Completed
Introduction
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Hacking the Law - A Call for Action – Bug Bounties Legal Terms as a Case Study
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 Who dictates the rules
- 3 The safe harbor
- 4 The legal implications
- 5 The call for action
- 6 Three important points
- 7 Proof of concept
- 8 Legal risks
- 9 Most paradoxical example
- 10 Alibaba example
- 11 Facebook example
- 12 Hackers examples
- 13 Intermediates
- 14 Exceptions
- 15 Platforms Matter
- 16 Who Can Participate
- 17 Microsoft Example
- 18 Suggestions
- 19 Eliminate Reverse Engineering Language
- 20 Review the Terms
- 21 One Language
- 22 Specific Authorization