Blog Posts Tagged with "Legal"
October 04, 2012 Added by:Jim Palazzolo
Is it the legal structure that makes it taboo, or the ambiguity of the target? What are the implications? Could a corporation accidentally set off a cyber flashpoint by attacking targets in other countries? And, is it an organization’s legal right, like an individual, to defend itself?
October 03, 2012 Added by:Ben Rothke
Social media makes it easy for organizations to find and retain customers and increase sales, amongst many other benefits. At the same time, it can expose an organization to significant and highly-expensive legal risks and issues, and find themselves at the receiving end of a subpoena...
October 03, 2012 Added by:Electronic Frontier Foundation
The Fourth Amendment has not kept up with technology. And a recent case decided by the Ninth Circuit Court of Appeals highlights the increasing way rights are adjudicated when it comes to data stored by other companies: through the service agreement a user enters into with a company...
September 30, 2012 Added by:Thomas Fox
The backbone of the revision process is how your company captures, collaborates and preserves “all of the comments, notes, edits and decisions during the entire project," and you should assess “the best application to launch your Code and whether it includes a certification process..."
September 30, 2012 Added by:Electronic Frontier Foundation
Congress needs to know that the Internet is watching and that users won’t sit on the sidelines as technology intended to connect us and bring knowledge to people worldwide is turned against us for the purposes of censorship and surveillance...
September 27, 2012 Added by:David Navetta
The CFAA only permits claims for accessing a protected computer “without authorization” and “exceeds authorized access” “only when an individual accesses a computer without permission or obtains or alters information on a computer beyond that which he is authorized to access...”
September 26, 2012 Added by:Thomas Fox
Compliance violation perpetrators will often grow the fraud in magnitude, sometimes increasing the number of participants. They will rarely cease on their own accord. This fits into Sir John’s analysis of the everyman of battle: What they did and how they did it...
September 25, 2012 Added by:Electronic Frontier Foundation
EFF and other digital rights advocates are continuing to fight for Do Not Track, a one-click browser-based signal users can turn on to tell websites not to track their online browsing habits. In this article, we’ll be reviewing recent Congressional hearings about online tracking...
September 23, 2012 Added by:Electronic Frontier Foundation
The House voted to renew the dangerous FISA Amendment Act which hands the NSA broad, warrantless surveillance powers for another five years. Sadly, the House refused to add any oversight powers or privacy protections, despite evidence the NSA has used it to spy on Americans...
September 20, 2012 Added by:Electronic Frontier Foundation
Since its origins in 2008, Freedom Not Fear has developed the general message: fundamental rights like privacy, free expression, due process, and democratic participation are jeopardized when reactionary, fear-driven surveillance systems penetrate our societies...
September 19, 2012 Added by:Tripwire Inc
The grey hat is more interested in the “how” than the “why”. There is a respect for the black hat's technical abilities, while keeping a wary eye on them. Some grey hats have had run ins with the law, not due to being malicious, but because curiosity got the best of them...
September 19, 2012 Added by:David Navetta
The BYOD movement, barring a black swan event, is likely to continue to gather steam – though not without detractors. And as the Toolkit notes, BYOD remains a nascent movement with real concerns and numerous issues to be worked through, along with the establishment of new practices...
September 12, 2012 Added by:Electronic Frontier Foundation
"Disciplines related to IPR could impact how people gain access to the Internet and could constrain what people may say online or how they can collaborate and share content. It is imperative that the IPR chapter of the proposed TPP agreement not inappropriately constrain online activity..."
September 11, 2012 Added by:Thomas Fox
Big banks are not doing too well these days in the compliance arena. From money-laundering operations for drug cartels to trading losses, big banks seem to be more in the news these days for compliance failures rather than successes...
September 10, 2012 Added by:Electronic Frontier Foundation
After a year control over dajaz1.com was handed back to the owners with no apology and no explanation. It is disturbing enough that DHS has been acting as the tax-funded hired gun of the content industry, but, even more horrifying it censored the wrong targets for no good reason...
September 09, 2012 Added by:David Navetta
Maine has been one of the most aggressive states to pursue widespread implementation of smart utility meters for customers throughout the state, but not all utility customers have embraced smart meters despite consumers concerns over privacy issues...
Bridging the Cybersecurity Divide, Why Secur... leijon 19 on 02-28-2015
Seven “Sins” of Cyber Security... Andrew David on 02-28-2015
Today's Mobile Device Data Protection Must G... leijon 19 on 02-28-2015