The Internet of Things (IoT) is a phenomenon that is not going away anytime soon. By 2020, it’s estimated that there will be a total of 50 billion connected devices worldwide says William D King. At this point, IoT devices can range from traditional items such as refrigerators and cars to wearable fitness trackers, smart watches, cameras and home assistants like Alexa or Google Home. With an ever-expanding list of industry verticals adopting the IoT model in some capacity, more and more everyday items are being connected to the internet. It’s important for us to understand how these interconnections between new technologies will play out on a legal level while forming our best strategy for managing data privacy risks while preserving the benefits of this technology. International Legal System in Cyberspace: When we think of privacy in the IoT context, it’s important to understand that IoT devices collect and store data about our daily lives. This information is valuable for organizations like retailers, marketing agencies and healthcare providers who can use it to influence their customers’ behaviors and deliver highly personalized advertising and services. It has been reporting that there are over 8 billion data-collecting beacons scatter throughout retail locations. In the United States alone and 60% of Americans have agreed or would agree to share their personal information in exchange for discounts. With so… Read More »William D King- International Legal System in Cyberspace: The Internet of Things
The unprecedented growth, connectivity, and application of information technology have radically altered the way individuals communicate with each other across the globe says William D King. Today it is possible for anyone with an internet connection to download information from every corner of the world in a matter of minutes. The widespread use of distributed computing also allows users to collaborate on massive multi-participant projects over the Internet that are limited only by technical capabilities. Moreover, the ability to collect huge amounts of data on internet users can be used for “big data” analysis which has become an integral part of many industries’ business models. These advances in interconnectivity have dramatically changed how people interact with one another; however they have not yet significantly influenced either how states relate to one another or what behavior states consider to be legitimate or illegitimate on the world stage. The current international legal framework was developed long before information technology advanced to its present state and thus is ill-equipped to deal with issues that arise from these advancements. In particular, the following two concerns stand out: First, many of the existing rules developed by states for regulating electronic communications are outdate and therefore do not reflect the latest technological developments. For example, some nations have used their control over Internet infrastructure to block citizens’ access to sites hosted… Read More »William D King: International Laws in Cyberspace
William D King- India’s National Cyber Security & Critical Information Infrastructure Protection Policy
This is a policy draft which has been proposed for discussion by the Indian Government explains William D King. The objective of this article is to discuss what Indian Government can do in order to enhance cyber security and critical information infrastructure protection. The National Cyber Security Policy 2009 released by the United States government included issues related to governance, risk management, national preparedness, international cooperation etc. In their endeavor for creating awareness about cyber security among general public they have also published FAQs related with questions asked by people from all walks of life on cyber security. It must be kept in mind that at other end India, as a developing country and an emerging economy, needs to first develop its own capabilities and standards keeping in view its requirement and priorities rather than following other countries like US and UK which are developed economies. India can develop its cyber law and cyber security policy keeping in view the Indian Constitution, Indian Penal Code (IPC), Information Technology Act 2000 (IT Act 2000), Rules of Procedure and Evidence Act (RPEA) etc. India also has National Policy on Critical Information Infrastructure Protection (NPCI-P) approved by the Cabinet in June 2009 explains William D King. The draft of National Cyberspace Security & CIIP Policy is divided into four parts; Vision, Strategies, Implementation Plan & Action points along… Read More »William D King- India’s National Cyber Security & Critical Information Infrastructure Protection Policy
If you pay attention to the internet, you might be under the impression that “study groups” in law school are a terrible idea says William D King. Let me take a step back and explain why we actually think they work really well at my (and many other) schools: First and foremost, study groups help students connect with one another and form friendships early on. This is especially crucial because those connections become very important as 1Ls progress through their first year of law school. The connections formed during this time will be instrumental throughout the rest of your legal studies (both as a student and as an attorney). So it’s particularly helpful for students to make lasting relationships from day one. Secondly, study groups give you an incentive/reason to do more than just attend class or do assigned readings. For example, every Monday at 6 PM I am probably either in my apartment studying with several of my friends, studying by myself while waiting for them to finish whatever they’re doing, or in somebody’s room playing Risk/something similar. Third, study groups actually help you learn the material better. This is especially true when combined with in-class participation (although I think in-class participation is only useful if done correctly). If you show up unprepared for class because you were too busy working on your own… Read More »William D King- In Defense of Study Groups in Law School
Here is How to Prevention in Computer System: 1. Avoid Microsoft word Email Attachment says William D King. 2. Choose Password Must Be Minimum 10 Character; Include One Special Character and Number 3. To Avoid Hacking Disable Auto Run USB Drive, External Hard Disk Drive On System Startup, Because Malicious Program Can Use This Way To Infiltrate Your Computer System. 4. Always Keep Updated Antivirus Program and Firewall and Enable Automatic Update 5. Always Check Background Process in Task Manager If There Is Unusual Process Running 6. Use An Operating System Which More Than 3 Years Old And Do Not Use Windows XP Because It Is The Most Hacked Version Of Windows OS. 7. Secure Your Wireless Network By Setting Strong Password, Because Hackers Can Steal Your Personal Data Through Wireless Networks Just By Sniffing Packets Of Connection. 8. Secure Credit Card Details When Shopping Online, Because Hackers Can Get Your Credit Cards Details Easily From E-Commerce Websites Like Amazon Or Ebay Simply Click One Button To Capture All Data Via Phishing Techniques. 9. Don’t Open Spam E-mail Because They Usually Contain Virus Or Malicious Link. 10. Enable Network Connection Encryption, Because Many Hackers Use Different Ways to Steal Your Connection Details like ARP Spoofing and Wire shark Attacks. 11. Disable Auto Run Any Drive On Your System Conguration Option, Because It Can Be… Read More »William D King- how to Prevention in Computer System
It’s a common story that you receive an email from your bank stating that incorrect charges have been made on your account and asks for personal details on a secure website says William D King. You follow the link and login on a spoofed webpage to enter your details, only to find that those have been used for financial frauds. In today’s internet business world, consumers have been constantly warned about phishing attacks on their accounts as criminals are becoming smarter by the day. In some cases, they even use social engineering skills to trick users into giving up sensitive information like account passwords and OTP (One time Password). So, how can you avoid falling prey to such traps? What Is Phishing? Phishing is one of the most common types of online scams that use social engineering or human intervention to steal user data. It includes email schemes which pose as an organization you trust like banks, credit card companies, electronic stores and social networks to steal your login details. Phishing Email Sample: How Can You Recognize A Phishing Attempt? Here’s how a phishing email may look like: There are few factors that can help you distinguish between the legitimate email and the fraudulent one says William D King. The sender address is usually invalid and doesn’t belong to the company in question or it… Read More »William D King- How to Prevent Email Frauds?
Prank calls are quite rampant these days. People make prank calls to their family, friends or even total strangers for fun or to extract some information from their victim says William D King. However, for those receiving the prank calls, it can be a very disturbing experience as they have to put up with someone insulting them, calling out lewd names or challenging them over something trivial. Typically, there are two types of prank callers — one who makes prank calls to extract information like passwords and bank details; the other type is simply doing it for fun. The first category is far more dangerous than the second (fun-loving) one since these individuals may misuse any information that they successfully acquire through their pranks. The targets of such pranksters are not limited to children but also include seniors and even foreigners who may find it difficult to comprehend the language in such calls or easily fall prey to the prank. The world over have been successful in extracting sensitive bank details from customers who have called to complain about their ATM cards not working. Instead of sympathizing with them, the banks often ask customers for personal information which may include passwords and other account numbers to verify their identity. So kindly beware before sharing your financial data! The second category of pranksters are doing it… Read More »William D King- how To Prevent Prank Calls? How Not To Fall Prey to Such Callers?
Phishing is one of the most common cyber crimes which are done by hackers. This is an attempt to obtain confidential information such as usernames, passwords and credit card details by disguising as a trustworthy source says William D King. Hence, many companies and organization train their employees to identify such emails which seem to be bogus and looks like they are sent from reliable sources. What is Phishing? Phishing is the attempt of gaining access to sensitive information by masquerading as a trustworthy entity in an electronic communication (e-mail). A phish email usually includes a link or some other method of sending your personal data/password etc. some reading this might say “phishing only happens on the internet”, but phishing can also occur over the phone, examples would be those who pretend to be from Microsoft support telling you that your computer has been infected with viruses so that they can gain access to your computer. Phishing usually takes place over email where hackers send out mass emails with subject headers that are designed to entice the reader into opening the message when in fact they may contain links that appear legitimate at first glance but they are in fact malicious. These emails are being sent from fake websites that are similar to real sites in order for victims do not to notice the difference. … Read More »William D King- How to Prevent Email Frauds? What Are the Rules Regarding Such Emails?
How to Legal Issues of Digital Marketing? The digital marketing industry is growing rapidly, but many advertisers are uncertain about best legal practices in this area says William D King. This article discusses some of the legal issues concerning digital marketing and examines how those issues have been addressed by the Federal Trade Commission (FTC). Digital marketers, as data-driven marketers, should pay attention to web analytics because it is a crucial part of building a successful online business. According to Google Analytics, there are more than 1 million websites that use Google’s service. One factor that has spurred this exponential growth is the rise in mobile traffic. In fact, according to Statista, mobile devices account for 53 percent of total web traffic in 2017 — a figure that’s expected to jump even further by 2020. At present, there are at least three major points of concern for companies operating within this constantly changing industry: consumer privacy; transparency; and the potential for legal repercussions. Consumer Privacy More than one-third of internet users use at least one ad blocker, meaning consumer privacy is top of mind for many advertisements. While digital marketers may be tempted to skirt around their customers’ concerns, advertisers should instead adhere to users’ rights under U.S. law by complying with requirements outlined in Section 5 of the Federal Trade Commission Act (FTC Act).… Read More »William D King- How to Legal Issues of Digital Marketing?
I was speaking with a friend of mine (who will remain nameless) who is currently in the middle of his divorce says William D King. He told me that he has been working on getting the financial part sorted out between him and his soon-to-be ex-wife, but it’s taken some time to get things moving forward. His attorney had not submitted anything yet for him (and my friend said he sent him several emails asking what was going on), even though he had promised something would happen several weeks earlier. As you can imagine, this wasn’t making any of us feel very confident about how things were progressing. However, after finally talking with her on the phone, she revealed that they are now moving forward…but the reason why it took so long was because she had quit her job as a paralegal to start a craft business. In other words, his attorney has been moonlighting as an extremely crappy crafter all this time and neglecting my friend’s case! And if that wasn’t bad enough, she actually got the divorce decree signed and notarized (which he could’ve done) and never submitted it to any of the courts! She is no longer his attorney because we both know you can’t trust someone who lies I guess what I’m getting at here is that there are some people… Read More »William D King- How to Identify a Bad Legal Representative Before They Screw Up Your Life