Within today’s tech-filled world, victims of data breaches can face identity theft, social stigma, and barriers to housing and jobs. Big companies are spending incredible amounts of money to make sure their customers’ data is protected. Additionally, new laws are being put in place to motivate companies about the issue. The CCPA estimates companies will spend between $50,000 to $55 billion to get in compliance. Smaller companies struggle to find funding for these privacy issues. It is essential, as privacy, defined as the ability to control or limit access to personal information, is an expectation for the end users of these products. Smaller companies are forced to get creative when solving this problem. There’s never a moment where a company can check the theoretical box of “now we’re privacy-compliant.” Data privacy is becoming less about compliance and more about building products that meet user expectations and contexts. Read More >>
Category Archives: Laws & Policy
Firms Favor Academic Insights That Come From Hubs
When research professors cannot get the attention of pharmaceutical firms, they turn to start-ups to fund the research. Firms are successfully using academic science as a source of having a competitive advantage. Through this, they are able to identify a breakthrough faster than their competitors, If done properly, it could become huge. Academic science plays a growing role for technology development. Its exploitation by firms has become an important frontier for strategy. Given the volume of academic output, firms home in on the academic discoveries that would give them a leg up via hubs. Hubs are geographic clusters of companies’ R&D labs in specific technological fields. Hubs facilitate the translation of academic science into corporate inventions. The struggle with scientific literature is that its extremely voluminous, fast-changing. Much of it is useless and not reproducible. It is not wise to ignore academic science altogether, as hubs produce a disproportionate amount of useful academic science. The best gems sometimes come from unexpected places. Read More >>
Uber But For Energy: Utility Surge Pricing Threatens Summer Cool
Inside, Jim leafs through their summer bills from the power company Arizona Public Service, or APS. He counts: “$183, $262, $250.” Steep, but predictable. Ever since he’s heard about a new fee, though, he’s begun to worry. For that so-called “demand” charge, the power company will look at the one hour of the month during peak time when the couple uses the most energy. Jim’s not the only one who’s upset. Within a week of the utility proposing the charge, protesters had taken to the streets with signs like “Surge Pricing is Unfair” and “Profits Over People. Read More>>
7 Trademark Rules Every Startup Should Know
A trademark or service mark is a brand identifier. Every company offering products or services has at least one. While the name of a product or service tells consumers what it is, the associated mark tells consumers who offers it to the public. The selection and use of a brand name involves a number of important decisions that have both marketing and legal implications. Failing to understand and accommodate those implications can expose a startup to increased marketing costs and legal exposure. Accordingly, a startup would be well-advised to follow some simple rules. Read More>>
Behind-the-Scenes Battle: Who Owns Your Digital Afterlife?
What happens to our emails, online searches and other digital assets after we die? A surge of families struggling with similar questions is driving a political battle between tech companies and estate lawyers over who gets the keys to someone’s digital afterlife.
In California, lawmakers will vote in September on a bill that would deny families access to emails of someone who died unless a court finds the person had consented to passing them on to heirs. According to a recent Zogby poll, over 70 percent of Americans say their private online communications and photos should remain private after they die. Read More>>
Private Space Stations Could Be a Reality by 2025
Experts believe that commercial space station will become a reality within the next 10 years if entrepreneurs and NASA can properly manage the transition from government-run space stations to privately build and operated. Private companies are currently using the ISS for experiments, commercial research and the launching of tiny spacecrafts called cubeseats. Read More>>
Smart gadgets from guns to cars ripe for hacking
These days Hackers are targeting for home security systems and other connected devices besides your computer. The rapid growth of internet has opened new opportunities of cyber-attacks. Protecting gadgets from such attacks is possible but increases costs. Read More>>
Stolen Data’s Speed Threatens Unaware Merchants
Data breaching happens very frequent these days. Stolen data travels much faster and can heighten the risk to merchants. Data thieves sell this information to aggregators to compile full identities. Organizations must not only secure their data but also be vigilant against people using stolen data. Read More>>
Huge Global Sting Yields World’s Biggest Hacker Bust Ever
Darkode is an online, Password-protected forum where hackers share information and tools to facilitate unlawful intrusions on other’s computer and electronic devices. Experts consider Darkode as one of the greatest threat to the integrity of data on computers in the U.S and around the world. Through the latest operation of FBI the malware network of Darkode was completely dismantled and the criminals will face trails. Read More>>
Universities Increasingly Vulnerable To Cyberattacks
In this world of hacking and security threats, Universities are becoming easy targets for cyber-attacks. The main reason for such attacks is the vast data generated by each person in the network of universities. Experts believe that these attacks in higher education will continue and might grow as well. Universities should take necessary precautions and must implement proper security measure to protect themselves. Read More>>