SlideShare a Scribd company logo
ā€œLEGAL ISSUES IN
TECHNOLOGYā€APT 510
SHONDA ROBINSON
DATA SECURITY
Data security concerns posed by advances in technology and the manner in which consumers, businesses and
other organizations use that technology will be a significant concern in the year ahead. Data-related issues
permeate virtually all evolving technologies. With huge amounts of business and personal data transmitted and
stored electronically, the opportunities for data breaches are dramatically increased and businesses must
anticipate quick responses to satisfy a patchwork of state and federal data breach regulations. While those
regulations continue to raise the standards for data security practices, contracting parties also expect greater
accountability for these standards. Enhanced encryption and biometrics may also provide solutions for some of
these problems.
BIG DATA
By one estimate, computer and device users create over 2.5 quintillion bytes of data daily! This is the world of Big Data.
Technologies to analyze, use, and, in some cases, commercialize such vast amounts of data are beginning to be more
widely deployed. However, the significant productivity gains and commercial opportunities are offset by serious security
concerns and encroachments on privacy. Major issues will include who should control and be compensated for such data.
CLOUD COMPUTING
Cloud computing continues to show great promise for major cost savings for
businesses and convenience for consumers. Yet, as more software applications
and other computing resources are hosted and accessed online in the ā€œcloud,ā€
data privacy and security risks are increasing, and contracting and licensing
norms are evolving and becoming more difficult to manage.
OPEN SOURCE SOFTWARE
Non-proprietary open source software applications offer many benefits and costs
savings, but compliance with open source license terms can be tricky. If not
handled properly, use of open source software can compromise ownership of
company software and jeopardize acquisitions and other significant business
transactions.
MOBILE PAYMENTS
Several consumer surveys suggest that we keep better track of our mobile devices than we do of our
wallets, so the rapid spread of mobile payments is no surprise. However, liability issues remain to be
worked out for many transactions – misdirected payments, unauthorized access and account balance
mistakes, among others – that may not go as intended.
SOCIAL MEDIA LIABILITIES
Widespread business use of social media tools means that companies must
maintain and communicate clear policies of acceptable practices and ensure
compliance with applicable terms. Many legal pitfalls exist, including running afoul
of state-level sweepstakes regulations with online promotions; failure to comply
with relevant FTC guidelines when using social media for online marketing
programs; inadvertent infringements of third-party intellectual property rights when
posting content; and contract breaches because of noncompliance with social
media platform rules.
THE INTERNET OF THINGS
Electronic tagging and tracking of objects and people with bar codes, RFID
devices and other technologies and communicating the resulting data about
locations, movements and status – the so-called ā€œInternet of Thingsā€ – is on the
cusp of becoming reality. While this technology may offer many benefits to
businesses and consumers, the privacy issues posed by the Internet of Things are
similar to the issues surrounding ā€œBig Data.ā€
VIRTUAL CURRENCIES
Offering convenience for many online transactions, virtual currencies (such as
Bitcoin) fill a growing marketplace niche. However, unlike sovereign currencies,
which are subject to varying degrees of regulation, virtual currencies do not fit
neatly into existing legal frameworks. In addition, this fact has not gone unnoticed
by criminal elements, and provides another reason that mainstream consumers
and businesses are wary about the acceptability of digital currencies.
WEARABLE COMPUTERS
Google Glass, computer watches (more elaborate than what Dick Tracy might have imagined) and other
wearable computing devices push the boundary of mobile computing even further than the still recent
wonders of smartphones and tablets. The tie-in of these devices with biometric monitoring, access and
control offer potential conveniences while also presenting additional risks. The privacy, security and
liability issues with such devices will likely dwarf the similar concerns (e.g., texting while driving) raised by
our non-wearable mobile appendages.

More Related Content

PPTX
Privacy in an interconnected world
PPTX
e-Signatures Summit for Insurance Executives
DOCX
Top 6 New Technology Trends For 2022.docx
PPTX
The 5 Biggest Cybersecurity Trends In 2020 Everyone Should Know About
PDF
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
PDF
E-Signature Webcast for Financial Services Legal Counsel (Slides)
PDF
Securing Digital_Adams
PPTX
The future of IOT
Privacy in an interconnected world
e-Signatures Summit for Insurance Executives
Top 6 New Technology Trends For 2022.docx
The 5 Biggest Cybersecurity Trends In 2020 Everyone Should Know About
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
E-Signature Webcast for Financial Services Legal Counsel (Slides)
Securing Digital_Adams
The future of IOT

What's hot (20)

PPTX
The Six Biggest Blockchain Trends Everyone Should Know About In 2021
PPTX
Blockchain technology and supply chain management
PPTX
Discover 7 Technology Trends To Watch For 2019
PDF
VET4SBO Level 2 module 6 - unit 4 - v0.9 en
PPTX
How the Emerging IoT will Prompt Asset Management Issues - IAITAM Spring ACE ...
PDF
Iot viewpoints. Ovum explores the IoT opportunity in 2018 and beyond
PDF
5 Security Trends to Watch in 2020
PDF
The Identity of Things: Privacy & Security Concerns
PPTX
Ten trends of blockchain in 2020
PPTX
The 5 Biggest Blockchain And Distributed Ledger Trends Everyone Should Be Wat...
PPTX
IoT, AI and Blockchain: Catalysts for Digital Transformation
PPTX
Latest Technology News 2020
PPTX
Ita 2000
PDF
The Internet Of Things
Ā 
PPTX
Global Threats| Cybersecurity|
PPTX
Kill the Dinosaurs, and Other Tips for Achieving Technical Competence
PDF
Is Your Organization in Crisis?
PDF
The criticality-of-security-in-the-internet-of-things joa-eng_1115
PDF
How the Internet of Things Leads to Better, Faster Crisis Communication
The Six Biggest Blockchain Trends Everyone Should Know About In 2021
Blockchain technology and supply chain management
Discover 7 Technology Trends To Watch For 2019
VET4SBO Level 2 module 6 - unit 4 - v0.9 en
How the Emerging IoT will Prompt Asset Management Issues - IAITAM Spring ACE ...
Iot viewpoints. Ovum explores the IoT opportunity in 2018 and beyond
5 Security Trends to Watch in 2020
The Identity of Things: Privacy & Security Concerns
Ten trends of blockchain in 2020
The 5 Biggest Blockchain And Distributed Ledger Trends Everyone Should Be Wat...
IoT, AI and Blockchain: Catalysts for Digital Transformation
Latest Technology News 2020
Ita 2000
The Internet Of Things
Ā 
Global Threats| Cybersecurity|
Kill the Dinosaurs, and Other Tips for Achieving Technical Competence
Is Your Organization in Crisis?
The criticality-of-security-in-the-internet-of-things joa-eng_1115
How the Internet of Things Leads to Better, Faster Crisis Communication
Ad

Similar to Apt 510 slideshare (20)

PPTX
Legal issues in technology
PDF
Cyber Security Challenges on Latest Technologies
PDF
Secure Times Spring 2010
DOCX
Top 10 Technology and Business Trends in 2022.docx
PPTX
559566583-Chapter-6-E-P.pptxGHRTHRTHTRHTH
PPTX
PowerISO 9.0 Crack + Serial Key Download 2025 [Latest]
PPTX
VG Tool V5.1 Crack with FRP Bypass Latest Setup Download 2025
PPTX
Security Monitor Pro 6.22 Crack Free Download
PDF
MIS Notes For University Students.MANAGEMENT INFORMATION SYSTEM
PDF
Information Security Shake-Up
Ā 
PPTX
How digital technology is shaping the future of marthab
PPTX
An American Legal Perspective
PPTX
Legal Issues in Applied Technology
PPTX
Trends in Cybersecurity that Businesses Need to Look Out for in 2023.pptx
PPTX
IT-Law-PPT.pptx1234567891112131415161718
DOCX
271 Information Governance for Mobile Devices .docx
ODP
IT Security through governance, compliance and risk
ODP
IISP NW branch meeting 15 nov 2012 security through governance, compliance…
PDF
Top 8 Cybersecurity Trends 2020
PDF
201306 Technology Outlook 2013 CGi
Legal issues in technology
Cyber Security Challenges on Latest Technologies
Secure Times Spring 2010
Top 10 Technology and Business Trends in 2022.docx
559566583-Chapter-6-E-P.pptxGHRTHRTHTRHTH
PowerISO 9.0 Crack + Serial Key Download 2025 [Latest]
VG Tool V5.1 Crack with FRP Bypass Latest Setup Download 2025
Security Monitor Pro 6.22 Crack Free Download
MIS Notes For University Students.MANAGEMENT INFORMATION SYSTEM
Information Security Shake-Up
Ā 
How digital technology is shaping the future of marthab
An American Legal Perspective
Legal Issues in Applied Technology
Trends in Cybersecurity that Businesses Need to Look Out for in 2023.pptx
IT-Law-PPT.pptx1234567891112131415161718
271 Information Governance for Mobile Devices .docx
IT Security through governance, compliance and risk
IISP NW branch meeting 15 nov 2012 security through governance, compliance…
Top 8 Cybersecurity Trends 2020
201306 Technology Outlook 2013 CGi
Ad

Recently uploaded (20)

PDF
algor mortis or cooling of body after death THANATOLOGY
PPTX
Lecture Notes on Family Law - Knowledge Area 5
PDF
Analysis Childrens act Kenya for the year 2022
PPTX
POSH Awareness and policy ppt with all design covering .
PDF
SUMMARY CASES-42-47.pdf tax -1 257++/ hsknsnd
PPT
Understanding the Impact of the Cyber Act
PPTX
prenuptial agreement ppt my by a phd scholar
PPT
Cyber-Crime-in- India at Present day and Laws
PPTX
Sexual Harassment Prevention training class
PPTX
BUSINESS LAW AND IT IN CONTRACT SIGNING AND MANAGEMENT
PPTX
Peter Maatouk Is Redefining What It Means To Be A Local Lawyer Who Truly List...
PDF
Trademark, Copyright, and Trade Secret Protection for Med Tech Startups.pdf
PPT
Understanding the Impact of the Cyber Act
PPTX
UDHR & OTHER INTERNATIONAL CONVENTIONS.pptx
DOCX
FOE Reviewer 2022.docxhgvgvhghhghyjhghggg
PPTX
2.....FORMULATION OF THE RESEARCH PROBLEM.pptx
PDF
AHRP LB - Quick Look of the Newly-initiated Koperasi MerahĀ PutihĀ (KMP).pdf
PDF
A SEP and FRAND Overview 13 Aug 2024.pdf
PDF
OpenAi v. Open AI Summary Judgment Order
PDF
Louisiana Bar Foundation 2023-2024 Annual Report
algor mortis or cooling of body after death THANATOLOGY
Lecture Notes on Family Law - Knowledge Area 5
Analysis Childrens act Kenya for the year 2022
POSH Awareness and policy ppt with all design covering .
SUMMARY CASES-42-47.pdf tax -1 257++/ hsknsnd
Understanding the Impact of the Cyber Act
prenuptial agreement ppt my by a phd scholar
Cyber-Crime-in- India at Present day and Laws
Sexual Harassment Prevention training class
BUSINESS LAW AND IT IN CONTRACT SIGNING AND MANAGEMENT
Peter Maatouk Is Redefining What It Means To Be A Local Lawyer Who Truly List...
Trademark, Copyright, and Trade Secret Protection for Med Tech Startups.pdf
Understanding the Impact of the Cyber Act
UDHR & OTHER INTERNATIONAL CONVENTIONS.pptx
FOE Reviewer 2022.docxhgvgvhghhghyjhghggg
2.....FORMULATION OF THE RESEARCH PROBLEM.pptx
AHRP LB - Quick Look of the Newly-initiated Koperasi MerahĀ PutihĀ (KMP).pdf
A SEP and FRAND Overview 13 Aug 2024.pdf
OpenAi v. Open AI Summary Judgment Order
Louisiana Bar Foundation 2023-2024 Annual Report

Apt 510 slideshare

  • 2. DATA SECURITY Data security concerns posed by advances in technology and the manner in which consumers, businesses and other organizations use that technology will be a significant concern in the year ahead. Data-related issues permeate virtually all evolving technologies. With huge amounts of business and personal data transmitted and stored electronically, the opportunities for data breaches are dramatically increased and businesses must anticipate quick responses to satisfy a patchwork of state and federal data breach regulations. While those regulations continue to raise the standards for data security practices, contracting parties also expect greater accountability for these standards. Enhanced encryption and biometrics may also provide solutions for some of these problems.
  • 3. BIG DATA By one estimate, computer and device users create over 2.5 quintillion bytes of data daily! This is the world of Big Data. Technologies to analyze, use, and, in some cases, commercialize such vast amounts of data are beginning to be more widely deployed. However, the significant productivity gains and commercial opportunities are offset by serious security concerns and encroachments on privacy. Major issues will include who should control and be compensated for such data.
  • 4. CLOUD COMPUTING Cloud computing continues to show great promise for major cost savings for businesses and convenience for consumers. Yet, as more software applications and other computing resources are hosted and accessed online in the ā€œcloud,ā€ data privacy and security risks are increasing, and contracting and licensing norms are evolving and becoming more difficult to manage.
  • 5. OPEN SOURCE SOFTWARE Non-proprietary open source software applications offer many benefits and costs savings, but compliance with open source license terms can be tricky. If not handled properly, use of open source software can compromise ownership of company software and jeopardize acquisitions and other significant business transactions.
  • 6. MOBILE PAYMENTS Several consumer surveys suggest that we keep better track of our mobile devices than we do of our wallets, so the rapid spread of mobile payments is no surprise. However, liability issues remain to be worked out for many transactions – misdirected payments, unauthorized access and account balance mistakes, among others – that may not go as intended.
  • 7. SOCIAL MEDIA LIABILITIES Widespread business use of social media tools means that companies must maintain and communicate clear policies of acceptable practices and ensure compliance with applicable terms. Many legal pitfalls exist, including running afoul of state-level sweepstakes regulations with online promotions; failure to comply with relevant FTC guidelines when using social media for online marketing programs; inadvertent infringements of third-party intellectual property rights when posting content; and contract breaches because of noncompliance with social media platform rules.
  • 8. THE INTERNET OF THINGS Electronic tagging and tracking of objects and people with bar codes, RFID devices and other technologies and communicating the resulting data about locations, movements and status – the so-called ā€œInternet of Thingsā€ – is on the cusp of becoming reality. While this technology may offer many benefits to businesses and consumers, the privacy issues posed by the Internet of Things are similar to the issues surrounding ā€œBig Data.ā€
  • 9. VIRTUAL CURRENCIES Offering convenience for many online transactions, virtual currencies (such as Bitcoin) fill a growing marketplace niche. However, unlike sovereign currencies, which are subject to varying degrees of regulation, virtual currencies do not fit neatly into existing legal frameworks. In addition, this fact has not gone unnoticed by criminal elements, and provides another reason that mainstream consumers and businesses are wary about the acceptability of digital currencies.
  • 10. WEARABLE COMPUTERS Google Glass, computer watches (more elaborate than what Dick Tracy might have imagined) and other wearable computing devices push the boundary of mobile computing even further than the still recent wonders of smartphones and tablets. The tie-in of these devices with biometric monitoring, access and control offer potential conveniences while also presenting additional risks. The privacy, security and liability issues with such devices will likely dwarf the similar concerns (e.g., texting while driving) raised by our non-wearable mobile appendages.