The following post comes from Jack Ring, a 3L at Scalia Law and a Research Assistant at C-IP2.

On April 15, 2024, C-IP2 scholars and contributors to 5G and Beyond: Intellectual Property and Competition Policy in the Internet of Things met for a live-streamed book launch event. Read more
In a
In Tuesday’s
Last week, the European Court of Justice—the judicial authority of the European Union—issued an anticipated
In a recent
Last week, a group of law professors wrote a
Malware, short for malicious software, has been used to infiltrate and contaminate computers since the early 1980s. But what began as relatively benign software designed to prank and annoy users has developed into a variety of hostile programs intended to hijack, steal, extort, and attack.