Given the internet is a multi-faceted environment, how can someone monitor his or her copyrighted content on the web? The internet has been called the “wild west” and yields limited regulations requiring lots of research, practice, and guidance to properly navigate its pathways. While self-tracking mechanisms can work in limited…
Articles Posted in Technology
Capital Records, LLC v. Vimeo
Now, that we know that Content ID exists, shouldn’t all online companies be held to that standard? As it currently stands, the law posits “not quite.” So, what standards are they held to? Surely, online content providers must take some reasonable measure to protect the copyrights of others. If not,…
What Is the Future of Internet of Things?
So, where do we go from here? After the Internet of Things was effectively used as a way to crash various online stores and services, it leaves us with the question of how can we fix this gaping hole in our security that would allow this new technology to continue…
Can Internet of Things Be Misused?
In recent years, we have all heard the expression before, but how does someone really “break the Internet?” Recently, an incident arose where a large network of electronic devices joined together resulting in a major interference with online businesses and services. Amazon, Netflix, and Yahoo, were hobbled temporarily due to…
Internet of Things: Is It Safe or Dangerous?
As it stands, the Internet of Things can be a dangerous proposition. Due to various hacking techniques, like rubber ducks, pineapples, and pivoting, one must wonder, if it can be hacked into, and if so, then what can we do about it? What about cars, planes, trains, and power plants?…
Avoiding Banking Fraud
Nowadays, we’re using the web for numerous purposes, including, but not limited to, online banking. So, we should be able to protect our financial information. There are many options for hackers to gain access to financial information, and without the prerequisite security, financial information can be accessed by hackers. The…
EU-US Privacy Shield
We’ve discussed the nature of this before, but the EU-US Privacy Shield has gone into full effect. This program essentially restricts the ability of U.S. commercial entities to do business in the European Union due to the ability of the U.S. government to use international businesses to improperly conduct surveillance…
Personal Image Protection
The internet with its “remix culture” often appropriates images and videos to create new things. Yet, this also includes personal images. Be it “Bad Luck Brian,” “Overly Attached Girlfriend,” or some exploitable image, how could one protect his or her personal image from being remixed and exploited for a financial…
Pokemon Go
In the current news is another emerging technology, which is called Augmented Reality. In general, augmented reality (“AR”) uses technology to artificially create the reality a person experiences. For example, this could be a pair of glasses that shows a person’s contact information when his/her face is seen, or mobile…
Clickwrap Agreements
In the current times, website design is a basic step for business operations. The design must be balanced, with attractive features and easy-to-use interface. The user interaction has to be accounted for, the visit locations, how the website flows. And with that, various user agreements are also in place to…