Internet of Things Security Claims

Internet of Things security claims have caught the attention of lawmakers and regulators. The Internet has been interesting to follow and work with as a realm of process and information exchange.  As the devices used to transmit information increase in our lives and work, protecting what is transmitted from unwanted eyes is not necessarily going…

Website Safe Harbor Copyright Notice Designation

Website safe harbor takedown requirements by the Copyright Office is soon to undergo changes.  According to the Copyright Office, it is the responsibility of a website owner or online service entity to make it easy for a copyright holder to contact the website regarding the possibility of content infringement.  The agent designation requirement[1] process form,…

Online Contracts Consent and Choice of Law

Online contracts trip the line that draws on possible arguments for applying the choice of law principles.  Platform terms of service, though frequently updated, may not be providing appropriate notice to inform the public user.  Data collection practices of social media platforms for purposes of claimed efforts to provide enhanced services to the user public…

Social Media Self-Modification

Self-Modification by social media platforms has struggled to ensure that the Internet is acceptable to all cultures, religions, political persuasion, and to all values of countries.  This exercise in Internet Governance is tall and detailed and comes under criticism for being too heavy handed towards exercising censorship.  Though easy to say, it becomes difficult to…

Music Access Going Offline

Music Access in time past was always a concern for the nostalgic music enthusiast, especially the desire to hold on to music treasures from one’s growing up years. There was the concerned about scratching and breaking and not being able to find another issue.  The digital innovation has liberated the music industry allowing for creative…

Music Appropriation Issue

The issue of music appropriation of culture e in music is controversially discussed raising concerns for the use of culture as backdrops.  The argument goes that as an artist unveils the video of music scenes appear of a particular culture and people of that particular region.  The criticism is with the prop effects of the…

Cyber Security Events and Lessons of 2015

The process of cyber security is an everyday occurrence in every entity, from government to small and large enterprises.  A handful of events took place in 2015, each shedding a lesson or two going forward.  Counseling clients on requirements always involves sharing best practices, despite them not being a guarantee.  But always the focus is…

Copyright Challenge – Ideas and Expression

Copyright for many individuals appears to be anything they write, express, or present on paper.  By putting content on a book one assumes it’s copyrightable, whether it is text, photos, or drawings.  For a yoga studio in California this was the mindset.  That which they organized together in the form of photos displaying poses was…

Cybersecurity, Internet of things in the Last Quarter

Cybersecurity and internet of things did capture Capitol Hill in this last quarter of 2015, pardon the football metaphor, and needless to say net-neutrality as well.  With physical objects being interconnected and collecting user data and sharing data as well, regulators and privacy groups saw the improved efficiency accompanied with the torment of loss privacy…

Internet Freedom of Speech at Risk

Internet freedom of speech is not given the attention it merits while the EU ponders on its EU Data Protection Regulation.  Many rightfully fear that censorship is looming near and is nearer than one imagines.  While the General Data Protection Regulation (GDPR) has lingered since the 1990s, many countries have followed the EU aspiration of…

Cloud Access Security Broker

As service providers and developers seek to encourage cloud service adoption, the role of a cloud access security broker, i.e., CASB, is seen as central to the effort.  The efforts to arrive at standard practices for cloud data security processes, are essential operational benefits of employing a CASB.  The role of a CASB is enhanced…

Fate of the Internet

Life has changed with the Internet but it will change even more as the fate of the Internet is in court hands once again. The U.S. Court of Appeals for the D.C. Circuit will determine how Internet providers will change how we use the internet, what content will be permitted, and how we access and…

Copyright Basis

Copyright basis draws the question of whether copyright law is based on government granting a monopoly, if you will, vis-à-vis against any other potential entrepreneur.  Many see it that way and tend to deny copyrights having a proprietary property right for the creator of the work.  Historically the value of crafting an idea composed was…

Linking Defamatory Content Online

A case from Washington state dealt with online defamation from linking defamatory content online.  The court wrestled with the issues of proving defamation online.  The court articulated that the First Amendment freedom speech is to be protected and the courts hold to that as well when it comes to online speech and linking defamatory content.  In the era of…

Website Defamation Immunity

Website operators, either as defendants or plaintiffs have resorted to Section 230 of the Communications Decency Act (CDA) to determine website defamation immunity and defamation liability.  Under the Section 230, blogs or forums, for instance, benefit from website immunity from tort liability if the information was from a third-party.  That third-party could be a subscriber,…

Net Neutrality European Points

Net Neutrality European Points Net neutrality European points are going before the EU Parliament soon where several proposals will be weighed.  The concept of an open internet without restrictions on traffic, how the networks manage traffic and how traffic is categorized is being considered in the EU Parliament.  There is a draft regulation proposed expressing…

Security of Internet of Things

The security of internet of things is unknowingly pervading our everyday life.  Items that can be remotely accessed for information, turned on to operate, adjust their operation settings, and process into a network are all fraught with vulnerabilities.  Security of internet of things is just becoming news worthy to some and ignored by great majority.…

International Service of Lawsuits Via Email

International service of lawsuits via email is an option when the physical address of an international defendant is unknown.  According to the Hague Convention on the Service Abroad (Hague Convention), when the physical address is unknown the Hague Convention does not apply.  In practice, as long as the email address does not return an undeliverable…

Facial Recognition and Social Media

The use of facial recognition by social media platforms is drawing concern from European regulators.   The ramifications impinging on privacy by the social media networks’ use of facial recognition technology are foreseen as limitless.  For instance, facial recognition technology can identify Facebook friends to whom users can then forward the photos.  Canadian authorities share…