Involuntary Technological Encroachment

Once upon a time, the advent of the radio was considered a major advancement, and families in the evenings would huddle together and listen to favorite radio shows. Not that much later, television became the big thing. And with TV, it was easy to sit passively by as a couch potato watching one show after another.

Indeed, there is the following joke: A man says to his wife, “Honey, if I ever became a vegetable, please pull the plug.” So, the wife walks past her husband on the couch over to the television set and pulls its plug from the wall electrical socket.

Continue reading “Involuntary Technological Encroachment”

The Coming Tech Year

We made it through 2016. So, what’s in store in 2017 when it comes to hot tech issues? There are many hot issues, such as big data, intellectual property disputes, the sharing economy, and drones. But this blog covers the three potential biggest issues. Drum roll please — here we go!

1. Security — Cybercrime & Cyberwarfare

Hacking, hacking, hacking …

Security on the internet is the first and foremost tech issue for 2017.

Hacking is penetrating all sorts of systems. For example, individuals are vulnerable to cybercrime, as their personally identifiable information is stolen when companies are hacked.

And cyberwarfare appears to be here and now, and not just some speculation about the future. Indeed, the Senate is preparing at this moment to hold hearings about the implications of apparent Russian hacking that meddled in our recent presidential election.

This year likely will be dominated by efforts to combat threats to internet security.

Continue reading “The Coming Tech Year”

Be Afraid, Very Afraid Of Who You Meet Online?

Before the explosion of online communications, our world necessarily was smaller and who we came in contact with tended to people we already knew. Then our ability to reach out and communicate with others expanded dramatically and exponentially as we all started traveling at warp speed down the information superhighway.

We learned that not only could we interact with people locally, but with a few keystrokes and mouse clicks we could be communicating with people across the country and even in countries on the other side of the globe. Part of the fun was our ability to communicate anonymously, using pseudonyms.

We could be informal, we could be creative, and we could reinvent ourselves. Indeed, most of us probably remember the cartoon with a dog in front of a monitor and a keyboard that had a caption which read: “On the Internet, nobody knows you’re a dog.” Case law developed making clear that First Amendment protections extended to the right to speak freely and even anonymously on the Internet.

All well and good, right? Perhaps for the most part. The Internet has provided a medium that has led to many beneficial communications and interactions for personal, business, and other purposes. However, human nature is not always pure. From the beginning of human history, it seems there always have been some people intent on mischief and even violent behavior. And unfortunately, with the increased ability for people to contact others via the Internet, there also is a heightened possibility for such contacts to lead to terrible results.
Continue reading “Be Afraid, Very Afraid Of Who You Meet Online?”

Smartphones Can Do Anything, Right?

Once upon a time, frankly not that long ago, a telephone was something that was tethered by a wire to a phone jack and that enabled people to make telephone calls — nothing more. A home had one phone line, and perhaps multiple phones for that line.

Things became just a bit more interesting later when a home had more than one phone line. That meant, for example, that a teenager could stay up all night gabbing on the teenager’s phone line without interfering with the ability of family members to make a phone call on another home line.

This still was a fairly simple situation. When we were out and about in the world, our phones did not follow us. Our communications tended to be more in-person, and perhaps we observed what was happening in the world around us with a bit more of a keen sense, without any technological distractions.

In the late 1980s, we witnessed the first “mobile” phones. These phones were behemoths. Such a phone and its battery pack literally took up a large briefcase to carry around. Other than the cachet of parading the fact of owning the behemoth mobile phone, it honestly was easier to use a pay phone when out of the home or office.

But in the 1990s and thereafter, mobile phone technology developed exponentially in terms of size, functionality, and convenience. And now, in a small device about the size of a pack of cards, or smaller, we literally have the world at our fingertips.
Continue reading “Smartphones Can Do Anything, Right?”

9th Circuit Resisting Efforts to Dilute CDA Section 230 ISP Immunity?

Section 230 of the Communications Decency Act (CDA) generally affords immunity for Internet Service Providers (ISPs) with respect to content posted by users on their websites. There have been various efforts by plaintiffs in lawsuits to chip away at this immunity, most of which have failed. Now along comes Doe v. Internet Brands, in which the plaintiff sought to convince the Ninth Circuit to circumvent CDA Section 230 immunity under a “duty to warn” theory.

Factual Allegations

The anonymous plaintiff, Jane Doe, alleged that she was a model who was enticed to travel to Florida by two men. The men drugged her, raped her, and then displayed this horrid event in a pornographic video.

Doe alleged that the two men initially found her by way of the website Model Mayhem, which she’d joined as a member. She asserted that Model Mayhem is a site that profiles hundreds of thousands of models, and that the owner of the site, Internet Brands, allegedly knew of the illegal scheme by the two men but nevertheless neglected to warn her of the potential harm. Continue reading “9th Circuit Resisting Efforts to Dilute CDA Section 230 ISP Immunity?”

Getting Serious About Cybersecurity

Hack attacks have been in the news for a while. But the most recent headlines seem to indicate that hackers are far outpacing security efforts to contain them.

In the last week, we have learned that a major health insurer was compromised, possibly exposing the data of 80 million health accounts. Data relating to medical patients is very sensitive, and the number 80 million is staggering in scope. And there have been indications that other health insurers might be vulnerable, meaning that 2015 could be the year of health insurance hacks.

On top of that, we just learned that “Anonymous” hackers have attacked the website of the President of the European Parliament. So, this tells us that not only is medical information unsafe, but government officials are not able to protect themselves from hackers. Continue reading “Getting Serious About Cybersecurity”

The Need for Speed Online: Don’t Just Sit There!

Do you ever get up in the morning, feeling sluggish and just not up to the tasks that await you? For most of us, the answer is yes, at least once in a while.

And does it ever seem that your Internet connection is having a bad hair day? Specifically, does it feel like it takes forever for Web pages to download, reminding you of the days of 32k and 56k dial-up modems?

If so, do you just sit there passively and hope and pray that the connection will improve? Well, there might be something you can do to give your Internet connection that coffee jolt that it needs to step up its game.

Case in point: There I was, trying to open Web pages so that I could accomplish work tasks remotely from my home computer last week. I kid you not, everything online was taking forever! Continue reading “The Need for Speed Online: Don’t Just Sit There!”

FTC Seeks to Thwart ‘Revenge Porn’

While the Internet provides many obvious advantages to people in this digital age, it can also enable a dark side for those intent on mischievous and criminal online behavior. “Revenge porn” is part of that dark side.

So, what is revenge porn? It usually consists of a nude photograph or video which is publicly shared online (most frequently by an ex-lover of the nude subject) for the purpose of spiteful humiliation.

The nude photograph or video generally is recorded when the couple is in a positive relationship, and then later is shown to the world on the Internet after the relationship has crumbled, most often by the male posting nude content of his female ex.

There also are revenge porn ransom websites. Specifically, such a website posts nude photos and videos provided by ex-lovers of their former lovers, and then offers to take down the content if paid a certain amount of money. The Federal Trade Commission has been seeking to root out these types of websites.
Continue reading “FTC Seeks to Thwart ‘Revenge Porn’”

Keeping Our Tech Love Alive

We live in a world in which we are bombarded with information data from many sources, and so much around us on the tech landscape is transparent. How, then, do we keep our tech love alive? Read on.

Spoiling the Surprise?

Yes, it is wonderful that we have so many interesting and creative information technology outlets. But at times we are robbed of the magic and mystique of learning about the world with surprise and personal experience.

Facebook is a great way to keep in touch with and learn about our friends. However, it becomes tiring and redundant to be notified of posts from the same people over and over again with respect to the most mundane matters.

And sure, it is wonderful to be able read online reviews of restaurants and hotels, but then when we arrive we generally find what we were expecting based on advance notice.

Of course, online trailers for movies and television shows help us to select what to watch, but so much is shown in the trailers that we know beforehand where the movies and shows will go.

When it comes to music, we have access to so much from online outlets that we can know so many more bands and songs than ever before; but at the same time it can become rare to hear new and different musical works.

In the 1970s, the band Heart sang “Keep My Love Alive.” So, how do we keep our tech love alive? Continue reading “Keeping Our Tech Love Alive”

It’s 2015: The Future Is Here for Legal Tech

It may be hard to believe, but we already have closed the books on 2014, and we now have started making our legal way into 2015. The year 2015 at first blush sounds futuristic, and in many ways we really are living in the legal tech future we could have barely imagined not that many years ago.

When I started practicing law approximately 30 years ago, advanced technology meant that legal secretaries used mag cards in their electronic typewriters. When we conducted legal research, we actually went into the law library and cracked open real, hard-backed books. Once upon a time, it was a very, very big deal to receive a fax.

Back then, we used dictaphones to dictate letters, memoranda and briefs. When it came to document production, we actually met in conference rooms with opposing counsel and exchanged boxes of hard copy documents for in-person review. When we made telephone calls, we were tethered to the phones and phone cords at our office desks. And, of course, when we were working, we definitely were physically present at our law offices.

In what seems like a heartbeat, those days are gone. Continue reading “It’s 2015: The Future Is Here for Legal Tech”

© 2009- Duane Morris LLP. Duane Morris is a registered service mark of Duane Morris LLP.

The opinions expressed on this blog are those of the author and are not to be construed as legal advice.

Proudly powered by WordPress