Technology Law Source

Archives: Information Technology

Subscribe to Information Technology RSS Feed

Verify your wires!

The FBI’s Internet Crime Complaint Center has released its 2018 annual report, which includes statistics that internet-enabled theft, wire fraud and exploitation were responsible for a staggering $2.7 billion in financial losses in 2018. If you are involved in transactional work, this can happen to you. Reports detail an increasingly common story of wire fraud accompanying … Continue Reading

The federal landscape on self-driving cars

Motivated by the unprecedented spike in automotive fatalities in 2015, mostly caused by human error, the United States Department of Transportation (DOT), through the National Highway Traffic Safety Administration (NHTSA), has embraced self-driving cars as a means to significantly reduce motor vehicle crashes. In so doing, the DOT stands behind developing a regulatory framework which … Continue Reading

FAA’s comprehensive new small UAS rules are here. How can they help your business?

On June 21, the Federal Aviation Administration (FAA) released long-awaited new rules for commercial, non-hobbyist small unmanned aircraft (sUAS) operations. The FAA’s press release about the new rules in part 107 of the FAA regulations is available here. FAA’s three-page fact sheet about the new regulations can be found at this link, and a 53-page … Continue Reading

Porter Wright announces the 2016 Technology Seminar Series

Porter Wright continues its tradition of providing cutting-edge information about how technology affects your business with the 2016 Technology Seminar Series, beginning  May 18. This year’s sessions are: May 18: Big Data, Data Analytics & the Law 2016: What Your Company Needs to Know About the Evolution of the Next Big Thing “Big data” is one of today’s … Continue Reading

Ch-ch-ch-changes – Fourth Circuit upholds FCC’s rules streamlining certain wireless telecommunications upgrades and expansions

Mobile wireless service is ubiquitous. Growth of domestic mobile data use is astronomical with growth rates expected to increase by as much as 20 times over the next five years.  4G LTE is lighting up our homes, schools, and workplaces. And 5G, we are told, is right around the corner. Growth requires infrastructure – new sites … Continue Reading

A potential game-changer in trademark registration proceedings

In trademark infringement litigation, the critical and usually pivotal issue is whether there is a likelihood of confusion between two allegedly similar marks. Eliminating a defendant’s ability to defend against an allegation of likelihood of confusion can be tantamount to establishing liability against the defendant. Yet, that will be the situation for many defendants following … Continue Reading

CRTC claims its first victim under Canada’s anti-spam law

Canada’s anti-spam law (CASL), enforced by the Canadian Radio-television and Telecommunications Commission (CRTC), requires that businesses and organizations secure a recipient’s express or implied consent before sending “commercial electronic messages” (CEM). A CEM is any electronic message that encourages participation in a commercial activity, such as a coupon or message about a promotion of the … Continue Reading

Leading European privacy law conference points to key themes, suggests strategic directions

A few weeks ago, more than 1,000 academics, legal practitioners and government officials convened for one of Europe’s premier privacy law events: the Computers, Privacy and Data Protection (CPDP) conference in Brussels, Belgium. Europeans dominated this crowd but a significant number of participants from other countries, including the U.S., made this a truly international gathering. I … Continue Reading

Warrant required for cell phone searches

A recent U.S. Supreme Court decision provides “a very clear and straightforward message” to law enforcement: You must obtain a warrant to search the contents of any cell phone. Kelly Johnson provides a review of the court’s decision in his article, “Privacy Comes at a Cost — Warrant Required for Cell Phone Search,” published by … Continue Reading

App developers should beware of the risks associated with transmitting data from a user’s mobile device to external servers

The availability of third-party keyboard apps on the new iOS 8 operating system for Apple mobile devices created quite a buzz. It also served as a reminder for any developer of apps that transmit data or communications from a user’s host device to external servers to be cognizant of the risks associated with such data … Continue Reading

Sony Data Hack: “You Can’t Lose What You Ain’t Never Had”

Back in the 1960’s, legendary bluesman Muddy Waters wrote a song called “You Can’t Lose What You Ain’t Never Had.” Now, it is Sony Pictures that is singing the blues, as damages continue to mount following the cyber attack on its data networks just before Thanksgiving. A shadowy group with possible connections to the North … Continue Reading

What have you done with your data?

Companies have moved in droves to allow hosting partners to store their mission critical applications — along with valuable business information, trade secrets and customer data — in the cloud. Saving money is great, but do you know where all of your data is at all times, and, more importantly, how secure is it? Every … Continue Reading

Texas Federal Court decision illustrates need for BYOD policies

Saman Rajaee was a salesman for Design Tech Homes. He used his personal iPhone to connect to his employer’s Microsoft Exchange Server, which allowed him to access his work-related email, contacts and calendar from his phone. Design Tech did not have a BYOD policy. When Rajaee’s employment terminated, Design Tech remotely wiped his phone, which … Continue Reading

Immigration reform may help out tech companies

Our colleagues at Employer Law Report recently discussed how President Obama’s immigration reform measures could affect tech companies whose workforces include non-U.S. residents with H-1B visas. According to a memo from the Department of Homeland Security, the visa application and approval process may become easier for employers and their highly skilled workers. Read more… Continue Reading

Coinye West will not take over bitcoin’s reign on cryptocurrency

There’s exciting news in the world of cryptocurrency, the exchange medium that uses cryptography to secure the transactions and control the creation of new units. Bitcoin, created in 2009, was the first cryptocurrency and remains the most popular, though numerous other cryptocurrencies, such as Coinye, have emerged in the interim. Where can you find cryptocurrency? … Continue Reading

Privacy law in the U.S. and Europe: University of Amsterdam Summer Course explores current issues

On July 7-11, 2014, a group of 25 privacy lawyers met in a historic building overlooking the Keizersgracht, one of Amsterdam’s most beautiful canals, and spent five days learning about U.S. privacy law, European data protection law, and the complex interactions between them. The setting was the Summer Course on Privacy Law and Policy, presented … Continue Reading

Beware of the Antitrust Laws’ extraterritorial reach

Our colleagues Jay Levine and Jason Startling recently wrote an interesting post on Porter Wright’s FedSec Law Blog. Though the article covers some interesting international and antitrust issues, the case Jay and Jason focus on is one that many in the technology industry may wish to follow. With technology products in particular, more and more … Continue Reading

Florida ramps up data breach notification law

The Florida Information Protection Act of 2014, aimed at strengthening Florida’s data breach notification law, goes into effect tomorrow, July 1, 2014. The act contains major changes to Florida’s existing data breach notification statute and makes it one of the toughest in the nation. Shortened notice period For example, notice to consumers must be given within … Continue Reading

Porter Wright announces 2014 Technology Seminar Series

Porter Wright continues its tradition of providing cutting-edge information about how technology affects your business with the 2014 Technology Seminar Series, beginning June 18. This year’s sessions are: Social media in litigation: a shield and a sword June 18 The worlds of social media and litigation have collided. Social media evidence is used in employment … Continue Reading
LexBlog