“Be careful what you post.” This may be the most obvious of social media commandments. Yet, it’s also true that it’s difficult to control the degree of public access to photos and messages posted on a social media platform, and one never knows who may be reading or monitoring your…
Internet & Social Media Law Blog
The Case of the Hacked Hospital: When a Cyber Breach Becomes a Health Crisis
Recently, we noted vulnerability issues from use of the Internet of Things and how that has come to impact the health industry. Recent events continue to highlight this development. Since the start of the year, there have been cyber attacks targeting hospitals. Perhaps recognizing the extensive disruption and potential privacy…
China Imposes New Restrictions on Online Publishing
China has issued new, wide-ranging regulations on the publication of virtually any type of content over the Internet. The new rules, promulgated jointly by the PRC State Administration of Press, Publication, Radio, Film and Television (SAPPRFT) and the Ministry of Industry and Information Technology (MIIT), go into effect on March…
The FCC’s New Contest Rules Are Worth a Look
In her post “The FCC Has Written Good Contest Rules, Now You Should, Too” over at Pillsbury’s CommLawCenter blog, Lauren Lynch Flick has written a good summary—and provided a number of useful takeaways—regarding the FCC’s new Licensee-Conducted Contested Rule. While the rule focuses on broadcaster-run contests, the importance of clear…
News of Note for the Internet-Minded – 2/12/16
Amazon adjusts its TOS to account for a zombie apocalypse; Apple and Facebook ponder different roads for VR and its devices; the BBC will scan your face to see how you feel about what you’re viewing; and more … The Drone Racing League (DRL) launches at 80 mph and “wreck…
Managing the Cybersecurity Risks of the Medical Internet of Things
The cybersecurity ramifications of the Internet of Things (IoT) are perhaps nowhere more crucial—potentially a matter of life and death, in fact—than in the realm of medical devices. Until recent times, a potential hack of the data-sharing that is a hallmark of the IoT raised far more privacy concerns than…
The Value of Terms Limits: YouTube’s Broadly Defined TOS Does the Trick
Frequent readers of our blog will recall that in prior posts on companies such as Uber, Ashley Madison and Twitter, we have stressed the importance of having a robust terms of service (TOS) agreement. In many instances, TOS, if adeptly deployed, can limit a social media or gaming company’s liability…
News of Note for the Internet-Minded – 2/5/16
Augmented reality goes to the Superbowl; Cisco commits to the Internet of Things with a billion-dollar embrace (even as IBM belatedly embraces the cloud); the staying power of the sharing economy is questioned; and more … As Google’s head of AI becomes the head of the company, Google search is…
The ITC Tries an En Banc Shot to Redefine Its Regulatory Authority
In our recent post, Living in a Nonmaterial World: Determining IP Rights for Digital Data, we discussed the potential impact of the Federal Circuit decision in ClearCorrect v. ITC, 2014-1527, in which the appeals court held that the “articles that infringe” are limited to “material things” and thus do not…
Uber and Lyft Choose Different Routes in Navigating Legal Challenges
The future of ride-sharing companies has hung in the balance for more than two years while class actions and labor complaints were pending against industry giants Uber, Lyft and others. The ride-sharing companies have primarily fought with their drivers over the driver’s employment status—a conflict between whether the drivers are…