Main Menu Back to Page
{ Banner Image }

Showing 78 posts by John W. Mashni.

Why Public WiFi is a Health Hazard

In the age of the mobile device, public WiFi is something that most of us will regularly use; whether in a coffee shop getting some extra work done or just waiting in an office area. The risks of this "free" commodity, however, are coming in faster than security specialists can deal with them. Read More ›

Categories: Cybersecurity, Did you Know?, Digital Assets

The Dangers of the DarkNet

When people think of the term "cybercrime", things like fraud and phishing scams commonly come to mind. Less known and discussed is the “DarkNet,” a digital underworld that is inaccessible to most and where illicit marketplaces exist for things like stolen identity information. Read More ›

Categories: Criminal, Cybersecurity

Wire Transfer Attacks are Increasing: Here’s What Companies Can Do to Prevent Them

In our fast-paced, interconnected business world, the ability to quickly, easily and safely wire money is essential. Companies rely on wire transfers to complete transactions and keep supply chains moving. But with this convenience comes risks. Read More ›

Categories: Cybersecurity

Supreme Court Strikes Down Provision of Lanham Act That Barred Registration of Disparaging Trademarks

The United States Supreme Court recently struck down a provision of the Lanham Act that denies registration of disparaging trademarks. Read More ›

Categories: Intellectual Property, News, Trademarks

Copyright is “In Fashion” Following Supreme Court’s Decision Upholding Protection for Cheerleading Uniform Design

Cheerleading UniformOn March 22, 2017, in a 6-2 decision, the U.S. Supreme Court affirmed a ruling by the Sixth Circuit Court of Appeals in the case of Star Athletica LLC v. Varsity Brands Inc. that two-dimensional graphic designs are entitled to copyright protection as “pictorial, graphic, and sculptural works” under the copyright law for useful articles under certain circumstances. It is the first time that the Supreme Court has addressed copyright protection for apparel, and the ruling bolsters legal protections for members of the fashion and apparel industries. Read More ›

Categories: Copyright, Intellectual Property

If You Think Consequences from a Cyber Data Breach Aren’t Real…Just Ask Target

CyberSecurityCyber attacks can be costly. Target recently reached a settlement with 47 states to pay $18.5 million, the largest multistate data breach settlement to date. In November 2013, Target's systems were infiltrated and 40 million customers' payment card information was stolen as was the personal information of 60 million customers. In addition to the settlement, Target paid for free credit monitoring services for consumers affected by the breach as part of a $10 million class-action lawsuit settlement.  Read More ›

Categories: Cybersecurity, News

Cyber-Security: It's Not If, It's When

We are all at risk for a cybersecurity breach. Speakers from Michigan State University, ASK and Foster Swift will help you determine the legal and technical processes you need to have in place. Learn more in this short video. Read More ›

Categories: Cybersecurity, News

Big Hollywood Studios Win Injunction Against Streamer VidAngel in Copyright Infringement Case

A big legal battle has been breVidAngel Logowing between upstart video streamer VidAngel and Hollywood heavyweights Disney, Warner Bros., and 20th Century Fox. So far, the studios have scored a clean knockdown, if not a knockout.

VidAngel describes itself as a family-friendly video streamer that allows users the ability to filter language, nudity and violence from movies and TV shows. Its business model involves selling new movies to customers for $20, allowing customers to select which snippets of content to edit out, and then buying movies back for $19. The price VidAngel will pay to buy back the content diminishes by a dollar for each day the buyer keeps it. In other words, VidAngel does not license the movies from the studios who hold the copyrights to the content like, for example, Netflix does.

The big studios took notice, and in June filed suit, alleging that VidAngel was operating as an “unlicensed [video on demand] streaming service.” Among other claims, the studios requested that the court grant an injunction blocking VidAngel from continuing to stream films. VidAngel fired back with counterclaims alleging antitrust violations by the studios. Read More ›

Categories: Copyright, Intellectual Property, Technology

Action Required to Keep Your DMCA Safe Harbor Protection

The U.S. Copyright Office recently implemented new rules (the “Rules”) governing the designation and maintenance of Digital Millennium Copyright Act (“DMCA”) agent information under a new electronic system. The Rules went into effect on December 1, 2016, so electronic designations should be filed as soon as possible. Service providers who fail to submit electronic designations will be ineligible for the safe harbor protections from copyright-infringement liability provided by the DMCA. Read More ›

Categories: Copyright, Intellectual Property, News

Assembling Your Company's Data Breach Response Plan

Business TeamNo matter how carefully, thoughtfully and diligently a company works to prevent it, data breaches happen. Company management, IT teams and outside consultants can do everything right and still end up dealing with a breach. That means that knowing how to best respond when (not if) a breach happens should be part of every company’s data protection strategy.

We recommend that every company assemble a security breach team, consisting of individuals inside and outside of the organization who possess different skill sets. This may include technology officers, as well as staff from IT, human resources, communications, legal departments, outside counsel, and outside vendors. The composition of the team will depend on the type and size of the organization, but each member should be in a position and have skills that enable the organization to quickly and properly respond to an incident. The team must also be equipped, authorized and empowered to evaluate and immediately react to an incident once it has occurred. Read More ›

Categories: HIPAA, News, Privacy, Technology