Search

Results 21-40 of 84 for Peter S. Vogel .
TECHNOLOGY LAW CORNER

More Things, More Cyberattacks

Not a day passes without mention of the Internet of Things in the media, as it appears to expand exponentially. Roughly 6.4 billion things will be connected to the Internet in 2016, at a rate of 5.5 million new things per day, according to Gartner. More than 20 billion devices will be in use by 2020...

TECHNOLOGY LAW CORNER

Taken to Extremes, ‘Right to Be Forgotten’ Is Like Burning Virtual Books

The highest court in the EU last year ordered Google to allow individuals there to request that certain specific information not be reported in Google search engine results, citing their "right to be forgotten." Since that court ruling, hundreds of thousands of EU residents have requested that Googl...

TECHNOLOGY LAW CORNER

DoJ: Firms Should Hire Cyber-Savvy Lawyers

Hardly a day goes by without a headline about a cyberintrusion. No entity is immune -- international retailers, airlines, hotels, mom and pop stores, cloud providers -- even the U.S. government. However, it seems that few businesses contemplate how important it is for their attorney to know and unde...

TECHNOLOGY LAW CORNER

The Perils of Employees’ Trade Secret Plundering

Sometimes before new employees leave their jobs to join your company, they copy valuable company secret information onto portable thumb drives or they send that information to their personal webmail accounts. As the new employer, you may be hiring those employees because they have valuable informati...

TECHNOLOGY LAW CORNER

The Cloud’s Threatening Legal Storm

With the ever-increasing use of the cloud by more and more businesses, there is good reason to be concerned about legal risks, which are an inherent part of the cloud. The term "cloud" may be relatively new, but the concept of remote computing started more than 60 years ago, when Dartmouth Universit...

TECHNOLOGY LAW CORNER

Your Lawyer Is Vulnerable to Cyberattacks

Lawyers help their clients as they negotiate confidential business transactions, hold intellectual property, manage funds and litigate disputes, among many other business activities. In the ordinary course of business, lawyers also maintain numerous confidential documents and data of and about their...

TECHNOLOGY LAW CORNER

Astroturfing’s Legality Is in the Weeds

We see it all the time: a glowing 5-star comment on Yelp about a restaurant. At first glance, it looks authentic. However, what if the review actually were purchased by the restaurant? Would that change your perspective on the review or the restaurant? Of course, paying for advertising is hardly new...

TECHNOLOGY LAW CORNER

It’s Time to Investigate Cyber Insurance

Almost every day there are reports of cyberintrusions, attacks and related security breaches. If your company does not have the right insurance, it could be even more of a disaster. For example, according to regulatory filings, at the time of Target's cyberbreach in 2014, it had about US$100 million...

TECHNOLOGY LAW CORNER

Yikes! Ransomware Could Take Over Your Hard Drive

Malware is running rampant on the Internet, affecting smartphones, tablets and personal computers. Relatively new malware allows bad guys to encrypt devices until a ransom is paid. Usually the ransom is required in bitcoin, rather than U.S. currency, as it cannot be traced. What are the legal and ...

TECHNOLOGY LAW CORNER

No One Has Privacy Now, Thanks to Super Cookies

Does anyone really think that we have any privacy? Probably not. Between GPS tracking and our favorite app, most of us gave up on privacy long ago. Some privacy advocates claim that cell carriers have not been transparent about what personal data they have been gathering and using, although we now k...

TECHNOLOGY LAW CORNER

LinkedIn Faces More Litigation for Doing What its Contracts Say It Will Do

LinkedIn has been a wildly successful social media business site for many years. It provides a free platform for millions of members to share professional experiences and for businesses to promote themselves. However, LinkedIn's financial success also makes it a target for lawsuits -- even suits tha...

TECHNOLOGY LAW CORNER

BYOD Privacy: Do Employees Have Rights?

The use of personal devices creates a privacy challenge. Employers want access to the devices, and employees want to protect their personal data contained on them. The term "devices" itself is deceiving. Many consider employee-owned devices to be smartphones and tablets, as the term "BYOD," or Bring...

TECHNOLOGY LAW CORNER

Google Autocomplete’s Brushes With Libel

Can an automated Google feature that ostensibly helps users with a search be a basis for libel? Courts in Germany, Italy and Hong Kong have had to field that question. Google's position is that there is no human intervention, and that its algorithm is based merely on what others have searched for, o...

TECHNOLOGY LAW CORNER

Do Facebook Searches to Show Disability Fraud Violate the Constitution?

Looking for evidence of disability fraud, the district attorney for Manhattan last year obtained 381 search warrants, supported by a 93-page affidavit, and served them on Facebook as part of a long-term investigation into a massive scheme. The search warrants were "sealed," which means they were not...

TECHNOLOGY LAW CORNER

Free Speech vs. Internet Privacy and the ‘Right to Be Forgotten’

The conventional wisdom of the Internet is that everything posted, whether on social media, a website or anywhere else, will be on the Internet forever. That conventional wisdom was just challenged successfully in a recent ruling handed down by the EU's highest court. A new conventional wisdom may a...

TECHNOLOGY LAW CORNER

The Tangled Web of IoT Security

The Internet of Things, or IoT, consists of "uniquely identifiable objects and their virtual representations in an Internet-like structure," according to Wikipedia. The IoT is "the network of physical objects accessed through the Internet," according to Cisco Systems. In addition to there being no c...

TECHNOLOGY LAW CORNER

The Internet and the Web in 2025

We are now living during a wave of social change, and we will not know how the Internet has affected society until we look back on it in the future. A great example of this: When Alexander Graham Bell obtained his patent for the telephone in 1875, no one could have foreseen that a lawyer from Texas ...

TECHNOLOGY LAW CORNER

The Increasing Business Risk of Cloud Cyberattacks

It is hard to figure out which is growing at a faster pace -- movement to the cloud or cybercrime. Cybercrime is following the data to the cloud, according to reports, to find and steal cloud data of hotel records, credit card information, and maybe even corporate secrets and the client files of law...

TECHNOLOGY LAW CORNER

Will Data Localization Kill the Internet?

In the wake of revelations that the U.S. and UK governments regularly monitor private communications, a number of countries are considering a new type of law called "data localization." In the simplest of terms, data localization laws would require that businesses that operate on the Internet -- inc...

TECHNOLOGY LAW CORNER

Internet Crimes Led to Long Jail Sentences in 2013

With all the headlines about Internet cybersecurity breaches, there seem to be few headlines about the consequences for cybercriminals. That is because not all cybercriminals are caught, and when they are it often takes months, if not years, before trials. Even when the cybercriminals plead guilty,...

E-Commerce Times Channels