If you are following the Apple v US Government legal process
over the FBI request to brute force break of the passcode on Syed
Farook’s work phone, the link below
has a good summary and also a link to the 65 page motion.
A blog relating to Internet legal issues by Professor John Swinson, University of Queensland
Adsense HTML
Subscribe to:
Posts (Atom)
How should damages be assessed for privacy and cybersecurity breaches
Listen to this podcast where I discuss how damages should be assessed in privacy and cybersecurity lawsuits. The Lawyers Weekly Show host J...
-
The United Nations intellectual property agency (WIPO) is the latest front in the US-China trade war. http://www.theage.com.au/world/sad-am...
-
These are my notes for class for 1 March 2010. The class is "The law of Google". Have a look at these websites (and if you have a ...
-
The issue of content regulation in China was mentioned in this blog last year . In the last few weeks, this issue has once again pushed into...