{"id":1598,"date":"2022-05-31T16:20:15","date_gmt":"2022-05-31T16:20:15","guid":{"rendered":"https:\/\/law.temple.edu\/ilit\/?page_id=1598"},"modified":"2022-06-17T20:35:03","modified_gmt":"2022-06-17T20:35:03","slug":"cybernorms","status":"publish","type":"page","link":"https:\/\/law.temple.edu\/ilit\/issues\/cybernorms\/","title":{"rendered":"Cybernorms"},"content":{"rendered":"<style>#kt-layout-id_8d4cb2-24 > .kt-row-column-wrap{align-content:start;}:where(#kt-layout-id_8d4cb2-24 > .kt-row-column-wrap) > .wp-block-kadence-column{justify-content:start;}#kt-layout-id_8d4cb2-24 > .kt-row-column-wrap{column-gap:var(--global-kb-gap-md, 2rem);row-gap:var(--global-kb-gap-md, 2rem);max-width:var( --global-content-width, 1290px );padding-left:var(--global-content-edge-padding);padding-right:var(--global-content-edge-padding);padding-top:var( --global-kb-row-default-top, 25px );padding-bottom:var( --global-kb-row-default-bottom, 25px );padding-top:100px;padding-bottom:100px;grid-template-columns:minmax(0, 2fr) minmax(0, 1fr);}#kt-layout-id_8d4cb2-24{background-image:url('https:\/\/law.temple.edu\/ilit\/wp-content\/uploads\/sites\/4\/2022\/04\/20170127_PhiladelphiaStock_023-Web-Res-JPEG-150-DPI.jpg');background-size:cover;background-position:center center;background-attachment:scroll;background-repeat:no-repeat;}#kt-layout-id_8d4cb2-24 > .kt-row-layout-overlay{opacity:0.55;background-color:var(--global-palette3, #1A202C);}@media all and (max-width: 1024px){#kt-layout-id_8d4cb2-24 > .kt-row-column-wrap{grid-template-columns:minmax(0, 2fr) minmax(0, 1fr);}}@media all and (max-width: 767px){#kt-layout-id_8d4cb2-24 > .kt-row-column-wrap{grid-template-columns:minmax(0, 1fr);}}<\/style>\n<div class=\"wp-block-kadence-rowlayout alignfull\"><div id=\"kt-layout-id_8d4cb2-24\" class=\"kt-row-layout-inner kt-row-has-bg kt-layout-id_8d4cb2-24\"><div class=\"kt-row-layout-overlay kt-row-overlay-normal\"><\/div><div class=\"kt-row-column-wrap kt-has-2-columns kt-gutter-default kt-v-gutter-default kt-row-valign-top kt-row-layout-left-golden kt-tab-layout-inherit kt-m-colapse-left-to-right kt-mobile-layout-row kb-theme-content-width\"><style>.kadence-column_bee614-31 > .kt-inside-inner-col{border-top-width:0px;border-right-width:0px;border-bottom-width:0px;border-left-width:0px;}.kadence-column_bee614-31 > .kt-inside-inner-col,.kadence-column_bee614-31 > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column_bee614-31 > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column_bee614-31 > .kt-inside-inner-col{flex-direction:column;}.kadence-column_bee614-31 > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column_bee614-31 > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column_bee614-31{position:relative;}@media all and (max-width: 1024px){.kadence-column_bee614-31 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column_bee614-31 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column inner-column-1 kadence-column_bee614-31\"><div class=\"kt-inside-inner-col\">\n<h1 class=\"has-theme-palette-9-color has-text-color wp-block-heading\">Cybernorms<\/h1>\n\n\n\n<h3 class=\"has-theme-palette-9-color has-text-color wp-block-heading\">Digital Critical Infrastructure &amp; Developing Cybernorms<\/h3>\n<\/div><\/div>\n\n\n<style>.kadence-column_89e2f1-c2 > .kt-inside-inner-col{border-top-width:0px;border-right-width:0px;border-bottom-width:0px;border-left-width:0px;}.kadence-column_89e2f1-c2 > .kt-inside-inner-col,.kadence-column_89e2f1-c2 > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column_89e2f1-c2 > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column_89e2f1-c2 > .kt-inside-inner-col{flex-direction:column;}.kadence-column_89e2f1-c2 > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column_89e2f1-c2 > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column_89e2f1-c2{position:relative;}@media all and (max-width: 1024px){.kadence-column_89e2f1-c2 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column_89e2f1-c2 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column inner-column-2 kadence-column_89e2f1-c2\"><div class=\"kt-inside-inner-col\"><\/div><\/div>\n<\/div><\/div><\/div>\n\n\n<style>#kt-layout-id_90e081-cc > .kt-row-column-wrap{align-content:start;}:where(#kt-layout-id_90e081-cc > .kt-row-column-wrap) > .wp-block-kadence-column{justify-content:start;}#kt-layout-id_90e081-cc > .kt-row-column-wrap{column-gap:var(--global-kb-gap-md, 2rem);row-gap:var(--global-kb-gap-md, 2rem);max-width:var( --global-content-width, 1290px );padding-left:var(--global-content-edge-padding);padding-right:var(--global-content-edge-padding);padding-top:var( --global-kb-row-default-top, 25px );padding-bottom:var( --global-kb-row-default-bottom, 25px );padding-top:50px;padding-bottom:50px;padding-left:0px;padding-right:0px;grid-template-columns:minmax(0, 1fr);}#kt-layout-id_90e081-cc > .kt-row-layout-overlay{opacity:0.30;}@media all and (max-width: 1024px){#kt-layout-id_90e081-cc > .kt-row-column-wrap{grid-template-columns:minmax(0, 1fr);}}@media all and (max-width: 767px){#kt-layout-id_90e081-cc > .kt-row-column-wrap{grid-template-columns:minmax(0, 1fr);}}<\/style>\n<div class=\"wp-block-kadence-rowlayout alignnone\"><div id=\"kt-layout-id_90e081-cc\" class=\"kt-row-layout-inner kt-row-has-bg kt-layout-id_90e081-cc has-theme-palette-9-background-color\"><div class=\"kt-row-column-wrap kt-has-1-columns kt-gutter-default kt-v-gutter-default kt-row-valign-top kt-row-layout-equal kt-tab-layout-inherit kt-m-colapse-left-to-right kt-mobile-layout-row kb-theme-content-width\"><style>.kadence-column_de097d-79 > .kt-inside-inner-col{border-top-width:0px;border-right-width:0px;border-bottom-width:0px;border-left-width:0px;}.kadence-column_de097d-79 > .kt-inside-inner-col,.kadence-column_de097d-79 > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column_de097d-79 > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column_de097d-79 > .kt-inside-inner-col{flex-direction:column;}.kadence-column_de097d-79 > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column_de097d-79 > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column_de097d-79{position:relative;}@media all and (max-width: 1024px){.kadence-column_de097d-79 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column_de097d-79 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column inner-column-1 kadence-column_de097d-79\"><div class=\"kt-inside-inner-col\">\n<p>As states, intergovernmental organizations, and commercial actors have amassed staggering amounts of digital information and moved critical operations online, new frontiers of vulnerability and insecurity have rapidly emerged on a global scale. These developments are at the forefront of geopolitics and increasingly occupy a prominent position in high-level international peace and security processes.&nbsp;&nbsp;<\/p>\n\n\n\n<p>The field currently raises more questions than it answers: What rules apply in cyberspace? Does the internet have a \u201ccore\u201d that is public and international? What is the nature of power exercised by multinational corporations in the elaboration and application of cybernorms?&nbsp;<\/p>\n\n\n\n<p>Decisions about the rules that govern state and non-state behavior in cyberspace bear a direct relationship to equally pivotal efforts to enhance human development and transnational solidarity through an open, safe, and free internet. The future position of human and peoples\u2019 rights in an emerging body of international law applicable to behavior in cyberspace hinges on how current debates are structured, engaged and informed.&nbsp;<\/p>\n<\/div><\/div>\n<\/div><\/div><\/div>\n\n\n<style>#kt-layout-id_de903e-53 > .kt-row-column-wrap{align-content:start;}:where(#kt-layout-id_de903e-53 > .kt-row-column-wrap) > .wp-block-kadence-column{justify-content:start;}#kt-layout-id_de903e-53 > .kt-row-column-wrap{column-gap:var(--global-kb-gap-md, 2rem);row-gap:var(--global-kb-gap-md, 2rem);max-width:var( --global-content-width, 1290px );padding-left:var(--global-content-edge-padding);padding-right:var(--global-content-edge-padding);padding-top:var( --global-kb-row-default-top, 25px );padding-bottom:var( --global-kb-row-default-bottom, 25px );padding-top:var(--global-kb-spacing-sm, 1.5rem);padding-bottom:var(--global-kb-spacing-sm, 1.5rem);grid-template-columns:minmax(0, 1fr);}#kt-layout-id_de903e-53 > .kt-row-layout-overlay{opacity:0.30;}@media all and (max-width: 1024px){#kt-layout-id_de903e-53 > .kt-row-column-wrap{grid-template-columns:minmax(0, 1fr);}}@media all and (max-width: 767px){#kt-layout-id_de903e-53 > .kt-row-column-wrap{grid-template-columns:minmax(0, 1fr);}}<\/style>\n<div class=\"wp-block-kadence-rowlayout alignnone\"><div id=\"kt-layout-id_de903e-53\" class=\"kt-row-layout-inner kt-row-has-bg kt-layout-id_de903e-53 has-theme-palette-9-background-color\"><div class=\"kt-row-column-wrap kt-has-1-columns kt-gutter-default kt-v-gutter-default kt-row-valign-top kt-row-layout-equal kt-tab-layout-inherit kt-m-colapse-left-to-right kt-mobile-layout-row kb-theme-content-width\"><style>.kadence-column_b20363-9c > .kt-inside-inner-col{border-top-width:0px;border-right-width:0px;border-bottom-width:0px;border-left-width:0px;}.kadence-column_b20363-9c > .kt-inside-inner-col,.kadence-column_b20363-9c > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column_b20363-9c > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column_b20363-9c > .kt-inside-inner-col{flex-direction:column;}.kadence-column_b20363-9c > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column_b20363-9c > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column_b20363-9c{position:relative;}@media all and (max-width: 1024px){.kadence-column_b20363-9c > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column_b20363-9c > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column inner-column-1 kadence-column_b20363-9c\"><div class=\"kt-inside-inner-col\"><style>.kb-posts-id-_b3512c-e2 .kb-post-list-item{display:grid;}<\/style><ul class=\"wp-block-kadence-posts kb-posts kadence-posts-list kb-posts-id-_b3512c-e2 content-wrap grid-cols kb-posts-style-boxed grid-sm-col-2 grid-lg-col-3 item-image-style-above\"><li class=\"kb-post-list-item\">\n\t<article class=\"entry content-bg loop-entry post-2361 post type-post status-publish format-standard has-post-thumbnail hentry category-ai category-blog category-consumer-protections category-cybernorms category-fintech category-privacy-law tag-ai tag-blog tag-consumer-protections tag-cybercrime tag-fintech tag-privacy-law\">\n\t\t\t\t<a aria-hidden=\"true\" tabindex=\"-1\" role=\"presentation\" class=\"post-thumbnail kadence-thumbnail-ratio-2-3\" href=\"https:\/\/law.temple.edu\/ilit\/from-deference-to-disruption\/\" aria-label=\"From Deference to Disruption:How The Loper Bright Enterprises Decision is Reshaping Fintech\">\n\t\t\t<div class=\"post-thumbnail-inner\">\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"461\" src=\"https:\/\/law.temple.edu\/ilit\/wp-content\/uploads\/sites\/4\/2024\/09\/C1.jpeg\" class=\"attachment-medium_large size-medium_large wp-post-image\" alt=\"A set of hands holding a smart phone over a computer, holding a credit card over the smartphone and light streams connecting the two\" \/>\t\t\t<\/div>\n\t\t<\/a><!-- .post-thumbnail -->\n\t\t\t\t<div class=\"entry-content-wrap\">\n\t\t\t<header class=\"entry-header\">\n\t\t<div class=\"entry-taxonomies\">\n\t\t<span class=\"category-links term-links category-style-normal\">\n\t\t\t<a href=\"https:\/\/law.temple.edu\/ilit\/category\/ai\/\" class=\"category-link-ai\" rel=\"tag\">AI<\/a> | <a href=\"https:\/\/law.temple.edu\/ilit\/category\/blog\/\" class=\"category-link-blog\" rel=\"tag\">Blog<\/a> | <a href=\"https:\/\/law.temple.edu\/ilit\/category\/consumer-protections\/\" class=\"category-link-consumer-protections\" rel=\"tag\">Consumer Protections<\/a> | <a href=\"https:\/\/law.temple.edu\/ilit\/category\/cybernorms\/\" class=\"category-link-cybernorms\" rel=\"tag\">Cybernorms<\/a> | <a href=\"https:\/\/law.temple.edu\/ilit\/category\/fintech\/\" class=\"category-link-fintech\" rel=\"tag\">Fintech<\/a> | <a href=\"https:\/\/law.temple.edu\/ilit\/category\/privacy-law\/\" class=\"category-link-privacy-law\" rel=\"tag\">Privacy Law<\/a>\t\t<\/span>\n\t<\/div><!-- .entry-taxonomies -->\n\t<h2 class=\"entry-title\"><a href=\"https:\/\/law.temple.edu\/ilit\/from-deference-to-disruption\/\" rel=\"bookmark\">From Deference to Disruption:How The Loper Bright Enterprises Decision is Reshaping Fintech<\/a><\/h2><\/header><!-- .entry-header -->\n\t<div class=\"entry-summary\">\n\t\t<p>From Deference to Disruption:How The Loper Bright Enterprises Decision is Reshaping Fintech By: Shubh Mehta LAW\u201826 Mobile apps have&#8230;<\/p>\n\t<\/div><!-- .entry-summary -->\n\t<footer class=\"entry-footer\">\n\t\t\t<div class=\"entry-actions\">\n\t\t\t<p class=\"more-link-wrap\">\n\t\t\t\t<a href=\"https:\/\/law.temple.edu\/ilit\/from-deference-to-disruption\/\" class=\"post-more-link\">\n\t\t\t\t\tRead More<span class=\"screen-reader-text\"> From Deference to Disruption:How The Loper Bright Enterprises Decision is Reshaping Fintech<\/span><span class=\"kadence-svg-iconset svg-baseline\"><svg aria-hidden=\"true\" class=\"kadence-svg-icon kadence-arrow-right-alt-svg\" fill=\"currentColor\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"27\" height=\"28\" viewBox=\"0 0 27 28\"><title>Continue<\/title><path d=\"M27 13.953c0 0.141-0.063 0.281-0.156 0.375l-6 5.531c-0.156 0.141-0.359 0.172-0.547 0.094-0.172-0.078-0.297-0.25-0.297-0.453v-3.5h-19.5c-0.281 0-0.5-0.219-0.5-0.5v-3c0-0.281 0.219-0.5 0.5-0.5h19.5v-3.5c0-0.203 0.109-0.375 0.297-0.453s0.391-0.047 0.547 0.078l6 5.469c0.094 0.094 0.156 0.219 0.156 0.359v0z\"><\/path>\n\t\t\t<\/svg><\/span>\t\t\t\t<\/a>\n\t\t\t<\/p>\n\t\t<\/div><!-- .entry-actions -->\n\t\t<\/footer><!-- .entry-footer -->\t\t<\/div>\n\t<\/article>\n<\/li>\n<li class=\"kb-post-list-item\">\n\t<article class=\"entry content-bg loop-entry post-2082 post type-post status-publish format-standard has-post-thumbnail hentry category-alumni category-cybernorms category-digital-surveillance category-events category-public-interest-tech category-students\">\n\t\t\t\t<a aria-hidden=\"true\" tabindex=\"-1\" role=\"presentation\" class=\"post-thumbnail kadence-thumbnail-ratio-2-3\" href=\"https:\/\/law.temple.edu\/ilit\/sovereign-identity-crisis-state-self-and-collective-in-a-digital-age-november-17-2022\/\" aria-label=\"Sovereign Identity Crisis: State, Self, and Collective in a Digital Age &#8211; November 17, 2022\">\n\t\t\t<div class=\"post-thumbnail-inner\">\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"432\" src=\"https:\/\/law.temple.edu\/ilit\/wp-content\/uploads\/sites\/4\/2022\/09\/20181205_Water_aquarium_019-Web-Res-JPEG-150-DPI-768x432.jpg\" class=\"attachment-medium_large size-medium_large wp-post-image\" alt=\"Abstract water movement image\" srcset=\"https:\/\/law.temple.edu\/ilit\/wp-content\/uploads\/sites\/4\/2022\/09\/20181205_Water_aquarium_019-Web-Res-JPEG-150-DPI-768x432.jpg 768w, https:\/\/law.temple.edu\/ilit\/wp-content\/uploads\/sites\/4\/2022\/09\/20181205_Water_aquarium_019-Web-Res-JPEG-150-DPI-300x169.jpg 300w, https:\/\/law.temple.edu\/ilit\/wp-content\/uploads\/sites\/4\/2022\/09\/20181205_Water_aquarium_019-Web-Res-JPEG-150-DPI-1024x576.jpg 1024w, https:\/\/law.temple.edu\/ilit\/wp-content\/uploads\/sites\/4\/2022\/09\/20181205_Water_aquarium_019-Web-Res-JPEG-150-DPI-1536x864.jpg 1536w, https:\/\/law.temple.edu\/ilit\/wp-content\/uploads\/sites\/4\/2022\/09\/20181205_Water_aquarium_019-Web-Res-JPEG-150-DPI-2048x1152.jpg 2048w\" sizes=\"auto, (max-width: 768px) 100vw, 768px\" \/>\t\t\t<\/div>\n\t\t<\/a><!-- .post-thumbnail -->\n\t\t\t\t<div class=\"entry-content-wrap\">\n\t\t\t<header class=\"entry-header\">\n\t\t<div class=\"entry-taxonomies\">\n\t\t<span class=\"category-links term-links category-style-normal\">\n\t\t\t<a href=\"https:\/\/law.temple.edu\/ilit\/category\/alumni\/\" class=\"category-link-alumni\" rel=\"tag\">Alumni<\/a> | <a href=\"https:\/\/law.temple.edu\/ilit\/category\/cybernorms\/\" class=\"category-link-cybernorms\" rel=\"tag\">Cybernorms<\/a> | <a href=\"https:\/\/law.temple.edu\/ilit\/category\/digital-surveillance\/\" class=\"category-link-digital-surveillance\" rel=\"tag\">Digital Surveillance<\/a> | <a href=\"https:\/\/law.temple.edu\/ilit\/category\/events\/\" class=\"category-link-events\" rel=\"tag\">Events<\/a> | <a href=\"https:\/\/law.temple.edu\/ilit\/category\/public-interest-tech\/\" class=\"category-link-public-interest-tech\" rel=\"tag\">Public Interest Tech<\/a> | <a href=\"https:\/\/law.temple.edu\/ilit\/category\/students\/\" class=\"category-link-students\" rel=\"tag\">Students<\/a>\t\t<\/span>\n\t<\/div><!-- .entry-taxonomies -->\n\t<h2 class=\"entry-title\"><a href=\"https:\/\/law.temple.edu\/ilit\/sovereign-identity-crisis-state-self-and-collective-in-a-digital-age-november-17-2022\/\" rel=\"bookmark\">Sovereign Identity Crisis: State, Self, and Collective in a Digital Age &#8211; November 17, 2022<\/a><\/h2><\/header><!-- .entry-header -->\n\t<div class=\"entry-summary\">\n\t\t<p>Sovereign Identity Crisis: State, Self, and Collective in a Digital Age Event Hosted by iLIT and the Temple Law&#8230;<\/p>\n\t<\/div><!-- .entry-summary -->\n\t<footer class=\"entry-footer\">\n\t\t\t<div class=\"entry-actions\">\n\t\t\t<p class=\"more-link-wrap\">\n\t\t\t\t<a href=\"https:\/\/law.temple.edu\/ilit\/sovereign-identity-crisis-state-self-and-collective-in-a-digital-age-november-17-2022\/\" class=\"post-more-link\">\n\t\t\t\t\tRead More<span class=\"screen-reader-text\"> Sovereign Identity Crisis: State, Self, and Collective in a Digital Age &#8211; November 17, 2022<\/span><span class=\"kadence-svg-iconset svg-baseline\"><svg aria-hidden=\"true\" class=\"kadence-svg-icon kadence-arrow-right-alt-svg\" fill=\"currentColor\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"27\" height=\"28\" viewBox=\"0 0 27 28\"><title>Continue<\/title><path d=\"M27 13.953c0 0.141-0.063 0.281-0.156 0.375l-6 5.531c-0.156 0.141-0.359 0.172-0.547 0.094-0.172-0.078-0.297-0.25-0.297-0.453v-3.5h-19.5c-0.281 0-0.5-0.219-0.5-0.5v-3c0-0.281 0.219-0.5 0.5-0.5h19.5v-3.5c0-0.203 0.109-0.375 0.297-0.453s0.391-0.047 0.547 0.078l6 5.469c0.094 0.094 0.156 0.219 0.156 0.359v0z\"><\/path>\n\t\t\t<\/svg><\/span>\t\t\t\t<\/a>\n\t\t\t<\/p>\n\t\t<\/div><!-- .entry-actions -->\n\t\t<\/footer><!-- .entry-footer -->\t\t<\/div>\n\t<\/article>\n<\/li>\n<li class=\"kb-post-list-item\">\n\t<article class=\"entry content-bg loop-entry post-1580 post type-post status-publish format-standard hentry category-collaboration category-cybernorms category-newsroom category-students\">\n\t\t\t\t<div class=\"entry-content-wrap\">\n\t\t\t<header class=\"entry-header\">\n\t\t<div class=\"entry-taxonomies\">\n\t\t<span class=\"category-links term-links category-style-normal\">\n\t\t\t<a href=\"https:\/\/law.temple.edu\/ilit\/category\/collaboration\/\" class=\"category-link-collaboration\" rel=\"tag\">Collaboration<\/a> | <a href=\"https:\/\/law.temple.edu\/ilit\/category\/cybernorms\/\" class=\"category-link-cybernorms\" rel=\"tag\">Cybernorms<\/a> | <a href=\"https:\/\/law.temple.edu\/ilit\/category\/newsroom\/\" class=\"category-link-newsroom\" rel=\"tag\">Newsroom<\/a> | <a href=\"https:\/\/law.temple.edu\/ilit\/category\/students\/\" class=\"category-link-students\" rel=\"tag\">Students<\/a>\t\t<\/span>\n\t<\/div><!-- .entry-taxonomies -->\n\t<h2 class=\"entry-title\"><a href=\"https:\/\/law.temple.edu\/ilit\/ilit-joins-un-cybercrime-treaty-negotiations\/\" rel=\"bookmark\">iLIT Joins UN Cybercrime Treaty Negotiations<\/a><\/h2><\/header><!-- .entry-header -->\n\t<div class=\"entry-summary\">\n\t\t<p>In February 2022, the UN kicked off a controversial and complex negotiation process that could lead to a new&#8230;<\/p>\n\t<\/div><!-- .entry-summary -->\n\t<footer class=\"entry-footer\">\n\t\t\t<div class=\"entry-actions\">\n\t\t\t<p class=\"more-link-wrap\">\n\t\t\t\t<a href=\"https:\/\/law.temple.edu\/ilit\/ilit-joins-un-cybercrime-treaty-negotiations\/\" class=\"post-more-link\">\n\t\t\t\t\tRead More<span class=\"screen-reader-text\"> iLIT Joins UN Cybercrime Treaty Negotiations<\/span><span class=\"kadence-svg-iconset svg-baseline\"><svg aria-hidden=\"true\" class=\"kadence-svg-icon kadence-arrow-right-alt-svg\" fill=\"currentColor\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"27\" height=\"28\" viewBox=\"0 0 27 28\"><title>Continue<\/title><path d=\"M27 13.953c0 0.141-0.063 0.281-0.156 0.375l-6 5.531c-0.156 0.141-0.359 0.172-0.547 0.094-0.172-0.078-0.297-0.25-0.297-0.453v-3.5h-19.5c-0.281 0-0.5-0.219-0.5-0.5v-3c0-0.281 0.219-0.5 0.5-0.5h19.5v-3.5c0-0.203 0.109-0.375 0.297-0.453s0.391-0.047 0.547 0.078l6 5.469c0.094 0.094 0.156 0.219 0.156 0.359v0z\"><\/path>\n\t\t\t<\/svg><\/span>\t\t\t\t<\/a>\n\t\t\t<\/p>\n\t\t<\/div><!-- .entry-actions -->\n\t\t<\/footer><!-- .entry-footer -->\t\t<\/div>\n\t<\/article>\n<\/li>\n<\/ul><\/div><\/div>\n<\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Cybernorms Digital Critical Infrastructure &amp; Developing Cybernorms As states, intergovernmental organizations, and commercial actors have amassed staggering amounts of digital information and moved critical operations online, new frontiers of vulnerability and insecurity have rapidly emerged on a global scale. These developments are at the forefront of geopolitics and increasingly occupy a prominent position in high-level&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":1229,"menu_order":2,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"footnotes":""},"categories":[],"tags":[],"class_list":["post-1598","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybernorms - Temple iLIT<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/law.temple.edu\/ilit\/issues\/cybernorms\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybernorms - Temple iLIT\" \/>\n<meta property=\"og:description\" content=\"Cybernorms Digital Critical Infrastructure &amp; Developing Cybernorms As states, intergovernmental organizations, and commercial actors have amassed staggering amounts of digital information and moved critical operations online, new frontiers of vulnerability and insecurity have rapidly emerged on a global scale. These developments are at the forefront of geopolitics and increasingly occupy a prominent position in high-level...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/law.temple.edu\/ilit\/issues\/cybernorms\/\" \/>\n<meta property=\"og:site_name\" content=\"Temple iLIT\" \/>\n<meta property=\"article:modified_time\" content=\"2022-06-17T20:35:03+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/law.temple.edu\/ilit\/issues\/cybernorms\/\",\"url\":\"https:\/\/law.temple.edu\/ilit\/issues\/cybernorms\/\",\"name\":\"Cybernorms - Temple iLIT\",\"isPartOf\":{\"@id\":\"https:\/\/law.temple.edu\/ilit\/#website\"},\"datePublished\":\"2022-05-31T16:20:15+00:00\",\"dateModified\":\"2022-06-17T20:35:03+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/law.temple.edu\/ilit\/issues\/cybernorms\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/law.temple.edu\/ilit\/issues\/cybernorms\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/law.temple.edu\/ilit\/issues\/cybernorms\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"ISSUES\",\"item\":\"https:\/\/law.temple.edu\/ilit\/issues\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybernorms\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/law.temple.edu\/ilit\/#website\",\"url\":\"https:\/\/law.temple.edu\/ilit\/\",\"name\":\"Temple iLIT\",\"description\":\"Institute for Law, Innovation &amp; Technology\",\"publisher\":{\"@id\":\"https:\/\/law.temple.edu\/ilit\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/law.temple.edu\/ilit\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/law.temple.edu\/ilit\/#organization\",\"name\":\"Temple iLIT\",\"url\":\"https:\/\/law.temple.edu\/ilit\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/law.temple.edu\/ilit\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/law.temple.edu\/ilit\/wp-content\/uploads\/sites\/4\/2022\/08\/cropped-iLIT-logo-1.png\",\"contentUrl\":\"https:\/\/law.temple.edu\/ilit\/wp-content\/uploads\/sites\/4\/2022\/08\/cropped-iLIT-logo-1.png\",\"width\":1465,\"height\":704,\"caption\":\"Temple iLIT\"},\"image\":{\"@id\":\"https:\/\/law.temple.edu\/ilit\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybernorms - Temple iLIT","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/law.temple.edu\/ilit\/issues\/cybernorms\/","og_locale":"en_US","og_type":"article","og_title":"Cybernorms - Temple iLIT","og_description":"Cybernorms Digital Critical Infrastructure &amp; Developing Cybernorms As states, intergovernmental organizations, and commercial actors have amassed staggering amounts of digital information and moved critical operations online, new frontiers of vulnerability and insecurity have rapidly emerged on a global scale. These developments are at the forefront of geopolitics and increasingly occupy a prominent position in high-level...","og_url":"https:\/\/law.temple.edu\/ilit\/issues\/cybernorms\/","og_site_name":"Temple iLIT","article_modified_time":"2022-06-17T20:35:03+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/law.temple.edu\/ilit\/issues\/cybernorms\/","url":"https:\/\/law.temple.edu\/ilit\/issues\/cybernorms\/","name":"Cybernorms - Temple iLIT","isPartOf":{"@id":"https:\/\/law.temple.edu\/ilit\/#website"},"datePublished":"2022-05-31T16:20:15+00:00","dateModified":"2022-06-17T20:35:03+00:00","breadcrumb":{"@id":"https:\/\/law.temple.edu\/ilit\/issues\/cybernorms\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/law.temple.edu\/ilit\/issues\/cybernorms\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/law.temple.edu\/ilit\/issues\/cybernorms\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"ISSUES","item":"https:\/\/law.temple.edu\/ilit\/issues\/"},{"@type":"ListItem","position":2,"name":"Cybernorms"}]},{"@type":"WebSite","@id":"https:\/\/law.temple.edu\/ilit\/#website","url":"https:\/\/law.temple.edu\/ilit\/","name":"Temple iLIT","description":"Institute for Law, Innovation &amp; Technology","publisher":{"@id":"https:\/\/law.temple.edu\/ilit\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/law.temple.edu\/ilit\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/law.temple.edu\/ilit\/#organization","name":"Temple iLIT","url":"https:\/\/law.temple.edu\/ilit\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/law.temple.edu\/ilit\/#\/schema\/logo\/image\/","url":"https:\/\/law.temple.edu\/ilit\/wp-content\/uploads\/sites\/4\/2022\/08\/cropped-iLIT-logo-1.png","contentUrl":"https:\/\/law.temple.edu\/ilit\/wp-content\/uploads\/sites\/4\/2022\/08\/cropped-iLIT-logo-1.png","width":1465,"height":704,"caption":"Temple iLIT"},"image":{"@id":"https:\/\/law.temple.edu\/ilit\/#\/schema\/logo\/image\/"}}]}},"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/law.temple.edu\/ilit\/wp-json\/wp\/v2\/pages\/1598","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/law.temple.edu\/ilit\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/law.temple.edu\/ilit\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/law.temple.edu\/ilit\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/law.temple.edu\/ilit\/wp-json\/wp\/v2\/comments?post=1598"}],"version-history":[{"count":4,"href":"https:\/\/law.temple.edu\/ilit\/wp-json\/wp\/v2\/pages\/1598\/revisions"}],"predecessor-version":[{"id":1758,"href":"https:\/\/law.temple.edu\/ilit\/wp-json\/wp\/v2\/pages\/1598\/revisions\/1758"}],"up":[{"embeddable":true,"href":"https:\/\/law.temple.edu\/ilit\/wp-json\/wp\/v2\/pages\/1229"}],"wp:attachment":[{"href":"https:\/\/law.temple.edu\/ilit\/wp-json\/wp\/v2\/media?parent=1598"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/law.temple.edu\/ilit\/wp-json\/wp\/v2\/categories?post=1598"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/law.temple.edu\/ilit\/wp-json\/wp\/v2\/tags?post=1598"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}