Article ID | Journal | Published Year | Pages | File Type |
---|---|---|---|---|
4957955 | Computer Law & Security Review | 2016 | 12 Pages |
Abstract
In this article, we identify 16 variables and a number of fundamental and non-fundamental constraints that must be taken into account by anyone setting out to construct a framework facilitating appropriate LEA access to evidence via direct contact with cloud providers, while safeguarding the rights and interest of individuals, as well as the rights and interest of the provider, and those of other States.
Related Topics
Physical Sciences and Engineering
Computer Science
Computer Science (General)
Authors
Dan Jerker B. Svantesson, Lodewijk van Zwieten,