<?xml version="1.0" encoding="UTF-8"?>
<urlset
	xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
	xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
	xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9
		http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd">
	<url>
		<loc>http://techandlaw.net</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/who-we-are/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/areas-of-interest/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/cloud-computing-2/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/internet-things/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/robotics-drones/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/cybercrime-2/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/cybersecurity-2/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/cyberwar-and-cyberterrorism-2/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/digital-forensics-and-digital-evidence/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/privacy-3/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/category/interviews/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/category/papers/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/resources/projects/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/resources/video/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/category/talks/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/category/news/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/collaborations/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/contacts/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/guest-post-artificial-people-will-law-adapt-intelligent-systems/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/category/highlights/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/category/homepage/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/artificial-intelligence-allowed-get-patent/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/legal-artificial-intelligence-can-stand-court-law/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/category/senza-categoria/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/tlc-interview-technical-challenges-machine-ethics-interview-ronald-c-arkin/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/tlc-interview-quest-roboethics-interview-prof-rafael-capurro/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/tlc-interview-regulate-robot-ethics-interview-prof-joanna-j-bryson/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/robot-ethics-one-two-origins-interview-prof-hiroko-kamide/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/robots-become-art-interview-mr-yi-wei-keng/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/ita-convegno-annuale-di-informatica-giuridica/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/page/2/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/drones-robotics/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/category/areas-of-interest/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/report-the-cloud-computing-workshop/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/digital-forensics-in-a-cloud-y-world/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/legal-aspects-of-the-cloud/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/newsletter/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/internet-things-applicazioni-sicurezza-e-riservatezza-dei-dati-personali/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/category/recommended-readings/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/japans-robot-policy-and-the-special-zone-for-regulating-next-generation-robots/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/new-malware-threats-in-the-cyber-world/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/cybercrime-3/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/misha-glenny/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/mikko-hypponen/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/assessing-europes-cyber-challenges/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/cyberwarfar/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/the-death-of-computer-forensics-digital-forensics-after-the-singularity/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/learning-ios-forensics-an-interview-with-our-fellows-pasquale-stirparo-and-mattia-epifani/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/september-26-2014-digital-investigations-deep-web/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/ryan-calo/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/security-digital-natives-video-presentation-project/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/march-18-dan-nagel-digital-whoness-identity-privacy-and-freedom-in-the-cyberworld/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/cyber-humans-future-machines-interview-prof-woodrow-barfield/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/6196-2/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/qa-marc-goodman-author-future-crimes/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/jesse-kornblum/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/category/interviews/page/2/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/paper-one-step-surveillance-society-case-predictive-policing/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/smart-law-for-intelligence-adam-d-m-svendsen/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/codifying-harm-cybercrime-injecting-zemiology-us-computer-fraud-abuse-act-cfaa-uks-computer-misuse-act-cma/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/russia-v-italy-copyright-violations/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/big-data-social-control/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/privacy-of-the-digital-natives/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/webinar-cybercrime-digital-evidence-e-digital-forensics/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/illbuster/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/progetto-forensics/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/security-of-the-digital-natives/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/ita-nuovo-seminario-la-riforma-europea-della-data-protection-e-la-sua-ricaduta-sulle-imprese-milano-26042016/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/intercettazioni-tutto-quello-che-non-avreste-voluto-sapere/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/september-20-2015-internet-of-everything-and-smart-agriculture/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/11-april-2014-the-current-bitcoin-challenges/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/may-27-stephen-mason-dealing-encrypted-data-criminal-proceedings/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/february-28-robolaw/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/february-1st-morgan-marquis-boire-on-for-their-eyes-only-the-changing-face-of-online-spying/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/category/talks/page/2/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/guest-post-law-abiding-robots-by-anders-sandberg/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/a-european-perspective-on-robot-law-an-interview-with-ms-mady-delvaux-stehres/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/is-there-a-safe-way-out-brexits-impact-on-data-protection-and-cybersecurity/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/council-europe-electronic-evidence-guide-now-available-italian/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/files/all-for-applications_oeu0eizd4kahpnr4mbwkj4/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/review-ai-ethics-car-wars-prof-joanna-bryson/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/robotics-new-challenge-security/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/ita-prossimi-appuntamenti-del-tech-law-center/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/category/news/page/2/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/ita-giuseppe-vaciago-su-cybersecurity-e-robotics-a-e-privacy-xvii-2015-la-trasparenza-e-la-privacy/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/our-new-fellow/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/theweaponizationofsocialmedia/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/united-states-new-executive-order-cyber-enabled-activities-potential-chilling-effect-cybercrime-research/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/dimva-2015-milano-italy-july-9-10-3/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/category/calendar/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/role-anonymous-declaration-war-isis/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/category/highlights/page/2/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/category/homepage/page/2/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/ita-webinar-robot-intelligenza-artificiale-e-le-nuove-sfide-per-la-sicurezza/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/ita-13-settembre-2016-controllo-del-lavoratori-cyber-espionage-e-tutela-del-segreto-industriale/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/september-7-2016-the-internet-of-broken-things/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/series-of-seminars-with-prof-david-thaw-universita-degli-studi-di-milano/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/robert-sloan-on-the-software-vulnerabilities-the-obvious-legal-responses-and-why-they-will-not-work/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/welcome-new-fellows/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/page/3/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/october-25-2014-guar-droni-come-contemperare-privacy-e-sicurezza/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/deftcon-2014/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/regulation-of-unknown-does-the-humanoid-robot-pepper-need-red-flag-laws/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/cybersecurity-3/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/dfrecommendedreadings/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/digital-evidence-beware-of-assuming-too-much/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/understanding-cybercrime-a-guide-for-developing-countries/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/category/recommended-readings/page/2/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/illbuster-project-video-promo/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/kick-illbuster-project/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/computers-privacy-data-protection-cpdp-data-protection-move/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/security-digital-natives/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/privacy-2/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/dave-monnier/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/susan-landau/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/moments-and-facial-recognition-on-facebook-within-the-european-legal-framework/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/alessandro-acquisti-on-the-privacy-in-the-age-of-augmented-reality/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/category/projects/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/news/security-digital-natives-brussels16th-october/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/news/security-digital-natives-main-articles-regarding-project/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/deftcon-2015-roma-17-aprile/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/september-24-surveillance-or-security/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/wassenaar-arrangement-changes-in-multifaceted-digital-society/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/open-data-first-steps-towards-milan-digital-city-university-of-milan-bicocca-march-7-2012/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/the-data-liberation-front-and-googles-commitment-to-the-open-web/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/tech-and-law-center-turned-4/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/tech-law-center-goes-expo-will-talking/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/category/news/page/3/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/david-camerons-proposal-new-data-laws-risks-benefits/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/digital-tools-crime-prevention-pre-crime-era-started/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/cybersecurity-based-startups-sharing-project-ideas/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/category/homepage/page/3/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/page/4/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/eu-security-awareness-summit-july-10th-2015-london/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/projects/illbuster/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/projects/security-of-the-digital-natives/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/fallacy-digital-native/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/security-digital-natives-brussels16th-october/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/homepage/alessandro-acquisti-on-the-privacy-in-the-age-of-augmented-reality/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/advanced-analysis-aerial-images/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/news/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/talks/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/calendar/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/news/digital-tools-crime-prevention-pre-crime-era-started/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/news/security-digital-natives/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/event/css-conference/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/event/october-25-2014-guar-droni-come-contemperare-privacy-e-sicurezza/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/event/workshop-privacy-electronic-society/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/event/cpdp2015-data-protection-move/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/calendar/month/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/resources/interviews/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/real-future-according-inventor-web/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/category/news/page/4/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/news/october-25-2014-guar-droni-come-contemperare-privacy-e-sicurezza/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/papers/big-data-social-control/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/interviews/ryan-calo/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/areas-of-interest/privacy-3/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/talks/march-18-dan-nagel-digital-whoness-identity-privacy-and-freedom-in-the-cyberworld/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/interviews/susan-landau/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/talks/september-24-surveillance-or-security/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/recommended-readings/privacy-2/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/news/september-26-2014-digital-investigations-deep-web/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/news/global-perspective-data-protection-private-sector/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/news/kick-illbuster-project/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/news/council-europe-electronic-evidence-guide-now-available-italian/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/news/deftcon-2014/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/homepage/11-april-2014-the-current-bitcoin-challenges/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/homepage/february-28-robolaw/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/talks/may-27-stephen-mason-dealing-encrypted-data-criminal-proceedings/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/homepage/february-1st-morgan-marquis-boire-on-for-their-eyes-only-the-changing-face-of-online-spying/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/tag/2012/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/talks/robert-sloan-on-the-software-vulnerabilities-the-obvious-legal-responses-and-why-they-will-not-work/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/homepage/digital-forensics-in-a-cloud-y-world/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/tag/2011/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/talks/new-malware-threats-in-the-cyber-world/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/recommended-readings/robotics-drones/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/areas-of-interest/drones-robotics/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/recommended-readings/dfrecommendedreadings/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/areas-of-interest/digital-forensics-and-digital-evidence/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/projects/progetto-forensics/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/papers/the-death-of-computer-forensics-digital-forensics-after-the-singularity/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/interviews/dave-monnier/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/interviews/mikko-hypponen/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/recommended-readings/cybercrime-3/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/areas-of-interest/cybercrime-2/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/projects/webinar-cybercrime-digital-evidence-e-digital-forensics/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/interviews/misha-glenny/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/who-we-are/executive-committee/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/who-we-are/scientific-committee/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/who-we-are/fellows/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/who-we-are/members/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/what-we-do/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/areas-of-interest/cloud-computing/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/areas-of-interest/cybercrime/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/areas-of-interest/cybersecurity/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/areas-of-interest/cyberwar-and-cyberterrorism/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/areas-of-interest/digital-forensics/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/areas-of-interest/digital-evidence/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/areas-of-interest/open-data/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/areas-of-interest/privacy/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/events/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/resources/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/resources/tech-and-law-papers/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/resources/recommended-readings/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/resources/links/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/resources/media/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/newsroom/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/tag/twitter/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/interviews/jesse-kornblum/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/recommended-readings/cybersecurity-3/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/areas-of-interest/cybersecurity-2/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/areas-of-interest/cloud-computing-2/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/recommended-readings/report-the-cloud-computing-workshop/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/papers/legal-aspects-of-the-cloud/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/2012/02/22/newsroom/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/2012/03/01/giulia-franzoso/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/2012/03/05/legal-aspects-of-the-cloud/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/2012/03/29/2012-fulbright-symposium-secu/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/2012/04/02/valerio-guadagno/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/2012/04/06/digital-forensics-2/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/2012/06/22/background-personalized-acce/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/2012/07/09/brikena-memaj/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/2013/05/04/may-27-stephen-mason-dealing-with-encrypted-data-in-criminal-proceedings/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/ak_action_aktt_css_v_2/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/mcsf_action_main_css_ver_3.5/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/mcsf_action_main_css_ver_4/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/s_{search_term_string}/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/sfc-channel-file_1/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/areas-of-interest/cyberwar-and-cyberterrorism-2/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/areas-of-interest/internet-things/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/calendar/deftcon-2015-roma-17-aprile/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/calendar/dimva-2015-milano-italy-july-9-10-3/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/event/2013-workshop-information-systems-economics/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/event/amsterdam-privacy-conference/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/event/cpdp-2014-conference-organisation/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/event/cyber-security-privacy-fourm-conference/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/event/deft-conference-2014/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/event/dimva-2015-milano-italy-july-9-10/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/event/eurodig-2014/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/event/fcct-2015-first-international-workshop-future-scenarios-cyber-crime-cyber-terrorism/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/event/global-multistakeholder-meeting-future-internet-governance/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/event/hackinbo-2015/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/event/international-conference-investigating-relationship-future-technologies-self-society-2/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/event/security-digital-natives/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/event/surveillance-ambiguities-asymmetries/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/event/working-agenda/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/event/workshop-ethics-cyber-conflict/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/event/wsis-forum-2015/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/event/www-2015-24th-international-world-wide-web-conference/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/executive-committee/francesca-bosco/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/homepage/may-27-stephen-mason-dealing-encrypted-data-criminal-proceedings/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/interviews/qa-marc-goodman-author-future-crimes/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/news/6196/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/news/assessing-europes-cyber-challenges/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/files/puter-misuse-act-cma_re4dmzuriocdz2cirhdot8/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/news/computers-privacy-data-protection-cpdp-data-protection-move/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/news/cybersecurity-based-startups-sharing-project-ideas/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/news/david-camerons-proposal-new-data-laws-risks-benefits/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/news/deftcon-2015-roma-17-aprile/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/news/dimva-2015-milano-italy-july-9-10/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/news/eu-security-awareness-summit-july-10th-2015-london/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/news/fallacy-digital-native/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/news/internet-things-applicazioni-sicurezza-e-riservatezza-dei-dati-personali/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/news/ita-giuseppe-vaciago-su-cybersecurity-e-robotics-a-e-privacy-xvii-2015-la-trasparenza-e-la-privacy/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/news/online-survey-privacy-protection-tools-surveillance-videos-shot-mini-drone/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/news/real-future-according-inventor-web/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/news/regulation-of-unknown-does-the-humanoid-robot-pepper-need-red-flag-laws/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/news/russia-v-italy-copyright-violations/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/news/security-digital-natives-video-presentation-project/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/news/tecol-tools-for-enforcement-of-competition-law/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/news/theweaponizationofsocialmedia/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/news/united-states-new-executive-order-cyber-enabled-activities-potential-chilling-effect-cybercrime-research/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/nortonsw_4ef89d90-5fa8-0/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/files/puter-misuse-act-cma_bfdn5efxjhz2033d2ot2t3/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/papers/japans-robot-policy-and-the-special-zone-for-regulating-next-generation-robots/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/papers/privacy-of-the-digital-natives/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/papers/russia-v-italy-copyright-violations/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/parking/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/recommended-readings/cyberwarfar/</loc>
	</url>
	<url>
		<loc>http://techandlaw.net/test/newsletter-december-2013/</loc>
	</url>
</urlset>