Court Finds Fake Cable Repair by FBI is an Illegal Search
Federal District Court Judge Andrew P. Gordon in Las Vegas, Nevada recently concluded the FBI’s use of a fake cable repair person to obtain information on a suspect constituted an illegal search....
View ArticleGoogle Target of Lawsuit over Fraud Caused by Malicious Apps
An angry customer recently sued Google over fraudulent charges billed to her account apparently as the result of a malicious app. The dispute shows the potentially adverse impact on customer relations...
View ArticleRadioShack Bankruptcy Pushes Data Privacy Law Limits
As the retailer RadioShack works its way through the bankruptcy process, it is selling all of its commercial assets, including a substantial collection of customer data. Federal and state authorities,...
View ArticleStarbucks and the Hacker: A Lesson in Cybersecurity Today
Egor Homakov found a security flaw in the Starbucks gift card payment system. His subsequent experience with Starbucks illustrates some of the key challenges associated with cybersecurity. It also...
View ArticleCybersecurity Insurance: Let the Buyer Beware
Headlines alerting businesses to the substantial potential losses associated with computer and data security breaches lead a growing number of businesses to turn to cybersecurity insurance coverage. A...
View ArticleEfforts to Force ISPs to be Global Copyright Police
An ongoing lawsuit in New Zealand raises the issue of whether or not Internet service providers (ISPs) should be required to serve as the enforcement authority for global copyright management....
View ArticleBig League Computer Hacking
Recent reports indicate that Major League Baseball has apparently suffered one of its most prominent computer hacking incidents. The United States Department of Justice and the FBI announced they have...
View ArticleApple Antitrust Settlement Payment Upheld on Appeal
On a 2-1 vote, the U.S. Court of Appeals for the Second Circuit upheld the antitrust ruling against Apple, Inc. In that case, the trial court determined that Apple’s electronic book pricing system...
View ArticleChicago Taxes Cloud Computing
Chicago recently extended certain existing city taxes to apply to some cloud computing services and content. The nine percent tax on Chicago residents is anticipated to raise approximately $12 million...
View ArticleRoboLaw: Automation of Legal Services
There has been much discussion on best practices for integration of technology into the practice of law through expanded use of software, social media, and mobile systems by lawyers as they interact...
View ArticleUnited Nations Appoints Its First Privacy Advocate
The United Nations Human Rights Council recently appointed its first dedicated privacy advocate. This appointment sends an important message regarding the significance of privacy rights in the digital...
View ArticleThe OPM Hack and the Challenge of Protecting Data Integrity
Since the discovery of the major data security breach involving millions of U.S. government personnel records allegedly executed with some involvement by Chinese interests, attention has been focused...
View ArticleN.Y. Court Denies Facebook Standing to Challenge Search Warrants for User...
Authorities in New York obtained and served search warrants for the Facebook accounts of 381 Facebook users. Facebook went to court challenging the validity of those warrants. The New York State...
View ArticleYet Another Data Security Challenge: Protection of Biometric Data
On a virtually daily basis, the headlines identify another data security risk or challenge. Among the most recently identified data security concerns is the problem of securing personal biometric...
View ArticleNSA’s EINSTEIN Surveillance Software: A Double-Edged Sword
For some time, the National Security Agency (NSA) has been using a sophisticated software system it developed, called EINSTEIN, for use in its surveillance activities. The NSA makes EINSTEIN available...
View ArticleAdvertising Injection: Another Source of Online Legal Controversy
Observers note that some Wi-Fi “hotspot” operators now use “advertising injection” systems to introduce ads into online content accessed through use of the hotspots. This process can be frustrating...
View Article“Beatlemania” Rocks Canadian Copyright Law
Until a few months ago, Canadian copyright law provided for entry of music recordings into the public domain after fifty years. Under that framework, some recordings created by notable artists...
View ArticleCourt Ruling Threatens Status of 50,000 Tech Visa Holders
An August 12, 2015 ruling of the federal district court in the District of Columbia could result in the loss of up to 50,000 visas currently held by foreign-born workers in the American technology...
View ArticleThe NFL and Data Mining: A Case Study in the Opportunities and Challenges of...
As this year’s professional football season begins, it is useful to consider reports that the National Football League has embarked on a process for aggressive collection and use of a wide range of...
View ArticleIs the Volkswagen Emission Scandal a Computer Crime?
The U.S. Environmental Protection Agency has cited Volkswagen for automobile emission violations and has ordered the company to recall approximately 500,000 of its cars for software modifications. The...
View Article
More Pages to Explore .....