Encryption and privacy and LGBT

February 23, 2016

The encryption debate did not begin or end with the FBI bringing action against Apple to compel it to crack open its operating system.  And it is not confined to that issue.  There have been Read the rest of this entry »

Employers using data to predict workers sickness

February 21, 2016

The Nasdaq reports, in Bosses Harness Big Data to Predict Which Workers Might Get Sick  that insurers and “Employee Wellness” firms are mining company employees’ data to predict whether and when they might be sick. That data includes the prescription drugs being used, where employees Read the rest of this entry »

Video surveillance recorders capable of being hacked

Another example of the internet of thing being prone to privacy breaches is the story titled Hard-coded password exposes up to 46,000 video surveillance DVRs to hacking of up to 46,000 internet accessible digital video recorders which can be taken over and controlled by hackers.  As the story Read the rest of this entry »

Jane Doe 464533 v N.D: Ontario Superior Court recognises the privacy tort of “publication of embarrassing private facts” arising out of revenge porn

February 19, 2016

The Ontario Superior Court of Justice in Jane Doe 464533 v ND (2016 ONSC 541) has expanded the tort of privacy to incorporate the publication of embarrassing facts.  It is a very significant decision and an advance in the development of the law of privacy, in Canada at least.  It is also a key case considering the egregious practice of revenge porn.  The commentary will be quite useful in the development of the tort in relation to this type of fact situation.

FACTS

The parties met while at high school and started dating while they were both in Grade 12.  They stopped dating but continued to see each other romantically throughout Read the rest of this entry »

The ongoing encryption and security debate escalates this time involving a court order and Apple

February 18, 2016

Internet service providers, technology based companies and businesses who rely on safe communication on line rely on encryption and security features are protective of their integrity.  There was plenty enough reputational blow back to go around several times when Read the rest of this entry »

Hollywood Hospital records held up by ransomware & the hospital pays the ransom..

Verizon highlighted the concerning extent of data breaches involving health information in 2015 in its report 2015 Protected Health Information Data Breach Report.  The vast majority Read the rest of this entry »

B J Bearings Pty Ltd v Whitehead [2016] VSC 44 (11 February 2016): preliminary discovery, Rules 32.05

In B J Bearings Pty Ltd v Whitehead [2016] VSC 44 Hargrave J considered an application for preliminary discovery and set out the applicable principles.  It is a useful Read the rest of this entry »

Drones in the resources industry

February 15, 2016

It is a truism that the resources sector is an early adopter of technology, particularly that of Read the rest of this entry »

The UK Information Commissioner releases IT Security Guide

The Information Commissioner has produced a very useful guide relating to IT security.  It is Read the rest of this entry »

V Tech’s hack highlights reputational damage and liability

February 13, 2016

The internet of things is changing the way children use their toys.  Ten years ago toys were overwhelmingly self contained objects, even the electronic ones.  The extent to which they were interactive was confined to basic voice recognition features and rudimentary command responses.  Of course a huge number of toys remain “old school”; Lego, matchbox cars and the ubiquitous teddy bears.  But many are now Read the rest of this entry »