Tag Archive | social network

The Privacy Legal Implications of Big Data: A Primer

By David Navetta, Information Law Group, February 12, 2013

By now many lawyers and business managers have heard of the term “Big Data,” but many may not understand exactly what it refers to, and still more likely do not know how it will impact their clients and business or perhaps it already is. Big Data is everywhere quite literally. …

The potential uses and benefits of Big Data are endless. Unfortunately, Big Data also poses some risk to both the companies seeking to unlock its potential, and the individuals whose information is now continuously being collected, combined, mined, analyzed, disclosed and acted upon. This post explores the concept of Big Data and some of the privacy-related legal issues and risks associated with it.

For full text of this legal discussion, please visit The Privacy Legal Implications of Big Data: A Primer | InfoLawGroup.

 

Advertisements

Responding to Liability: Evaluating and Reducing Tort Liability for Digital Volunteers

Responding to Liability: Evaluating and Reducing Tort Liability for Digital Volunteers

By Edward Robson, Esq.

Major emergencies and crises can overwhelm local resources. In the last several years, self-organized digital volunteers have begun leveraging the power of social media and “crowd-mapping” for collaborative crisis response. Rather than mobilizing a physical response, these digital volunteer groups have responded virtually by creating software applications, monitoring social networks, aggregating data, and creating “crowdsourced” maps to assist both survivors and the formal response community. These virtual responses can subject digital volunteers to tort liability. This report evaluates the precise contours of potential liability for digital volunteers. Published by the Commons Lab of the Science and Technology Innovation Program of the Woodrow Wilson International Center for Scholars, September 2012.

To download a PDF of the free report, visit the Commons Lab Scribd webpage here.

To read a follow up blog post by the author, visit the Commons Lab Blog “Calling for Backup – Indemnification for Digital Volunteers (November 7, 2012)”

To watch a video of the author discussing liability for digital volunteers, visit the Commons Lab YouTube webpage here.

A code of conduct for apps

by Tony Romm, Politico.com, May 20, 2012

As smartphone-crazed consumers fiddle with Angry Birds and challenge each other on Words With Friends, policymakers are playing a different game: bringing order to mobile apps. To Washington, the daily deals tools, social networks and other programs that consumers download onto their smartphones present new challenges to consumer privacy and security. Lawmakers are keenly aware of the horror stories of apps surreptitiously accessing user address books or broadcasting location data sans permission. …

For full text of the article, visit A code of conduct for apps – Tony Romm – POLITICO.com.

Drones for Human Rights: Brilliant or Foolish? (Updated)

By Patrick Meier, iRevolution Blog, on February 10, 2012

My [Patrick Meier’s] colleague Mark Hanis recently co-authored this Op-Ed in the New York Times advocating for the use of drones in human rights monitoring, particularly in Syria. The Op-Ed has provoked quite the debate on a number of list-serves like CrisisMappers, and several blog posts have been published on the question. I’ve long been interested this topic, which is why I included a section on drones in this official UN Foundation Report on “New Technologies in Emergen-cies and Conflicts: The Role of Information and Social Networks.” I also blogged about the World Food Program’s (WFP) use of drones some four years ago. …

For full text of Patrick Meier’s op-ed, visit Drones for Human Rights: Brilliant or Foolish? (Updated) | iRevolution.

Crisis Management 3.0: Social Media and Governance in Times of Transition « Communia

Olubunmi Emenanjo, JD, Commons Lab Blog Communia, Woodrow Wilson Center, February 28, 2012

On Feb. 16, 2012, the Woodrow Wilson International Center for Scholars hosted a panel of experts to examine the role that social networks play in preventing and managing crises using “Web 3.0 Resilience Systems.” The discussion centered on the effectiveness of these systems over a Web 2.0 social network.

While Web 2.0 social networks include systems like Facebook and Twitter, Web 3.0 social systems make use of a variety of tools that many say are more effective because they can prevent emergencies from turning into crises. Recent advances in technology allows the collective engagement of millions of sensors in a “cloud”, such as phones, in a real time hyper-network that can allow neighborhoods to take action before a crisis. For example, in a recent explosion of gas lines, loss of life could have been prevented if there had being a way to inform neighborhood residents prior to the explosion. …

via Crisis Management 3.0: Social Media and Governance in Times of Transition « Communia.

Air Force’s Top Brain Wants a “Social Radar”

by Noah Shachtman, Wired Magazine, Danger Room Blog, January 19, 2012

…Dr. Mark Maybury, today’s [Air Force] chief scientist, … calls his vision “Social Radar.” …  It’ll be more of a virtual sensor, combining a vast array of technologies and disciplines, all employed to take a society’s pulse and assess its future health. It’s part of a broader Pentagon effort to master the societal and cultural elements of war … First step: mine Twitter feeds for indications of upset. …

For full text of the article, visit Air Force’s Top Brain Wants a Social Radar and visit Danger Room – What’s Next in National Security | Wired.com.

The Legal Implications of Social Networking Part Three: Data Security

by David Navetta, InformationLawGroup, January 9, 2012

Summary: In 2011, InfoLawGroup began its “Legal Implications” series for social media by posting Part One (The Basics) and Part Two (Privacy). In this post (Part Three), we explore how security concerns and legal risk arise and interact in the social media environment. There are three main security-related issues that pose potential security-related legal risk. First, to the extent that employees are accessing and using social media sites from company computers (or increasingly from personal computers connected to company networks or storing sensitive company data), malware, phishing and social engineering attacks could result in security breaches and legal liability. Second, spoofing and impersonation attacks on social networks could pose legal risks. In this case, the risk includes fake fan pages or fraudulent social media personas that appear to be legitimately operated. Third, information leakage is a risk in the social media context that could result in an adverse business and legal impact when confidential information is compromised.

For full text of the article, click here. See also Part I: The Basics and Part II: Privacy.

%d bloggers like this: