Tag Archive | social network

The Privacy Legal Implications of Big Data: A Primer

By David Navetta, Information Law Group, February 12, 2013

By now many lawyers and business managers have heard of the term “Big Data,” but many may not understand exactly what it refers to, and still more likely do not know how it will impact their clients and business or perhaps it already is. Big Data is everywhere quite literally. …

The potential uses and benefits of Big Data are endless. Unfortunately, Big Data also poses some risk to both the companies seeking to unlock its potential, and the individuals whose information is now continuously being collected, combined, mined, analyzed, disclosed and acted upon. This post explores the concept of Big Data and some of the privacy-related legal issues and risks associated with it.

For full text of this legal discussion, please visit The Privacy Legal Implications of Big Data: A Primer | InfoLawGroup.


Responding to Liability: Evaluating and Reducing Tort Liability for Digital Volunteers

Responding to Liability: Evaluating and Reducing Tort Liability for Digital Volunteers

By Edward Robson, Esq.

Major emergencies and crises can overwhelm local resources. In the last several years, self-organized digital volunteers have begun leveraging the power of social media and “crowd-mapping” for collaborative crisis response. Rather than mobilizing a physical response, these digital volunteer groups have responded virtually by creating software applications, monitoring social networks, aggregating data, and creating “crowdsourced” maps to assist both survivors and the formal response community. These virtual responses can subject digital volunteers to tort liability. This report evaluates the precise contours of potential liability for digital volunteers. Published by the Commons Lab of the Science and Technology Innovation Program of the Woodrow Wilson International Center for Scholars, September 2012.

To download a PDF of the free report, visit the Commons Lab Scribd webpage here.

To read a follow up blog post by the author, visit the Commons Lab Blog “Calling for Backup – Indemnification for Digital Volunteers (November 7, 2012)”

To watch a video of the author discussing liability for digital volunteers, visit the Commons Lab YouTube webpage here.

A code of conduct for apps

by Tony Romm, Politico.com, May 20, 2012

As smartphone-crazed consumers fiddle with Angry Birds and challenge each other on Words With Friends, policymakers are playing a different game: bringing order to mobile apps. To Washington, the daily deals tools, social networks and other programs that consumers download onto their smartphones present new challenges to consumer privacy and security. Lawmakers are keenly aware of the horror stories of apps surreptitiously accessing user address books or broadcasting location data sans permission. …

For full text of the article, visit A code of conduct for apps – Tony Romm – POLITICO.com.

Drones for Human Rights: Brilliant or Foolish? (Updated)

By Patrick Meier, iRevolution Blog, on February 10, 2012

My [Patrick Meier’s] colleague Mark Hanis recently co-authored this Op-Ed in the New York Times advocating for the use of drones in human rights monitoring, particularly in Syria. The Op-Ed has provoked quite the debate on a number of list-serves like CrisisMappers, and several blog posts have been published on the question. I’ve long been interested this topic, which is why I included a section on drones in this official UN Foundation Report on “New Technologies in Emergen-cies and Conflicts: The Role of Information and Social Networks.” I also blogged about the World Food Program’s (WFP) use of drones some four years ago. …

For full text of Patrick Meier’s op-ed, visit Drones for Human Rights: Brilliant or Foolish? (Updated) | iRevolution.

Crisis Management 3.0: Social Media and Governance in Times of Transition « Communia

Olubunmi Emenanjo, JD, Commons Lab Blog Communia, Woodrow Wilson Center, February 28, 2012

On Feb. 16, 2012, the Woodrow Wilson International Center for Scholars hosted a panel of experts to examine the role that social networks play in preventing and managing crises using “Web 3.0 Resilience Systems.” The discussion centered on the effectiveness of these systems over a Web 2.0 social network.

While Web 2.0 social networks include systems like Facebook and Twitter, Web 3.0 social systems make use of a variety of tools that many say are more effective because they can prevent emergencies from turning into crises. Recent advances in technology allows the collective engagement of millions of sensors in a “cloud”, such as phones, in a real time hyper-network that can allow neighborhoods to take action before a crisis. For example, in a recent explosion of gas lines, loss of life could have been prevented if there had being a way to inform neighborhood residents prior to the explosion. …

via Crisis Management 3.0: Social Media and Governance in Times of Transition « Communia.

Air Force’s Top Brain Wants a “Social Radar”

by Noah Shachtman, Wired Magazine, Danger Room Blog, January 19, 2012

…Dr. Mark Maybury, today’s [Air Force] chief scientist, … calls his vision “Social Radar.” …  It’ll be more of a virtual sensor, combining a vast array of technologies and disciplines, all employed to take a society’s pulse and assess its future health. It’s part of a broader Pentagon effort to master the societal and cultural elements of war … First step: mine Twitter feeds for indications of upset. …

For full text of the article, visit Air Force’s Top Brain Wants a Social Radar and visit Danger Room – What’s Next in National Security | Wired.com.

The Legal Implications of Social Networking Part Three: Data Security

by David Navetta, InformationLawGroup, January 9, 2012

Summary: In 2011, InfoLawGroup began its “Legal Implications” series for social media by posting Part One (The Basics) and Part Two (Privacy). In this post (Part Three), we explore how security concerns and legal risk arise and interact in the social media environment. There are three main security-related issues that pose potential security-related legal risk. First, to the extent that employees are accessing and using social media sites from company computers (or increasingly from personal computers connected to company networks or storing sensitive company data), malware, phishing and social engineering attacks could result in security breaches and legal liability. Second, spoofing and impersonation attacks on social networks could pose legal risks. In this case, the risk includes fake fan pages or fraudulent social media personas that appear to be legitimately operated. Third, information leakage is a risk in the social media context that could result in an adverse business and legal impact when confidential information is compromised.

For full text of the article, click here. See also Part I: The Basics and Part II: Privacy.

How Technology Made `Occupy Wall Street’ Both Irrelevant and Ubiquitous | MIT Technology Review

by Christopher Mims, MIT Technology Review, October 5, 2011

How can you ‘occupy’ an abstraction? By invading the network on which it depends.

Watching the protest in lower Manhattan metastasize from an eager call for volunteers on various social networks to a full-on movement has been a dizzying exercise in the power of technology to render protest both irrelevant and remarkably powerful at the same time. Perhaps this is the condition of all political movements in the 21st century, but Occupy Wall Street feels like a post-post-something exercise in the ability of social networks, citizen journalism and the always-on news cycle to amplify the power of symbols. It’s also a demonstration of the futility of trying to shut down an industry that has more or less completely dematerialized. …

For full text of the article, visit How Technology Made `Occupy Wall Street’ Both Irrelevant and Ubiquitous – Technology Review.

Datamining Social Media Profiles for Actionable Intelligence | The Financial Brand

The Financial Brand, October 24, 2011

If a financial institution could know that one of its customers just got married[, had a baby, or got divorced,] wouldn’t those life events create selling opportunities for that financial institution? If a bank or credit union could understood its customers’ life situations, wouldn’t they be able to market specific products and services centered around people’s unique needs? … Technologists say it is possible — at least in theory — for financial institutions to link data available in social media profiles with marketing strategies and lending decisions. …

For full text of this chilling article, visit Datamining Social Media Profiles for Actionable Intelligence | The Financial Brand: Marketing Insights for Banks & Credit Unions.

New Report from the Congressional Research Service: Social Media and Disasters

SECRECY NEWS from the FAS Project on Government Secrecy
Volume 2011, Issue No. 86
September 13, 2011

Secrecy News Blog:  http://www.fas.org/blog/secrecy/

The growing use of social media — such as Twitter and Facebook — in responding to emergency situations is examined in a new report (pdf) from the Congressional Research Service. “In the last five years social media have played an increasing role in emergencies and disasters,” the report notes. “… They have been used by individuals and communities to warn others of unsafe areas or situations, inform friends and family that someone is safe, and raise funds for disaster relief.” While they have still untapped potential for improving emergency communications, social media can also be used — inadvertently or maliciously — to disseminate false or misleading information, the report observes. See “Social Media and Disasters: Current Uses, Future Options, and Policy Considerations,” September 6, 2011.

%d bloggers like this: