Close

Articles Posted in Technology

Updated:

Business Email Compromise: A Growing Threat to Businesses

Business email compromise (“BEC”) is a type of cyberattack that targets businesses and organizations by manipulating email accounts to conduct fraudulent activities. This type of attack has been on the rise in recent years, with the FBI reporting that BEC scams have cost businesses over $26 billion in losses since…

Updated:

Artificial Intelligence Technology: Legal Implications and Challenges

Artificial intelligence (“AI”) technology has been rapidly advancing in recent years, with many new and exciting applications emerging in various fields. However, the use of AI also raises important legal questions and challenges. In this article, we will explore some of the key legal implications and challenges associated with AI…

Updated:

Artificial Intelligence and ChatGPT

Artificial intelligence is here and will continue to grow across various industries. This type of technology allows intelligent machines to think like humans and take over human-like tasks. The fact that intelligent machines can conduct human-like tasks such as answer phone calls, quickly analyze complex information, drive vehicles, or fly…

Updated:

The Computer Fraud and Abuse Act

The Computer Fraud and Abuse Act (“CFAA”) amends the federal criminal code to change the scienter requirement from “knowingly” to “intentionally” for certain offenses regarding accessing the computer files of another. It revises the definition of “financial institution” to which the financial record provisions of computer fraud law apply. It…

Updated:

Ireland’s Data Protection Commission Fines Meta Platforms

Ireland’s Data Protection Commission (“DPC”) has reached its final decision related to Meta Platforms Ireland Limited (“MPIL”) which is Facebook’s data controller in that country. The DPC announced last month that it will be imposing a fine of €265 million against the company and will issue a set of corrective…

Updated:

CISA Releases Cloud Security Technical Reference Architecture

The Cybersecurity and Infrastructure Security Agency (“CISA”) released the second version of its cloud security Technical Reference Architecture (“TRA”) several months ago. CISA is the country’s cyber defense agency that works with other interagency partners to improve cybersecurity. The purpose of the TRA is to outline the suggested approaches to…

Updated:

Big Data Rules and Regulations – Part III

A business organization has legal responsibilities when it comes to data access, control, and management. The government has recently issued an opinion regarding disclosure requirements for the so-called “inferred data” which comprise of internally generated inferences within the context of a consumer’s right of access request. California Civil Code Section…

Updated:

Big Data Rules and Regulations – Part I

The term “big data” is generally used for the collection and analysis of a large amount of electronic data by using special and complex algorithms. The process is to analyze the correlation between large data sets which would not make sense independently. Now, another reason for its expansion is because…

Contact Us