Oct 4, 20183 minCyberbullying and Cyberstalking in FloridaAfter my last blog post, Protecting Children's Privacy Online, I wanted to discuss another cyber law issue that affects children. Bullyin...
Oct 2, 20183 minProtecting Children's Privacy OnlineChildren today are digital natives. They do homework, read books, talk to friends, play games and watch videos online. Personally, I wa...
Sep 27, 20182 minInternet of Things and Cyber InsuranceIn my last blog, Attorneys will Impact the Internet of Things, I discussed that the IoT creates a significant risk to privacy and cyberse...
Sep 25, 20183 minAttorneys will impact the Internet of ThingsAnything connected to the Internet can be hacked. With the Internet of Things (IoT), everything is being connected to the Internet. The...
Sep 20, 20183 minInsurance Commissioners Oppose Federal Cybersecurity Law On September 13, the House Financial Services Committee passed H.R. 6743, the Consumer Information Notification Requirement Act. The leg...
Sep 18, 20184 minJurisdiction in CyberspaceDetermining jurisdiction for companies that operate over the Internet is a very complicated issue. The question of jurisdiction is wheth...
Sep 13, 20184 minThe Expense of a Data BreachBusiness executives and owners may not appreciate the pain (financially, mentally, and emotionally) that a data breach will cause. Ask a...
Sep 11, 20184 minDraftKings Sues Unknown Hackers In August, DraftKings' website, www.draftkings.com, was the victim of a Distributed Denial of Service (DDoS) attack. DraftKings is an onl...
Sep 6, 20183 minData Retention and Electronic DiscoveryBack in the "paper days" it was easier to have a document retention and disposal plan. Storing mountains of paper was expensive and an e...
Sep 4, 20184 minThe Internet - Neutrality or Management?The open Internet drives the economy and serves as a critical tool for people to conduct commerce, communicate, educate, entertain, and e...
Aug 30, 20183 minInformation Privacy and SecurityIn cyberspace, there is a difference between privacy and security that is sometimes misunderstood. The two concepts are similar and overl...
Aug 28, 20184 minCyber Law in e-commerceAre you using Amazon, Expedia, Groupon, Wayfair, Etsy? Subscribe to Netflix, Hulu, Amazon Prime Video. Listen to Spotify, Pandora, Tida...
Aug 23, 20183 minFlorida Law Firm Hacked Then Sued For Legal MalpracticeReal estate attorneys are prime targets for data breaches, but do they have a duty to prevent/avoid a breach? A Florida company is askin...
Aug 21, 20182 minLocked-In Ransomware hits Maryland CompanyA local Maryland embroidery and silk-screening company is suing its insurance carrier due to a Locked-In ransomware attack. In July, Nati...
Aug 16, 20183 minGAFA - The four companies changing the practice of lawNichole Black at mycase.com wrote a blog on 10 Technologies That Changed the Practice of Law. Among the 10 were (in no particular order),...
Aug 14, 20182 minConstruction company lost $1.6 million in email scamAccording to a complaint filed in federal court, Quality Plus Services, Inc, claims that earlier this year it discovered it was a victim ...
Aug 9, 20184 minLawsuits Against Software Developers and IT SpecialistsPeople understand and may even accept that software in computers and mobile devices have glitches, failures and security holes. People h...
Aug 7, 20182 minEmerging Disruptive TechnologiesAre you curious about possible types of emerging technology? Imperial Tech Forsight (which is affiliated with Imperial College London) ha...
Aug 2, 20182 minPhishing is Prohibited Phishing is an attempt to trick a user into voluntarily supplying credentials, such as passwords, or bank account information, often by e...
Jul 31, 20183 minWhat is Cyber Law?Cyber Law or cyberspace law is the field of law dealing with the Internet, encompassing cases, statutes, regulations, and disputes that a...