Internet & Online Privacy - Legal Technology - Technologist
Technologist - The FindLaw Legal Technology Blog

Recently in Internet & Online Privacy Category

It hasn't been a good few months for ALEC, the American Legislative Exchange Council, the organization that brings together (often conservative) state legislators and corporate interests to write model legislation. Several major corporations have been jumping ship as the organization has faced increasing criticism.

What's the best way to deal with critics? Sue them! At least that's increasingly become ALEC's strategy. The group has sued critics in the past and has will probably continue to -- the group has started to send out cease and desist letters to MVNO Credo after the small telecom claimed ALEC's policies keep broadband uncompetitive.

We talk a lot about cybersecurity here, and not just because the Internet is a scary place full of crazed Russian hackers ready to steal your every cached file. It's because of that, but it's also because we're lawyers, and we're trained to look at potential risks.

Some of those risks may get a bit smaller should Congress pass any of the three cybersecurity bills coming down the pipeline. The bills seek to increase information sharing between the private sector and government and protect companies from liability when sharing information. Privacy advocates and the White House have expressed concerns that the bills could lead to greater gathering of person information by the NSA, however.

The White House announced this week that it had been hacked, presumably by Russian cyberspies. The operation must have been pretty sophisticated, right? Someone at the State Department -- other than Hillary -- fell for a classic phishing scheme, allegedly opening an unverified document from a scam email. That's a pretty basic mistake. Has the Secretary of Defense started sending federal funds to that Nigerian prince yet?

Let's not lament how easily our government computers were breached though -- the intruders may have had access to sensitive documents since last October. Rather, let's take this moment to remind ourselves of the importance of proper training.

So does your firm need mandatory I.T. security training? Of course it does. Here's why:

If you've uploaded photos of family or friends to Facebook, you've probably been asked to "tag" them, or in the past few years, to confirm the tags suggested by Facebook. Instead of requiring you to say, "That's Sarah!" Facebook now asks, "Hey, isn't this Sarah?" In doing so, it uses its facial recognition software to scan members' faces and identify them in photos posted across the site.

That practice, made possible by Facebook's "DeepFace" technology, may also be against the law, according to a new class action lawsuit filed against the social networking site. The suit alleges that Facebook has gathered "the world's largest privately held database of consumer biometrics data," in violation of Illinois's Biometrics Information Privacy Act.

Once again, teenagers have been hit with child pornography charge after they, so wisely, posted a group sex video of themselves on Twitter. The kids were arrested and charged with distributing child pornography.

Let the stupidity of children be a reminder to us all, even those of us who are grown and at practice before the bar, your tweets can easily land you in hot water, even if they're not of child porn. Here's five other ways to avoid trouble on Twitter:

For the past few months, the government has been waging a PR campaign against enhanced phone encryption -- encryption of the type that might make it harder for government snoops to peak into your phones. When Apple announced that it wouldn't be able to break the default encryption in their new operating system, FBI Director James Comey went as far to say that children will die as a result.

Several commentators noted the irony behind Comey's histrionics. The FBI itself recommended that consumers encrypt their phones. Well, not anymore.

As you may have heard, pop star Taylor Swift recently bought and It's not a sign of a career change, though, it's simply good business. Swift and many others are taking proactive steps to snap up embarrassing domain names before anyone else can.

With the growing proliferation of Internet domains, websites have moved far beyond the .com's of yesteryear, making it easier than ever to create a demeaning or misleading URL. Should you follow Swift's lead and head off the domain trolls, before someone lays claim to YourName.Sucks?

What made the Internet the strange, fascinating and sometimes frightening animal that it is today? It wasn't just the Silicon Valley billionaires, ARPANET visionaries or cats -- lots and lots of cats. The legal system bears its share of praise, or blame, as well.

From protecting free speech online, to prosecuting cyber pirates, these five lawsuits helped shape today's information super-highway:

Less than a month after the FCC commissioners voted to regulate Internet service providers as "common carriers" under the Communications Act, the telecoms have filed suit. Well, one industry trade group, USTelecom, representing some of the nation's largest Internet providers, has sued, as has one small Texas ISP, Alamo Broadband.

The suits, brought in the D.C. and Fifth Circuits, come much sooner than expected, as the FCC has just begun to process of regulating ISPs. Has this pair jumped the gun or are they just in time to shoot down the FCC's regulations in their infancy?

The Fourth Amendment prevents the government from engaging in unreasonable searches and seizures without a warrant, but what about surveillance by private actors?

Through years of torturous interpretations of that amendment, the Supreme Court has settled on a "reasonable expectation of privacy" as the lodestar for whether the government needs a warrant to search something.

The reasonableness of privacy expectation depends both on whether the person whose privacy is invaded had a subjective expectation of privacy and whether society is prepared to recognize that expectation. A straightforward rule, perhaps, but one that's subject to being contorted out of existence. For example, if someone places a sign in a public restroom that says you're being recorded, can it be said that you had a subjective expectation of privacy? It very well might, which is sort of the problem.