Internet & Online Privacy - Legal Technology - Technologist
Technologist - The FindLaw Legal Technology Blog

Recently in Internet & Online Privacy Category

On Thursday, Yahoo announced it would disclose more than 1,500 pages of documents relating to 2007-08 litigation surrounding government attempts to access Yahoo user accounts without a warrant.

Yahoo said on its Global Public Policy Tumblr (yes, Yahoo uses a Tumblr to disseminate global public policy information) that it will take time to disseminate so much material, but other news outlets have apparently gotten access to some of the documents and reported on them. So, here's what happened:

Back in February, the D.C. Circuit Court struck down the FCC's net neutrality rules, necessitating new regulations.

Earlier this year, the FCC opened its proposed regulations for public comment. The comment period was set to close on Wednesday, September 10, but has been extended to September 15.

To honor the end of the comment period, the activist group Battle for the Net announced that September 10 will be "Internet Slowdown Day." To show your support for net neutrality, go to the website, then use whatever method you'd like to change your website or Twitter avatar to a spinning gear icon, which represents the slowdown that would result if net neutrality were abolished. (Of course, websites won't actually be slowing down.)

In the wake of the celebrity-actress-nude-selfie-hack scandal, should anyone store private things in places like iCloud and Dropbox, that are susceptible to hacking?

Absolutely. Internet commenters -- including Ricky Gervais -- blamed the actresses themselves for putting such private photos online. But "online" is a big place. Certainly they wouldn't have published them to Facebook or Instagram, which are, by now, public places by definition. These objectors seem to be saying that any location accessible via the Internet is necessarily a public place because it can be hacked.

But such a broad definition not only encompasses literally everything accessible through the Internet (as any security system can be hacked), it also doesn't make sense in terms of our expectations of privacy.

The first of two parallel challenges to the NSA's cell phone metadata gathering program reached a federal appeals court this week, and if the judges' comments are any indication, the Second Circuit may be leaning toward reversing a district court's ruling in favor of the agency.

U.S. District Judge William Pauley ruled in the NSA's favor last December, accepting the government's proffered evidence that the program had helped anti-terrorism efforts and holding that he was bound by decades-old Supreme Court precedent. Pauley's ruling came shortly after a district court judge in Washington, D.C., held the exact opposite -- that the precedent was no longer valid and that the Orwellian program was unconstitutional.

While it was initially looking like the two cases were bound for a Supreme Court showdown, if both the Second and D.C. Circuits side with challengers to the program, it could impact the cases' chances of a certiorari grant.

The Los Angeles Police Department has about 242 cameras mounted on police cars throughout its fleet. That's not unusual, but the cameras are always on and always scanning license plates as they drive by. The cameras are connected to optical character recognition (OCR) software that reads and stores the license plate numbers -- every license plate that it sees, whether or not the plate is expired or the car's registrant is suspected of a crime.

A little creepy? The ACLU of Southern California thought so too, so it filed a records request to see a week's worth of license plate data from those cameras. The LAPD opposed it on the ground that it could reveal patrol patterns, which could impact current investigations; a superior court judge agreed with the LAPD.

The question remains whether collecting such information could be a search because the information -- license plate numbers -- is "in public" already.

Jennifer Lawrence. Kirsten Dunst. Kate Upton. Hope Solo. Victoria Justice. The biggest celebrity nude photo hack in history went down over the weekend, with hackers on online forums claiming that they had over 60 photos of Lawrence alone, along with nude photos of over 100 actresses.

How? The hack appears connected to Apple's iCloud. While there was some speculation that it was the result of "brute force" password cracking via a now-patched hole in Apple's "Find My iPhone" feature, Apple instead pointed to lucky guesses by determined hackers.

My invite is here! I'm now a member of the special persons club who are privileged enough to get to pay Google Domains to register a new domain name! Despite that sarcastic tone, I was actually pretty excited to get in the door. The problem is, once I got there, the experience was completely anti-climactic.

Speaking of domain names, perhaps you've seen our excited posts about the wave of new top-level domains (TLDs) coming in the near future. With the ".com" domain selection looking more and more like the San Francisco housing market (there's nothing "trendy" left, investors sell domains for way more than they're worth), perhaps a .esq, .lawyer, or .attorney domain name is in your future?

Good luck with that, because finding and registering new TLDs isn't as easy as clicking over to GoDaddy (yet).

Distributing assets in a will is easy enough, but a testator's social media accounts, and their associated assets, aren't exactly amenable to being put in a box and handed over to the heirs.

Further complicating the social media picture is that there's no uniform way to access the account once the owner has died. Each platform has different procedures in place. For example, Facebook won't give out login information for a dead person, but it will delete an account or "memorialize" it, which allows only confirmed friends to see it or find it.

The "Stingray" is a neat little device that fools a cell phone into connecting to it as though it were a cellular phone tower. Once connected, the Stingray can record the device's unique ID, monitor the device's traffic, and even triangulate the cell phone's position.

It's also questionably legal. In June, unsealed documents revealed that Florida police were caught lying about using information from a Stingray to obtain warrants. As Ars Technica reports, officers were instructed to "refer to the assistance as 'received information from a confidential source regarding the location of the suspect.'" They were also told never to refer to the Stingray in police documents and to re-submit warrant affidavits that referred to them, according to the ACLU.

Lies notwithstanding, we still don't know any more about Stingrays, and now the FCC wants to get involved.

It's FindLaw's "Legal Shark Week" which means, like it or not, you're going to see a lot of shark-themed posts. If you were traumatized as a kid by the movie "Jaws," we apologize in advance.

Today's topic? Three ways you can be a tech-savvy shark, starting with social media, and continuing with metadata and e-discovery. And as you'll see, these tips aren't just for the fiercest predators -- some of them are actually necessary to be a competent guppy: