“Robert was an excellent addition to InterCon's legal team, using his keen understanding of intellectual property law and superb communications skills to provide a nuanced approach to the legal issues the company faced with the emergence of the Internet. Because of InterCon's special position as a leading provider of Internet software, he had to navigate issues of standard software licensing and contracts as well as deal with budding online piracy issues.”
Robert Carolina
Greater London, England, United Kingdom
3K followers
500+ connections
About
Commercial lawyer focussed on information & communications technologies, Internet…
Experience
Education
Licenses & Certifications
Publications
-
Law and Regulation Knowledge Area
CyBOK: The Cyber Security Body Of Knowledge
This knowledge area introduces to cybersecurity practitioners and researchers various aspects of law and regulation that may or should influence their activity. The focus is primarily upon substantive law, and includes discussion of legal research and sources of law, online jurisdiction, privacy, data protection, computer crime, contract, tort, intellectual property, content intermediary liability, trust services, miscellaneous regulation, international law, ethics, and legal risk management.
-
Megamos Crypto, Responsible Disclosure, and the Chilling Effect of Volkswagen Aktiengesellschaft vs Garcia, et al
White Paper
Discussion of the English High Court decision to issue a preliminary injunction restraining publication of an academic research paper describing weakness in a proprietary crypto algorithm. Topics addressed include shortcomings in the court's understanding of crypto technology, lack of risk analysis related to publication, appropriate legal standard in assessing liability of academic researchers for misuse of trade secret, lack of understanding of the meaning of "responsible disclosure", delay…
Discussion of the English High Court decision to issue a preliminary injunction restraining publication of an academic research paper describing weakness in a proprietary crypto algorithm. Topics addressed include shortcomings in the court's understanding of crypto technology, lack of risk analysis related to publication, appropriate legal standard in assessing liability of academic researchers for misuse of trade secret, lack of understanding of the meaning of "responsible disclosure", delay in enforcement of trade secret rights, and chilling effect on security research.
Other authorsSee publication -
The Information Storage and Access Rule: Designing a consent user interface for “Cookies”
This paper explores the problem of designing an online experience for compliance with the new European rules on end user machine storage and access. This is more commonly known as the “cookie consent” problem.
-
BBC Click exploited world’s poor and vulnerable
Computer Weekly
By purchasing and using an illegal computer botnet, BBC’s “Click” programme chose to educate their affluent English-speaking technically savvy audience about computer security by exploiting 21,000 poor and vulnerable computer users in the developing world.
-
Encyclopedia of Ecommerce Law
Thomson / Sweet and Maxwell
Co-editor of loose-leaf publication detailing multiple topics in ecommerce law
-
Interception of Communications
Encyclopedia of E-Commerce Law
Treatise (20,000 words) on UK law of interception
-
The European Database Directive: An Introduction for Practitioners
The Journal of Proprietary Rights vol. 8 no. 9
-
Commercial Transactions on the Global Information Infrastructure: A European Perspective
14 John Marshall Journal of Computer and Information Law 269
Early work exploring application of multiple areas of law to operation and use of the Internet. This article was the culmination of research, conference speaking, and client advisory activity over a period of nearly two years.
Other authorsSee publication -
Legal Aspects of Software Protection Devices
11 Computer Law and Security Report 188
The article reports on a case where an English Magistrates Court found a software developer guilty of criminal computer misuse (Computer Misuse Act 1990) as a result of inserting a time lock device into software without the awareness of the customer. The article compares and comments upon a series of similar cases reported in the US.
-
Paying for Undercompensated Hospital Care: The Regressive Profile of a "Hidden Tax"
2 Health Matrix 141
The article uses contemporary cost of living and tax data to demonstrate that US Hospital care provided "for free" to some indigent patients is financed on a sharply regressive basis. Compared with the wealthy and affluent, the middle class and working poor pay much more (as % of income) to finance such care.
Co-Author: Maxwell Gregg Bloche, J.D., M.D., Professor of Law at Georgetown University
Courses
-
Information Technology Law
-
-
International Business Transactions
-
-
Legal Aspects of International Finance
-
-
Multinational Enterprises
-
-
Telecommunications Law
-
Recommendations received
7 people have recommended Robert
Join now to viewOther similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named Robert Carolina
11 others named Robert Carolina are on LinkedIn
See others named Robert Carolina