IT Law Alerts
Information Technology Law is our FocusKeeping IT Legal™
IT Law Alerts
Imposter LinkedIn Account Leads to Lawsuit
Setting up a social media profile posing as someone else likely violates the platform’s terms of service. It may also constitute trademark infringement, unfair competition and civil fraud. Illinois-based poultry processor Wayne Farms LLC filed a federal complaint...
Appellate Court: Amazon May Be Liable For Injury Caused By Third Party Product
In the first decision of its kind, a California appellate court has held that Amazon may be subject to liability for a personal injury caused by a third-party product sold through its site. Angela Bolger purchased a replacement laptop computer battery on Amazon and...
Latest Lawsuit Against Zoom Alleges Non Adherence to Published Security Measures
In the first half of 2020, Zoom Video Communications, Inc. (“Zoom”) was named in a number of proposed class action lawsuits. Claims in the various lawsuits include violations of state data protection laws based on: (a) alleged improper sharing of users’ personal...
Instacart Sues Uber Grocery Delivery Company for Illegal “Scraping”
Recently, Maplebear Inc. dba Instacart field a lawsuit in federal court in Texas against Cornershop Technologies Inc. Cornershop is an online grocery delivery service launched in Chile in 2015 and purchased by Uber in 2019. In May 2020, Cornershop began...
Are iPhone Apps Accessing Data on Apple Clipboard Without Consent?
In a class-action styled lawsuit filed last month, Adam Bauer, a LinkedIn user, accuses the social networking platform of accessing his and other iPhone users’ sensitive data from Apple’s “Handoff” clipboard. The purpose of the clipboard is to temporarily store...
Department of Defense Audit of AI Standards and Protections
The Office of Inspector General (OIG) has issued a report of its audit of the governance and protection of Department of Defense (DOD) Artificial Intelligence Data and Technology. The dual purpose of the audit was to determine DOD’s progress in: (a) developing a...
European Commission Investigates Apple Over App Store Rules
After receiving complaints filed by music-streaming service Spotify and an audio book distributor, the European Commission formally opened an investigation into Apple. The Commission is looking into whether Apple’s rules for app developers on the distribution of apps...
HomeAdvisor’s Clickwrap Arbitration Clause Overcomes Challenge
A group of Dallas area homeowners used HomeAdvisor’s website to locate contractors for home improvement projects. Though they were recommended by the site and subsequently hired by the homeowners, the contractors abandoned the projects. The homeowners/plaintiffs then...
Court: Capital One Breach Investigation Report Not Privileged
In March 2019, Capital One experienced a data breach affecting over 100 million consumers. The Capital One data breach is the subject of consumer multi-district litigation pending in federal court in Virginia. The case is currently in the discovery stage. The...
Attackers May Remain Even After Ransomware Payments
Microsoft’s Threat Protection Intelligence Team recently reported that ransomware groups may remain on an organization’s system even after receiving the requested payment. Ransomware involves the deployment of malware to lock or prevent user access to a network or...
Google Argues Accidental Recording Doesn’t Violate State, Federal Laws
Last summer, a proposed class action was filed in a California federal court against Alphabet, Inc., the parent company of Google, alleging that the accidental recording of conversations by Google Assistant violates various state and federal privacy and wiretap laws....
Michigan Personal Privacy Protection Act Extends to Out-of-State Residents
In 1988, Michigan enacted the Personal Privacy Protection Act (PPPA) to “preserve personal privacy with respect to the purchase, rental, or borrowing” of written materials, sound recordings, and video recordings. Enacted with the video rental industry in mind, the...
Latest TCPA Decision Further Demonstrates Need for “Auto Dialer” Clarification
Calling or texting consumers without proper consent can lead to a potential violation of the Telephone Consumer Protection Act of 1991 (TCPA). The TCPA prohibits calls and texts to consumers using an automatic telephone dialing system (ATDS) without obtaining the...
No More Blanket Portable Electronics Bans in Michigan Courts
On January 8, 2020, the Michigan Supreme Court amended a longstanding court rule that had allowed local courts to determine the use of electronics in their facilities, including outright bans of such devices. The amended rule allows attorneys, parties and members of...
California Consumer Privacy Act Takes Effect
On January 1, 2020, California’s new consumer privacy act became effective. The California Consumer Protection Act, or CCPA, includes a broad definition of “personal information” that not only includes identifiers like name, address, phone number and email address,...
Harvard Settles Online Accessibility Lawsuit
In 2015, the National Association of the Deaf (NAD) filed a lawsuit in Massachusetts federal court against Harvard University. The class action complaint alleged that thousands of videos and audio tracks on the university’s website and third-party platforms violated...
The Inconsistent Scope of EU Tech Rulings
Two recent tech-related rulings from the E.U. Court of Justice demonstrate inconsistencies in whether the decisions apply just within the European Union or more globally. Over the past five years, the E.U. Court of Justice has ruled that Google must comply with...
Bill Introduced to Create Federal Online Privacy Agency
U.S. Representatives Anna Eshoo and Zoe Lofgren, each representing districts in Silicon Valley, have introduced the “Online Privacy Act” bill. The bill calls for the creation of a U.S. Digital Privacy Agency to draft and enforce comprehensive federal...
FTC Enters into First “Stalkerware” Consent Order
The Federal Trade Commission has entered into a Consent Order with Retina-X Studios and its founder for alleged violations of federal privacy laws involving three “stalkerware” apps known as Mobile Spy, Phone Sheriff and Teen Shield. Downloading each app required...
Insurer Seeks Ruling to Deny Coverage for $6 Million Email Spoofing
AIG Specialty Insurance Company recently filed a motion to dismiss a lawsuit filed by investment software manager SS&C Technologies Holding, Inc. seeking coverage for a $6 million loss based on email spoofing. The lawsuit...
TCPA Class Action Proceeding Against Quest Diagnostics
Calling or texting consumers without proper consent can lead to claimed violations of the federal Telephone Consumer Protection Act of 1991 (TCPA). A plaintiff must show that the call or text utilized an automatic telephone dialing system (ATDS) and was without the...
NTSB: Tesla Autopilot Shares Responsibility for Crash
Tesla touts its Autopilot as having “advanced safety and convenience features . . . designed to assist you with the most burdensome parts of driving” and enabling “your car to steer, accelerate and brake automatically within its lane.” Tesla also warns that “[c]urrent...
Google Sued Over Potentially Re-identified Medical Records
Google, LLC and the University of Chicago Medical Center have been named as defendants in a class action style lawsuit recently filed in federal court in Illinois. The named plaintiff, Matt Dinerstein, alleges that Google, through its start-up, DeepMind, “embarked on...
U.S. Conference of Mayors: No More Ransomware Payments
A ransomware attack involves the introduction of malware that locks user access to their system or files, along with a demand for a ransom payment to unlock the system or files. On July 11, 2019, the United States Conference of Mayors, representing more than...
Changes Coming to Illinois’ Biometric Protection Law?
Illinois’s Biometric Information Privacy Act (BIPA) was passed in 2008 but over the past few years has been the basis for hundreds of proposed class action lawsuits. As originally drafted, the law contains potentially overbroad definitions of “biometric...
Mobile App “Click Spamming’ Lawsuit
Chinese-based mobile app developer Cheetah Mobile, Inc. has asked a federal court in New York to dismiss a purposed class action lawsuit brought by the company’s investors. Cheetah boasts hundreds of millions of monthly active users of its apps, including Clean...
Key Findings of Verizon’s 2019 Data Breach Investigations Report
In May 2019, Verizon released its 2019 Data Breach Investigations Report. The report is the result of analyzing some 41,686 security incidents of which 2,013 were confirmed data breaches. Among the report’s key findings: The majority of incidents were denial of...
Apple’s Face Recognition Software Leads to Wrongful Arrests, Lawsuit
Eighteen year old Ousmane Bah has sued Apple after he was falsely accused of felonies in multiple states, including Massachusetts, New York, New Jersey and Delaware. The arrests allegedly resulted from Bah’s image being mismatched to the identity of the true suspect...
European Commission Demands Yield Upcoming Facebook Data Changes
The Consumer Federation of America, along with 10 other advocacy groups, including Mozilla and the Internet Society, have sent an open letter to Target, Amazon, Best Buy and Walmart asking the retailers to endorse minimum privacy and security guidelines for connected...
Court Removes Non-Compete Injunction from Former ADP Sales Reps
A federal court in New Jersey has lifted a preliminary injunction enjoining former ADP salesmen from engaging in certain conduct alleged by ADP to violate non-compete provisions in their employment agreements. The injunction had been originally entered in June 2016,...
Senate Committee: Equifax Did Not Retain Records Related to Data Breach
In 2017, credit reporting agency Equifax experienced a data breach that impacted 143 million consumers. Fallout from the breach included class action lawsuits initiated by various plaintiff classes such as consumers, financial institutions and a small business class....
Audit Reveals Flaws in FBI Cyber Notification System
The U.S. Department of Justice Inspector General has released a report of an audit of the Federal Bureau of Investigation (FBI) process for notifying victims of cyber incidents. The primary findings of the report include: Some unreliable data, including typographical...
Consumer Advocacy Groups Call for Minimum IoT Standards
The Consumer Federation of America, along with 10 other advocacy groups, including Mozilla and the Internet Society, have sent an open letter to Target, Amazon, Best Buy and Walmart asking the retailers to endorse minimum privacy and security guidelines for connected...
No Trademark for Hashtagged Chicago Cubs Phrase
The Trademark Trial and Appeal Board (TTAB) has recently issued a precedential opinion denying a Chicago Cubs fan’s request to trademark #MAGICNUMBER108 for t-shirts. The fan, Grant DePorter wished to use the hashtagged phrase in reference to the fact that it took the...
U.S. Houses Passes “Hack Your State Department Act”
In a 377-3 bipartisan vote, the U.S. House of Representatives has passed H.R. 238, the “Hack Your State Department Act.” If this bill becomes law, the U.S. State Department would have one year to establish a pilot “bug bounty program” under which qualified security...
The Geographic Scope of “The Right To Be Forgotten”
As early as 2014, the Court of Justice of the European Union (CJEU) has ruled that Google must comply with the request of E.U. citizens to remove certain search engine results reflecting past actions of the citizens, or the so-called “right to be forgotten.” One...
The Impact of Drones Near Airports
Over the past two months, drone sightings have caused closures at international airports, both in the U.S. and abroad. In December 2018, drone activity at London’s Gatwick Airport resulted in the airport being closed for 33 hours with multiple flight cancellations,...
E.U. Sets Privacy Shield Deadline for U.S.
The European Union General Data Privacy Regulation (GDPR), which took effect in May 2018, covers the handling of personal information of E.U. citizens, including by U.S.-based companies. The E.U.-U.S. Privacy Shield is a framework to provide companies with a mechanism...
FCC Seeks New Call Authentication System in 2019
The Federal Communications Commission (FCC) recently sent letters to telecommunications carriers asking them to establish plans to implement the Signature-based Handing of Asserted Information Using toKENS (SHAKEN) and the Secure Telephone Identity Revisited (STIR)...
Facebook and Google Face Location Tracking Lawsuits
Two recent class action-styled lawsuits have been filed against Facebook and Google, respectively, for allegedly tracking and storing user location data even after the user had turned off location tracking features. In Heeger v. Facebook, Inc., the plaintiff claims...
California’s Connected Device Security Law
California has become the first state to pass legislation to regulate the Internet of Things. The new law, which takes effect on January 1, 2020, applies to manufacturers of connected devices, which are defined as “any device, or physical object that is capable of...
Small Businesses and the Equifax Breach
Last year, credit reporting agency Equifax experienced a data breach that impacted 143 million consumers. Fallout from the breach included class action lawsuits initiated by various plaintiff classes such as consumers, financial institutions and a small business...
Suit Alleges Apple’s Website Not Accessible
A visually-impaired and legally blind woman has filed a lawsuit against Apple, Inc. in federal court in New York, alleging that Apple’s website is not accessible and is therefore in violation of the federal Americans with Disabilities Act (“ADA”). Himelda Mendez...
Can Smart Cities be Hacked?
Earlier this year, citizens in Hawaii experienced a false missile attack alert resulting from employee error. The potential for similar incidents caused by hackers in so-called “smart cities” has been identified by researchers at IBM X-Force Red and cybersecurity firm...
Pentagon Creating “Do Not Buy” Software List
According to a Department of Defense official, the Pentagon has been working on a “do not buy” list of software vendors since early this year. Without identifying specific vendors or products, in a recent press conference, Ellen Lord, undersecretary of defense for...
Cybersecurity Risk Tops CEO Concerns
Global advisory firm Willis Towers Watson recently released its 2018 Management Liability (Directors & Officers) U.S. Survey. When asked the question “to what extent are the following risks a concern for your organization in the coming year,” 80 percent of the...
Court Won’t Enforce Uber’s Terms of Service
The importance of making online and mobile app terms clear and conspicuous to users was reinforced by the recent federal appeals court decision in Cullinane v. Uber Technologies, Inc. The plaintiffs filed a proposed class action in Massachusetts state court alleging...
Banks Not Allowing Credit Card Purchases of Cryptocurrency
Wells Fargo Bank has recently announced that its customers will no longer be able to make purchases of cryptocurrency using their bank-issued credit cards. This move is consistent with the stated practice of several other major U.S. banks including J.P. Morgan Chase,...
Network in the Sky in our Future?
Network in the Sky In our Future? Tech start up Elefante Group, Inc., in partnership with Lockheed Martin Corporation, has filed a petition for rulemaking with the Federal Communications Commission (FCC) regarding a design for a platform of atmospheric-based service...
Courts Deny Cyber Insurance Coverage for Phishing Claims
“Phishing” occurs through a fake email message to obtain sensitive information for the purpose of committing fraud. Phishing schemes are becoming more sophisticated, resulting in many organizations falling victim and incurring financial loss. Some organizations have...
Alabama: Final State to Enact Data Breach Notification Law
As of June 1, 2018, Alabama has become the 50thstate to enforce a data breach notification law to protect the personally identifiable information of its residents. Not unlike other states’ laws, the Alabama law defines “sensitive personally identifying information” as...
Court Holds Disney Engaged in Copyright Misuse
Disney recently suffered a potentially devastating setback in its legal effort to stop Redbox from selling digital codes to Disney films. A federal court in California denied Disney’s request for a preliminary injunction against Redbox, citing that Disney has engaged...
Legalities of Augmented and Virtual Reality
Augmented realty (AR) and virtual reality (VR) technology is becoming more commonplace in both our business and personal lives. Business uses of AR/VR include product design, employee training, marketing and customer service. A March 2018 survey conducted by the law...
Judicial Insights into Online Defamation
A federal court of appeals has rejected the notion that “circulation” rather than “publication” of allegedly defamatory material online and through email distribution is sufficient to state a claim. In late 2013/early 2014, financial publisher The Deal, LLC posted...
Is Your Web Host Adequately Protecting Your Organization?
The Federal Trade Commission (FTC) has issued the report “Do Web Host Protect Their Small Business Customers With Secure Hosting And Anti-Phishing Technologies? This report is the result of a mid-2017 investigation by the FTC’s Office of Technology Research and...
A New Cyber Risk Management Partnership
In what is being touted as a “first” in cyber risk management solutions, tech giants Apple and Cisco have announced a partnership with Aon plc (“Aon”) and Allianz Global Corporate & Specialty (AGCS). An organization adopting the solution would undergo a cyber...
“Bug Bounties” in the Spotlight
Some companies offer monetary rewards to so-called “white hat” hackers to find security bugs in the company’s systems. These “bug bounties” can prove useful in identifying vulnerabilities and preventing breaches. Care must be taken, however, that a bug bounty...
The Legal Side of Bitcoin
Public interest in Bitcoin grows as the value of the cryptocurrency has increased of late. Some view cryptocurrency as the wave of the future; others consider trading in it a gamble. How do countries and other levels of government treat cryptocurrency? In the United...
Connected Vehicle Hacking Lawsuits
Following the hacking of a Jeep Cherokee during a staged experiment in 2015, Fiat Chrysler USA (FCA) recalled 1.4 million 2013-2015 vehicles. The incident also prompted the filing of a proposed class action lawsuit against FCA in an Illinois federal district court...
FTC Considers “Informational Injury” for Data Breaches
Victims of data breaches are often unable to find a remedy without sustaining actual monetary damages. That could change if the Federal Trade Commission (FTC) pursues a path toward “informational injury,” which could impose a deemed harm to data breach subjects. In...
Online Sex Trafficking Law’s Unintended Impact
In November, the U.S. Senate Commerce Committee unanimously approved a bill known as the Stop Enabling Sex Traffickers Act of 2017 (SESTA). SESTA has broad bi-partisan support of its worthwhile goal of allowing civil and criminal actions against a website for...
Exempting Cybersecurity Plans from FOIA
The Michigan House of Representatives recently approved a bill that would amend the state’s Freedom of Information Act (FOIA) to prevent public disclosure of organization’s cybersecurity assessments, cybersecurity plans, cybersecurity incidents and cybersecurity...
Benefits and Risks of Drone Technology
Drones are now smaller, lighter, easier to use and capable of capturing high quality images and other data. Drone technology facilitates things like law enforcement activities, aerial photography and emergency deliveries. Last month, the Federal Aviation...
The SEC Database Hack
A few weeks ago, the Securities and Exchange Commission (SEC) revealed that its Electronic Data Gathering Analysis and Retrieval (EDGAR) system was hacked in 2016. Rather than issuing a news release specific to the discovery of the event, the SEC included information...
Emoji as Evidence
Emoji, the popular icons used in texts and social media posts (and their predecessor, emoticons), are increasingly being asserted as evidence of intent in both civil and criminal matters. What do “✌??” or “:-P” mean? They may have multiple meanings, depending on the...
NHTSA’s Voluntary Guidance on Automated Cars
In September, the National Highway Traffic Safety Administration (NHTSA) issued a voluntary guidance for automated vehicles entitled “Automated Driving Systems 2.0 – A Vision for Safety”. The 36-page document, a much scaled down version of what the agency issued a...
U.S Supreme Court Asked to Declare “Google” Generic
A trademark is a word, phrase, symbol or design that identifies and distinguishes the particular source of a product. A service mark does the same thing with respect to the source of services. An owner of a mark can control its use, including preventing others from...
Implications of the Equifax Data Breach
Last week, credit reporting agency Equifax announced that data of 143 million consumers was potentially compromised through a “website vulnerability” that occurred from mid-May through July, 2017. Equifax discovered the breach on July 29th, but waited nearly six weeks...
FCC Considers Robocall Reforms
The Federal Communications Commission (FCC) has been addressing two aspects of robocalls (unsolicited calls being placed to consumers) and caller ID spoofing (impersonating a different phone number to evade call blocking or filtering tools). First, the FCC is focusing...
The Impact of Moderating Web Content
Many online platforms use moderators to screen user content submissions. How does the use of moderators impact a site’s ability to successful defend itself against copyright infringement claims under the Digital Millennium Copyright Act? The Ninth Circuit Court of...
Regulating Personal Delivery Devices
Personal delivery devices, or PDDs, have begun rolling along some cities’ streets, transporting carry-out from local restaurants and delivering parcels. Unlike flying drones that fall under the jurisdiction of the Federal Aviation Administration, there is no basis for...
Court: Winn-Dixie Website Violates ADA
After a two-day bench trial, a federal court in Florida has ruled that grocery chain Winn-Dixie’s website is inaccessible to individuals who require screen reader software. The court concluded that Winn-Dixie violated the Americans With Disabilities Act (“ADA”) as a...
FTC Secures $2.7 Million Judgment against Telemarketers
For many years, the Federal Trade Commission (FTC) has maintained a national “do-not-call” registry of telephone numbers of individuals and organizations that do not to receive unsolicited marketing calls. Recently, the FTC obtained a $2.7 million judgment from a U.S....
States Consider New Privacy, Security Laws
While administrative changes within federal agencies have raised uncertainty over enforcement of privacy and security initiatives, many state governments are looking at establishing new rules and laws directed at protecting individual privacy and enhancing online...
Protecting Your Organization from Ransomware
Last week, hundreds of thousands of computer systems were impacted by global cyberattacks, many in the form of ransomware. Protecting your organization from these types of attacks is more important than ever. Understanding the ins and outs of ransomware is the first...
Interactive Mobile Apps and Wiretap Laws
Mobile apps are increasingly designed with features and functions promoting interaction with users, including voice commands. Could the design of an app to capture and transmit user communications and other information violate federal wiretap laws? An amended class...
Copyrights and 3D Printing
A recent decision of the U.S. Supreme Court may expand copyright protection for 3D printing designs. In general, copyrights protect creative works rather than useful or functional objects. In Star Athletica LLC vs. Varsity Brands Inc., the Court examined whether...
FCC Internet Privacy Rules Repealed
Last fall, the Federal Communications Commission (FCC) adopted historic rules to require broadband Internet Service Providers (ISPs) to protect certain sensitive customer information, including web browser history, app usage history and specific geolocation...
Google Settles AdWords Class Action
In July, 2008, Alphabet, Inc. (Google’s parent company) was sued in federal court by advertisers alleging violation of California fair advertising laws. According to the plaintiffs, Google mislead them regarding their paid AdWords, which the advertisers claimed were...
Regulating Autonomous Vehicles
Senators John Thune (R-SD) and Gary Peters (D-MI) recently announced that they are exploring federal regulations to be proposed this year for self-driving vehicles. These lawmakers’ stated goal was to offer flexibility for manufacturers of autonomous vehicles without...
EU Privacy Compliance Identified as Top Priority
The European Union has adopted a General Data Protection Regulation (GDPR) which will take effect in May, 2018. In January 2017, Price Waterhouse Coopers conducted a survey about preparing for the GDPR of 200 General Counsel and C-level executives from U.S. companies...
Managing Corporate Device and App Related Risks
Employees using corporate or personal devices to text and use communication apps use can pose risk to an organization. The risk can be even greater for highly regulated industries like financial institutions. Recently, Deutsche Bank announced a ban on employee text...
A Contest to Fix IoT Risk
The ever-increasing number of smart or connected devices is also referred to as the “Internet of Things” or “IoT”. Many smart devices are installed in homes, such as thermostats, home security systems and appliances. A smart device may pose security risks in initial...
“Zombie” Cookie Enforcement Action
Cookies are unique, persistent text files stored in a user’s browser that allow an app provider to recognize that user when the browser reconnects with the provider’s server. They are widely used by ecommerce and other web sites. A user can delete or control cookies...
Implications of a Billion Record Breach
This week, Yahoo! Inc. announced its discovery of an August, 2013 data breach of over one billion user account records. The announcement came less than three months after the company disclosed a 2014 breach of more than 500 million records, although Yahoo! believes...
“Fake News” and Organizational Risk
Inaccurate or misleading information on the Internet is nothing new, but the number of “fake news” sites and false or misleading articles being shared on social media has skyrocketed in recent months. Last week, an article that President Obama issued an executive...
Litigating Use of Facial Recognition Data
Social media and other apps use facial recognition technology in connection with their service offerings. Facebook’s “DeepFace” program automatically “tags” users thereby creating an ever-growing database of faces associated with users’ profiles, likes and other...
AI: Balancing Innovation with Consumer Protection
Artificial intelligence, or AI, is broadly defined as a computerized system that can either think or act like a rational human. Examples of AI in action include Amazon.com’s personal assistant “Echo” and Uber’s autonomous cars. While the genesis of AI goes back over...
A Medical Device Hacking Warning
Johnson & Johnson has issued a formal warning to over 110,000 patients that its Animas OneTouch Ping insulin pump, if left unencrypted, could be hacked and result in a potential overdose of insulin to a diabetic patient. This is the first time a medical device...
An Update on Data Breach Costs
Kaspersky Labs has issued its annual report on “Measuring the Financial Impact of IT Security on Businesses” after surveying more than 4000 business representatives from 25 different countries. Some key findings of the report: The cost of a single security incident...
Final E-Warranty Act Rules Issued
The federal E-Warranty Act of 2015 was enacted to allow manufacturers to display consumer product warranties online. On September 8, 2016, the Federal Trade Commission issued its final rules and amendments on the act. One of the ways that manufacturers can provide...
Millions of Blocked Text Messages or “Spamageddon”?
https://www.publicknowledge.org/assets/uploads/documents/PK-CC-FP_Twilio_Comments.pdfIn recent years, the Federal Communications Commission (FCC) has been considering what direction to take regarding mobile messaging. In August, the FCC held hearings where mobile companies and industry associations offered comments on the proposed regulations of...
Courts Examine Scope of Computer Fraud Act
The federal Computer Fraud & Abuse Act (CFAA) was enacted in 1986 to target computer system hackers who either damage the system or take valuable information. The CFAA prohibits “unauthorized access to a protected computer to commit fraud or obtain something of...
“BYOD” Requires Management of Legal Risks
Bring Your Own Device, or “BYOD”, continues to grow in popularity. As an example, over the past 18 months, the State of Michigan has quadrupled the number of employees using their own devices on the job. Michigan’s goal is to have 90% of employees on the program by...
Free Apps and the Expectation of Privacy
On July 6, 2016, the Michigan Supreme Court ruled that Peter Deacon, a user of Pandora’s free streaming music service, is not a “customer” under Michigan’s Video Rental Privacy Protection Act. Deacon is alleging that Pandora violated the act by sharing his name and...
Which Sites Top the Online Trust Audit & Honor Roll?
On June 14th, the Online Trust Alliance (OTA) issued its 2016 Online Trust Audit & Honor Roll. A self-described “benchmark analysis of businesses’ commitment to security, privacy and consumer protection”, the audit was the eighth consecutive effort by the OTA....
Combating Online Hate Speech
How long should a social media platform allow illegal hate speech to remain on its site before removing it? Unfortunately, social media has become a tool for terrorist groups and others to spread “the public incitement to violence or hatred directed against a group of...
Limitations of “Clicking Through” Online
Almost every website has terms that govern a user’s experience and the site owner’s responsibility for the operations and activities of the site. The enforceability of such terms and the limitations of a user “clicking through” was recently addressed by the U.S....
Driverless Vehicle Competitors Form Lobbying Group
Automakers Ford and Volvo, ride-sharing leaders Uber and Lyft (in which General Motors is a major investor), together with tech giant Google have formed a lobby called the Self-Driving Coalition for Safer Streets. The coalition is lead by former National Highway...
Vendor Data Breach Notification Concerns
A recent survey conducted by the Ponemon Institute LLC finds that 37% of companies that outsource services do not believe that their primary third party vendor would notify them in the event of a breach of the company’s confidential data. The percentage jumps to 73%...