Showing 10 posts in Privacy.
The days of carrying around a work phone and personal phone are quickly dwindling, if not already gone. Instead, businesses are implementing bring-your-own-device ("BYOD") policies that allow employees to access corporate information from their personal mobile device. On one hand, providing employees with mobile access to information increases productivity by allowing employees to work from anywhere. On the other hand, allowing corporate information to be accessed on devices that are mobile and capable of falling into the wrong hands produces a host of new security issues. This creates a difficult balancing act for employers who want their employees to be productive, but still want to maintain control over the information being accessed. Read More ›
Yes, the FTC can shut down your app. But you could also face stiff penalties for lack of compliance.
COPPA is the Children's Online Privacy Protection Act. The FTC has recently revised the rules regarding collecting personal information from children, and has set a date of July 1, 2013 as the deadline for compliance with the latest revised rule. The revision focuses on applications that collect personal information about children, such as photos, videos, and audio files containing the child's voice. Read More ›
We currently live in an era where our grandchildren will have access to everything we are currently posting online. In many ways, we are defined by our emails, pictures, Facebook likes, and tweets.
Typically, we make serious plans on who will get our houses, cars, money, and property when we die. But have you ever considered who will own – or control – your emails, online pictures, Facebook account, or social media profiles? Read More ›
Categories: Privacy, Social Media
Michigan’s new law, the Internet Privacy Protection Act (IPPA), protects employees, potential employees, students and applicants from giving employers and educators access to their personal social media accounts. Under the new law, accounts such as Gmail, Facebook, Twitter, Tumblr or Twitter are covered. Employers and school administrators can’t discharge, fail to hire or admit or otherwise penalize their current or potential employees or students for refusing their request. Read More ›
Categories: Employment, Privacy
Many people love having an application on their iPhone that can convert nearly anything they say into text. But what does Apple do with what you say to Siri?
Most people are unaware that everything you say to Siri is sent to a data center in North Carolina. It is sent to Apple in order to convert what you say into text. Read More ›
Let's revisit a previous posting regarding the scope of the Fourth Amendment in the digital era.
Last year, the Department of Justice requested the U.S. Supreme Court to approve the warrantless and covert attachment by law enforcement of a GPS tracking device to an individual's vehicle. The DOJ’s request arose from a U.S. Court of Appeals decision, which vacated the life sentence of a convicted drug dealer. In that case, the Court of Appeals held that law enforcement violated the individual’s Fourth Amendment rights by secretly attaching a GPS tracking device to the individual’s vehicle without a warrant. Read More ›
Facebook has reached a settlement with the Federal Trade Commission regarding charges that it violated users' privacy rights.
In December 2009, privacy advocates filed a complaint with the FTC following certain changes to Facebook privacy policies. Specifically, the FTC complaint alleged that Facebook made aspects of its users' profiles - such as name, picture, and friends list - public by default and without user consent. The FTC stated that such actions violated user expectations of privacy and threatened the "health and safety" of users by exposing "potentially sensitive affiliations" such as political views and sexual orientation.
The FTC complaint also alleged other situations where Facebook "made promises that it did not keep," such as promising that it would not share information with advertisers or retain data that it promised users was deleted. Read More ›
Categories: Privacy, Social Media
Cellular phones continue to play an increasing role in our daily lives, allowing us to stay "connected" 24/7. That "connectivity", however, blurs and erodes the traditional notions of privacy in an individual's daily life. Now, your boss, email, customers, and friends are never more than a button's push away. Read More ›
Categories: E-Commerce, Privacy
How would you like to have the weight of the U.S. Federal Government behind you in combating piracy of your product? And how would you like to have it for free? If you answered no to both, perhaps you should reevaluate your business acumen. For those who answered in the affirmative, please read on.
The free service is offered through the Office of Intellectual Property Rights (OIPR) of the U.S. Department of Commerce. OIPR can assist your company in combating intellectual property piracy of your products. After you have secured your intellectual property protections at home and abroad and taken local enforcement steps through the administrative or legal process, OIPR will step in on your behalf and work with the foreign government to target, confiscate and destroy the piracy items. Read More ›
The Fourth Amendment protects an individual from unreasonable searches and seizures. As it stands today, unless an individual has a reasonable expectation of privacy, local and federal law enforcement are not required to obtain a warrant prior to conducting a search. Does a person reasonably expect that law enforcement will attach a GPS tracking device to a vehicle to clandestinely monitor that person’s every movement? The Department of Justice (DOJ) thinks so. Read More ›
Categories: E-Discovery, Privacy