Over the next five years in the United States, thousands of drones are expected to be deployed for an array of commercial and governmental purposes.
Movie ticket seller Fandango and financial management service Credit Karma have agreed to settle the Federal Trade Commission’s allegations that the companies misrepresented the security of their mobile apps and failed to secure the transmission of millions of consumers’ sensitive personal information from the apps, the agency announced last week.
Fox Rothschild LLP is excited to announce that Data Breach 411, an iPhone app that delivered a comprehensive resource on state breach notification statutes and related materials, was named one of BigLaw’s best new mobile apps for 2014.
The American Bar Association’s annual technology conference was held in Chicago last week, and one session was entitled, “Tools for lawyers worried that NSA is eavesdropping on their confidential conversations.” While I think most of the conversations I hold with my clients would be pretty boring stuff for the NSA, there are a few occasions where a client consults with me as to whether certain behavior or actions may be construed as criminal in nature.
The Nevada State Bar (the “Bar”) has confirmed that “criminals” forced their way into storage facilities maintained by the Bar related to past bar exam applicants and made off with “18 records of individuals.” The loss appears to have been first reported here at databreaches.net. It does not sound like much, but databreaches.net further reports that at least one case of identity theft has been confirmed.
Google held true to its promise to seek SCOTUS review of the Ninth Circuit’s interpretation of the term “radio communications” in the Wiretap Act when it filed its Petition for Certiorari last week
As part of its increased focus on combating cybercrime, the U.S. Department of Justice is pushing to loosen requirements for obtaining search warrants in order to allow them greater freedom to hack into the computers of criminal suspects.
The Internet of Things (IoT) is the network of everyday physical objects that surround us and are increasingly being embedded with technology to enable those objects to collect and transmit data about their use and surroundings. In the new world of the IoT, the possibilities are enormous, and the technology industry has so far only scratched the surface of what “machine-to-machine” (M2M) interconnectivity could achieve.
In January 2014, a massive data leak of some 104 million credit card accounts shocked South Korea. The number of affected accounts was twice the number of the population of South Korea’s. The incident arose when a temporary employee of a personal credit rating agency that manages personal financial data of customers of three major credit card companies allegedly copied personal credit details of millions of people on his portable disk drive and subsequently sold the information to loan marketers and brokers.