Does a web site’s manipulation of publicly available positive and negative reviews rise to the level of extortion?
Subpoenas, Forensic Exams and Cyber Investigation: How to Identify Anonymous or Unknown Internet Posters
It is no secret that people are more comfortable publishing harmful statements on the internet when their identities are masked. As such, the sources of internet defamation and other online reputation attacks typically publish damaging content anonymously or pseudonymously.
On 10 September 2014, the Global Privacy Enforcement Network (GPEN) published the results of its privacy enforcement survey or “sweep” carried out earlier in 2014 with respect to popular mobile apps. The results of the sweep are likely to lead to future initiatives by data protection authorities to protect personal information submitted to mobile apps.
In addition to the networking technologies that NextEnergy is developing with its partners, NextEnergy is also developing vehicle charging and power systems that look to trim energy bills for both homes and businesses.
On September 23 and 24, 2014, the National Institute of Standards and Technology (“NIST”) and the Department of Health and Human Services Office of Civil Rights (“HHS OCR”) hosted their annual HIPAA conference “Safeguarding Health Information: Building Assurance through HIPAA security.”
When the defendants could not otherwise be located and served by paper, face-to-face, two Judges ordered service on Facebook since the defendants were in Turkey and Antigua.
On January 1, 2015, Delaware employers who dispose of records which contain the unencrypted personal identifying information of employees must take steps to ensure the privacy of such information. The bill, H.B. 294, was recently signed by Delaware’s Governor Jack Markell.
For those who think the podcast is best when we have a guest from the opposite end of the political spectrum, episode 35 should be a treat. (We’re late this week, but it will be well worth the wait.)