Internet Law Commentary

Law and Technology from a Palm Beach lawyer

Latest Blogs
Popular Posts
Recommended

Latest Blogs

ajax-loader

WE’VE MOVED !

HL

After about six years and several hundred posts, I’ve decided to use www.Hopkins.law as my primary blog and website. I am going to leave this site active. But the new content will be at Hopkins.law. At the new site, I’ll broaden the topics we discuss and, at least immediately, post more frequently. Please add to your… Read More

Nine Ways that Companies Get Hacked

gmail-hack-day-2

This one page article explains the 9 most common ways your clients and companies get hacked — in a single page Palm Beach Bar article. Don’t know a DDOS from a SQL attack? Brute force or a reverse brute force. Read the kama sutra of hacking-for-lawyers, here.

Department of Defense: Interim Rule on CyberSecurity

the_pentagon (1)

The Department of Defense has issued an Interim Rule amending the Defense Federal Acquisition Regulation Supplement (DFARS). The specific focus is on new rules  which require contractor reporting on network penetrations. Additionally, this Rule implements DoD policy on the purchase of cloud computing services. The Interim Rule is here. According to the Federal Registry: This interim… Read More

NIST Draft Practice Guide: Securing Electronic Health Records on Mobile Devices

nist_campus-sign

The National Institute for Standards and Technology issued a “draft” version of a Cybersecurity Practice Guide aimed at doctors, hospitals, and other health care providers. The 82-page Guide discusses how medical providers access patient data remotely and that “the use of mobile devices to store, access and transmit electronic health care records is outpacing the privacy… Read More

Second Cir: Facebook Case Reveals Difference b/t CFAA & SCA Statute of Limitation Periods

fb

The Second Circuit confirmed that the Computer Fraud and Abuse Act (18 USC 1030) and the Stored Communications Act (18 USC 2701) calculate the starting point of their two year statute of limitation differently.  If someone’s email and/or social media accounts are hacked, the statutory periods are calculated differently.  This case may be important since… Read More

Apps for Florida Mediators

d2f922d202814267bba27f87962827ce

What technology and apps should mediators use? Thanks to the Florida Dispute Resolution Center for inviting me to their 23rd annual conference in Orlando, Florida on July 30-31, 2015. Our session, Technology and Apps for Mediators, explained what technology you need to run an effective and profitable mediation office.  We also discussed iPhone and iOS… Read More

Federal Reserve: What Community Banks Should Know About Virtual Currency

Bitcoin-btcbible

The Federal Reserve System issues periodic newsletters to highlight information that community banks may find helpful in order to comply with Federal Reserve policy. To that end, the Federal Reserve’s “Community Banking Connections” is supposed to be a “primary source for information on guidance, resources, and tools to help community banks across the United States.”… Read More

Ten Steps to Facebook Discovery

fb

      This article, from the Spring 2015 Trial Advocate Quarterly, discusses four (4) reported trial orders  and (3) appellate decisions on social media discovery from Florida. While the orders and opinions are not exactly harmonized, they can be interpreted in a way that counsel for parties seeking social media discovery can follow these ten… Read More

ajax-loader