SlideShare a Scribd company logo
1 of 10
“LEGAL ISSUES IN
TECHNOLOGY”APT 510
SHONDA ROBINSON
DATA SECURITY
Data security concerns posed by advances in technology and the manner in which consumers, businesses and
other organizations use that technology will be a significant concern in the year ahead. Data-related issues
permeate virtually all evolving technologies. With huge amounts of business and personal data transmitted and
stored electronically, the opportunities for data breaches are dramatically increased and businesses must
anticipate quick responses to satisfy a patchwork of state and federal data breach regulations. While those
regulations continue to raise the standards for data security practices, contracting parties also expect greater
accountability for these standards. Enhanced encryption and biometrics may also provide solutions for some of
these problems.
BIG DATA
By one estimate, computer and device users create over 2.5 quintillion bytes of data daily! This is the world of Big Data.
Technologies to analyze, use, and, in some cases, commercialize such vast amounts of data are beginning to be more
widely deployed. However, the significant productivity gains and commercial opportunities are offset by serious security
concerns and encroachments on privacy. Major issues will include who should control and be compensated for such data.
CLOUD COMPUTING
Cloud computing continues to show great promise for major cost savings for
businesses and convenience for consumers. Yet, as more software applications
and other computing resources are hosted and accessed online in the “cloud,”
data privacy and security risks are increasing, and contracting and licensing
norms are evolving and becoming more difficult to manage.
OPEN SOURCE SOFTWARE
Non-proprietary open source software applications offer many benefits and costs
savings, but compliance with open source license terms can be tricky. If not
handled properly, use of open source software can compromise ownership of
company software and jeopardize acquisitions and other significant business
transactions.
MOBILE PAYMENTS
Several consumer surveys suggest that we keep better track of our mobile devices than we do of our
wallets, so the rapid spread of mobile payments is no surprise. However, liability issues remain to be
worked out for many transactions – misdirected payments, unauthorized access and account balance
mistakes, among others – that may not go as intended.
SOCIAL MEDIA LIABILITIES
Widespread business use of social media tools means that companies must
maintain and communicate clear policies of acceptable practices and ensure
compliance with applicable terms. Many legal pitfalls exist, including running afoul
of state-level sweepstakes regulations with online promotions; failure to comply
with relevant FTC guidelines when using social media for online marketing
programs; inadvertent infringements of third-party intellectual property rights when
posting content; and contract breaches because of noncompliance with social
media platform rules.
THE INTERNET OF THINGS
Electronic tagging and tracking of objects and people with bar codes, RFID
devices and other technologies and communicating the resulting data about
locations, movements and status – the so-called “Internet of Things” – is on the
cusp of becoming reality. While this technology may offer many benefits to
businesses and consumers, the privacy issues posed by the Internet of Things are
similar to the issues surrounding “Big Data.”
VIRTUAL CURRENCIES
Offering convenience for many online transactions, virtual currencies (such as
Bitcoin) fill a growing marketplace niche. However, unlike sovereign currencies,
which are subject to varying degrees of regulation, virtual currencies do not fit
neatly into existing legal frameworks. In addition, this fact has not gone unnoticed
by criminal elements, and provides another reason that mainstream consumers
and businesses are wary about the acceptability of digital currencies.
WEARABLE COMPUTERS
Google Glass, computer watches (more elaborate than what Dick Tracy might have imagined) and other
wearable computing devices push the boundary of mobile computing even further than the still recent
wonders of smartphones and tablets. The tie-in of these devices with biometric monitoring, access and
control offer potential conveniences while also presenting additional risks. The privacy, security and
liability issues with such devices will likely dwarf the similar concerns (e.g., texting while driving) raised by
our non-wearable mobile appendages.

More Related Content

What's hot

The criticality-of-security-in-the-internet-of-things joa-eng_1115
The criticality-of-security-in-the-internet-of-things joa-eng_1115The criticality-of-security-in-the-internet-of-things joa-eng_1115
The criticality-of-security-in-the-internet-of-things joa-eng_1115
Devaraj Sl
 

What's hot (20)

Interner of Things Iinsurance gateway
Interner of Things Iinsurance gateway Interner of Things Iinsurance gateway
Interner of Things Iinsurance gateway
 
The Six Biggest Blockchain Trends Everyone Should Know About In 2021
The Six Biggest Blockchain Trends Everyone Should Know About In 2021The Six Biggest Blockchain Trends Everyone Should Know About In 2021
The Six Biggest Blockchain Trends Everyone Should Know About In 2021
 
Blockchain technology and supply chain management
Blockchain technology and supply chain managementBlockchain technology and supply chain management
Blockchain technology and supply chain management
 
Discover 7 Technology Trends To Watch For 2019
Discover 7 Technology Trends To Watch For 2019Discover 7 Technology Trends To Watch For 2019
Discover 7 Technology Trends To Watch For 2019
 
VET4SBO Level 2 module 6 - unit 4 - v0.9 en
VET4SBO Level 2   module 6 - unit 4  - v0.9 enVET4SBO Level 2   module 6 - unit 4  - v0.9 en
VET4SBO Level 2 module 6 - unit 4 - v0.9 en
 
How the Emerging IoT will Prompt Asset Management Issues - IAITAM Spring ACE ...
How the Emerging IoT will Prompt Asset Management Issues - IAITAM Spring ACE ...How the Emerging IoT will Prompt Asset Management Issues - IAITAM Spring ACE ...
How the Emerging IoT will Prompt Asset Management Issues - IAITAM Spring ACE ...
 
Iot viewpoints. Ovum explores the IoT opportunity in 2018 and beyond
Iot viewpoints. Ovum explores the IoT opportunity in 2018 and beyondIot viewpoints. Ovum explores the IoT opportunity in 2018 and beyond
Iot viewpoints. Ovum explores the IoT opportunity in 2018 and beyond
 
5 Security Trends to Watch in 2020
5 Security Trends to Watch in 20205 Security Trends to Watch in 2020
5 Security Trends to Watch in 2020
 
The Identity of Things: Privacy & Security Concerns
The Identity of Things: Privacy & Security ConcernsThe Identity of Things: Privacy & Security Concerns
The Identity of Things: Privacy & Security Concerns
 
Ten trends of blockchain in 2020
Ten trends of blockchain in 2020Ten trends of blockchain in 2020
Ten trends of blockchain in 2020
 
The 5 Biggest Blockchain And Distributed Ledger Trends Everyone Should Be Wat...
The 5 Biggest Blockchain And Distributed Ledger Trends Everyone Should Be Wat...The 5 Biggest Blockchain And Distributed Ledger Trends Everyone Should Be Wat...
The 5 Biggest Blockchain And Distributed Ledger Trends Everyone Should Be Wat...
 
IoT, AI and Blockchain: Catalysts for Digital Transformation
IoT, AI and Blockchain: Catalysts for Digital TransformationIoT, AI and Blockchain: Catalysts for Digital Transformation
IoT, AI and Blockchain: Catalysts for Digital Transformation
 
Latest Technology News 2020
Latest Technology News 2020Latest Technology News 2020
Latest Technology News 2020
 
Ita 2000
Ita 2000Ita 2000
Ita 2000
 
The Internet Of Things
The Internet Of ThingsThe Internet Of Things
The Internet Of Things
 
Global Threats| Cybersecurity|
Global Threats| Cybersecurity| Global Threats| Cybersecurity|
Global Threats| Cybersecurity|
 
Kill the Dinosaurs, and Other Tips for Achieving Technical Competence
Kill the Dinosaurs, and Other Tips for Achieving Technical CompetenceKill the Dinosaurs, and Other Tips for Achieving Technical Competence
Kill the Dinosaurs, and Other Tips for Achieving Technical Competence
 
Is Your Organization in Crisis?
Is Your Organization in Crisis?Is Your Organization in Crisis?
Is Your Organization in Crisis?
 
The criticality-of-security-in-the-internet-of-things joa-eng_1115
The criticality-of-security-in-the-internet-of-things joa-eng_1115The criticality-of-security-in-the-internet-of-things joa-eng_1115
The criticality-of-security-in-the-internet-of-things joa-eng_1115
 
How the Internet of Things Leads to Better, Faster Crisis Communication
 How the Internet of Things Leads to Better, Faster Crisis Communication How the Internet of Things Leads to Better, Faster Crisis Communication
How the Internet of Things Leads to Better, Faster Crisis Communication
 

Similar to Apt 510 slideshare

Project 2020 Scenarios for the Future of.docx
Project 2020 Scenarios for the Future of.docxProject 2020 Scenarios for the Future of.docx
Project 2020 Scenarios for the Future of.docx
briancrawford30935
 
WP-Privacy-IoT-Era - PRODUCTION
WP-Privacy-IoT-Era - PRODUCTIONWP-Privacy-IoT-Era - PRODUCTION
WP-Privacy-IoT-Era - PRODUCTION
John Pinson
 
The Weakest Point of Security in IoT
The Weakest Point of Security in IoTThe Weakest Point of Security in IoT
The Weakest Point of Security in IoT
nsangary
 
Sept 2012 data security & cyber liability
Sept 2012   data security & cyber liabilitySept 2012   data security & cyber liability
Sept 2012 data security & cyber liability
DFickett
 

Similar to Apt 510 slideshare (20)

Legal issues in technology
Legal issues in technologyLegal issues in technology
Legal issues in technology
 
Gilbert + Tobin Innovation Insights
Gilbert + Tobin Innovation InsightsGilbert + Tobin Innovation Insights
Gilbert + Tobin Innovation Insights
 
Virtual Data Room Industry Growth Statistics and Trends.pdf
Virtual Data Room Industry Growth Statistics and Trends.pdfVirtual Data Room Industry Growth Statistics and Trends.pdf
Virtual Data Room Industry Growth Statistics and Trends.pdf
 
Project 2020 Scenarios for the Future of.docx
Project 2020 Scenarios for the Future of.docxProject 2020 Scenarios for the Future of.docx
Project 2020 Scenarios for the Future of.docx
 
Deloitte the case for disruptive technology in the legal profession 2017
Deloitte the case for disruptive technology in the legal profession 2017 Deloitte the case for disruptive technology in the legal profession 2017
Deloitte the case for disruptive technology in the legal profession 2017
 
WP-Privacy-IoT-Era - PRODUCTION
WP-Privacy-IoT-Era - PRODUCTIONWP-Privacy-IoT-Era - PRODUCTION
WP-Privacy-IoT-Era - PRODUCTION
 
Digital Forensics Market, Size, Global Forecast 2023-2028
Digital Forensics Market, Size, Global Forecast 2023-2028Digital Forensics Market, Size, Global Forecast 2023-2028
Digital Forensics Market, Size, Global Forecast 2023-2028
 
DATA SAFEGUARD INC.- WHITE PAPER
DATA SAFEGUARD INC.- WHITE PAPERDATA SAFEGUARD INC.- WHITE PAPER
DATA SAFEGUARD INC.- WHITE PAPER
 
Lecture 14
Lecture 14Lecture 14
Lecture 14
 
F5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks: The Internet of Things - Ready InfrastructureF5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks: The Internet of Things - Ready Infrastructure
 
Quick Start Guide to IT Security for Businesses
Quick Start Guide to IT Security for BusinessesQuick Start Guide to IT Security for Businesses
Quick Start Guide to IT Security for Businesses
 
The Weakest Point of Security in IoT
The Weakest Point of Security in IoTThe Weakest Point of Security in IoT
The Weakest Point of Security in IoT
 
Legal Issues in Applied Technology
Legal Issues in Applied TechnologyLegal Issues in Applied Technology
Legal Issues in Applied Technology
 
Cybersecurity regulation will be challenging
Cybersecurity regulation will be challengingCybersecurity regulation will be challenging
Cybersecurity regulation will be challenging
 
Managing Consumer Data Privacy
Managing Consumer Data PrivacyManaging Consumer Data Privacy
Managing Consumer Data Privacy
 
Securing data in the cloud: A challenge for UK Law Firms
Securing data in the cloud: A challenge for UK Law FirmsSecuring data in the cloud: A challenge for UK Law Firms
Securing data in the cloud: A challenge for UK Law Firms
 
Future of digital identity initial perspective - final lr
Future of digital identity   initial perspective - final lrFuture of digital identity   initial perspective - final lr
Future of digital identity initial perspective - final lr
 
9 Trends in Identity Verification (2023) by Regula
9 Trends in Identity Verification (2023) by Regula9 Trends in Identity Verification (2023) by Regula
9 Trends in Identity Verification (2023) by Regula
 
Five strategies for gdpr compliance
Five strategies for gdpr complianceFive strategies for gdpr compliance
Five strategies for gdpr compliance
 
Sept 2012 data security & cyber liability
Sept 2012   data security & cyber liabilitySept 2012   data security & cyber liability
Sept 2012 data security & cyber liability
 

Recently uploaded

一比一原版悉尼大学毕业证如何办理
一比一原版悉尼大学毕业证如何办理一比一原版悉尼大学毕业证如何办理
一比一原版悉尼大学毕业证如何办理
Airst S
 
Contract law. Indemnity
Contract law.                     IndemnityContract law.                     Indemnity
Contract law. Indemnity
mahikaanand16
 
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
Airst S
 
一比一原版(Cranfield毕业证书)克兰菲尔德大学毕业证如何办理
一比一原版(Cranfield毕业证书)克兰菲尔德大学毕业证如何办理一比一原版(Cranfield毕业证书)克兰菲尔德大学毕业证如何办理
一比一原版(Cranfield毕业证书)克兰菲尔德大学毕业证如何办理
F La
 
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理
A AA
 
一比一原版悉尼科技大学毕业证如何办理
一比一原版悉尼科技大学毕业证如何办理一比一原版悉尼科技大学毕业证如何办理
一比一原版悉尼科技大学毕业证如何办理
e9733fc35af6
 
Code_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.pptCode_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.ppt
JosephCanama
 
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
e9733fc35af6
 

Recently uploaded (20)

Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...
Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...
Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...
 
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
 
一比一原版悉尼大学毕业证如何办理
一比一原版悉尼大学毕业证如何办理一比一原版悉尼大学毕业证如何办理
一比一原版悉尼大学毕业证如何办理
 
Understanding the Role of Labor Unions and Collective Bargaining
Understanding the Role of Labor Unions and Collective BargainingUnderstanding the Role of Labor Unions and Collective Bargaining
Understanding the Role of Labor Unions and Collective Bargaining
 
Human Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptxHuman Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptx
 
Hely-Hutchinson v. Brayhead Ltd .pdf
Hely-Hutchinson v. Brayhead Ltd         .pdfHely-Hutchinson v. Brayhead Ltd         .pdf
Hely-Hutchinson v. Brayhead Ltd .pdf
 
Contract law. Indemnity
Contract law.                     IndemnityContract law.                     Indemnity
Contract law. Indemnity
 
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
 
The doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statuteThe doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statute
 
一比一原版(Cranfield毕业证书)克兰菲尔德大学毕业证如何办理
一比一原版(Cranfield毕业证书)克兰菲尔德大学毕业证如何办理一比一原版(Cranfield毕业证书)克兰菲尔德大学毕业证如何办理
一比一原版(Cranfield毕业证书)克兰菲尔德大学毕业证如何办理
 
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理
 
CAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction FailsCAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction Fails
 
一比一原版悉尼科技大学毕业证如何办理
一比一原版悉尼科技大学毕业证如何办理一比一原版悉尼科技大学毕业证如何办理
一比一原版悉尼科技大学毕业证如何办理
 
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
 
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptxAnalysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
 
3 Formation of Company.www.seribangash.com.ppt
3 Formation of Company.www.seribangash.com.ppt3 Formation of Company.www.seribangash.com.ppt
3 Formation of Company.www.seribangash.com.ppt
 
Cyber Laws : National and International Perspective.
Cyber Laws : National and International Perspective.Cyber Laws : National and International Perspective.
Cyber Laws : National and International Perspective.
 
Code_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.pptCode_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.ppt
 
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
 
Elective Course on Forensic Science in Law
Elective Course on Forensic Science  in LawElective Course on Forensic Science  in Law
Elective Course on Forensic Science in Law
 

Apt 510 slideshare

  • 2. DATA SECURITY Data security concerns posed by advances in technology and the manner in which consumers, businesses and other organizations use that technology will be a significant concern in the year ahead. Data-related issues permeate virtually all evolving technologies. With huge amounts of business and personal data transmitted and stored electronically, the opportunities for data breaches are dramatically increased and businesses must anticipate quick responses to satisfy a patchwork of state and federal data breach regulations. While those regulations continue to raise the standards for data security practices, contracting parties also expect greater accountability for these standards. Enhanced encryption and biometrics may also provide solutions for some of these problems.
  • 3. BIG DATA By one estimate, computer and device users create over 2.5 quintillion bytes of data daily! This is the world of Big Data. Technologies to analyze, use, and, in some cases, commercialize such vast amounts of data are beginning to be more widely deployed. However, the significant productivity gains and commercial opportunities are offset by serious security concerns and encroachments on privacy. Major issues will include who should control and be compensated for such data.
  • 4. CLOUD COMPUTING Cloud computing continues to show great promise for major cost savings for businesses and convenience for consumers. Yet, as more software applications and other computing resources are hosted and accessed online in the “cloud,” data privacy and security risks are increasing, and contracting and licensing norms are evolving and becoming more difficult to manage.
  • 5. OPEN SOURCE SOFTWARE Non-proprietary open source software applications offer many benefits and costs savings, but compliance with open source license terms can be tricky. If not handled properly, use of open source software can compromise ownership of company software and jeopardize acquisitions and other significant business transactions.
  • 6. MOBILE PAYMENTS Several consumer surveys suggest that we keep better track of our mobile devices than we do of our wallets, so the rapid spread of mobile payments is no surprise. However, liability issues remain to be worked out for many transactions – misdirected payments, unauthorized access and account balance mistakes, among others – that may not go as intended.
  • 7. SOCIAL MEDIA LIABILITIES Widespread business use of social media tools means that companies must maintain and communicate clear policies of acceptable practices and ensure compliance with applicable terms. Many legal pitfalls exist, including running afoul of state-level sweepstakes regulations with online promotions; failure to comply with relevant FTC guidelines when using social media for online marketing programs; inadvertent infringements of third-party intellectual property rights when posting content; and contract breaches because of noncompliance with social media platform rules.
  • 8. THE INTERNET OF THINGS Electronic tagging and tracking of objects and people with bar codes, RFID devices and other technologies and communicating the resulting data about locations, movements and status – the so-called “Internet of Things” – is on the cusp of becoming reality. While this technology may offer many benefits to businesses and consumers, the privacy issues posed by the Internet of Things are similar to the issues surrounding “Big Data.”
  • 9. VIRTUAL CURRENCIES Offering convenience for many online transactions, virtual currencies (such as Bitcoin) fill a growing marketplace niche. However, unlike sovereign currencies, which are subject to varying degrees of regulation, virtual currencies do not fit neatly into existing legal frameworks. In addition, this fact has not gone unnoticed by criminal elements, and provides another reason that mainstream consumers and businesses are wary about the acceptability of digital currencies.
  • 10. WEARABLE COMPUTERS Google Glass, computer watches (more elaborate than what Dick Tracy might have imagined) and other wearable computing devices push the boundary of mobile computing even further than the still recent wonders of smartphones and tablets. The tie-in of these devices with biometric monitoring, access and control offer potential conveniences while also presenting additional risks. The privacy, security and liability issues with such devices will likely dwarf the similar concerns (e.g., texting while driving) raised by our non-wearable mobile appendages.