Internet & Online Privacy - Legal Technology - Technologist
Technologist - The FindLaw Legal Technology Blog

Recently in Internet & Online Privacy Category

Today's big tech companies are as bad as Standard Oil was a century ago. Tech platforms, like Google, Facebook, and Amazon are monopolies that abuse their market dominance, stifle innovation, and harm the public. They need to be broken up.

That, at least, is the argument former Sectary of Labor Robert Reich makes in last weekend's edition of The New York Times: dust off the antitrust laws and break up big tech. It's unlikely that Reich's advice will be heeded anytime soon -- as he notes, the FTC rejected staff recommendations and refused to prosecute Google for anti-competitive behavior. But new research shows that government regulation over the tech industry may be inevitable, if popular opinion is any indicator.

If Google search results are to comply with European law, they must do so globally, France's data protection authority has ruled. That means that Google must apply the EU's "right to be forgotten" to its search results throughout the world. After all, what good is being forgotten if another country's Google search could easily find your most embarrassing photos and memories?

The order comes after an informal appeal by Google which sought to limit the right to search results in the European Union. Google has strenuously disagreed with the ruling, saying it allows nations to impose their laws extraterritorially. If Google refuses to comply with France's order, however, they could face fines of over $1 billion.

One password requires that you use special characters, the other forbids them. One password expires every three months, while another account has kept you logged in so long you couldn't even begin to guess what your password might be. You use a few variations of the same password to get you through as much as you can -- if you're forced to use something too far off from the original, you just reset your password every other time you need to log in.

Passwords are horrible.

And we don't need them. The age of the password is soon coming to an end as the security industry develops increasingly sophisticated technologies that protect valuable information without you needing to remember 8-16 characters. For law firms and lawyers concerned about security, this is great news.

Looking to get into hacking? Forget Ashley Madison or the State Department. Corporate legal departments are the easiest targets. That's the lesson from a new report on data breaches released by Verizon recently. The report, which examined threats to data security across industries, looked in part at responses to 150,000 phishing emails.

Phishing is a form of email fraud where messages appear legitimate in order to steal sensitive information. For example, a phishing email may disguise itself as a message from a bank, asking for your account information, or an update from H.R. telling you to install a new, secretly malicious, program. And corporate lawyers love them! In-house legal departments were more likely than any almost all other groups to fall for phishing emails' tricks.

Has Google done you wrong? Well, then Hausfeld, an international plaintiff's firm, wants to hear from you. The firm, known for its high-profile class actions, recently launched a platform to help individuals and businesses pursue potential lawsuits against Google.

The Google Redress & Integrity Platform, or GRIP, is specifically aimed at those harmed by the tech company's allegedly anticompetitive behavior in Europe. In April, the European Commission accused Google of abusing its search dominance in violation of European antitrust laws. That action could bring up to $6 billion in fines and, Hausfeld hopes, spawn a slew of civil suits.

Most lawyers communicate primarily through email. At the same time, lawyers need to take reasonable efforts to prevent disclosure of client communications and information. Are these two things in conflict? Potentially.

It's fair to say that email isn't the world's most secure communication system. For one, the NSA regularly intercepts attorney-client emails, by its own admission. Then there's the risks posed by hackers, by snooping email tracking software, by your firm's noisy IT intern. Don't worry though -- you needn't abandon email and strap on a tin foil hat. Not yet at least. There's still several easy ways to make your attorney-client emails more secure.

First they came for our credit card numbers. Then they turned to our cars. Now, even medical devices are vulnerable to hacking. Pacemakers, insulin pumps and other medical devices are vulnerable to hacking -- so vulnerable that the FDA has called for medical facilities to abandon some vulnerable devices.

Not only are the hackable medical devices a risk to patients, they're also a potentially huge liability to medical companies -- and perhaps a boon to malpractice lawyers.

This is not your traditional summer camp. There are no ghost stories around the fire, no hiking through the woods, no macrame. Instead, the middle and high school students attending the NSA's summer camp learn how to decrypt passwords, exploit network security flaws, and build robots.

That's right, the NSA has a summer camp -- and it's turning America's youth into an army of hackers. What could go wrong?

Hackers have stolen the personal information of millions of users of Ashley Madison, the dating website for married people looking to have an affair. The hackers, who call themselves The Impact Team, are demanding that the website shut down -- or else they'll release the stolen customer data, including real names and addresses, revealing the identity of millions of potential adulterers.

Is nothing sacred anymore?

The Office of Personel Management announced last week that it had been hacked -- hard. The OPM is essentially the human resources department for the entire federal government, which just happens to be the largest employer in the nation. The personal information of over 22 million people, or almost seven percent of the entire U.S. population, was stolen.

The information stolen included almost 20 million background investigation forms, over 1 million fingerprint records, and thousands of confidential security clearance dossiers. The fallout from the OPM hack promises to last for years, threatening the federal government, individuals, and even national security.