Junger V. Daley
''Junger v. Daley'' is a court case brought by Peter Junger challenging restrictions on the export of encryption software outside of the United States. The case was first brought in 1996 (as ''Junger v. Christopher''), when Junger was a professor at Case Western Reserve University and wanted to teach a class on computer law. Because of the restrictions, he was unable to accept non-US citizens into his class. Following a district court victory in the ''Bernstein v. United States'' case on the same matter, Junger amended his complaint to ask for an injunction on enforcement of the regulations prohibiting his publication of encryption course materials on the Internet. On appeal, the Sixth Circuit held that software source code is protected by the First Amendment. See also * Export of cryptography * ''Bernstein v. United States ''Bernstein v. United States'' was a series of court cases filed by Daniel J. Bernstein, then a mathematics Ph.D. student at the University of Ca ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Peter Junger
Peter D. Junger (1933 – November 2006) was a computer law professor and Internet activist, most famous for having fought against the U.S. government's regulations of and export controls on encryption software. The case, ''Junger v. Daley'' (6th Cir. 2000), held that computer source code is protected by the First Amendment. The US government prohibited publication of encryption software on the Internet, arguing that encryption software was a "munition" subject to export controls. Junger filed suit in 1996 challenging the regulations. Junger also did significant legal theoretical work on the interplay between intellectual property, computer law, and the First Amendment. He defined himself as a "First Amendment absolutist." Biography Junger grew up in Wyoming, graduating from Harvard University in 1955 and Harvard Law School in 1958. From January 1959 to December 1960 he was an enlisted man in the U.S. Army serving in West Germany. After practicing law from 1961 to 1970, he a ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Export
An export in international trade is a good produced in one country that is sold into another country or a service provided in one country for a national or resident of another country. The seller of such goods or the service provider is an ''exporter''; the foreign buyer is an '' importer''. Services that figure in international trade include financial, accounting and other professional services, tourism, education as well as intellectual property rights. Exportation of goods often requires the involvement of customs authorities. Firms For any firm, Global expansion strategies may include: * Franchising, * Turn Key Project, * Export, * Joint Venture, * Licensing, * Creating an owned subsidiary, * Acquisition, * Merger, etc. Exporting is mostly a strategy used by product based companies. Many manufacturing firms begin their global expansion as exporters and only later switch to another mode for serving a foreign market. Barriers There are four main types of expo ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Encryption
In Cryptography law, cryptography, encryption (more specifically, Code, encoding) is the process of transforming information in a way that, ideally, only authorized parties can decode. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext. Despite its goal, encryption does not itself prevent interference but denies the intelligible content to a would-be interceptor. For technical reasons, an encryption scheme usually uses a pseudo-random encryption Key (cryptography), key generated by an algorithm. It is possible to decrypt the message without possessing the key but, for a well-designed encryption scheme, considerable computational resources and skills are required. An authorized recipient can easily decrypt the message with the key provided by the originator to recipients but not to unauthorized users. Historically, various forms of encryption have been used to aid in cryptography. Early encryption ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Software
Software consists of computer programs that instruct the Execution (computing), execution of a computer. Software also includes design documents and specifications. The history of software is closely tied to the development of digital computers in the mid-20th century. Early programs were written in the machine language specific to the hardware. The introduction of high-level programming languages in 1958 allowed for more human-readable instructions, making software development easier and more portable across different computer architectures. Software in a programming language is run through a compiler or Interpreter (computing), interpreter to execution (computing), execute on the architecture's hardware. Over time, software has become complex, owing to developments in Computer network, networking, operating systems, and databases. Software can generally be categorized into two main types: # operating systems, which manage hardware resources and provide services for applicat ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
United States
The United States of America (USA), also known as the United States (U.S.) or America, is a country primarily located in North America. It is a federal republic of 50 U.S. state, states and a federal capital district, Washington, D.C. The 48 contiguous states border Canada to the north and Mexico to the south, with the semi-exclave of Alaska in the northwest and the archipelago of Hawaii in the Pacific Ocean. The United States asserts sovereignty over five Territories of the United States, major island territories and United States Minor Outlying Islands, various uninhabited islands in Oceania and the Caribbean. It is a megadiverse country, with the world's List of countries and dependencies by area, third-largest land area and List of countries and dependencies by population, third-largest population, exceeding 340 million. Its three Metropolitan statistical areas by population, largest metropolitan areas are New York metropolitan area, New York, Greater Los Angeles, Los Angel ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Case Western Reserve University
Case Western Reserve University (CWRU) is a Private university, private research university in Cleveland, Ohio, United States. It was established in 1967 by a merger between Western Reserve University and the Case Institute of Technology. Case Western Reserve University comprises eight schools that offer more than 100 undergraduate programs and about 160 graduate and professional options across fields in STEM, medicine, arts, and the humanities. In 2024, the university enrolled 12,475 students (6,528 undergraduate plus 5,947 graduate and professional) from all 50 states and 106 countries and employed more than 1,182 full-time faculty members. The university's athletic teams, Case Western Reserve Spartans, play in NCAA Division III as a founding member of the University Athletic Association. Case Western Reserve University is a member of the Association of American Universities and is Carnegie Classification of Institutions of Higher Education, classified among "R1: Doctoral Univ ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Computer Law
Information technology law (IT law), also known as information, communication and technology law (ICT law) or cyberlaw, concerns the juridical regulation of information technology, its possibilities and the consequences of its use, including computing, software coding, artificial intelligence, the internet and virtual worlds. The ICT field of law comprises elements of various branches of law, originating under various acts or statutes of parliaments, the common and continental law and international law. Some important areas it covers are information and data, communication, and information technology, both software and hardware and technical communications technology, including coding and protocols. Due to the shifting and adapting nature of the technological industry, the nature, source and derivation of this information legal system and ideology changes significantly across borders, economies and in time. As a base structure, Information technology law is related to primarily g ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Bernstein V
Bernstein is a common surname of German origin, meaning "amber" (literally "burn stone"). The name is used by both Germans and Jews, although it is most common among people of Ashkenazi Jewish heritage. The German pronunciation is , but in English, it is pronounced either as or . Notable people sharing the surname "Bernstein" A–H * Aaron Bernstein (1812–1884), German short story writer and historian * Abe Bernstein (1892–1968), American mobster * Abraham Bernstein (other), several people * Adam Bernstein (born 1960), American film, music video, television director, and screenwriter * Al Bernstein (born 1949), Austrian contemporary artist * Al Bernstein (born 1950), American boxing commentator * Alan Bernstein (born 1947), Canadian medical researcher * Alexander Bernstein, Baron Bernstein of Craigweil (1936–2010), British television executive and politician and psychologist, doctor of medicine, professor * Alfred Bernstein (1911–2003), American civil ri ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
United States Court Of Appeals For The Sixth Circuit
The United States Court of Appeals for the Sixth Circuit (in case citations, 6th Cir.) is a federal court with appellate jurisdiction over the district courts in the following districts: * Eastern District of Kentucky * Western District of Kentucky * Eastern District of Michigan * Western District of Michigan * Northern District of Ohio * Southern District of Ohio * Eastern District of Tennessee * Middle District of Tennessee * Western District of Tennessee The court is composed of sixteen judges and is based at the Potter Stewart U.S. Courthouse in Cincinnati, Ohio. It is one of 13 United States courts of appeals. The United States federal courts were divided into six circuits in 1801, but a circuit court of appeals was not established until the passage of the Judiciary Act of 1891. William Howard Taft, the only person ever to serve as both President and Chief Justice of the United States, once served on the Sixth Circuit. Four other judges of the Sixth Circuit ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Computer Software
Software consists of computer programs that instruct the Execution (computing), execution of a computer. Software also includes design documents and specifications. The history of software is closely tied to the development of digital computers in the mid-20th century. Early programs were written in the machine language specific to the hardware. The introduction of high-level programming languages in 1958 allowed for more human-readable instructions, making software development easier and more portable across different computer architectures. Software in a programming language is run through a compiler or Interpreter (computing), interpreter to execution (computing), execute on the architecture's hardware. Over time, software has become complex, owing to developments in Computer network, networking, operating systems, and databases. Software can generally be categorized into two main types: # operating systems, which manage hardware resources and provide services for applicat ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Source Code
In computing, source code, or simply code or source, is a plain text computer program written in a programming language. A programmer writes the human readable source code to control the behavior of a computer. Since a computer, at base, only understands machine code, source code must be Translator (computing), translated before a computer can Execution (computing), execute it. The translation process can be implemented three ways. Source code can be converted into machine code by a compiler or an assembler (computing), assembler. The resulting executable is machine code ready for the computer. Alternatively, source code can be executed without conversion via an interpreter (computing), interpreter. An interpreter loads the source code into memory. It simultaneously translates and executes each statement (computer science), statement. A method that combines compilation and interpretation is to first produce bytecode. Bytecode is an intermediate representation of source code tha ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
First Amendment To The United States Constitution
The First Amendment (Amendment I) to the United States Constitution prevents Federal government of the United States, Congress from making laws respecting an Establishment Clause, establishment of religion; prohibiting the Free Exercise Clause, free exercise of religion; or abridging the Freedom of speech in the United States, freedom of speech, the Freedom of the press in the United States, freedom of the press, the freedom of assembly, or the Right to petition in the United States, right to petition the government for redress of grievances. It was adopted on December 15, 1791, as one of the ten amendments that constitute the United States Bill of Rights, Bill of Rights. In the original draft of the Bill of Rights, what is now the First Amendment occupied third place. The first two articles were not ratified by the states, so the article on disestablishment and free speech ended up being first. The Bill of Rights was proposed to assuage Anti-Federalism, Anti-Federalist oppo ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |