Most everyone knows about or at least has heard of bitcoin. However, not everyone understands the technology of bitcoin, which extends well beyond Internet-based currency. For the rock people, bitcoin is an Internet-based currency that allows for transparency with respect to each transfer of the currency. Each transaction is locked in a block, and blocks are connected to form ...
Protecting the data in electronic health records did not start with the advent of HIPAA, as many people think. Protecting health records has been a critical requirement in the healthcare space since the computers became a fixture in hospitals. However, HIPAA added public reports of fines issued for ...
Even though D-Link expressly promised that many of its wireless devices had the highest level of security available, the Federal Trade Commission last month filed a lawsuit that alleges otherwise. The FTC filing includes copies of online marketing materials and technical specifications for D-Link's ...
Laws usually are established after interpersonal or business activities collide with the real or perceived rights of others. After parties with different positions fight about who's right and who's wrong, legislatures create laws to solve the legal issues raised, and courts enforce them or create th...
Before the Internet, messages were spread by television and newspaper ads and highway billboards. Today that is done through social media. Virtually everyone knows about it, and many people use it. Does it make any sense that a U.S. government agency could violate any laws for using social media to ...
Not a day passes without mention of the Internet of Things in the media, as it appears to expand exponentially. Roughly 6.4 billion things will be connected to the Internet in 2016, at a rate of 5.5 million new things per day, according to Gartner. More than 20 billion devices will be in use by 2020...
The highest court in the EU last year ordered Google to allow individuals there to request that certain specific information not be reported in Google search engine results, citing their "right to be forgotten." Since that court ruling, hundreds of thousands of EU residents have requested that Googl...
Hardly a day goes by without a headline about a cyberintrusion. No entity is immune -- international retailers, airlines, hotels, mom and pop stores, cloud providers -- even the U.S. government. However, it seems that few businesses contemplate how important it is for their attorney to know and unde...
Sometimes before new employees leave their jobs to join your company, they copy valuable company secret information onto portable thumb drives or they send that information to their personal webmail accounts. As the new employer, you may be hiring those employees because they have valuable informati...
With the ever-increasing use of the cloud by more and more businesses, there is good reason to be concerned about legal risks, which are an inherent part of the cloud. The term "cloud" may be relatively new, but the concept of remote computing started more than 60 years ago, when Dartmouth Universit...
Daily
Several times a week
Occasionally
Never
I can't tell when apps use AI
Enter your Username and Password to sign in.