{"id":61741,"date":"2018-02-06T13:00:25","date_gmt":"2018-02-06T21:00:25","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=61741"},"modified":"2019-01-29T13:06:01","modified_gmt":"2019-01-29T21:06:01","slug":"cybersecurity-canon-cyberlaw-law-internet-information-technology","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2018\/02\/cybersecurity-canon-cyberlaw-law-internet-information-technology\/","title":{"rendered":"The Cybersecurity Canon -  Cyberlaw: The Law of the Internet and Information Technology"},"content":{"rendered":"<p><div style=\"max-width:100%\" data-width=\"600\"><span class=\"ar-custom\" style=\"padding-bottom:43.33%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"alignnone size-full wp-image-32398 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2017\/06\/cybersecuity-canon-blog-600x260.png\" alt=\"cybersecuity-canon-blog-600x260\" width=\"600\" height=\"260\" \/><\/span><\/div><\/p>\n<p><em>We modeled the\u00a0<\/em><a href=\"https:\/\/cybercanon.paloaltonetworks.com\/\"><em>Cybersecurity Canon<\/em><\/a><em>\u00a0after the Baseball or Rock &amp; Roll Hall-of-Fame, except for cybersecurity books. We have more than 25 books on the initial candidate list, but we are soliciting help from the cybersecurity community to increase the number to be much more than that.\u00a0Please write a review and nominate your favorite.\u00a0<\/em><\/p>\n<p><em>The Cybersecurity Canon is a real thing for our community. We have designed it so that you can\u00a0<\/em><a href=\"https:\/\/cybercanon.paloaltonetworks.com\/nominate-a-book\/\"><em>directly participate in the process<\/em><\/a><em>. Please do so! <\/em><\/p>\n<p>&nbsp;<\/p>\n<p><strong>EXECUTIVE SUMMARY<\/strong><\/p>\n<p><em>Cyberlaw: The Law of the Internet and Information Technology<\/em> is a well-written and well-organized book aimed squarely at undergraduate students for whom a knowledge of key IT law topics may be valuable.\u00a0 Through 11 chapters it covers a broad variety of topics, ranging from jurisdictional issues to online privacy. With chapters that include learning objectives, review questions and exercises, <em>Cyberlaw<\/em> does an excellent job of reaching its target audience.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>REVIEW<\/strong><\/p>\n<p><em>Cyberlaw<\/em> is written to help students understand the legal and policy issues associated with the internet. In a somewhat-too-small-for-comfort font, it addresses a broad range of information technology-related legal topics.<\/p>\n<p>Chapter 1 looks at the broad topic of \u201cJurisdiction and Venue in Cyberspace.\u201d While it covers these topics very well from a general legal perspective, it doesn\u2019t dive into the thornier issues of determining jurisdiction in multi-state or multinational settings.<\/p>\n<p>Chapter 2 addresses \u201cCopyright Law in the Digital Age.\u201d Included is a well-done summary of the Digital Millennium Copyright Act, an oft-confusing and broad-ranging law.<\/p>\n<p>Chapter 3 looks at \u201cTrademarks in E-Commerce,\u201d including international aspects of enforcement.<\/p>\n<p>Chapter 4 covers \u201cPatents and Trade Secrets in the Information Age,\u201d including in-depth coverage of patent infringement.<\/p>\n<p>Chapter 5 is about \u201cE-Commerce and Online Contracts,\u201d including international aspects and the Statute of Frauds.<\/p>\n<p>Chapter 6 addresses \u201cOnline Tax-Related Issues.\u201d I was somewhat surprised at the amount coverage of this topic as, in my experience, it is rarely something that concerns cybersecurity practitioners and tends to be more of a public policy matter.<\/p>\n<p>Chapter 7 is about \u201cCybercrimes.\u201d Computer crime laws are diverse and wide-ranging, and the author does a good job of providing a high-level overview of them. This chapter, however, contains a discussion of \u201cenforcement of cybercrimes,\u201d including the statement: \u201cCybercrimes are often not enforced.\u201d I find this troubling, as cybercrimes are not enforced \u2013 cybercrime <em>laws<\/em> are enforced. In the scope of the entire book, it is only a few lines. But it is a confusing misuse of terms, especially given the book\u2019s target audience.<\/p>\n<p>Chapter 8 looks at \u201cTort Law in Cyberspace,\u201d including misappropriation of a likeness, and general fraud and misappropriation.<\/p>\n<p>Chapter 9 addresses \u201cRegulating Online Speech,\u201d including defamation, a topic of current importance, given the increasingly contentious use of social media to espouse and refute social issues.<\/p>\n<p>Chapter 10 is about \u201cConstitutional and Statutory Privacy Protections,\u201d also a current issue of concern in an age of data collection and social media.<\/p>\n<p>Chapter 11 covers \u201cSpecial Topics in Online Privacy,\u201d with emphasis on personal privacy issues.<\/p>\n<p>Each chapter includes well-defined learning objectives, review questions and discussion questions to measure and exercise the reader\u2019s comprehension and application of the chapter.<\/p>\n<p><em>Cyberlaw<\/em>, like most legal texts, suffers from its inability to track legal developments following publication. Some texts publish supplements on a regular basis, which, given the quality of the author\u2019s work, may be something he wants to consider. In some chapters, <em>Cyberlaw<\/em> gives a solid review of legal topics, but really doesn\u2019t drill down to the unique issues and problems that come from their application in the cyber realm. Some of the case reviews do look at these matters, but it would be helpful to have them brought out in the body of the text as well.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>CONCLUSION<\/strong><\/p>\n<p>A text that squarely hits the mark in terms of its target audience, <em>Cyberlaw: The Law of the Internet and Information Technology<\/em> is a solid overview of many of the legal topics relevant to those operating in the cyber arena. Because of this high-level view, however, it may not be helpful for those more advanced in their cybersecurity or policy roles.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>William Yurek reviews \u201cCyberlaw: The Law of the Internet and Information Technology\u201d for the Cybersecurity Canon.<\/p>\n","protected":false},"author":394,"featured_media":32398,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[4521,6724],"tags":[5404,5401,251,4270,5407],"coauthors":[4252],"class_list":["post-61741","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-canon","category-points-of-view","tag-brian-craig","tag-cyberlaw-the-law-of-the-internet-and-information-technology","tag-cybersecurity-canon","tag-cybersecurity-canon-review","tag-william-yurek"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2017\/06\/cybersecuity-canon-blog-600x260.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/61741","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/394"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=61741"}],"version-history":[{"count":2,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/61741\/revisions"}],"predecessor-version":[{"id":61747,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/61741\/revisions\/61747"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/32398"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=61741"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=61741"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=61741"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=61741"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}