Sexting Victim Cannot Sue Under the Stored Communications Act
A personal cell phone is not a “facility” within the meaning of the Stored Communications Act—Navarro v. Verizon Wireless, L.L.C., 2013 WL 275977 (E.D. La. Jan.24, 2013) A federal court in Louisiana...
View ArticleSteven Tyler Act Redux: Better But Probably Still Unnecessary
Creative Commons image courtesy of Daigo Oliva on Flickr The Hawaii anti-paparazzi bill eponymously named after its chief supporter is back after getting an extreme makeover, and it just took another...
View ArticleHawaii Legislature Advances Bill to Ban Employer Access to Social Media...
Hawai‘i has jumped on the bandwagon of states (along with 31 other states, according to the National Conference of State Legislatures) introducing legislation to ban employers from requesting access to...
View ArticlePrivacy of Employee Data on Dual-Use Devices
Supervisor snoops into former employee’s personal Gmail account after she returns company-issued Blackberry — Lazette v. Kulmatycki, 2013 WL 2455937 (N.D. Ohio June 5, 2013) The line between personal...
View ArticleNLRB Approves Rule Shuttering Cameras in the Workplace
(Photo credit: Wikipedia) “Smile, you’re on Candid Camera.” Originally coined on the eponymous TV show, that catchphrase is becoming more of common refrain in the workplace. Any employee with a...
View ArticleHawaii Legislature 2014 — Summary of Proposed Computer Tech Legislation
It’s time to roundup the bills related to computer technology that the Hawai‘i legislature is considering in its 2014 regular session. Click here for a chart summarizing the proposed legislation....
View ArticleOh Snap! Lessons From the Snapchat Settlement With the FTC
The Federal Trade Commission (FTC) just announced that Snapchat agreed to settle charges that it deceived consumers about how its popular mobile message app worked and what personal user data it...
View ArticleFTC Releases Staff Report and Recommendations on “Internet of Things”
The FTC released two guides on the privacy and security issues related to the Internet of Things. The first is a staff report based on discussions in an FTC-hosted workshop on the subject held on...
View ArticleNLRB Rules Use of GPS Tracking to Investigate Employee Misconduct Not a...
A recent National Labor Relations Board Shore Point Advisory Letter gives a bit of good news to employers who want to use modern monitoring technology to monitor employees that they suspect are...
View ArticleLegal “Wrist Watch”: Plan Ahead for Legal Challenges of Wearables
Your employees may return to the office after the holidays with new gadgets strapped to their wrist. Wearable devices like the Apple Watch, Android Wear smart watch, and FitBit are some of the hottest...
View ArticleApple v. FBI Debate Highlights Importance of Investing in Mobile Device...
Digital privacy versus national security. That’s how scores of articles have framed the controversy over Apple Inc.’s refusal to cooperate with the FBI in bypassing the security features of an iPhone...
View ArticleThe GDPR: A Tsunami of Data Regulation That Could Crash Onto Your Shore
A sea change in data protection law in the European Union (EU) is about to take place, and your organization doesn’t have to be based in the EU to feel its impact. The General Data Protection...
View ArticleFree Cybersecurity Toolkit For Small Businesses
High-profile data breaches have become common in the headlines, but it’s not just big businesses that are the targets of hackers. According to the 2018 Hiscox Small Business Cyber Risk Report, 47% of...
View ArticleCybersecurity Tips For Small Businesses – Celebrating National Cybersecurity...
Beefing up cybersecurity controls could seem intimidating and costly, but it doesn’t have to be. Although the appropriate cybersecurity controls vary depending on a number of factors including the...
View ArticleCybersecurity For Small Businesses Tip #1 – Lock It Up (Encrypt)
In honor of National Cybersecurity Awareness Month, we’re sharing our top practical tips for small businesses to keep their data secure. Tip #1 is encryption. The National Institute of Standards and...
View ArticleCybersecurity For Small Businesses Tip #2 – Keep Track (Take Inventory)
This is the second in a series of posts in honor of National Cybersecurity Awareness Month. Each day this week, we’re sharing a practical cybersecurity tip for small businesses. Modern data privacy...
View ArticleCybersecurity For Small Businesses Tip #3 – Sort It Out (Organize & Centralize)
This is the third in a series of posts in honor of National Cybersecurity Awareness Month. Each day this week, we’re sharing a practical cybersecurity tip for small businesses. Modern data privacy...
View ArticleCybersecurity For Small Businesses Tip #4 – Stand Guard (Control Access)
This is the fourth in a series of posts in honor of National Cybersecurity Awareness Month. Each day this week, we’re sharing a practical cybersecurity tip for small businesses. Cybersecurity attacks...
View ArticleCybersecurity For Small Businesses Tip #5 – Get Physical (Set Physical Controls)
This is the fifth and final post in a blog series in honor of National Cybersecurity Awareness Month. Cybersecurity might seem like technical stuff, but don’t overlook the role of physical...
View ArticleAloha, CCPA: What the New California Data Privacy Law Means For Hawaii...
California is a pioneer in the frontier of data privacy. In 2003, California was the first state to pass a law requiring commercial websites to post a privacy policy. Last year, California did it...
View Article
More Pages to Explore .....