Skip the navigation

More Legal In Depth

How to create awareness of the insider threat

One of the legacies of Edward Snowden's treason is that companies are now concerned about the insider threat more than they ever were before. He demonstrates that a single person inside an organization can devastate the organization. While technology should have caught Snowden, there is also the realization that his coworkers and managers should have noticed indications of unusual activities.

Trust issue looms large for tech companies capitalizing on personal data

As tech companies increasingly rely on analyzing and selling user data to boost revenue, trust is emerging as one of the defining issues of the year for the IT sector.

How IT Can Support Reputation Management in Our Social Age

Oracle was in the news for the wrong reason this week when a former employee filed a lawsuit alleging the firm is racist. The incident provides some lessons in image and reputation management in our age of social media and 24-hour news cycles. As it turns out, IT departments can help protect the brand.

Net neutrality decision sells consumers out to the ISPs

The D.C. Circuit Court of Appeals decision in Verizon v. FCC is a dangerously retrograde move that, by badly damaging the cause of net neutrality, harms American consumers and further insulates the already over-protected cable industry from any kind of meaningful competition.

Steps to take in wake of Gmail wiretapping decision

Mobile, Web- and cloud-based companies could also face class-action lawsuits. Here's how to prepare for that possibility. Insider (registration required)

IBM to pay $44K fine over online job listings

IBM will pay a US$44,000 fine to settle a case alleging it violated anti-discrimination law by placing online job listings seeking software developers with specific visas, the U.S. Department of Justice said Friday.

False Lenovo Security Report Only Strengthens World's Top PC Maker

A report that Western nations deemed Lenovo PCs to be insecure was quickly kiboshed this week. CIO.com columnist Rob Enderle smells a rat and suspects it's only a matter of time before the source is outed (and unemployed). Meanwhile, Lenovo can relax and tout its security and stability.

Senators Push to Curb NSA's FISA Authorities

Members of Judiciary Committee express concern over broad-ranging, secretive authorities under Foreign Intelligence Surveillance Act, push for bill to strengthen oversight, transparency.

Update: Apple colluded with book publishers on e-book prices, judge rules

A U.S. district court judge has found Apple guilty of e-book price fixing after three weeks of court proceedings that ended June 20.

Google doesn't plan to change its privacy policy for Glass

Google Glass may be a new and innovative product with the potential to change the world, but one thing that won't change because of Glass is the search giant's unified privacy policy.

Google's Mob Mentality Defies U.S. Attorneys General

Microsoft eventually learned that you can't win a battle against the government. Google appears poised to learn the same lesson. The difference: Google's fight goes well beyond separating a browser from an operating system and involves illegal drugs and illicit activities. There's a teachable moment here, writes CIO.com columnist Rob Enderle, but it may cost Google its advertisers.

U.S. officials claim surveillance programs helped stop 50 terrorist plots

U.S. law enforcement agencies have disrupted more than 50 terrorist plots in the U.S. and other countries with the help of controversial surveillance efforts at the U.S. National Security Agency, government officials said Tuesday.

The BYOD Mobile Security Threat Is Real

Cloud storage, text messaging, poor accountability and the "Bad Leaver" open the doors to data breaches in a BYOD environment, says a cyber-crime expert in this CIO.com interview.

Does your cloud vendor protect your rights?

When an organization's data is in the cloud, requests to provide access to it for legal reasons are more complicated.

How to Recover From a Twitter Hack

Do you know what to do if your Twitter account is hacked? Here are four steps to take to regain control of your account and ensure it doesn't happen again.

BYOL: Bring your own liabilities

What are the legal ramifications of allowing staff to bring their own mobile devices to work and where is the dividing line between organisational and employee risk?

A matter of trust

It would be an understatement to say there are some New Zealanders who don't completely trust our government. There are probably more who have not yet completely overcome their mistrust of ICT.

12 simple steps to safer social networking

Confession time: I'm an inveterate social media junkie. From Facebook to Instagram to Diaspora, whenever a newA communication platform rolls around--or comes back around--I'm ready to leap aboard.

Chinese Government's Link to Cyber Espionage Clearer Than Ever

It's a common belief in the information security world that the Chinese government is behind many of the advanced persistent threats that target companies around the world in an effort to steal their IP and trade secrets. Now one security firm has come forward with years of evidence to link a prolific APT group to a unit inside the Chinese government.

Should you risk jailbreaking your iPhone?

Chances are, if you don't know the dangers involved, you shouldn't jailbreak.