Digital currency security and privacy laws are changing with time. We have mentioned transparency issues in previous articles. The fact that Bitcoin’s blockchain transactions are public and generally accessible can be beneficial when it comes to government investigations. Yet, it may not be the most secure platform for cryptocurrency transactions…
Internet Lawyer Blog
Bitcoin Security and Privacy Laws – Part II
Bitcoin has become a popular digital currency in the past several years. Its price has fluctuated tremendously in the past five years. And now, everyone is rushing into buying it by using various applications such as Coinbase. As always, the bad actors (i.e., hackers) are on the prowl to exploit…
Bitcoin Security and Privacy Laws – Part I
Digital currencies have become prevalent around the globe in recent times. There are various enterprises that are involved in the mining process which is now more difficult especially because it needs more computing power. Bitcoin’s price volatility is a major issue which has scared away investors. However, more importantly, are…
Predictive Policing Technology and Legal Issues
Predictive policing has been used to calculate and forecast future crimes. Yes, although it sounds quite futuristic, but it has been used by various private and public organizations. The City of Santa Cruz, California was one of the first state governments that tried to implement this technology in an effort…
United States Government Surveillance Programs – Part III
The National Security Agency (“NSA”) along with other government agencies (e.g., FBI, CIA) have expanded their surveillance programs after several terrorist attacks took place on domestic soil. It is a known fact that the federal government is systematically tracking domestic and international calls of its citizens. The surveillance program does…
United States Government Surveillance Programs – Part II
The governments of many countries have initiated surveillance programs to protect national security. These programs were allegedly designed and instigated to fight against terrorism and other criminal activities. For example, the British Government has setup a similar program to the United States government’s PRISM program which is called TEMPORA. The…
United States Government Surveillance Programs – Part I
The United States government has implemented surveillance programs to promote national security. These programs are designed to gather and process electronic information that could arguably assist government agencies in their efforts to enhance national security. However, there is an argument being made that the federal government is using the resources…
Cybersecurity Risk Management – Part III
Cybersecurity risk management has become a more challenging endeavor recently. It was never an easy task for commercial enterprises, but now that we’re facing a global pandemic and economic recession, there are additional challenges. At this point, most of our personal information is being transmitted and stored on the internet.…
Cybersecurity Risk Management – Part II
Cybersecurity risk management requires proper due diligence on the company’s cybersecurity program. This is an important aspect because the company’s executives owe a fiduciary duty towards their shareholders and customers. In other words, a company’s manager or director should take every reasonable measure to ensure the safety and security of…
Cybersecurity Risk Management – Part I
Cybersecurity risk management is a key component in avoiding cybersecurity incidents. Our law firm assists clients with breach response plans pursuant to the rules and regulations. An Incident Response Plan (“IRP”) should be carefully created to address cybersecurity incidents. There are strategic challenges with implementing an effective IRP within the…