This article discusses the remedies for unauthorized access to email in the State of California. Now, email is an essential part of our lives and has been granted extensive protections in the state and federal spheres. Beyond that, it can occur in a variety of ways such as: (i) leaving…
Articles Posted in Technology
Who Are Script Kiddies?
There are few things that you consider when forming a cybersecurity framework. Naturally, chief among them are the perpetrators such as hackers who engage in mysterious online threats by constantly adapting to new technology. These hackers might seem indomitable, clever, and always working to break down security. Yet, this is…
Ransomware: Does A Tort Claim Apply?
In our last blog post, we mentioned eBay, Inc. v. Bidder’s Edge, Inc. While the case wasn’t related directly to ransomware, it creates an important precedent for tort liability. Specifically, it supports the idea that common law torts can be carried out and applied in the digital world. So, what…
What Are Ransomware Laws?
Now, we know what ransomware is and a little on how to fight against it. So, what are the applicable statutes and how can you recover? Naturally, after a person pays the ransom, or loses their data, they have been harmed by a violation. This could be potentially devastating to…
What Is Ransomware?
A business’s computer network, which may comprise of network and database servers, is the operation’s lifeline. A successful business should require its computer network to be secure and protected. There are many ways that these measures can go wrong. Yes, sometimes hackers can get in and access sensitive information (e.g.,…
Doxing: Is It A Violation of Privacy Laws?
In the last article, we ended our comments with anonymous online speech and the related complications. However, unmentioned before is an act that’s generally prohibited on websites, and indeed, it will probably be prohibited pursuant to state, federal, or international laws. This is “doxing” which is a practice of taking…
Reverse Engineering: Fair Use and Other Rights
Among the rights people have, many are unknown or unsung until there is a dispute and the courts get involved in the process. Rarely recognized is the right to reverse engineer under the Fair Use Doctrine and Digital Millennium Copyright Act. However, this is not an absolute right. Rather, it…
Digital Assistants
As we close out the year and enjoy the new technology from the holiday season, one piece of technology stands out as a forerunner. It is something that we’ve dreamed and written about to the point it is a staple in science fiction. An artificial intelligence that anticipates and responds…
Wearable Devices: Privacy and Security
Wearable devices become more popular as the holiday season approaches. Among various new technologies, there’s a focus on the idea of wearable devices, which include items like smartwatches, fitness trackers, and other electronic accessories that can help make life easier. However, with that comes the risk of privacy and security.…
Technology and Patent Lawsuits
For the uninitiated, motion sensors work on either the idea of cameras capturing motions, infrared light waves, or gyroscopes. Yet, even with this simple trio, this subject has led to a large scale of lawsuits based on patent violations. There are two major lawsuits to look at, one in the…