www vjolt.net  
or

Critical Infrastructure: Legislative Factors for Preventing a "Cyber-Pearl Harbor"
by Robert K. Palmer
18 Va. J.L. & Tech. 289 (2014)   View PDF

Warnings about the possibility of a “cyber–Pearl Harbor” attack on our nation’s vulnerable critical infrastructure have been promulgated with increased frequency over the past several years. This Article proposes two essential baseline factors for cyber-legislation to incorporate in order to protect the nation’s critical ... [show]
Warnings about the possibility of a “cyber–Pearl Harbor” attack on our nation’s vulnerable critical infrastructure have been promulgated with increased frequency over the past several years. This Article proposes two essential baseline factors for cyber-legislation to incorporate in order to protect the nation’s critical infrastructure: (1) centralized and mandatory threat communication that is carefully tailored, and (2) government-incentivized, but private industry–led, security development. This Article arrives at these conclusions by first examining the currently existing cyber-threat to critical infrastructure through several examples before laying out why critical infrastructure has proven so vulnerable to, and unprepared for, cyber-attacks. Then, this Article analyzes how several legislative proposals can be utilized to address the vulnerability factors identified and why current law and executive action falls short of effective cybersecurity. [hide]


The State of the Discordant Union: An Empirical Analysis of DMCA Takedown Notices
by Daniel Seng
18 Va. J.L. & Tech. 369 (2014)   View PDF

By conducting a census on half a million takedown notices and more than fifty million takedown requests in its datasets, this Article takes a detailed and systematic look at the state of the takedown process from an empirical perspective. It examines the use and ... [show]
By conducting a census on half a million takedown notices and more than fifty million takedown requests in its datasets, this Article takes a detailed and systematic look at the state of the takedown process from an empirical perspective. It examines the use and issuance of takedown notices by copyright owners and reporters and the response of service providers to them. This Article further studies the relationship between the notices and requests and safe harbor provisions of the Digital Millennium Copyright Act and identifies ways in which the takedown process can be further improved to preserve the diversity and freedom of the Internet. [hide]




   ISSN 2327-7777 (Print)
   ISSN 1522-1687 (Online)

   Citation Policy
   Reprint Policy

Although this organization has members who are University of Virginia students and may have University employees associated or engaged in its activities and affairs, the organization is not a part of or an agency of the University. It is a separate and independent organization which is responsible for and manages its own activities and affairs. The University does not direct, supervise or control the organization and is not responsible for the organization's contracts, acts or omissions.