Internet privacy laws have been implemented to protect us from legal violations. These laws are meant to protect us against cyber threats and data intrusions which are designed to extract personal or confidential information (e.g., intellectual properties, trade secrets) without authorization. Data privacy is paramount when it comes to the…
Articles Posted in Cybersecurity
Ransomware: What is it and what are the relevant laws?
In general, ransomware is a type of malware (i.e., malicious software) that is designed to take control of an electronic communication device, prevent its owner from accessing the electronic communication device, notify its owner that the electronic communication device has been held ransom, demand payment from the owner, and return…
Cloud Computing and Cybersecurity Laws
Cloud computing has become the normal protocol to store data for most individuals and businesses. The fact that online storage is cheaper these days has contributed to the expansion of this technology. There are numerous companies out there that provide cloud storage facilities which may be inside or outside of…
DMV Sale of Personal Information and TrueDialog Text Message Leak
Part I: DMV Sale of Personal Information A group has investigated and allegedly found that the California Department of Motor Vehicles has earned more than $50 million by selling personal information of drivers to third parties without consent. This data may include names, addresses, and registration information. The DMV claims…
Quantum Computing Technology and Legal Issues
Quantum computing technology will be affecting most of us in a direct or indirect way. We have stated in a prior article that: “A quantum computer is a highly-advanced computer system that works exponentially faster than today’s conventional computers. Quantum computing is the practice of studying quantum computers and their potential. This…
Spammers and Legal Issues
There have been cases where spammers have transmitted spam via email and text messages. These messages can include improper content, propaganda, hidden messages, and malware (e.g., virus, trojan, ransomware, adware, spyware). The spammers use the Internet Service Provider’s and user’s bandwidth to disseminate spam which results in bandwidth saturation, lost…
Internet of Things, Artificial Intelligence, and Smart Dust Technologies
Internet of Things is more extensive than the Internet itself. It constitutes the combination of all electronic devices that are connected on the web and are able to communicate with each other. It is different from the Internet because it is essentially governed by information that is stored by electronic devices…
Smart Dust: The Legal Issues
Smart Dust is a system of tiny microelectromechanical systems (MEMS) which include sensors or robots that are able to detect light, temperature, vibration, magnetism, or chemicals. They are usually operated on a computer network wirelessly and are distributed over an area to perform tasks by sensing through radio-frequency identification. The…
Update: Cyberhacking and Legal Issues
In the accelerating information frenzy of the modern world, the specter of hacking has become more threatening as technology progresses. For example, information is more accessible and vulnerable especially when it is valuable. Public and private institutions rely heavily on electronic communications and storage, which raises the stakes of a…
Fifth Amendment’s Application To Encryption and Biometric Information
In this article, we plan to discuss the Fifth Amendment implications of requirements to digitally identify oneself, for example by facial or thumbprint recognition. The spread of data-encryption services has made the retrieval of information more difficult for law enforcement officials. Over half the attempts the FBI made to unlock…