Close

Articles Posted in Technology

Updated:

What Is A Virtual Currency?

The legality of certain virtual currencies can be murky.  While some currencies, like Bitcoin, can be readily traded for goods and services, however, other virtual currencies remain where regulation is more questionable. To that point, the curators of digital economies have hired economists to better model the value of these…

Updated:

The Growing Problem of Identity Theft

Identity theft is an epidemic impacting people across America. During 2016, an estimated 15.4 million consumers experienced some kind of identity theft. This is an increase from 13.1 million in 2015. Another staggering statistic is that 1 in every 16 adults in the United States is a victim of identity…

Updated:

OneLogin Security Breach

OneLogin recently suffered from a major security breach. This breach has compromised private and confidential information, which is managed by its datacenter. OneLogin provides a service that is used by organizations to secure their data. It is basically a password manager for corporations. It allows employees, customers, and partners to…

Updated:

Facebook v. Power Ventures: Unlawful Access To Computer Networks

After this month’s discussion on the statutes that prohibit the unauthorized access of email accounts and digital assets, one might wonder how these statutes may apply in a case. However, in the lengthy saga of Facebook v. Power Ventures, the Ninth Circuit issued a determination giving a bright line example…

Updated:

Fiduciary’s Access Rights To Decedent’s Digital Assets

What happens to a person’s digital assets when he or she passes away? They still have email, social media, and bank accounts.  This could be an uncomfortable topic.  However, any unauthorized access to a person’s online account that is password protected will constitute a violation of state or federal law.…

Updated:

Unauthorized Wiretapping Laws

In addition to California’s precautions against unauthorized email access, there are additional Federal measures to protect privacy. Compared to state measures, this gives another way for an individual to seek legal remedies in a federal court. This is broken up into three different statutes, as part of the Electronic Communications…

Contact Us