首页 | 本学科首页   官方微博 | 高级检索  
     检索      


Government procurement law and hacking technology: The role of public contracting in regulating an invisible market
Institution:1. Senior Lecturer in Law at the University of Waikato, New Zealand;2. Trustee at Public Trust, New Zealand;1. Full Professor of Private Comparative Law at Sant''Anna School of Advanced Studies, Pisa, Italy;2. Postdoc Researcher in Private Comparative Law at Sant''Anna School of Advanced Studies, Pisa, Italy;1. Independent Computer Security Consultant, Manchester, UK;2. Department of Computer Science and Mathematics, Liverpool John Moores University, Liveropool L3 3AF, UK;1. Institute for Chinese Legal Modernization Studies, law School of Nanjing Normal University, Collaborative Innovation Center for Regional Rule of Law in Jiangsu, No.1 Wenyuan Road, Nanjing 210023, China;2. School of Intellectual Property of Nanjing University of Science & Technology, Intellectual Property Development Research Center of Jiangsu Province, No.200 Xiaolingwei Street, Nanjing 210094, China;3. law School of Zhejiang University, No.51 Zhijiang Road, Hangzhou 310008, China
Abstract:This article considers the purchasing of hacking technology by governments and the role of government procurement processes in regulating the hacking market and reducing risks to the buyer. While the proliferation of hacking technology for government actors has led to various proposed solutions for accountability, little consideration has been given to public purchasing of this technology. This article explores whether public contracting processes could be used to help minimize the risks that arise from the use of government hacking technology, and, if so, the types of contractual clauses and institutional supports that might be useful to achieve that goal. In exploring this issue, this article considers theories of government by contract and the publicization of the private sector. These theories posit that public contracting can be used as a vehicle to impose public considerations—for example, certain policy goals—on the private sector. It argues that requirements of transparency and accountability that inhere on the public sector could be transferred in part to the private sector through the vehicle of a public contract and explores how public contracts for government hacking technology could be structured in order to reduce risks posed by the use of this technology.
Keywords:
本文献已被 ScienceDirect 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号