Technology Law Blog

Showing 15 posts in Privacy.

Protect Your Business From Competitive Intelligence

Chess GameThe term "competitive intelligence" is the process of legally gathering information about one's competitors to gain a strategic advantage in the marketplace. Large corporations will have strategic intelligence experts as a part of their marketing department. These experts specialize in discovering promotional activities, sales figures, and other information about the company's competitors. Ideally, strong competitive intelligence enables a company to predict the strategy of a competitor and adapt with a strategy of its own that will result in an advantage in the marketplace.

The good news is that small and medium-sized businesses are not usually the targets of professional competitive intelligence experts. However, a business owner would be wise to protect itself from amateur intelligence gathering by its competitors. Competitive intelligence gathering begins by identifying the strategy of your own business and how your competitor's strategy will interfere. Then the intelligence gathering begins.  Read More ›

Categories: Privacy, Social Media

Police Officers Can Force You to Unlock a Phone with Apple's Touch ID Technology

Did you know that one court has ruled that a police officer can force a person to unlock a phone with Apple's Touch ID technology? Understand the risks with enabling this feature on your phone. Check out the story here.

Categories: News & Events, Privacy

Is customer e-mail data maintained by US companies on overseas servers subject to US jurisdiction?

Microsoft may soon find itself being held in contempt of court after refusing to abide by a U.S. District Court Order, requiring it to produce customer e-mail data stored by the company in Dublin, Ireland.  The United States Department of Justice previously sought and obtained a search warrant for the production of customer e-mail data maintained by Microsoft as part of a criminal investigation relating to narcotics trafficking.

Judge Loretta Preska, chief judge of the United States District Court for the Southern District of New York, ordered Microsoft to produce the e-mail data in July, finding that, although the data was held overseas, it remained under Microsoft’s possession and control, over which the court maintained jurisdiction. Microsoft has yet to comply, claiming that the court lacks jurisdiction over the foreign e-mail data. The judge has since imposed a Sept. 5 deadline for the parties to inform the court on how they plan to proceed. Read More ›

Categories: News & Events, Privacy

Cincinnati Who-Dey Ruling is Big Deal for Internet Commerce: Website immune from Ex-Bengals Cheerleader’s Defamation Lawsuit

The gossip website, thedirty.com, is immune from liability for online posts about an ex-Bengals Cheerleader’s sexual promiscuity and acquiring a sexually transmitted disease. In a closely followed decision from a case that has generated considerable media coverage because of its potential to chill online speech and hold internet websites such as Facebook, Twitter and newspaper sites liable, which allow third party users to post content, was reversed. The U.S. Court of Appeals for the Sixth Circuit recently overturned a jury verdict of $338,000 against gossip website thedirty.com and its owner Nik Richie. Sarah Jones v. Dirty World Entertainment Recordings LLC arose after Sarah Jones, a former Cincinnati Bengals cheerleader and teacher who was subsequently convicted of having sex with a high school student, sued the website after it posted unflattering information about her sexual promiscuity with football team players, she demanded the posts be removed, and the website refused. She filed state law tort claims for defamation and privacy torts and won at trial. The defendants appealed. Read More ›

Categories: First Amendment, Privacy, Social Media

How Secure Is Your Cloud?

Business owners are increasingly turning to cloud storage as an alternative to maintaining their own servers. The three most popular cloud storage services are Dropbox, Google Drive and SkyDrive. Each service comes with a specific amount of free storage and allows users to upgrade for a fee. For a helpful comparison of these three choices, see here. Cloud storage providers are promising upgraded security, but there are certain steps business owners can take themselves to protect their data. Read More ›

Categories: Cloud Computing, Privacy

BYOD: Balancing Data Security with Employee Privacy

The days of carrying around a work phone and personal phone are quickly dwindling, if not already gone. Instead, businesses are implementing bring-your-own-device ("BYOD") policies that allow employees to access corporate information from their personal mobile device. On one hand, providing employees with mobile access to information increases productivity by allowing employees to work from anywhere. On the other hand, allowing corporate information to be accessed on devices that are mobile and capable of falling into the wrong hands produces a host of new security issues. This creates a difficult balancing act for employers who want their employees to be productive, but still want to maintain control over the information being accessed. Read More ›

Categories: Employment, Privacy, Regulatory

Can the FTC Shut Down Your App?

FTC buildingYes, the FTC can shut down your app. But you could also face stiff penalties for lack of compliance.

COPPA is the Children's Online Privacy Protection Act. The FTC has recently revised the rules regarding collecting personal information from children, and has set a date of July 1, 2013 as the deadline for compliance with the latest revised rule. The revision focuses on applications that collect personal information about children, such as photos, videos, and audio files containing the child's voice. Read More ›

Categories: Privacy, Regulatory, Social Media

Is There a Digital Afterlife?

Social media iconsWe currently live in an era where our grandchildren will have access to everything we are currently posting online. In many ways, we are defined by our emails, pictures, Facebook likes, and tweets.

Typically, we make serious plans on who will get our houses, cars, money, and property when we die. But have you ever considered who will own – or control – your emails, online pictures, Facebook account, or social media profiles? Read More ›

Categories: Privacy, Social Media

Michigan’s New Law Protects Online Privacy

Social MediaMichigan’s new law, the Internet Privacy Protection Act (IPPA), protects employees, potential employees, students and applicants from giving employers and educators access to their personal social media accounts. Under the new law, accounts such as Gmail, Facebook, Twitter, Tumblr or Twitter are covered. Employers and school administrators can’t discharge, fail to hire or admit or otherwise penalize their current or potential employees or students for refusing their request. Read More ›

Categories: Employment, Privacy

Does Apple’s Siri Record and Store Everything You Say?

Picture of Siri on iPhoneMany people love having an application on their iPhone that can convert nearly anything they say into text.  But what does Apple do with what you say to Siri?

Most people are unaware that everything you say to Siri is sent to a data center in North Carolina.  It is sent to Apple in order to convert what you say into text. Read More ›

Categories: Privacy