- Journal Archives
- Volume 17
- Volume 16
- Volume 15
- Volume 14
- Volume 13
- Volume 12
- Volume 11
- Volume 10
- Volume 9
- Volume 8
- Volume 7
- Volume 6
- Volume 5
- Volume 4
- Volume 3
- Volume 2
- Volume 1
Currently viewing the tag: "privacy"
On January 29, 2015 By Sarah Robbins January 29, 2015
A recent case involving the United States Drug Enforcement Administration ended in a settlement this past Tuesday. As discussed in a previous blog post, the federal government has been repeatedly criticized for using controversial impersonation methods in connection with criminal investigations. In this case, a woman whose identity was allegedly used by a [...]Continue Reading →
On January 26, 2015 By Wayman Stodart January 26, 2015
After a startling revelation on the first day, the trial of Ross Ulbricht, the alleged Dread Pirate Roberts continues this week. On day one of the trial, Ulbricht’s defense attorney conceded that yes, Ross Ulbricht did indeed start the notorious Silk Road market.
Silk Road was intended to be, as portrayed by Ulbricht’s defense counsel, [...]Continue Reading →
Earlier this week, ACLU analyst Christopher Soghoian discovered that in 2007, the FBI impersonated the Seattle Times while investigating bomb threats made to a school in Lacey, Washington. The bureau was using a technique commonly referred to as “phishing” to monitor a juvenile after receiving tips that he was behind the threats. The FBI obtained [...]Continue Reading →
On November 4, 2014 By Anthony Jackson November 4, 2014
Although the Supreme Court has held that police officers must obtain a warrant in order to search a suspect’s cell phone upon arrest, not all police departments have gotten on board. At least one California Highway Patrol officer has been accused of stealing nude photographs [...]Continue Reading →
On October 17, 2014, just days before Staples announced that it was investigating a “potential [security] issue,” President Obama signed an executive order to accelerate EMV adoption in the United States.
The hacking trend first began in November of 2013 when—a few days before Thanksgiving—Target’s security and payments system was hacked. In the first [...]Continue Reading →
On October 8, 2014 By Patrick Tricker October 8, 2014
A Hollywood lawyer representing Jennifer Lawrence, Kristen Dunst, and Kate Upton accused Google of taking “little or no action” to remove the recent hacked nude photos and even facilitating their dispersal, in a letter sent Wednesday threatening a $100 million lawsuit.
On September 25, 2014 By Chris Martucci September 24, 2014
With last week’s announcement of the new iPhone 6 and Apple Watch, the tech giant has come under scrutiny from lawmakers, regulators, and the general public. Just one week after Tim Cook, Apple’s chief executive officer, introduced the company’s latest offerings, Apple is seemingly running damage control. This may come as no surprise (to [...]Continue Reading →
On September 12, 2014 By Ryan Dewey September 14, 2014
US Magazine and People are no longer the only sources revealing intimate details about the private lives of celebrities. Over the holiday weekend, hundreds of nude celebrity photos were made available to a few million more than their intended audience. Among the stars hacked were Kate Upton, Kirsten Dunst, and most notably, Jennifer Lawrence.
The [...]Continue Reading →
On September 10, 2014 By Brittany Burnham September 14, 2014
Earlier this year, Facebook agreed to purchase the startup messaging company WhatsApp for $19 billion. WhatsApp has become hugely popular in the last few years due to its instant messaging capability, but without the usual carrier fees associated with text messaging, its compatibility with all major mobile operating systems, and its [...]Continue Reading →
On August 25, 2014 By Matthew Gaske August 25, 2014
On August 11, 2014, the California Senate passed cellular phone anti-theft legislation, sending it to Governor Jerry Brown to be signed into law. The bill, SB 962, mandates that any smartphone built and distributed in California after July 1, 2015 must have a “technological solution” that would prevent new [...]Continue Reading →
Recent Blog Posts
- Hiding Behind the Computer Screen: James Woods Files Defamation Lawsuit Against a Twitter User
- Let’s Enjoy Fantasy Football…While We Can
- Guest Post: Tweeting Away Patient Privacy
- Naturally Occurring or Mind-made?
- Does China’s 2022 Winter Olympics Song Intentionally Plagiarized ‘Frozen’s’ ‘Let It Go’?
- Neurosurgical Advances Raise Novel Legal and Ethical Implications
Tagsadvertising antitrust Apple books career celebrities contracts copyright copyright infringement courts creative content criminal law entertainment Facebook FCC film/television financial First Amendment games Google government intellectual property internet JETLaw journalism lawsuits legislation media medicine Monday Morning JETLawg music NFL patents privacy progress publicity rights radio social networking sports Supreme Court of the United States (SCOTUS) technology telecommunications trademarks Twitter U.S. Constitution