The UK Government has added two new duties to the proposed Online Safety Bill (the Bill) that are aimed at protecting people against anonymous online abuse. These measures would give users of “main social media firms” more control over
Security
Online security breaches — A growing threat in the digital era
One of the emerging threats in the digital era is online security breaches. Today, millions of people use social media platforms to post information about their lives online. In doing so, they often provide sensitive personal information to various platforms, including credit card information, personal preferences, and other information that is otherwise protected by various privacy legislation. A security breach from an unknown hacker can lead to millions of users’ accounts being compromised. In addition, many users now use one social media platform to host a variety of applications. In those circumstances, a security breach of the main platform could have a ripple effect on other accounts. Protecting against these types of security breaches is becoming increasingly important in the digital era.
U.S. Department of Homeland Security to collect immigrants’ social media data
The United States Department of Homeland Security (“DHS”) published, on September 18, 2017, in the Federal Register, a notice that it would begin collecting certain information relating to immigrants’ use of social media as part of the National File Tracking System of Records. Since 1944, so-called Alien Files have been the official record system of immigrants, who have each received an Alien Registration Number. These files have historically contained basic information, such as each immigrant’s name, date of birth, date of entry into the United States, country of birth, parents’ names, and naturalization information, if applicable. The files also generally include any record of interactions between each immigrant and the United States government.
Making Us Safer, through Brand Protection
What does brand protection have to do with cybersecurity? A study earlier this year demonstrates the connection.
Social engineering fraud
We’re back, with our top five social media stories of 2015
The Social Media Law Bulletin is back!
The ongoing interest of our readers as well as the increasing impact of social media led us to re-launch the Social Media Law Bulletin. We will be bringing you coverage of one or…
Snapchat and Maryland Attorney General
We had previously written about the U.S. Federal Trade Commission’s proposed complaint and consent with mobile messaging service Snapchat, best known for promoting its “ephemeral” photo messaging site. The FTC alleged the Snapchat violated the Federal Trade Commission Act through…
Do you “like” it?
From clicking “like” on Facebook to the +1 button on Google+ to the “Follow” or “Retweet” buttons on Twitter, the use of endorsements in social media has exploded since 2009. “Like” buttons and retweeting are growing trends in social media. …
Social media: did you know?
How many of us actually read social media terms of use? Be wary: you allow public information to be accessible over public search engines.
When you tweet you:
- grant Twitter a licence to use, copy, reproduce, process, adapt, modify, publish,
…
Minors’ credit card purchases
If your social media page permits a user to purchase goods or services from you, a December 20, 2013 ruling from the Northern District of California may be of interest.
The case involves minors using their parents’ credit cards without…