Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: Privacy

How to Block Spam Calls and Text Messages

Wired: “Learn how to fight the scourge of unsolicited rings and pings from spammers, scammers, and telemarketers.Life is busy enough without wasting time on spammers, scammers, and telemarketers. Whether you are suffering insistent injury lawyers, fraudulent IT specialists, or a drunk-dialing ex, there is a way to stop the calls and messages. The major carriers… Continue Reading

Breached! Why Data Security Law Fails and How to Improve It (Chapter 1)

Solove, Daniel J. and Hartzog, Woodrow, Breached! Why Data Security Law Fails and How to Improve It (Chapter 1) (March 1, 2022). Oxford University Press (2022), Available at SSRN: https://ssrn.com/abstract=4043111 – “Digital connections permeate our lives—and so do data breaches. Given that we must be online for basic communication, finance, healthcare, and more, it is remarkable… Continue Reading

Pete Recommends Weekly highlights on cyber security issues, March 12, 2022

Via LLRX – Pete Recommends Weekly highlights on cyber security issues, March 12, 2022 – Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly… Continue Reading

Pete Recommends – Weekly highlights on cyber security issues, March 6, 2022

Via LLRX – Pete Recommends – Weekly highlights on cyber security issues, March 6, 2022: Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex… Continue Reading

LLRX February 2022 Issue

LLRX Articles and Columns for February 2022 Offense v. Defense – The goal of this paper by Andrew Pittman, MSU Law-3L, is a call for a new strategy on cybersecurity. Pittman’s paper begins with real life incidents of cybercrime attacks on critical infrastructures abroad and in the U.S. Second, it defines what is offensive cybersecurity… Continue Reading

The secret police: Cops built a shadowy surveillance machine in Minnesota after George Floyd’s murder

“An investigation by MIT Technology Review reveals a sprawling, technologically sophisticated system in Minnesota designed for closely monitoring protesters. Law enforcement agencies in Minnesota have been carrying out a secretive, long-running surveillance program targeting civil rights activists and journalists in the aftermath of the murder of George Floyd in May 2020. Run under a consortium… Continue Reading