Archive for category Digital Information Law

ISIS Selfies Demonstrate the Connection Between Social Media and Business Situational Awareness

What is Situational Awareness? A Navy SEAL describes situational awareness in this way: “[i]n military-speak, situational awareness is defined as the ability to identify, process, and comprehend the critical elements of information about what is happening to the team with regard to a mission. More simply, it’s being aware of what is going on around you.” […]

, , , , , ,

Leave a comment

Excellent Information = 5 Easy Ways to Get Sued Over Online Content & Social Media

My friend Deb McAlister is a professional writer who has been writing about law and technology issues since before most of us had even considered putting the two words together in the same sentence. The following article is one that she wrote on practical social media legal issues — social media law — and while […]

Leave a comment

Social Media Law Presentation Slides for MENG Webinar

I recently had the pleasure of presenting a nationally broadcast webinar on social media law to MENG (Marketing Executives Networking Group) which is a national network of top-level marketing executives. You can learn more about MENG by visiting its website and you can learn more about my presentation by visiting MENG’s webpage promoting the webinar. Thanks to the hard […]

, , , , , , , , ,

Leave a comment

Supreme Court: Private Information Is Worthy of Protection, Even on Cell Phones

In Riley v. California the Supreme Court made it clear that people’s private information is worthy of protection, even on their cell phones, in holding that cell phones are generally protected from searches without a warrant.  The Supreme Court ruled Wednesday that police cannot go snooping through people’s cell phones without a warrant, in a unanimous […]

, ,

Leave a comment

3 Important Questions the State Attorneys General Will Ask Your Company Following A Data Breach

In an earlier blog post I wrote about how [w]hen your company has a data breach, these are the top 3 questions that you will be required to answer: How did the breach happen? What steps did your company take before the breach to protect the data and keep it from happening? What steps is […]

, , , , ,

Leave a comment