Share
Category Country
Category Keywords
Articles  |  Found 15 Results
Page 1 Of 1 Pages

USA | Cyber War | Pentagon on cyber war footing after hacker raid  17/07/2011 | Pentagon on cyber war footing after hacker raid
USA | Computers | Review of one of USA's worst digital attacks in history, when a foreign intelligence service hacked into the computer system of a corporate contractor and obtained 24,000 Pentagon files. .. Continue

Israel | iPad | No real basis for iPad import ban in Israel 15/04/2010 | No real basis for iPad import ban in Israel
ISRAEL | Regulation |  The writer of the article, Aviv Eilon, Adv, (an Israeli Lawyer specialized in Technology Law) examines the absence of logic in the Israeli Communication office's decision of banning iPad's import to Israel, explaining that the dev.. Continue

Articles | Cyber crime | Computer viruses labs : True story 26/03/2010 | Computer viruses labs : True story
INTERNATIONAL | Cyber Crime | The writer reveilles the story behind a computer viruses lab in Kiev, Ukraine. The lab, run as a fictive commercial company - is the work place for hundreds of students... Continue

USA | Pornography | Can innocent citizen be convicted in possessing children porn? 26/11/2009 | Can innocent citizen be convicted in possessing children porn?
USA | Evidence | The article deals with the frightening case of accusing innocent citizen in possessing child pornography, after a malware has planted convicting files in their computer. Bottom line: nothing to worry about, this cases are extremely rare!.. Continue

USA | Biometric data base | Will Biometric identification reduce identity theft? 23/11/2009 | Will Biometric identification reduce identity theft?
USA | Data Bases | The author claims that biometric identification technologies won`t solve the identity theft problem, and will expose the public to higher risks of biometric information theft... Continue

USA | Biometric data base | Close watch at children`s kingdom 22/11/2009 | Close watch at children`s kingdom
USA | Data Bases | An article describing the entrance of biometric identification to Disneyland. Disneyland has begun to scan visitor`s finger print information in 2006. .. Continue

International | Privacy | Google voice is violating the company`s privacy policy 21/11/2009 | Google voice is violating the company`s privacy policy
INTERNATIONAL | Privacy | The writer claims that Google voice deliberately causes the appearance of the Google voice account phone number on a phone screen, even when the service`s owner is calling from a different number... Continue

International | Copy rights | Pirates discover new websites 16/11/2009 | Pirates discover new websites
INTERNATIONAL | Copy Rights | As a result from the recent crack down of bittorrent websites such as Pirate Bay, File sharers discover new illegal arenas to operate in, websites that allows anonymous uploads... Continue

England | Hackers | Breaking into websites: A lucrative crime? 14/11/2009 | Breaking into websites: A lucrative crime?
ENGLAND | Cyber Crime | The author claims that hacking websites has become more and more common, and turned from amateur to professional. The hackers exploit flaws in content management systems, to penetrate websites and perform cyber crime... Continue

England | Cyber crime | The war against malware 11/11/2009 | The war against malware
ENGLAND | Cyber Crime | The article presents the increasing phenomenon of malware. The writer claims that fighting the malware should be an initial goal of the British government .. Continue

USA | Internet and Law | Should Courts Trust the Web? 06/04/2009 | Should Courts Trust the Web?
USA | Evidence | This article deals with the growing use of information from the internet in courts, sometimes even as "judicial notice", and suggests this may be problamatic... Continue

International | Tech Law | Technology vs. Lawyers 04/03/2009 | Technology vs. Lawyers
INTERNATIONAL | Technology | The article discusses the problem of lawyers` technological incompetence. It raises ways to deal with this problem... Continue

USA | Mobile Phones | Who should be Allowed to Jam? 22/02/2009 | Who should be Allowed to Jam?
USA | Technology | The author of the article raises the question – why do federal authorities and they only have the right to jam cellular signals? The article gives many examples of when jamming can be used for public security and other legitimate needs and discusses .. Continue

USA | Environment | Be Careful with Green Claims 16/02/2009 | Be Careful with Green Claims
USA | Technology | Many companies choose to decrease greenhouse gas emissions voluntarily and then inform their customers and investors. The problem is that as there are no official and clear regulations on calculating those emissions, the companies’ declarations may t.. Continue

USA | Jury | How to get the Jury`s Attention? 08/02/2009 | How to get the Jury`s Attention?
USA | Legal Procedure | The article deals with the lack of attention that characterizes almost everyone in the developed world, including jurors, due to ever-growing technology and stimuli. The author of the article addresses the issue of the jury`s attention during trials,.. Continue



NetLaw Hebrew Version
 Advanced Search
 Follow us on Facebook
 Follow us on Twitter







Sections

Copy Rights

 

© All copyrights reserved to Aviv Eilon, Adv. 1999-2011