Close

Articles Posted in Technology

Updated:

Avoiding Banking Fraud

Nowadays, we’re using the web for numerous purposes, including, but not limited to, online banking.  So, we should be able to protect our financial information. There are many options for hackers to gain access to financial information, and without the prerequisite security, financial information can be accessed by hackers.  The…

Updated:

EU-US Privacy Shield

We’ve discussed the nature of this before, but the EU-US Privacy Shield has gone into full effect. This program essentially restricts the ability of U.S. commercial entities to do business in the European Union due to the ability of the U.S. government to use international businesses to improperly conduct surveillance…

Updated:

Personal Image Protection

The internet with its “remix culture” often appropriates images and videos to create new things. Yet, this also includes personal images. Be it “Bad Luck Brian,” “Overly Attached Girlfriend,” or some exploitable image, how could one protect his or her personal image from being remixed and exploited for a financial…

Updated:

Copyright Protection of Computer Programs

Where are the limits of copyright?  Copyright in general is limited to those new and original works, fixed in a tangible medium.  In regards to computer programs, they are also considered literary works for the purposes of copyright law, and so, it could be argued that the language of a…

Contact Us