The Cybersecurity and Infrastructure Security Agency (“CISA”) released the second version of its cloud security Technical Reference Architecture (“TRA”) several months ago. CISA is the country’s cyber defense agency that works with other interagency partners to improve cybersecurity. The purpose of the TRA is to outline the suggested approaches to…
Articles Posted in Technology
Wire Fraud Laws – Part III
It’s a crime when you use interstate wire communications (e.g., phone, radio, television, internet) to engage in a scheme to defraud or to obtain money by false pretenses. Wire fraud is one type of cybercrime that takes place by using technology. In most cases, the culprit uses some kind of…
Big Data Rules and Regulations – Part III
A business organization has legal responsibilities when it comes to data access, control, and management. The government has recently issued an opinion regarding disclosure requirements for the so-called “inferred data” which comprise of internally generated inferences within the context of a consumer’s right of access request. California Civil Code Section…
Big Data Rules and Regulations – Part I
The term “big data” is generally used for the collection and analysis of a large amount of electronic data by using special and complex algorithms. The process is to analyze the correlation between large data sets which would not make sense independently. Now, another reason for its expansion is because…
Corporate Cybersecurity
It’s important to implement practical corporate cybersecurity measures especially in today’s volatile climate. The number of reported cyber threats are increasing as we progress and it will most likely continue on the same trajectory. All businesses and commercial enterprises are a target especially if they have access or control over…
Legal Issues Of Non-Fungible Tokens
Non-fungible tokens (“NFTs”) are unique digital items that have been a focus of the United States Securities and Exchange Commission (“SEC”) which is the federal government agency that enforces security regulations to protect investors. NFTs are made out of computer code and recorded on a blockchain ledger that can prove…
Is Non-Fungible Token a Security or Asset?
A non-fungible token (“NFT”) is a non-exchangeable unit of data that is stored on a blockchain and is transferrable to another party. In short, blockchain is a type of a digital ledger. NFTs can be related to photos, videos, or audio files. NFTs are not the same as cryptocurrencies because…
Social Media Litigation – Part III
Social media law comprises of several different components including free speech, privacy, online advertisement, and intellectual property rights. These issues come up regularly during the course of online transactions between parties. The courts have been inundated with social media litigation and have issued their rulings when faced with complicated problems.…
Social Media Litigation – Part II
Social media litigation can be caused or initiated for various reasons related to privacy violations, online defamation, internet harassment, contractual disputes, and intellectual property violations. Privacy violations take place when a company does not adhere to its terms of use or privacy policy. The terms of use and privacy policy…
Social Media Litigation – Part I
Social media litigation has become increasingly prevalent for obvious reasons. This is simply because multiple issues come up on social media websites and platforms. The objective of this article is to discuss them. Business entrepreneurs, owners, and operators, who have an online presence on various social media websites, such as…