics     Hybrid Journal  
Jussens Venner     Full-text available via subscription  
Justiça do Direito     Open Access  
Justice Research and Policy     Full-text available via subscription   (Followers: 1)
Justicia     Open Access  
Justicia Juris     Open Access  
Justitia et Pax     Open Access  
Kanun : Jurnal Ilmu Hukum     Open Access  
Kertha Patrika     Open Access  
Kertha Wicaksana     Open Access  

  First | 1 2 3 4 5     

Similar Journals
Journal Cover
International Cybersecurity Law Review
Number of Followers: 1  
 
  Hybrid Journal Hybrid journal (It can contain Open Access articles)
ISSN (Online) 2662-9739
Published by Springer-Verlag Homepage  [2469 journals]
  • Editorial

    • Free pre-print version: Loading...

      PubDate: 2022-04-26
       
  • Correction to: Cybersecurity certification of Artificial Intelligence:
           a missed opportunity to coordinate between the Artificial Intelligence
           Act and the Cybersecurity Act

    • Free pre-print version: Loading...

      PubDate: 2022-04-20
       
  • Potential security and privacy issues in zero UI touchless technology

    • Free pre-print version: Loading...

      Abstract: Abstract Touchless technology often called Zero User Interface (UI) has begun to permeate every aspect of our lives as its use became necessary for hygiene measures in public places. The evolution of touchless technology replacing touchscreen interaction started as a luxury concept to give a fancier look to digital interactions, but now it has gained real value as a health-oriented interaction method. Switching to a touchless interface reduces common touchpoints, which help to safeguard against the spread of pathogens. Although the evolution of touchless technology is not new, its use massively increased due to its inherent hygienic nature during the COVID-19 pandemic. However, this investment in a new form of digital interaction has several privacy and security issues that need attention, in order to allow for safe human–machine interaction to cope with security breaches and cyber-attacks to protect our credentials. This paper outlines the potential security and privacy issues concerning Zero UI adoption in various technologies that need to be considered if one wishes to adopt responsible technology practices with this technology.
      PubDate: 2022-04-19
       
  • USA: Department of Justice’s new civil cyber-fraud initiative and
           its implications

    • Free pre-print version: Loading...

      Abstract: Abstract The US Department of Commerce relies more and more on the Federal Claims Act (FCA) to prosecute cybersecurity-related fraud against contractors, grantees and providers with a nexus to the United States. A new DOJ Cyber Fraud Initiative of lastOctober provides more guidance and contains broad whistleblower provisions. There are legal uncertainties and risks that come with this initiative.
      PubDate: 2022-04-16
       
  • Cybersicherheit in Krankenhäusern – Teil 1:
           IT-Compliance als Leitungsaufgabe

    • Free pre-print version: Loading...

      Abstract: Zusammenfassung Die Gefahr von Cyberangriffen ist aktuell in sämtlichen Branchen allgegenwärtig. Bei Krankenhäusern kann ein Cybervorfall neben dem Verlust von Patientendaten sogar zu einer Gefahr für Leib und Leben der Patienten führen. Krankenhäuser sind daher durch eine Vielzahl von Gesetzen zur Vorhaltung ausreichender Schutzmaßnahmen verpflichtet. Die Kontrolle der Einhaltung dieser Vorschriften obliegt den Leitungspersonen in Krankenhäusern. Es handelt sich hierbei um eine wichtige Compliance-Aufgabe. Ein Baustein kann in diesem Zusammenhang der Abschluss einer Cyberversicherung sein. Besondere Vorsicht ist bei der Zahlung von Lösegeldern im Fall einer Ransomware-Attacke geboten.
      PubDate: 2022-04-13
       
  • Analysis of the cybersecurity ecosystem in the European Union

    • Free pre-print version: Loading...

      Abstract: Abstract The information society is a complex network of interconnected public and private entities and human beings. Many of them choose a certain level of technological development from the generally available solutions to support internal processes attaining objectives that support operations, creating technological dependence via internal or external services of the information and communication technologies (ICTs). Due to the technological development and technological dependence caused by ICTs, a society-wide political need has arisen for tackling security requirements for cyberspace in several sectors to satisfy the individuals’ needs that directly or indirectly define the requirements for such services, resulting in a complex ecosystem with several participants. Although the European Union has formulated some crucial rules via regulations and directives with which it increasingly defined cybersecurity stakeholders from time to time, there are several missing affected parties. This paper aims to review the relevant technological, societal, and economic factors of the information society creating the necessity to strictly handle cybersecurity requirements and analyse decisive stakeholders via a theoretical framework. Furthermore, it also identifies the current legislative framework issues to identify pain points.
      PubDate: 2022-03-24
       
  • Cybersicherheit von Gehirn-Computer-Schnittstellen

    • Free pre-print version: Loading...

      Abstract: Zusammenfassung Gehirn-Computer-Schnittstellen beflügeln die Hoffnung auf übermenschliche Kräfte: Sie versetzen Nutzer in die Lage, Prothesen und sonstige Geräte allein mit ihren Gedanken zu steuern. Je weiter die Entwicklung der neuen Technologie voranschreitet und in marktfähige Produkte mündet, desto sichtbarer rücken auch potenzielle Sicherheitsrisiken in den Fokus. Denn Angriffe auf Gehirn-Computer-Schnittstellen können neurologische Daten erspähen oder Gehirnaktivitäten manipulieren und dadurch verheerende Schäden verursachen. Der Beitrag geht der Frage auf den Grund, wie die Rechtsordnung den Risiken eines Angriffs auf Gehirn-Computer-Schnittstellen bislang begegnet – und wie sie ihnen künftig begegnen sollte.
      PubDate: 2022-03-17
       
  • Artificial intelligence as a challenge for the law: the example of
           “Doctor Algorithm”

    • Free pre-print version: Loading...

      Abstract: Abstract Society increasingly relies on algorithms to improve decisions with the aid of artificial intelligence. This is particularly true in the field of medicine where, based on algorithms, ever increasing volumes of data are to be analysed and provide the basis for tailored medical treatment. This leads to the question of how the law should react to the adoption of such algorithm-based decisions. Will new regulatory approaches be required if algorithms are employed for treatment decisions, or can one resort to the basic principles applied to determine the standard of medical treatment' Who will be liable if the use of algorithms leads to malpractice, in particular if it is the programming of the algorithms that has caused the fault'
      PubDate: 2022-03-11
       
  • European Cybersecurity Certification Schemes and cybersecurity in the EU
           internal market

    • Free pre-print version: Loading...

      Abstract: Abstract The principal question addressed by this paper is: how adequate are the minimum security objectives of the European Union Cybersecurity Act (Regulation (EU) 2019/881) in assisting organisations in the European Union internal market with resisting and recovering from cyber threats' The question is answered by first identifying the scope of the minimum security objectives. Scope identification, performed through legislative interpretation, reveals an integrated system of security objectives with significant gaps. Second, the minimum security objectives are evaluated within a model of cyber attacks from attack reconnaissance to legal proceedings to reveal further significant gaps. Finally, the minimum security objectives are evaluated within five cyber attack scenarios, reflecting the highest ranking cyber threats to the internal market. The simulation analysis accentuates the findings of the model analysis and identifies further significant gaps. In conclusion, the minimum security objectives are found to be largely inadequate in assisting organisations in the European Union internal market with resisting and recovering from cyber threats. The analysis of the adequacy of the minimum security objectives is timely, as the first European cybersecurity certification schemes are currently being designed.
      PubDate: 2022-01-28
      DOI: 10.1365/s43439-021-00044-5
       
  • Cyber governance studies in ensuring cybersecurity: an overview of
           cybersecurity governance

    • Free pre-print version: Loading...

      Abstract: Abstract With the exponential increase of digital data in cyber environments, security measures have gained more importance. Cybersecurity threats are revealed by national and international units, and the number of these threats is increasing daily. The elimination of cybersecurity risks is possible with an effective cybersecurity strategy. Since the concept of management is not sufficient, the implementation of this strategy is possible with cyber governance, which includes all stakeholders in the management processes. This study emphasizes the importance and necessity of cyber governance in ensuring cybersecurity. The research and results for cybersecurity governance have been examined. A descriptive research model was used to this end. In terms of research philosophy, a basic research model and a documentary research model have been created with regard to the application method. The universe of the research consists of studies obtained from Web of Science, EBSCO, Scopus, Google Scholar, and TR Index. Studies from the last 5 years have been downloaded with the determined keywords. The result showed that although there are studies that produce local solutions for cybersecurity governance in different countries, a general governance framework has not been established as yet. On the contrary, there is a latent struggle to retain the management of this area, not its governance.
      PubDate: 2022-01-11
      DOI: 10.1365/s43439-021-00045-4
       
  • Cybersecurity certification of Artificial Intelligence: a missed
           opportunity to coordinate between the Artificial Intelligence Act and the
           Cybersecurity Act

    • Free pre-print version: Loading...

      Abstract: Abstract In April 2021, the Commission published a draft proposal for a regulation on artificial intelligence (AI) systems aimed at striking a balance between the market need for a competitive and dynamic ecosystem and the need to minimise risks to the safety and fundamental rights of users and citizens. Among the set of obligations that apply to high-risk AI technologies, the AI Act includes a specific provision addressing the security and robustness of AI systems. This provision overlaps with existing legislation addressing cybersecurity, namely the certification process defined in Regulation 2019/881 on the European Union Agency for Cybersecurity and on information and communication technology cybersecurity certification. Although the AI Act hints at a possible path towards mutual recognition of certifications, a deeper analysis of the provisions and a comparison between the underlying features of the certification mechanisms show that the different approaches adopted in the two acts may undermine the goal of certification mechanisms as trust-enhancing and transparency instruments. As a result, this paper provides evidence of the missed opportunity for the AIA proposal to link and coordinate in a more structured way with the cybersecurity framework.
      PubDate: 2022-01-05
      DOI: 10.1365/s43439-021-00043-6
       
  • Open source intelligence

    • Free pre-print version: Loading...

      Abstract: Abstract Open Source Intelligence (OSINT) has gained importance in more fields of application than just in intelligence agencies. This paper provides an overview of the fundamental methods used to conduct OSINT investigations and presents different use cases where OSINT techniques are applied. Different models of the information cycle applied to OSINT are addressed. Additionally, the terms data, information, and intelligence are explained and correlated with the intelligence cycle. A classification system for entities during OSINT investigations is introduced. By presenting the capabilities of modern search engines, techniques for research within social networks and for penetration tests, the fundamental methods used for information gathering are explained. Furthermore, possible countermeasures to protect one’s privacy against the misuse of openly available information as well as the legal environment in Germany, and the ethical perspective are discussed.
      PubDate: 2021-12-01
      DOI: 10.1365/s43439-021-00042-7
       
  • Die Strafbarkeit des Betreibens krimineller Handelsplattformen im
           Internet – Der neue § 127 StGB

    • Free pre-print version: Loading...

      Abstract: Zusammenfassung Am 1. Oktober 2021 ist der neue § 127 StGB in Kraft getreten, mit dem eine eigenständige Strafbarkeit für das Betreiben von kriminellen Handelsplattformen im Internet eingeführt wird. Allerdings bestand für diese Neuregelung schon keine Regelungslücke und damit auch keine Legitimation für eine erneute Erweiterung des Strafgesetzbuchs. Zudem weist die gesetzliche Ausgestaltung – allen Warnungen aus der Wissenschaft zum Trotz – massive gesetzestechnische Mängel auf. Außerdem wurden ihre praktischen Auswirkungen erkennbar nicht konsequent durchdacht. Der nachfolgende Beitrag benennt die neuralgischen Punkte dieser neuen Strafnorm und bemüht sich um erste Überlegungen zu Auslegungs- und Anwendungsfragen.
      PubDate: 2021-10-13
      DOI: 10.1365/s43439-021-00040-9
       
  • Understanding the Chinese Data Security Law

    • Free pre-print version: Loading...

      Abstract: Abstract On 10 June 2021, the Data Security Law of the People’s Republic of China (hereinafter the “DSL”) was adopted at the 29th session of the Standing Committee of the 13th National People’s Congress, effective as of 1 September 2021. The DSL is the fundamental law in the data security sphere and, together with the Cybersecurity Law (hereinafter the “CSL”) and the Personal Information Protection Law (hereinafter the “PIPL”), outlines the data regulatory framework in China. The DSL contains seven chapters and 55 articles that widely cover data security mechanisms, obligations and liabilities at both State administration and data handler levels. In this article, the key contents of the DSL together with the intensively promulgated supplemental laws and regulations will be analyzed to provide a comprehensive grasp of data security supervision in China. Specifically, section one explains the basic concepts of the DSL, section two highlights the key data security protection mechanisms such as the Important Data protection and data cross-border transfer and section three will summarize the main compliance obligations for companies to effectively put laws into actions.
      PubDate: 2021-10-12
      DOI: 10.1365/s43439-021-00038-3
       
  • Accountability, liability and intermediaries: a new set of rules in
           India

    • Free pre-print version: Loading...

      Abstract: Abstract In early 2021, the Indian government introduced the Information Technology (Intermediary Guidelines and Digital Media Ethics Code) Rules, 2021, which rehaul the existing legislative framework that regulates internet intermediaries, introduces new due diligence requirements for social media companies and seeks to regulate publishers of content on the internet. This move has been met with significant opposition, especially on the grounds that it offends free speech and privacy, and that it amounts to legislative overreach. This article aims to provide a comprehensive overview of these developments.
      PubDate: 2021-10-06
      DOI: 10.1365/s43439-021-00036-5
       
  • Portscans im Lichte des Rechts: eine straf- und zivilrechtliche Analyse

    • Free pre-print version: Loading...

      Abstract: Zusammenfassung Die Prüfung von IT-Sicherheitsstrukturen mithilfe von Portscans wurde im Rahmen des Zweiten Gesetzes zur Erhöhung der Sicherheit informationstechnischer Systeme (nachfolgend auch „IT-SiG 2.0“ genannt) kontrovers diskutiert. Das Bundesamt für Sicherheit in der Informationstechnik (nachfolgend „BSI“ genannt) ist nach Umsetzung des IT-SiG 2.0 zur Vornahme von Portscans zur Prüfung der IT-Sicherheitsstruktur bestimmter Unternehmen berechtigt. Angesichts des dem IT-SiG 2.0 vorgelagerten Gesetzgebungsverfahrens haben sich die Schwächen bei der rechtlichen Einschätzung von Portscans unter dem StGB und dem Deliktsrecht offenbart. Mit unterschiedlichen oder gänzlich ohne Begründungen wurden Portscans durch verschiedene Interessenverbände als Computerstraftat oder deliktsrechtlich relevant eingestuft, während andere diese minimal-invasive Maßnahme zur Sicherstellung der IT-Sicherheit von Unternehmen uneingeschränkt willkommen geheißen haben. Die vorgenannte Diskrepanz in der rechtlichen Beurteilung von Portscans ist auch in der juristischen Literatur und Praxis wiederzufinden. Der Beitrag versucht diese Unsicherheiten aufzugreifen und Klarheit in den Fragen der rechtlichen Bewertung von Portscans unter dem StGB und dem Deliktsrecht zu schaffen. Richtungsweisende Rechtsprechung hierzu existiert bislang nicht. Angesichts der steigenden Bedeutung der IT-Sicherheit für alle Marktteilnehmer unterschiedlichster Art und Größe ist die Frage nach der rechtskonformen Einsatzmöglichkeit dieses Sicherheitstools auch abseits vertraglicher Beziehungen von elementarer Bedeutung. Die besonderen Anforderungen für Portscans staatlicher Stellen bleiben bei der hiesigen Analyse außen vor.
      PubDate: 2021-10-04
      DOI: 10.1365/s43439-021-00034-7
       
  • Editorial

    • Free pre-print version: Loading...

      PubDate: 2021-09-30
      DOI: 10.1365/s43439-021-00039-2
       
  • Necessary or premature' The NIS 2 Directive from the perspective of
           the telecommunications sector

    • Free pre-print version: Loading...

      Abstract: Abstract A high level of cybersecurity is at the very core interest of the telecommunications sector and constitutes a basic requirement for customer trust in the use of their services. A high cybersecurity standard in the telecom sector is also a precondition for the cyber-resilience of other providers of critical infrastructures that rely on their services. Already pre-dating the NIS Directive the sector has therefore been subject to specific cybersecurity obligations under the Telecom Framework Directive (TFD). The legal framework has only recently been updated in the European Electronic Communications Code (EECC), which is currently still being transposed into Member State law. In addition, the EU Commission’s 5G Toolbox introduced further sector-specific obligations for mobile network operators. The draft Directive on measures for a high common level of cybersecurity across the Union (NIS 2 Directive) abandons the sector-specific approach and aims to harmonise the cybersecurity standards across all critical infrastructure sectors—including the telecom sector. This article focuses on the need for such harmonisation, the key challenges the NIS 2 Directive would create for the telecom sector and should ultimately answer the question, whether the NIS 2 Directive would indeed contribute to a higher cybersecurity standard in the telecom sector.
      PubDate: 2021-09-23
      DOI: 10.1365/s43439-021-00035-6
       
  • Proposal for a NIS directive 2.0: companies covered by the extended scope
           of application and their obligations

    • Free pre-print version: Loading...

      Abstract: Abstract The proposal for a Network and Information Systems (NIS) Directive 2.0 aims to broaden the scope of the current NIS Directive by covering more companies in existing sectors as well as including additional sectors. The present categories of operators of essential services and digital service providers are to be replaced by important and essential entities. Currently, companies subject to NIS obligations are identified by decisions of national competent authorities. In contrast, the proposal introduces a single criterion for companies in the listed sectors, according to which they are to be primarily identified ipso iure—a company’s size. The author gives an overview of the main provisions and highlights the principal challenges associated with the proposed changes to the NIS regulatory regime.
      PubDate: 2021-09-20
      DOI: 10.1365/s43439-021-00033-8
       
  • Cybersecurity in Russia

    • Free pre-print version: Loading...

      Abstract: Abstract Cybersecurity in Russia is not a standalone concept but an integral part of national information security, which influences its legal status and applicable regulation, and determines its development trends. The purpose of this article is to outline the Russian approach to cybersecurity, describe the related legal framework, representative business cases and trends in legal development.
      PubDate: 2021-07-19
      DOI: 10.1365/s43439-021-00032-9
       
 
JournalTOCs
School of Mathematical and Computer Sciences
Heriot-Watt University
Edinburgh, EH14 4AS, UK
Email: journaltocs@hw.ac.uk
Tel: +00 44 (0)131 4513762
 


Your IP address: 44.192.25.113
 
Home (Search)
API
About JournalTOCs
News (blog, publications)
JournalTOCs on Twitter   JournalTOCs on Facebook

JournalTOCs © 2009-