Security
On March 22, the House Committee on Oversight and Government Reform held a hearing to review the Federal Bureau of Investigation’s use of facial recognition technology and other programs. Facial recognition technology uses an algorithm to analyze a subject’s facial features, such as length and width of a person’s nose, eyes and ears. Law enforcement…
A Democratic Senator is pushing for a privacy focused overhaul regarding device searches at the border. The suspicious scientist Sidd Bikkannavar, a U.S. born citizen and employee at NASA’s Jet Propulsion Laboratory, left for a trip to South America on January 15. When he returned two weeks later, the Trump administration’s travel ban was four…
While President Trump has outlined his plans for strengthening the nation’s cyber security, his stances on privacy and net neutrality are unclear. However, his newly appointed FCC chair, Ajit Pai, has a consistent track record and is expected to oppose an open internet. In fact, on February 28th, Pai said net neutrality was “a mistake.”…
As computers become more pervasive in our government, our businesses, and our homes, cybersecurity crises seem to arise with alarming regularity and often in unexpected places. In particular, networking among computers and electronics is sharply on the rise, giving hackers extraordinary power to attack, compromise and control systems from afar without ever leaving their desks.…
With offices moving to the cloud, more lawyers are using their own hardware to stay productive while away from the office. Merging personal and professional data on the same device opens both sides to cyber attacks. Most workplaces are fully online: Printers and landlines are networked, paper files are being digitized and indexed for searching,…
Attorneys are often exposed to risk simply because they do not possess a data breach response plan. Data breaches are becoming too common. According to the FBI, hundreds of law firms have fallen victim to data breaches committed by hackers. Data breaches range from theft or loss of laptops or mobile devices to interference with…
Most states have not issued ethics opinions on cloud computing security. However, firms that do use third-party cloud computing services still need to follow standards to ensure client information is safeguarded. The rapid development of information technology has increased efficiency in law firms, and has also raised security issues. Attorneys have a responsibility to keep…
The greater question of whether companies’ and citizens’ use of and access to strong cryptography will eventually be curtailed by the courts or by Congress still looms.
Legal News
Powered by Law Firm Newswire