William D King: Is It Possible For Google To Filter Out Fake Profiles Or Spam Accounts From Profile Pages?

In order to answer this question, we will have to break it up into smaller questions says William D King. This way we’ll get a better understanding of what exactly happens when you search for a person on Google+. Let’s have a look at the first part of the question: “Is It Possible for Google to Filter out Fake Profiles or Spam Accounts from Profile Pages?” Technically, Google+ and the other social networks (Facebook and LinkedIn) store data in a way that’s specific to them. When we search for someone on Google+, we receive different results than when we search for someone on Facebook. The same goes for all these companies. They each have their own algorithms (sets of rules used in calculations or other problem-solving operations), which produce unique results when searching for something. When you search for a person on Google+, the following things occur: 1) We send a request to Google servers with the name of the person we’re looking for 2) Google sends back a list of people matching our criteria 3) If you were looking for this person +1ing links, writing blog posts, or publishing photos on Google+, then you will get a list of accounts that have been active in the last few days. Otherwise, you’ll have a list of all the people who match your search criteria 4)… Read More »William D King: Is It Possible For Google To Filter Out Fake Profiles Or Spam Accounts From Profile Pages?

William D King- Is It Legal For An Employer To Read Your Employee’s Email Messages On Company Computers And Servers?

Since the email took off in popularity near the start of this decade, employers have been allowed to monitor their employees’ use of company computers says William D King. The question is whether they can monitor employee use of general servers and webmail programs while the employee is not at work. People who are being paid for their time do not have a right to privacy in the workplace. No privacy rights were granted when “the boss” hacked Facebook and saw photos of his employee drinking at a party or snooped through her email and found out which co-worker she was dating. Employers can monitor you to make sure you are not browsing sites that are related to your union organizing efforts. They can also read your company email if they suspect you are up to no good on company time, but they have to have some reason for thinking so. It is legal for employers to track what you do online after work hours, though it’s questionable whether they should. If your employer installs keystroke logging software on your computer during non-work hours, consider this a red flag that causes you to ask for proof that your employer is not spying on you. Employers that track employees in this way are only allowed to see what the employee is doing that relates to their… Read More »William D King- Is It Legal For An Employer To Read Your Employee’s Email Messages On Company Computers And Servers?

William D King- International Legal System in Cyberspace: The Internet of Things

The Internet of Things (IoT) is a phenomenon that is not going away anytime soon. By 2020, it’s estimated that there will be a total of 50 billion connected devices worldwide says William D King. At this point, IoT devices can range from traditional items such as refrigerators and cars to wearable fitness trackers, smart watches, cameras and home assistants like Alexa or Google Home. With an ever-expanding list of industry verticals adopting the IoT model in some capacity, more and more everyday items are being connected to the internet. It’s important for us to understand how these interconnections between new technologies will play out on a legal level while forming our best strategy for managing data privacy risks while preserving the benefits of this technology. International Legal System in Cyberspace: When we think of privacy in the IoT context, it’s important to understand that IoT devices collect and store data about our daily lives. This information is valuable for organizations like retailers, marketing agencies and healthcare providers who can use it to influence their customers’ behaviors and deliver highly personalized advertising and services. It has been reporting that there are over 8 billion data-collecting beacons scatter throughout retail locations. In the United States alone and 60% of Americans have agreed or would agree to share their personal information in exchange for discounts. With so… Read More »William D King- International Legal System in Cyberspace: The Internet of Things

William D King: International Laws in Cyberspace

The unprecedented growth, connectivity, and application of information technology have radically altered the way individuals communicate with each other across the globe says William D King. Today it is possible for anyone with an internet connection to download information from every corner of the world in a matter of minutes. The widespread use of distributed computing also allows users to collaborate on massive multi-participant projects over the Internet that are limited only by technical capabilities. Moreover, the ability to collect huge amounts of data on internet users can be used for “big data” analysis which has become an integral part of many industries’ business models. These advances in interconnectivity have dramatically changed how people interact with one another; however they have not yet significantly influenced either how states relate to one another or what behavior states consider to be legitimate or illegitimate on the world stage. The current international legal framework was developed long before information technology advanced to its present state and thus is ill-equipped to deal with issues that arise from these advancements. In particular, the following two concerns stand out: First, many of the existing rules developed by states for regulating electronic communications are outdate and therefore do not reflect the latest technological developments. For example, some nations have used their control over Internet infrastructure to block citizens’ access to sites hosted… Read More »William D King: International Laws in Cyberspace

William D King- India’s National Cyber Security & Critical Information Infrastructure Protection Policy

This is a policy draft which has been proposed for discussion by the Indian Government explains William D King. The objective of this article is to discuss what Indian Government can do in order to enhance cyber security and critical information infrastructure protection. The National Cyber Security Policy 2009 released by the United States government included issues related to governance, risk management, national preparedness, international cooperation etc. In their endeavor for creating awareness about cyber security among general public they have also published FAQs related with questions asked by people from all walks of life on cyber security. It must be kept in mind that at other end India, as a developing country and an emerging economy, needs to first develop its own capabilities and standards keeping in view its requirement and priorities rather than following other countries like US and UK which are developed economies. India can develop its cyber law and cyber security policy keeping in view the Indian Constitution, Indian Penal Code (IPC), Information Technology Act 2000 (IT Act 2000), Rules of Procedure and Evidence Act (RPEA) etc. India also has National Policy on Critical Information Infrastructure Protection (NPCI-P) approved by the Cabinet in June 2009 explains William D King. The draft of National Cyberspace Security & CIIP Policy is divided into four parts; Vision, Strategies, Implementation Plan & Action points along… Read More »William D King- India’s National Cyber Security & Critical Information Infrastructure Protection Policy

William D King- In Defense of Study Groups in Law School

If you pay attention to the internet, you might be under the impression that “study groups” in law school are a terrible idea says William D King. Let me take a step back and explain why we actually think they work really well at my (and many other) schools: First and foremost, study groups help students connect with one another and form friendships early on. This is especially crucial because those connections become very important as 1Ls progress through their first year of law school. The connections formed during this time will be instrumental throughout the rest of your legal studies (both as a student and as an attorney). So it’s particularly helpful for students to make lasting relationships from day one. Secondly, study groups give you an incentive/reason to do more than just attend class or do assigned readings. For example, every Monday at 6 PM I am probably either in my apartment studying with several of my friends, studying by myself while waiting for them to finish whatever they’re doing, or in somebody’s room playing Risk/something similar. Third, study groups actually help you learn the material better. This is especially true when combined with in-class participation (although I think in-class participation is only useful if done correctly). If you show up unprepared for class because you were too busy working on your own… Read More »William D King- In Defense of Study Groups in Law School

William D King- how to Prevention in Computer System

Here is How to Prevention in Computer System: 1. Avoid Microsoft word Email Attachment says William D King. 2. Choose Password Must Be Minimum 10 Character; Include One Special Character and Number 3. To Avoid Hacking Disable Auto Run USB Drive, External Hard Disk Drive On System Startup, Because Malicious Program Can Use This Way To Infiltrate Your Computer System. 4. Always Keep Updated Antivirus Program and Firewall and Enable Automatic Update 5. Always Check Background Process in Task Manager If There Is Unusual Process Running 6. Use An Operating System Which More Than 3 Years Old And Do Not Use Windows XP Because It Is The Most Hacked Version Of Windows OS. 7. Secure Your Wireless Network By Setting Strong Password, Because Hackers Can Steal Your Personal Data Through Wireless Networks Just By Sniffing Packets Of Connection. 8. Secure Credit Card Details When Shopping Online, Because Hackers Can Get Your Credit Cards Details Easily From E-Commerce Websites Like Amazon Or Ebay Simply Click One Button To Capture All Data Via Phishing Techniques.     9. Don’t Open Spam E-mail Because They Usually Contain Virus Or Malicious Link. 10. Enable Network Connection Encryption, Because Many Hackers Use Different Ways to Steal Your Connection Details like ARP Spoofing and Wire shark Attacks. 11. Disable Auto Run Any Drive On Your System Conguration Option, Because It Can Be… Read More »William D King- how to Prevention in Computer System

William D King- How to Prevent Email Frauds?

It’s a common story that you receive an email from your bank stating that incorrect charges have been made on your account and asks for personal details on a secure website says William D King. You follow the link and login on a spoofed webpage to enter your details, only to find that those have been used for financial frauds. In today’s internet business world, consumers have been constantly warned about phishing attacks on their accounts as criminals are becoming smarter by the day. In some cases, they even use social engineering skills to trick users into giving up sensitive information like account passwords and OTP (One time Password). So, how can you avoid falling prey to such traps? What Is Phishing? Phishing is one of the most common types of online scams that use social engineering or human intervention to steal user data. It includes email schemes which pose as an organization you trust like banks, credit card companies, electronic stores and social networks to steal your login details. Phishing Email Sample: How Can You Recognize A Phishing Attempt? Here’s how a phishing email may look like: There are few factors that can help you distinguish between the legitimate email and the fraudulent one says William D King. The sender address is usually invalid and doesn’t belong to the company in question or it… Read More »William D King- How to Prevent Email Frauds?

William D King- how To Prevent Prank Calls? How Not To Fall Prey to Such Callers?

Prank calls are quite rampant these days. People make prank calls to their family, friends or even total strangers for fun or to extract some information from their victim says William D King. However, for those receiving the prank calls, it can be a very disturbing experience as they have to put up with someone insulting them, calling out lewd names or challenging them over something trivial. Typically, there are two types of prank callers — one who makes prank calls to extract information like passwords and bank details; the other type is simply doing it for fun. The first category is far more dangerous than the second (fun-loving) one since these individuals may misuse any information that they successfully acquire through their pranks. The targets of such pranksters are not limited to children but also include seniors and even foreigners who may find it difficult to comprehend the language in such calls or easily fall prey to the prank. The world over have been successful in extracting sensitive bank details from customers who have called to complain about their ATM cards not working. Instead of sympathizing with them, the banks often ask customers for personal information which may include passwords and other account numbers to verify their identity. So kindly beware before sharing your financial data! The second category of pranksters are doing it… Read More »William D King- how To Prevent Prank Calls? How Not To Fall Prey to Such Callers?

William D King- How to Prevent Email Frauds? What Are the Rules Regarding Such Emails?

Phishing is one of the most common cyber crimes which are done by hackers. This is an attempt to obtain confidential information such as usernames, passwords and credit card details by disguising as a trustworthy source says William D King. Hence, many companies and organization train their employees to identify such emails which seem to be bogus and looks like they are sent from reliable sources.  What is Phishing? Phishing is the attempt of gaining access to sensitive information by masquerading as a trustworthy entity in an electronic communication (e-mail). A phish email usually includes a link or some other method of sending your personal data/password etc. some reading this might say “phishing only happens on the internet”, but phishing can also occur over the phone, examples would be those who pretend to be from Microsoft support telling you that your computer has been infected with viruses so that they can gain access to your computer. Phishing usually takes place over email where hackers send out mass emails with subject headers that are designed to entice the reader into opening the message when in fact they may contain links that appear legitimate at first glance but they are in fact malicious. These emails are being sent from fake websites that are similar to real sites in order for victims do not to notice the difference. … Read More »William D King- How to Prevent Email Frauds? What Are the Rules Regarding Such Emails?