Cryptography law
Cryptography is the practice and study of hiding information. There are many different cryptography laws in different nations. Some countries prohibit export of cryptography software and/or encryption...
Digital rights management
Digital rights management (DRM) is a class of technologies that are used by hardware and software manufacturers, publishers, copyright holders, and individuals with the intent to control the use of di...
RealNetworks, Inc. v. DVD Copy Control Association, Inc.
RealNetworks, Inc. v. DVD Copy Control Association, Inc., 641 F. Supp. 2d 913 (2009), is a United States District Court case involving RealNetworks, the movie studios and DVD Copy Control Association ...
RealNetworks, Inc. v. DVD Copy Control Association, Inc. - Wikipedia
Digital signatures and law
Worldwide, legislation concerning the effect and validity of digital signatures includes:
ElcomSoft
ElcomSoft Co.Ltd. is a privately owned software company headquartered in Moscow, Russia. Since its establishment in 1990, the company has been working on computer security programs, with the main focu...
Rpmsg

An rpmsg file is a restricted-permission message with an extension of rpmsg [1]. It is used to implement IRM for Outlook messages with the aim of restricting certain actions such as the ability t...
Peter Junger
Peter D. Junger (1933 – November 2006) was a computer law professor and Internet activist, most famous for having fought against the U.S. government's regulations of and export controls on encryption ...
ECC patents
Patent-related uncertainty around elliptic curve cryptography (ECC), or ECC patents, is one of the main factors limiting its wide acceptance. For example, the OpenSSL team accepted an ECC patch only i...
Electronic Communications Act 2000
The Electronic Communications Act 2000 (c.7) is an Act of the Parliament of the United Kingdom that:The United Kingdom government had come to the conclusion that encryption, encryption services and el...
Massachusetts Bay Transportation Authority v. Anderson
Massachusetts Bay Transportation Authority v. Anderson, et al., Civil Action No. 08-11364, was a challenge brought by the Massachusetts Bay Transportation Authority (MBTA) to prevent three Massachuset...
Massachusetts Bay Transportation Authority v. Anderson - Wikipedia
Electronic Signatures in Global and National Commerce Act
The Electronic Signatures in Global and National Commerce Act (ESIGN, Pub.L. 106–229, 114 Stat. 464, enacted June 30, 2000, 15 U.S.C. ch. 96) is a United States federal law passed ...
The Chamberlain Group, Inc. v. Skylink Technologies, Inc.
The Chamberlain Group, Inc. v. Skylink Technologies, Inc., 381 F.3d 1178 (Fed. Cir. 2004) is a legal case heard by the United States Court of Appeals for the Federal Circuit concerning the anti-traffi...
The Chamberlain Group, Inc. v. Skylink Technologies, Inc. - Wikipedia
Illegal prime
An illegal prime is a prime number that represents information whose possession or distribution is forbidden in some legal jurisdiction. One of the first illegal primes was found in 2001. When interpr...
Illegal prime - Wikipedia
Perpetual access
Perpetual access refers to the right to ongoing access to electronic materials. In situations where digital materials are licensed, access to these materials is often lost after the licensing agreemen...
Government Paperwork Elimination Act
The Government Paperwork Elimination Act (GPEA, Pub.L. 105–277 Title XVII) requires that, when practicable, Federal agencies use electronic forms, electronic filing, and electronic signatures to condu...
DeCSS
DeCSS was one of the first free computer programs capable of decrypting content on a commercially produced DVD video disc. Before the release of DeCSS, there was no way for computers running a Linux-...
DeCSS - Wikipedia
Export of cryptography
The export of cryptography is the transfer from one country to another of devices and technology related to cryptography.In the early days of the Cold War, the U.S. and its allies developed an elabora...
Regulation of Investigatory Powers Act 2000
The Regulation of Investigatory Powers Act 2000 (c.23) (RIP or RIPA) is an Act of the Parliament of the United Kingdom, regulating the powers of public bodies to carry out surveillance and investigati...
Penet remailer
The Penet remailer (anon.penet.fi) was a pseudonymous remailer (type 0) operated by Johan "Julf" Helsingius of Finland from 1993 to 1996. Its initial creation stemmed from an argument in a Finnish new...
Illegal number
An illegal number is a number that represents information which is illegal to possess, utter, propagate, or otherwise transmit in some legal jurisdiction. Any piece of information is representable as ...
Junger v. Daley
Junger v. Daley is a court case brought by Peter Junger challenging restrictions on the export of encryption software outside of the United States.The case was first brought in 1996 (as Junger v. Chri...
Always-on DRM
Always-on DRM or always-online DRM is a form of digital rights management (DRM) that requires a consumer to remain connected to a server, especially through an internet connection, to use a particular...
Hardware restriction
A hardware restriction (sometimes called hardware DRM) is content protection enforced by electronic components. The hardware restriction scheme may complement a digital rights management system implem...
Information rights management
Information rights management (IRM) is a subset of digital rights management (DRM), technologies that protect sensitive information from unauthorized access. It is sometimes referred to as E-DRM or En...
In re Boucher
In re Boucher, No. 2:06-mj-91, 2009 WL 424718, is a federal criminal case in Vermont, which was the first to address directly the question of whether a person can be compelled to reveal his or her enc...
Qrpff
qrpff is a Perl script created by Keith Winstein and Marc Horowitz of the MIT SIPB. It performs DeCSS in six or seven lines. The name itself is an encoding of "decss" in rot-13.In fact, two versions...