Close

Articles Posted in Government

Updated:

Protecting Against Data Breaches

The recent cyberattack on Anthem, Inc., one of the largest health insurance companies in the United States, illustrates the persistence and severity of the risk of data breaches. On February 4, 2015, Anthem confirmed that one of its databases had been hacked. The data breach exposed personal information of approximately…

Updated:

Moving Towards Net Neutrality

Net neutrality refers to the principle that Internet service providers and governments should treat all Internet traffic equally, regardless of the source. Among other implications, net neutrality includes the idea that a website should not be given the option to pay an Internet service provider a premium to speed up…

Updated:

Internet of Things, Privacy, Security and Related Issues

The Internet of Things (“IoT”) is the next evolution and is making a remarkable impact on technology and our way of life. In fact, the availability of an omnipresent network connectivity has fostered the widespread use of smart devices. Devices are now able to communicate with each other through embedded…

Updated:

eDiscovery, ESI, and Data Collection Guidelines

Electronic discovery (a/k/a “eDiscovery”) is the process of identifying, locating, preserving, collecting, preparing, reviewing, and producing electronically stored information in the context of the legal process. Electronically stored information (“ESI”) includes anything that can be stored in electronic form on a computer or other media device. A computer is defined…

Updated:

e-Residencies, e-States, And The Risk of Cyberattacks on Digital Societies

In recent times, e-residencies (a/k/a “electronic residency”) have become a trend in some European societies. For example, the Republic of Estonia implemented this concept into its banking systems in order to permit people to manage their funds in an electronic environment. According to the Information System Authority, in 2001, the…

Updated:

The JOBS Act: Crowdfunding Under Titles II and III

Since the 1930s, the act of publicly raising money for a startup business has been outlawed. Now, with the implementation of the Jumpstart Our Business Startups Act (“JOBS Act”), in 2012, public crowdfunding is legal and encouraged. Startup companies are no longer confined in the resources and opportunities available to…

Updated:

Cryptocurrencies and Crypto-Crowdfunding

It seems that entrepreneurs do not simply want to capitalize on local markets anymore.  An international impact is achievable with the connections available through internet and technology (e.g., e-commerce).  A startup company can now achieve that international presence by utilizing cryptocurrencies and crypto-crowdfunding.  Using cryptocurrencies allows a company to do…

Updated:

Data Mining and Privacy Concerns

Where you visit online seems to say a lot about you. Online privacy has been in the spotlight recently, as consumers come to terms with the reality that their online tracks define who they are to marketers and government agencies.  By studying this data, third parties can paint a picture…

Updated:

The Supreme Court Expands Electronic Privacy

In a decision released June 25, 2014, the United States Supreme Court held that law enforcement officials could not search a suspect’s cell phone or electronic devices as part of an arrest. In Riley v. California, the Supreme Court maintained that the officials would need to secure a warrant to…

Updated:

Protecting Corporate Trade Secrets

A corporation’s trade secrets are its lifeblood. Indeed, it is through this information that a company generates a profit and maintains its reputation in the industry. A trade secret includes any unique information that carries value. There are both state and federal laws which pertain to trade secrets. Unfortunately, federal…

Contact Us