Close

Articles Posted in Technology

Updated:

SMS Advertising Spam

Under the Telephone Consumer Protection Act, commercial entities are barred from freely soliciting customers using a short message service (“SMS”). A SMS typically allows vendors to send short text messages to consumers’ mobile phones. In this case, vendors send text messages to customers, or potential customers, advertising their deals and…

Updated:

FTC Adopts Amendments to the Child Online Privacy Protection Act

In 1998, Congress passed the Children’s Online Privacy Protection Act (“COPPA”) to ensure online privacy for children under the age of thirteen. Under this Act, online operators must obtain parental consent before they begin to collect information about online users under the age of thirteen. The Federal Trade Commission (“FTC”)…

Updated:

Cloud Computing and Privacy Laws

The proliferation of cloud computing has given rise to increased privacy concerns. These concerns are especially grounded in Google’s new terms of service that allow the company to gather user information and data and release it to government entities upon request, without obtaining user consent. According to these new terms,…

Updated:

Digital Estate Planning

The Electronic Communications Privacy Act of 1986 (“ECPA”) prohibits disclosure of stored communications without a court order. This includes instant messages, emails, and communications on Facebook. The issues that can arise from such a standard came to light in 2005, when Loren Williams died in a motorcycle accident in Arizona,…

Updated:

Access to Websites for Persons With Disabilities

The Americans with Disabilities Act (“ADA”) requires public businesses to provide equal access to their venues for persons with disabilities. Under Subchapter III of the ADA, such public establishments include, among others, restaurants, movie theaters, stores, and places of education. Now, the increases in businesses that operate exclusively online, without…

Updated:

Legal Implications of Online Impersonation

The possibility of identity theft is a growing concern. However, banks, credit card companies, and various other institutions that house private information regularly take steps to protect customers’ identities. Nonetheless, a different type of identity theft continues to thrive. Online impersonation is a quick and easy form of identity theft…

Updated:

Cyberbullying

Bullying has plagued people of all ages for many generations. Now, with the expansion of the Internet, bullies are able to threaten and harass people at an even greater level through cyberbullying. Stopbullying.gov, a government supported website aimed at spreading awareness, defines cyberbullying as any bullying that involves electronic technology…

Updated:

Cloud Computing

Cloud computing offers a revolutionary new way to conduct business over the Internet. This service is a form of cyber-outsourcing where virtual servers provide certain services or applications for consumers online. Cloud computing vendors include, IBM SmartCloud, Cisco Cloud Computing, Amazon Elastic Compute Cloud (aka Amazon EC2), and various smaller…

Updated:

Privacy Concerns for Personal Email Accounts

Former CIA Director David Petraeus from his position after the FBI looked through Petraeus’ private Gmail account and discovered that he was having an extramarital affair. These events have brought to light the fragile state of individual privacy on the Internet, particularly in relation to individual email accounts. According to…

Updated:

Facebook Pictures and Privacy Concerns with Facial Recognition Technology

Facebook is struggling to decide how to handle its pictures. While consumer companies urge Facebook to profit from its face recognition technology, international regulators insist that user identities remain protected. According to a New York Times article entitled, Facebook Can ID Face, But Using Them Grows Tricky, Facebook agreed to…

Contact Us