A student-run resource for reliable reports on the latest law and technology news

Archive for the ‘Cyberlaw’ Category

Leaked NSA Memos Reveal More on Data Collection Procedures
By Katie Mullen – Edited by Michelle Sohn

Last weekend, the Guardian leaked two more National Security Agency (“NSA”) documents regarding the NSA’s recently uncovered surveillance program. The first document details procedures used to target “non-U.S. persons” believed to be located outside the United States. The second document describes minimization procedures the NSA uses in collecting data under Section 702 of the amended Foreign Intelligence Surveillance Act (“FISA”), 50 U.S.C. 1881 (2012).

Read More...

Posted On Jun - 28 - 2013 Comments Off READ FULL POST

Leaked Surveillance Programs Reveal Large-Scale Data Collection
By Michelle Sohn – Edited by Katie Mullen

Last week, the Guardian revealed two top-secret U.S. programs—Verizon metadata collection and PRISM—that allow the National Security Agency (“NSA”) to conduct domestic surveillance on a massive and unprecedented scale. The U.S. Foreign Intelligence Surveillance Court ordered Verizon to provide the NSA with “telephony metadata.” The PRISM program allows the government direct access to participating companies’ servers.

Read More...

Posted On Jun - 15 - 2013 Comments Off READ FULL POST

Trailblazing Email Privacy Bill Proposed in Texas
Mary Grinman – Edited by Natalie Kim

On May 27, 2013, the Texas State Senate and House signed H.B. 2268. The legislation requires state law enforcement agents to secure a warrant before accessing emails and other “electronic customer data.” H.B. 2268 at 3–4. It also permits warrants on out-of-state service providers that do business with a Texas resident in certain circumstances. Id. at 9. The bill closes the loophole of the 1986 Electronic Communications Privacy Act (ECPA), which allows warrantless access to emails opened or older than 180 days.

Read More...

Posted On Jun - 8 - 2013 Comments Off READ FULL POST

Unwanted Exposure: Civil and Criminal Liability for Revenge Porn Hosts and Posters

Written by: Susanna Lichter
Edited by: Suzanne Van Arsdale

Hollie Toups, the first named plaintiff in Toups v. GoDaddy, was harassed for weeks after nude pictures of her appeared on the website Texxxan.com alongside her real name and a link to her Facebook profile. When Toups requested that Texxxan.com remove the pictures, she was told by the website that they could help in exchange for her credit card information.[i] Texxxan.com is a “revenge porn” or “involuntary porn” website.[ii]

Read More...

Posted On May - 28 - 2013 2 Comments READ FULL POST

Flash Digest: News in Brief

By Jessica Vosgerchian

Phishing Attack Used to Steal Bitcoins

Court Documents Reveal FBI Cellphone Surveillance Tool and Verizon’s Involvement

Google Introduced New Tool for Managing Digital Afterlife

Lithuania Monitors Suspected Tax Fraud with Google Maps Street View

Read More...

Posted On Apr - 15 - 2013 Comments Off READ FULL POST
  • RSS
  • Facebook
  • Twitter
  • GooglePlay
how-to-draw-an-android-android-phone_1_000000008746_5

Google Appeals Rulin

Google Appeals Ruling that Use of Java APIs in Android ...

Icon-news

Flash Digest: News i

By Ariane Moss Microsoft Tax Banned in Italy In a case filed ...

api_icon

Google Appeals Rulin

By Katherine Kwong – Edited by Ashish Bakshi Petition for Writ ...

13399-surveillance_news

UN Report Finds Gove

By Olga Slobodyanyuk – Edited by Jesse Goodwin The UN Report from ...

PatentDraftingTools

Functional Claim Ele

By Asher Lowenstein – Edited by Mengyi Wang Robert Bosch, LLC, ...