Close

Articles Posted in Technology

Updated:

What Is Ransomware?

A business’s computer network, which may comprise of network and database servers, is the operation’s lifeline.  A successful business should require its computer network to be secure and protected.  There are many ways that these measures can go wrong.  Yes, sometimes hackers can get in and access sensitive information (e.g.,…

Updated:

Doxing: Is It A Violation of Privacy Laws?

In the last article, we ended our comments with anonymous online speech and the related complications.  However, unmentioned before is an act that’s generally prohibited on websites, and indeed, it will probably be prohibited pursuant to state, federal, or international laws.  This is “doxing” which is a practice of taking…

Updated:

Reverse Engineering: Fair Use and Other Rights

Among the rights people have, many are unknown or unsung until there is a dispute and the courts get involved in the process. Rarely recognized is the right to reverse engineer under the Fair Use Doctrine and Digital Millennium Copyright Act.  However, this is not an absolute right.  Rather, it…

Updated:

Wearable Devices: Privacy and Security

Wearable devices become more popular as the holiday season approaches. Among various new technologies, there’s a focus on the idea of wearable devices, which include items like smartwatches, fitness trackers, and other electronic accessories that can help make life easier.  However, with that comes the risk of privacy and security.…

Updated:

Augmented Reality v. Virtual Reality

In general, December is the month that yields a high volume of consumer activity, and the purchase of new technology devices. One of these is Virtual Reality (“VR”) technology, slowly trickling down from a niche market. However, it is not the only new reality-altering technology coming into the market, as…

Updated:

What is Content ID?

Given the internet is a multi-faceted environment, how can someone monitor his or her copyrighted content on the web? The internet has been called the “wild west” and yields limited regulations requiring lots of research, practice, and guidance to properly navigate its pathways.  While self-tracking mechanisms can work in limited…

Updated:

Capital Records, LLC v. Vimeo

Now, that we know that Content ID exists, shouldn’t all online companies be held to that standard? As it currently stands, the law posits “not quite.”  So, what standards are they held to? Surely, online content providers must take some reasonable measure to protect the copyrights of others.  If not,…

Contact Us