Skip to main content

Our Work

Our Work

Broken laptop

Keys Case Spotlights Flaws of Computer Hacking Law

Old laws can cause confusion and unduly harsh consequences, particularly when courts confront situations Congress did not anticipate. This is particularly true for the Computer Fraud and Abuse Act, 18 U.S.C. § 1030—the federal "anti­hacking" statute prompted in part by fear generated by the 1983 techno­thriller "WarGames." The CFAA...

Free Speech banner, an colorful graphic representation of a megaphone

Doe I v. Cisco

In the digital age, repressive governments do not act alone to violate human rights. They have accomplices—often Western technology companies—with the sophistication and technical know-how that those repressive governments lack.
In this case, the plaintiffs are followers of the religious movement called Falun Gong in China. They were victims...

Binge On Lite? Ask for the Truth about T-Mobile Video Throttling

At Noon Today, Demand Real Answers from John Legere, CEO of T-Mobile
T-Mobile's Binge On service could have been great. Giving customers a choice about how to use their data so that they can stream more video without hitting their data cap is a wonderful idea. Unfortunately, T-Mobile botched...

Pages

Back to top

JavaScript license information