The CMA still governs UK cyber crime while inadvertently criminalising legitimate cyber security research, including critical ...
Technology has simplified access to electronically stored information. Today, thousands of pages of data can be copied and transferred onto an inexpensive thumb drive or other computer device. As a ...
People who work in tech know their employers have internal rules or policies regarding intellectual property and access to the employer’s systems. But few are familiar with a federal statute, the ...
The Computer Misuse Act turns 30 next year, with some in the industry calling for revisions to be made to bring it up to speed with modern security research practices. However, as Dan Raywood finds ...