Listing of Blog Items

FAA Finally Requires Drone UAS Registration

The FAA now requires registration and labeling of all outdoor drones (unmanned aircraft systems or UAS) by February 19, 2016. According to the FAA UAS Website, electronic registration is available for hobbyists, as defined by law, fro drones weighing less

Posted in Blog Tagged with: ,

Pirker Decision Fails: Drones Subject to FAA Rules

As predicted, the NTSB reversed an earlier administrative law decision in Pirker and held that drones (UAS) are aircraft according to law and thus subject to FAA regulation. The FAA accused Pirker of “reckless operation of an aircraft” and imposed

Posted in Blog

Is PCI Compliance Enough?

CIO Magazine recently ran an insightful article about PCI compliance. The article emphasizes that PCI “compliance” is a credit card industry minimum set of standards to protect data and to minimize data breaches. However, as the numerous data breaches over

Posted in Blog Tagged with: , , , , , , , , ,

Texas Bar Opinion 642 and Today’s Legal Profession

In May 2014, the Texas Bar Association’s Professional Ethics Committee released Opinion 642 barring law firms from using the title “officer” or “principal” in non-lawyer job titles such as Chief Information Officer. Shockingly, the opinion unleashed a howl of protest

Posted in Blog Tagged with: , , , , , ,

Cybersecurity Resolution Adopted

The American Bar Association (ABA) adopted a startling resolution on cybersecurity at its August 2014 meeting. The ABA resolution urges all businesses, law firms, government agencies, and organizations to take cybersecurity seriously and to conduct regular reviews of security posture.

Posted in Blog

Droning On: Drone Aircraft Activists’ Arguments Unravel

On June 23, 2014, the FAA issued a Federal Register Notice for the operation of model aircraft (drone) aircraft. The Notice repeats the long-standing rules regarding operating model aircraft and addresses the new rules mandated by Congress—ironically, Rules necessitated by

Posted in Blog Tagged with: ,

The Next Battleground for Data Breaches…Shareholder Lawsuits?

Companies ill-prepared for data breaches and failing to take reasonable steps to secure data and computer systems face increasing and serious risks to the business. Specifically, companies, officers, and boards must start taking data and computer-systems security seriously or risk

Posted in Blog Tagged with: , , , , , , , ,

Commercial Drones Pose Confirmed Dangers?

Drone aircraft crashes and personal injury may no longer be speculation. In Australia, a triathlete was apparently struck by a drone aircraft after radio interference destabilized the drone. See, e.g., Australian triathlete injured after drone crash, BBCNews (Apr.7, 2014). Even

Posted in Blog Tagged with:

Not So Fast…Commercial Drone Legality Still Remains Unclear

On 6 March 2014, in FAA v. Pirker, a NTSB Administrative Law Judge dismissed the first complaint brought by the FAA against the operator of a commercial drone for reckless operation of an aircraft. While some claim that this opinion

Posted in Blog Tagged with: , , ,

A Fair Approach to Drone Regulation

Drone manufacturers and would-be manufacturers paint a picture of skies filled with drones—unmanned aircraft (and other machines). Media and advocacy groups cite First Amendment rights to the use of drones. Police seek drones despite prohibitions by federal and state constitutions.

Posted in Blog Tagged with: , , , ,

Federal Appellate Court Affirms Warrant Required for GPS Tracking

UPDATE: Government attorneys continue to press for warrantless searches in GPS cases and significant, and unconstitutional, expansion of the so-called Good Faith Doctrine. On December 12, 2013, a majority of the Third Circuit agreed to re-hear the matter en banc

Posted in Blog Tagged with: , ,

Warrant Necessary to Obtain Cell Phone Tracking Data

The New Jersey Supreme Court held that government agents must obtain a warrant, supported by probable cause and issued by a neutral judicial authority, before obtaining cell phone tracking data (unless exceptional, exigent circumstances apply). State vs. Earls, A-53-11 (N.J. Sup.

Posted in Blog Tagged with: , ,

Part 2: Could “Undeletable” Cookies Be a Felony in Pennsylvania?

Pennsylvania has a new (2010, P.L. 855, No. 86) Consumer Protection Against Computer Spyware Act (73 P.S. 2330.1–2330.9, and 2330.19). The apparent aim of the Act is to prevent software from being deceptively installed on a user’s computer and compromising personally identifiable information.

Posted in Blog Tagged with: , ,

CAPTCHA Turing Test Defeated: Ramifications for Legal Community

While debates on the use of machine learning algorithms in e-discovery continue (for example, so called “predictive coding”), the recent defeat of CAPTCHA signals a growing maturity in machine learning capabilities with direct applicability to the legal community.

Posted in Blog Tagged with: , ,

Pennsylvania Case Addresses Authenticating Text Messages

On 16 September 2011, the Pennsylvania Superior Court in Comm. v. Koch, 2011 PA Super 201 (Sept. 16, 2011) (slip-opinion) re-emphasized “authentication of electronic communications, like documents, requires more than mere confirmation that the number or address belonged to a

Posted in Blog Tagged with: , , , ,

Navigating the Fog of Cloud Computing: An Unofficial Supplement to The Pennsylvania Lawyer Article

Attorney Brown compiled some of his most recent articles and blog posts related to cloud computing. If you read the recent article, “Navigating the Fog of Cloud Computing” in The Pennsylvania Lawyer, these articles might also be of interest for

Posted in Blog Tagged with: , , ,

Could “Undeletable” Cookies Be a Felony in Pennsylvania?

Could “Undeletable” Cookies, Zombie Cookies, Flash Cookies, “Super-cookies” or Malcookies Be a Felony in Pennsylvania? Insidious web tracking. “Undeletable” cookies. Zombie cookies. Malcookies.[FN1] Flash cookies. Euphemistically termed “super-cookies.” Web cookie viruses. No matter what term is applied, the distribution of

Posted in Blog Tagged with: , ,

An Unofficial Quick Guide to Installing a VeriSign Digital ID (S/MIME Certificate) for Lawyers

Installing an email encryption S/MIME (SMIME) certificate on Mozilla Thunderbird and Mozilla Firefox is simple. However, the instructions provided by Verisign (as of August 2011) do not appear to address newer versions of Mozilla products (circa 5.0+) and can be

Posted in Blog Tagged with: , ,

Cloud Nines: Understanding Accessibility Versus Availability in Cloud Computing for Lawyers

Cloud computing, by definition, relies on networks as well as servers, software, and related items. The lawyer, thus, should understand the important distinction between cloud provider promises of service availability (uptime) and network accessibility when considering the use of cloud

Posted in Articles, Blog Tagged with: ,

Pennsylvania Court Opinion Implicates Authentication of Social Media Evidence

A recent Commonwealth Court decision, Chapman v. Unemployment Compensation Board of Review 20 A.3d 603 (Pa. Commw. Ct. 2011), illustrates 1) the growing presence of social media evidence and 2) the potential for social media authentication issues in legal matters —including in

Posted in Articles, Blog Tagged with: , , ,

New, Active-controller Hard Drive Technologies Pose Challenges and Benefits

Toshiba plans a new line of hard drives that self-encrypt data and automatically wipe the drive (delete data) if the drive is removed. [FN1] A smart controller embedded in the hard drive provides the self-encryption and wiping capabilities. These new

Posted in Articles, Blog Tagged with: , ,

Cloud Computing: Who Holds the Encryption Keys? [And Why It May Matter to Lawyers]

General cloud-provider statements simply indicating that the cloud-based data is encrypted might not be adequate protection for a lawyer’s data. The lawyer should also know 1) when the data is encrypted and 2) who holds the encryption key(s). (See my prior article

Posted in Articles, Blog Tagged with: , , ,

Storing Files in the Cloud: Storage-as-a-Service for Lawyers—Encryption

For attorneys, special considerations may be appropriate before implementing a STaaS solution especially if storing client data in the cloud. What might an attorney consider before using a Storage-as-a-Service (STaaS) such as DropBox, SpiderOak, IronMountain, JungleDisk, or MozyPro? Salient factors

Posted in Articles, Blog Tagged with: , ,

Study Offers Insights into Law Practice Technology

The 2010 Case, Matter, and Practice Management System Software Study provides interesting insights into law practice technologies. The 312 page report widely addresses technology use in law practice. However, three areas particularly intrigue: cloud computing use, OpenOffice word processor use,

Posted in Blog Tagged with: , ,

Pennsylvania Ethics Advisory Opinion on Cloud Computing

In January 2011, the Pennsylvania Bar Association released an advisory (non-binding) ethics opinion addressing cloud computing issues.

Posted in Blog Tagged with: ,