When the defendants could not otherwise be located and served by paper, face-to-face, two Judges ordered service on Facebook since the defendants were in Turkey and Antigua.  Since Turkey “has not specifically objected to service by email or social media networking sites which are not explicitly listed as means of

Continue Reading 2 Courts Permit Defendants to be Served on Facebook

Privacy issues have been highlighted by a recent Newsweek report that “mysterious devices sprinkled across America—many of them on military bases—that connect to your phone by mimicking cell phone towers and sucking up your data“ and an earlier Florida Today report that “[l]ocal and state police, from Florida to Alaska

Continue Reading 18+ States Rely on “Stingrays” (Fake Cell Towers) for Surveillance – Is this an Invasion of Privacy?


Most people freely attach devices to the Internet throughout their home without contemplating any privacy risk, but a recent home inspection of “network-attached storages (NAS), Smart TVs, router, Blu-ray player” by Kaspersky Lab security analyst David Jacoby proved otherwise.  As a result of this inspection a report was issued entitled

Continue Reading 3 IoT (Internet of Things) Cyber Threats to Privacy in Your Home That Might Surprise You


Since the plaintiff did not a file a lawsuit against John Doe, the Texas trial court had no jurisdiction to allow the plaintiff to take the deposition of “Trooper,” an anonymous blogger who launched on on-line attack on the CEO of a company who lives in Houston. In the case

Continue Reading John Doe Can Remain Anonymous and Not Be Deposed in Pre-Litigation Discovery


My 2011 eCommerce Times column “Cloud Computing – New Buzzword, Old Legal Issues” reminded many folks that “the technology concept behind cloud computing has been around for more than 50 years, and the legal issues are equally old.”  Obviously the reasons Cloud systems crash are equally old news

Continue Reading 9 Common Reasons Cloud Systems Crash: Things to Remember When Negotiating Cloud Contracts


Unsuspecting children downloaded apps from the Google Play store with “unlimited in-app charges without Google requiring entry of a password or other account holder involvement to obtain the account holder’s consent before the charges were incurred” according to FTC (Federal Trade Commission) Chair Edith Ramirez.  On September 4, 2014

Continue Reading $19 Million Settlement for Droid App Charges between Google and FTC


Wikipedia describes “Big Data” as a broad term “for any collection of data sets so large and complex that it becomes difficult to process using on-hand data management tools or traditional data processing applications.”  Forbes identified these “5 Things Managers Should Know About The Big Data Economy

Continue Reading 5 Reasons to Read “Big Data Analytics for Dummies”


Wikipedia describes cyberethics as “the philosophic study of ethics pertaining to computers, encompassing user behavior and what computers are programmed to do, and how this affects individuals and society.”  To learn more about cyberethics in business, please watch my recent video entitled “CyberEthics: A Growing Business Challenge.” The

Continue Reading VIDEO: Cyberethics in the Work Place


A recent survey about BYOD (“Bring Your Own Device”) resulted in the finding that “78% of employees use their own mobile devices for work” and “the use of personal technology to access corporate data can be solved by better communication between both parties regarding security, data and privacy concerns.”  On

Continue Reading “BYOD Bill of Rights” May Help Concerns about Privacy


Dell’sAnatomy of a cyber-attack” focuses on malware because malware “comes in various forms, some more nefarious than others, ranging from annoying sales pitches to potentially business-devastating assaults.”  This “how to” report from Dell makes the point that you “need to understand the enemy before you can defeat

Continue Reading “How to Stop Malware” – Strategies and Tools of Cyber Criminals