With the ever-increasing dominance of cameras in our society, we might never think to ask “can someone find me from a picture?” How futuristic would it be, to snap a picture of someone’s face and see their social media? To use a face like a business card? While technology may…
Articles Posted in Technology
Drone Laws – Part IV
In the future, drones may be a commonplace since businesses are using drones for commercial purposes, and individuals are flying drones as a hobby. You may wonder about your privacy with all those eyes in the sky. Drones that can go about, without giving you a way to stop them.…
Drone Laws – Part III
So far, we have discussed what licenses are necessary and how you will be using your drone. Surely, there can’t be more issues. Well, not quite. Following the issuance of drone licenses, there are restrictions on where and when these drones can fly. Be it for safety or for general…
Drone Laws – Part I
In our ever-evolving world, there are always new technologies and new opportunities. Why invest in a person when a machine can do the work for its useful life? Why hire a taxi driver when the car can drive itself? How could you pay for a helicopter or carrier fees when…
Copyright Protection of Computer Programs
Where are the limits of copyright? Copyright in general is limited to those new and original works, fixed in a tangible medium. In regards to computer programs, they are also considered literary works for the purposes of copyright law, and so, it could be argued that the language of a…
Uber Class Action Settlement Terms
A new economy has been developing for a while, opening a unique market, with new opportunities. This is what’s called the new “sharing” economy with an entrepreneur presenting a way to connect willing participants for an economic transaction. This has evolved from something like Craigslist, to a more user-friendly and…
FCC Proposes New Broadband Privacy Regulations
This one isn’t an April Fools’ prank. On April 1, 2016, the Federal Communications Commission (“FCC”) announced its proposed rulemaking to create regulation that would bind Broadband Internet Access Service (“BIAS”) providers in the interest of enhancing privacy towards consumers. This proposal has raised objections from AT&T, Comcast, USTelecom, and…
Apple v. Federal Bureau of Investigation – Part II
As we discussed in part one of this issue, during the late morning of December 2, 2015, a couple armed with weapons walked into a banquet room filled with people. At first, the attack was categorized as another mass shooting that ended in a large number of fatalities. As the…
Apple v. Federal Bureau of Investigation – Part I
On December 2, 2015, Syed Rizwan Farook and Tashfeen Malik, walked into a banquet room at the Inland Regional Center in San Bernardino, California, armed with semi-automatic weapons. At the time, the San Bernardino County Department of Public Health was holding a training event and holiday party. Approximately 75-80 people…
How to Detect and Address Online Counterfeiters
The Internet has become an important aspect in our lives. With the Internet, people can pay bills, make appointments, and buy or sell products. For example, websites like Amazon, Craigslist, and eBay allow the public to buy and sell products. So, due to the ease of e-commerce transactions, counterfeiters have…