Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: E-Records

5 Common Cybercrime Attack Vectors and How to Avoid Them

MakeUseOf – “The threat landscape has significantly expanded with the proliferation of the internet and digital connectivity. As of March 2020, there were more than 677 million new malware detections. This figure by Statista indicates a growing threat of cyberattacks against individuals and businesses. Cybercriminals take advantage of cyberattack vectors to bypass your basic security… Continue Reading

How hospitals hide pricing data from web search results

Becker’s Health IT (no paywall): “HCA Healthcare and Universal Health Services are among hundreds of hospitals that have embedded special coding within their websites to block previously confidential pricing information from appearing in web searches, according to a March 22 Wall Street Journal report. Seven things to know…” Continue Reading

Pete Recommends – Weekly highlights on cyber security issues, March 21, 2021

Via LLRX – Pete Recommends – Weekly highlights on cyber security issues, March 21, 2021 – Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the… Continue Reading

Cars Have Your Location. This Spy Firm Wants to Sell It to the U.S. Military

Motherboard – “A surveillance contractor that has previously sold services to the U.S. military is advertising a product that it says can locate the real-time locations of specific cars in nearly any country on Earth. It says it does this by using data collected and sent by the cars and their components themselves, according to a… Continue Reading

Your Face Is Not Your Own

The New York Times – “When a secretive start-up scraped the internet to build a facial-recognition tool, it tested a legal and ethical limit — and blew the future of privacy in America wide open…Computers once performed facial recognition rather imprecisely, by identifying people’s facial features and measuring the distances among them — a crude… Continue Reading

Federal Guidance Could Help Mitigate Cybersecurity Risks in 401(k) and Other Retirement Plans

Defined Contribution Plans: Federal Guidance Could Help Mitigate Cybersecurity Risks in 401(k) and Other Retirement Plans, GAO-21-25, Published: Feb 11, 2021. Publicly Released: Mar 15, 2021. “In their role administering private sector employer-sponsored defined contribution (DC) retirement plans, such as 401(k) plans, plan sponsors and their service providers—record keepers, third party administrators, custodians, and payroll… Continue Reading

You Know It’s Bad When The Court Decision Has A Table Of Contents: Part Deux

Above The Law -“…In DR Distributors, LLC v. 21 Century Smoking, Inc., originally filed in 2012, two companies that sell electronic cigarettes brought suit and counterclaims alleging, among other things, trademark violations under the Lanham Act. The court’s decision is 256 pages long. Like the Smalls decision 18 months ago, this decision was at times… Continue Reading

Pete Recommends – Weekly highlights on cyber security issues, March 6, 2021

Via LLRX – Pete Recommends – Weekly highlights on cyber security issues, March 6, 2021 – Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly… Continue Reading

Microsoft: Chinese Hackers Have Been Exploiting Our Email Product to Steal Data

Gizmodo: “In the latest in a string of security-related headaches for Microsoft, the company warned customers Tuesday that state sponsored hackers from China have been exploiting flaws in one of its widely used email products, Exchange, in order to target American companies for data theft. In several recently published blog posts, the company listed four… Continue Reading

Classifying Litigation Documents by Type

Osgood, Gene, Classifying Litigation Documents by Type (November 6, 2020). Proceedings of the 4th Annual RELX Search Summit, Available at SSRN: https://ssrn.com/abstract=3775730 “Law firms typically have large document repositories of litigation documents. Attorneys often want to locate litigation documents of a particular type, such as a motion to dismiss. Tagging each document with its type… Continue Reading

The importance of technology competence when communicating electronically

Sui Generis – Nicole Black: “I’m sure that by now you’ve already seen the now infamous cat filter court hearing video. If not, Google it and watch it. I’ll wait. Now that you’re back, let’s talk about how you can avoid replicating that unfortunate predicament. The short answer? By maintaining technology competence when using electronic… Continue Reading