Legal, privacy, and security concerns about driverless cars
In the last five years, there has been a steady increase in the number of driverless cars. First, such cars were launched in the city of Phoenix (Arizona), followed by launches in San Francisco (California) and Los Angeles (California). The introduction of driverless cars is often accepted with a dose of skepticism. Below, we will examine some of the major issues raised by the opponents of...
Our partner, Rasa Juzenaite LLM, CIPP/E/US,
was accepted as a PhD candidate at the Gent University and, in parallel with her work for Dimov Internet Law Consulting, will engage in writing a dissertation in the exciting field of data ownership and intellectual property law.
A new publication in a reputable journal
Dr. Daniel Dimov has just published an article entitled “Strategies for Dealing with Reverse Domain Name Hijacking” in the Journal of Internet Law edited by DLA Piper. The article is available in issue 3 of volume 27 of the journal.
The article provides guidance on how to identify domain name hijacking and broadly outlines the strategies a respondent can use to deal with it.
We got a certificate from Harvard Business School
Our privacy lawyer, Rasa Juzenaite LLM, obtained a Certificate in Business Analytics from Harvard Business School. The certificate demonstrates (i) an ability to interpret data to make informed business decisions, (ii) recognize trends and summarize data sets, (iii) analyze complex relationships between variables, (iv) develop and test hypotheses, (v) craft survey questions and reach...
We are now ECPC-B DPO certified
In December 2022, our co-founder, Rasa Juzenaite, who is a Certified Information Privacy Professional (CIPP/Europe and the United States) and has a Master’s Degree in IP and ICT law (Brussels) added a new certification to her portfolio. More particularly, she became a Certified Data Protection Officer (DPO).
The certification was issued by the European Centre on Privacy...
Key findings from ESG’s Modern Application Development Security report
A deep dive into security issuesIn August 2020, the Enterprise Strategy Group (ESG) published its report, “Modern Application Development Security.” ESG is a company specialized in IT-related research. It provides market intelligence to companies all over the world. To compile its report, ESG surveyed 378 cybersecurity, application development and...
Octopus Scanner malware: What it is, how it works and how to prevent it | Malware spotlight
IntroductionOctopus Scanner appeared somewhere in 2018. Although its creators are still unknown, the operation of Octopus Scanner has been extensively discussed in numerous information security publications. This type of malware attacks repositories on the GitHub...
Business email compromise (BEC) scams level up: How to spot the most sophisticated BEC attacks
Introduction to BEC attacksThe term “business email compromise” (BEC) refers to the use of email fraud with the aim to accomplish malicious purposes. BEC attacks usually rely on the lack of information security awareness of the employees of the targeted...
Tesla Model 3 vulnerability: What you need to know about the web browser bug
IntroductionIn 2020, Jacob Archuleta, a researcher nicknamed Nullze, discovered an important information security vulnerability on the web browser of the Tesla Model 3 automobile. If a user of the car’s boarding computer visits a specific website, the entire...
The State of the Art and the Future of GDPR Compliance Software
The General Data Protection Regulation (GDPR) is an EU regulation that became effective on the 25th of May 2018. It imposes a number of obligations on individuals and entities collecting personal data of EU residents, including, but not limited to, (i) implementing appropriate technical and organizational measures to ensure the security of the collected personal data, (ii) processing...