When hackers breached the e-commerce firm Zappos in January, they may have compromised the personal information of as many as 24 million users. Legislatures in several states, including California, have responded to attacks such as this one by passing laws enhancing cybersecurity investigation and enforcement, and increasing requirements for disclosure…
Articles Posted in Technology
Internet Piracy Results In Arrests In New Zealand
Megaupload.com was among the world’s biggest file-sharing sites with 150 million registered users and about 50 million hits daily. It was big enough that it earned founder Kim Dotcom $42 million in 2011. The movie industry objected that the site was making money off pirated material; even though, Megaupload is…
Michelle Obama Is Officially Live On Twitter
Michelle Obama is officially live on Twitter. The first lady’s Twitter feed went live on Thursday and her link is being managed by the president’s re-election campaign. The first two tweets came from the campaign staff and described the account as “a new way for you to connect with First…
Facebook Refers to Its Users As Public Figures
In California, a new Facebook feature which permits an advertiser to publish or broadcast a user’s “like” of its product to others in that individual’s circle is under scrutiny. The United States District Court in San Jose, California refused to grant a motion to dismiss which states that Facebook ads…
California Online Harassment Laws
In the recent years, online harassment or cyberharassment has become an important issue. This is because the Internet has changed our lives on so many levels. Generally, the law prohibits harassment and our readers should consider taking certain precautions when being harassed. Cyberharassment is different from cyberstalking because it does…
California Cyber Stalking and Harassment Laws
In California, the stalking laws are included under Section 646.9 of the Penal Code, which states that any person who willfully and maliciously, and repeatedly follows or harasses another person and who makes a credible threat with the intent to place that person in reasonable fear for his or her…
CAN-SPAM ACT
If you use email in your day-to-day business operations the CAN-SPAM Act is a law that sets the rules for commercial email. It also establishes the requirements for commercial messages, provides recipients the right to have the sender stop emailing them, and mentions the penalties for related violations. The CAN-SPAM…
Cyberstalking, Cyberharassment and Cyberbullying Laws
In light of the circumstances, numerous states have enacted “cyberstalking” or “cyberharassment” laws or currently possess laws that specifically include electronic forms of communication within more traditional stalking or harassment laws. In addition, many states have enacted “cyberbullying” laws in reaction to issues related to protecting minors from online bullying…
Samsung Enters Into a Legal Battle with Apple Over iPhone 3G Patents
Samsung Electronics, the second largest maker of mobile phones, claims that Apple Inc. has infringed upon its patents since entering the mobile-phone market with the iPhone 3G, a lawyer for Samsung told a Dutch court as the Korean company seeks a ban on some Apple products in the Netherlands. “Apple…
Politically-motivated hackers release sensitive information
In the recent years, politically-motivated hackers have made sensitive information available to bloggers and mainstream media at unprecedented rates. For example, Wikileaks released leaked Afghan war logs and government diplomatic cables. Anonymous individual hacked and released emails from the computer security firm HBGary. A college student gained access to and…