Cyberlaw

Home/Cyberlaw

“The Glacier is Too Cold” – Protecting Your Right to Complain

By |2020-02-17T12:04:10-05:00June 15th, 2017|Cyberlaw, Intellectual Property, Internet Business|

Photo credit: Pixabay.com Can a business prevent an unreasonable customer from posting a negative (and unfair) online review to Yelp, Facebook, Amazon, or other online platform? For example, a reviewer wrote, “Do Not Camp Anywhere Near Here - You Will Freeze” when posting a one-star TripAdvisor review of the Columbia Ice Field in [...]

Will your underwear talk to the internet?

By |2019-06-15T20:48:39-04:00May 2nd, 2017|Cyberlaw, Cybersecurity, Events, Featured, Internet of Things (IoT), Patent, Privacy|

Will your underwear become a node on the Internet of Things? Gerry Elman attended the Greater Philadelphia Smart Fabrics Conference at Drexel University's Center for Functional Fabrics on May 9, 2017.  He enjoyed learning more about the Smart Belly Band for pregnant moms, developed in the Shima Seiki Haute Technology Lab at Drexel's ExCITe Center. Gerry continues to [...]

Privacy & Security for the Internet of Things

By |2019-05-28T13:27:59-04:00December 23rd, 2016|Cyberlaw, Cybersecurity, Featured, General, Internet Business, Internet of Things (IoT), Privacy, Trade Secret|

On December 8, 2016, Gerry Elman gave a presentation on Privacy and Security for the Internet of Things.  As new products and services are designed, innovators will need to build-in security from the outset and consider the privacy implications of the data derived from them.  Gerry shared the very latest information on the subject (including [...]

Gerry Elman spoke on Privacy & Security for the Internet of Things Dec. 8, 2016

By |2019-05-28T08:02:48-04:00December 2nd, 2016|Cyberlaw, Cybersecurity, Events, Internet of Things (IoT)|

https://www.meetup.com/TriState-IoT/events/232731983/ The issues are as current as recent headlines: Was your voting machine hacked??? Presidential candidate Jill Stein has asked for a recount in Pennsylvania. On October 21, 2016, consumers were unable to reach Netflix, Twitter, CNN and several other well-known websites. This was because Dyn, a provider of core Internet services for these sites, was in [...]

Thank You to TPNG for hosting our presentation “Cybersecurity Technical and Legal Challenges (You Can’t Just Check the Box)”

By |2019-06-02T16:44:51-04:00September 27th, 2016|Cyberlaw, Cybersecurity, Internet Business, Privacy|

On September 22, 2016, Elman Technology Law attorneys Gerry Elman and Joshua Waterston gave a presentation on "Cybersecurity Technical and Legal Challenges (You Can’t Just Check the Box)" to the Philadelphia chapter of the Technology Professionals Networking Group (TPNG).  Attendees included Information Technology professionals of varied interests and backgrounds - entrepreneurs, directors, consultants, analysts and [...]

We spoke on Cybersecurity Technical and Legal Challenges (You Can’t Just Check the Box) to Philly’s TPNG chapter

By |2019-06-02T16:49:05-04:00September 14th, 2016|Cyberlaw, Cybersecurity, Events, Internet Business, Privacy, Trade Secret|

Every business, large and small, is investigating its cybersecurity.  And increasingly, they're investigating their employees, clients, vendors, and suppliers, too.  If you haven't seen a cybersecurity questionnaire yet, you soon will.  You need to know more and do more than just checking a box.  You need a security strategy permeating every part of your organization. [...]

US and EU finalize “Privacy Shield” agreement to replace invalidated “Safe Harbor” privacy policy

By |2019-12-28T15:50:23-05:00July 13th, 2016|Cyberlaw, Cybersecurity, Internet Business, Privacy|

Yesterday the European Union and the United States finalized a "Privacy Shield" agreement which enables companies to exchange personal data between the EU and US without violating the EU's stricter privacy laws (last year the "Safe Harbor" policy was overturned by an EU court due to insufficient privacy protections for EU citizens.). Under this agreement, [...]

American Bar Ass’n to distribute FBI cyber-threat warnings

By |2016-04-13T11:22:41-04:00April 12th, 2016|Associations, Cyberlaw, Cybersecurity, General|

April 12, 2016 - In the wake of headlines detailing cyber-breaches at some of the most prominent law firms in the U.S., the President of the American Bar Association this morning sent a letter to its members, advising that from now on we will receive FBI Amber Alerts with intelligence that warn of cyber-threats to the [...]

Internet connectivity is the new “electricity”: Underwriters Labs (UL) meet The Third Wave

By |2019-06-02T16:58:32-04:00April 7th, 2016|Cybersecurity, Internet of Things (IoT)|

Since 1894, Underwriters Laboratories (UL) have been providing safety certification for products, especially those with electrical cords. On April 5, 2016, they announced that they're extending their reach to cybersecurity.  UL will test and certify products that are increasingly becoming elements of the Internet of Things. Steve Case's book "The Third Wave," coincidentally also published on April [...]

We presented a cybersecurity seminar at Delaware County Bar Association on Feb. 24, 2016

By |2019-06-02T17:02:09-04:00February 3rd, 2016|Cyberlaw, Cybersecurity, Events, Internet Business, Privacy, Trade Secret|

Elman Technology Law attorneys Gerry Elman and Joshua Waterston presented the legal seminar “Cybersecurity Ethical and Legal Challenges: How to Protect your Clients and Your Firm" at the Delaware County Bar Association on Feb. 24 from 12 p.m. to 2 p.m. DELAWARE COUNTY BAR ASSOCIATION CLE SEMINAR WEDNESDAY, FEBRUARY 24, 2016 “CYBERSECURITY ETHICAL AND LEGAL [...]

Special invitation: FREE admission to hear Gerry Elman speak on Cybersecurity Litigation

By |2020-08-27T16:08:21-04:00January 28th, 2016|Cyberlaw, Events|

On February 2, 2016, Gerry Elman will be a presenter at a webinar about how businesses can minimize their legal exposure from cybersecurity threats.  Instead of paying $249, you can register for free as our guest, via our registration link.  For further information, see below, or click here for more details. Cyber Security Litigation: What [...]

Go to Top