The European Commission released its first annual review of the current EU-US Privacy Shield in order to determine what may or may not need changes as a matter of policy. As it currently stands, the Privacy Shield creates enforceable protections for European Union residents regarding the use of their personal…
Articles Posted in Internet Law
Internet Commerce and GDPR
In general, internet commerce transpires on the national and international levels. Naturally, data protection is an important concern for private and public agencies. The European Union’s remaining members are currently in the process of another process to protect data with the “General Data Protection Regulation” (GDPR) set to take effect…
Artificial Intelligence and Copyright Laws
A question for you to consider: Imagine a world where music is created by a random set of numbers. Who owns the music? Is it the programmer? Is it the user who gave specifications for the music? It’s certainly an odd question to ask, and unsurprisingly, one without a clear…
The Equifax Breach: Part Four Analysis
As the Equifax breach continues to become a complicated issue, certain lessons can be learned for other businesses handling personal information. Namely, what not to do in their business operations? In the wake of the cybersecurity breach, it had been reported that Equifax was aware of the security gaps, and…
The Equifax Breach: Part Three Analysis
As the Equifax breach has developed recently, another issue has come up, namely the arbitration provision within its website, which has caused consumer outrage and confusion. So, why does this provision matter? If consumers want to get their credit frozen, or check to see if they were affected, surely Equifax…
The Equifax Breach: Part Two Analysis
Let us move on to the ways to protect ourselves in the future by using a credit freeze or fraud alert. These options can protect your personal, private, and confidential information after a security breach and effectively add extra protection against identity theft. We have discussed them briefly in the…
The Equifax Breach: Part One Analysis
Equifax presents an interesting question to consumers. Somehow, an entity that no consumer may have had an actual interaction with has their information, and had leaked it out onto the world. For example, names, phone numbers, credit card numbers, social security numbers, addresses, e-mails were collected and released to unauthorized…
Internet Scams: What Are Your Options?
You may have been considering legal actions due to a recent internet scam. Or, you may be wondering what other options you may have for dealing with the issue outside of the legal sphere. Naturally, legal recourse may provide financial or equitable remedies (e.g., temporary restraining orders) but usually there…
What Are Online Scam Factors?
So, despite your best efforts, you may have been cat-fished, doxed or otherwise victim to an online scam. Your information is probably now out into the Internet and a stranger that you may have trusted now has personally identifying information. So, your next question may be “well, what comes next?”…
What Are Catfishing Motives?
Now that we’ve discussed Catfishing as a scam, let’s go into further detail regarding the motives. Like any scam, there must be some benefit to the scammer. This benefit is the primary motive for anyone to commit a catfishing scam. Previously, we mentioned that among other things, the perpetrator may…