Legal aspects of computing
Legal aspects of computing are related to the overlapping areas of law and computing.The first one, historically, was information technology law (or IT law). ("IT law" should not be confused with the ...
YouTube mistakenly shuts down conservative channels, videos
Kairos CEO Ankur Jain on the European Union issuing strict guidelines for tech companies' handling of terror content and how Rhino helps renters avoid security deposits.
Report: Facebook Has “An Army Of Filipinos” Policing Offensive Content For £1.81/hr – MILO NEWS
He searches the world for the cheapest labor possible and than wants the government to pay a minimum income. The hypocracy is astounding.
Zuckerberg Says Facebook Plans To Crack Down On Fake News
Facebook founder Mark Zuckerberg released a statement on how his company is working to mitigate fake news.
Why Is Typo Hashtag #HillaryForPrision Trending On Twitter?
Hashtag #HillaryForPrision began trending on Twitter Monday morning — and no, this writer didn’t just strike a typo on his MacBook Air.
All the Ways Your Wi-Fi Router Can Spy on You
It can even be trained to read your lips.
Google Can Now Tell You When And Where You Were Mentioned Online
The company's new Stay In The Loop feature does just that. If you weren’t scared that Google knows too much about you, here’s yet another reason to be so. The company’s new ‘Stay In the Loop’ feature ...
Americans Are Getting Freaked Out About Doing Stuff on the Internet
If you've started to think twice about what you type into a search engine or whether you should hit that Wi-Fi hotspot, you're not alone. Literally.
Beware of ads that use inaudible sound to link your phone, TV, tablet, and PC
Privacy advocates are warning federal authorities of a new threat that uses inaudible, high-frequency sounds to surreptitiously track a person's online behavior across a range of devices, including ph...
Paris Attack Could Renew Debate Over Encrypted Messaging Apps
The deadly terror attack in Paris could reignite the debate over whether the government should have a 'back door' to access encrypted communications. Law enforcement officials and cyberexperts have po...
AT&T Chairman To Sue The FCC Over Net Neutrality
The FCC won't be able to regulate the internet unless it's reclassified as a Title II service.
Google could end China's web censorship in 10 days – why doesn't it?
Google is too big for China to block. Just two simple steps and Eric Schmidt will have done something we can all celebrate
Crypto-anarchism
Crypto-anarchism (or crypto-anarchy) is a cyber-spatial realization of anarchism. Crypto-anarchists employ cryptographic software to evade prosecution and harassment while sending and receiving infor...
Cryptography law
Cryptography is the practice and study of hiding information. There are many different cryptography laws in different nations. Some countries prohibit export of cryptography software and/or encryption...
Electronic Frontier Foundation
The Electronic Frontier Foundation (EFF) is an international non-profit digital rights group based in the United States.EFF provides funds for legal defense in court, presents amici curiae briefs, def...
Electronic Frontier Foundation - Wikipedia
Digital forensics
Digital forensics (sometimes known as digital forensic science) is a branch of forensic science encompassing the recovery and investigation of material found in digital devices, often in relation to c...
Digital forensics - Wikipedia
Internet censorship
Internet censorship is the control or suppression of what can be accessed, published, or viewed on the Internet. It may be carried out by governments or by private organizations at the behest of gover...
Internet censorship - Wikipedia
Internet governance
Internet governance is the development and application of shared principles, norms, rules, decision-making procedures, and programs that shape the evolution and use of the Internet. This article descr...
Internet governance - Wikipedia
Internet privacy
Internet privacy involves the right or mandate of personal privacy concerning the storing, repurposing, provision to third parties, and displaying of information pertaining to oneself via the Interne...
Internet privacy - Wikipedia
Net neutrality
Net neutrality (also network neutrality, Internet neutrality, or net equality) is the principle that Internet service providers and governments should treat all data on the Internet equally, not discr...
Data privacy
Information privacy, or data privacy (or data protection), is the relationship between collection and dissemination of data, technology, the public expectation of privacy, and the legal and political ...
Software license
A software license is a legal instrument (usually by way of contract law, with or without printed material) governing the use or redistribution of software. Under United States copyright law all softw...
Software license - Wikipedia