Articles Posted in Technology

Business email compromise (“BEC”) is a type of cyberattack that targets businesses and organizations by manipulating email accounts to conduct fraudulent activities. This type of attack has been on the rise in recent years, with the FBI reporting that BEC scams have cost businesses over $26 billion in losses since 2016. In this article, we will explore what business email compromise is, how it works, and what businesses can do to protect themselves from this growing threat.

What is Business Email Compromise?

BEC is a type of cyberattack that involves the use of email to trick businesses and individuals into transferring money or sensitive information to the attacker. Typically, the attacker will first gain access to a business email account, either through a phishing scam or by exploiting a vulnerability in the email system. Once they have access to the account, the attacker will use it to send fraudulent emails to other employees, customers, or vendors, often impersonating a high-level executive or trusted partner.

Artificial intelligence (“AI”) technology has been rapidly advancing in recent years, with many new and exciting applications emerging in various fields. However, the use of AI also raises important legal questions and challenges. In this article, we will explore some of the key legal implications and challenges associated with AI technology.

Intellectual Property

One of the most significant legal implications is in the area of intellectual property. AI technology can be used to generate creative works, such as music, art, and writing, which raises questions about who owns the copyright to these works. In some cases, the copyright may belong to the person or organization that created the AI system, while in other cases, the copyright may belong to the person or organization that provided the data or training that the AI system used to generate the work.

Artificial intelligence technology is growing in an exponential speed. It is arguable that it has great potentials but there could be a downside. Nevertheless, the private and public sectors are looking to maximize their profits by using this new and emerging technology.

What is Google Bard?

Google’s Bard is a generative artificial intelligence chatbot that is powered by LaMDA. It gets its geeky name based on the search engine giant’s marketing strategies. This platform is able to accept prompts and conduct text-based tasks such as giving answers to questions or creating content. It can summarize information that can be found on the internet and provide links to explore websites with additional information.

Artificial intelligence is here and will continue to grow across various industries. This type of technology allows intelligent machines to think like humans and take over human-like tasks. The fact that intelligent machines can conduct human-like tasks such as answer phone calls, quickly analyze complex information, drive vehicles, or fly airplanes – is a remarkable phenomenon.

What is ChatGPT?

Wikipedia has described ChatGPT (a/k/a “Chat Generative Pre-trained Transformer”) as an artificial-intelligence chatbot developed by OpenAI which was launched last year. It is built on top of OpenAI’s GPT-3.5 and GPT-4 families of large language models and has been fine-tuned using both supervised and reinforcement learning techniques. This technology allows having natural conversations with users. So, in other words, it’s an intelligent chatbot that can assist with automating chat tasks. It can answer questions and assist the user with writing emails, essays, and software programs. It’s the fastest growing application of all time according to analysts since it had 100 million active users two months after being launched.  The application can be accessed by visiting chat.openai.com where users can create their accounts. Then, once you create the account, you can start your conversation and ask questions.

The Computer Fraud and Abuse Act (“CFAA”) amends the federal criminal code to change the scienter requirement from “knowingly” to “intentionally” for certain offenses regarding accessing the computer files of another. It revises the definition of “financial institution” to which the financial record provisions of computer fraud law apply. It applies such provisions to any financial records, including, but not limited to, those of corporations and small businesses, not just those of individuals and certain partnerships. It modifies existing federal law regarding accessing federal computers. It makes the basic offense trespass. The federal statute removes criminal liability for exceeding without the intent to defraud authorized access to a federal computer in one’s own department or agency. This law creates new federal criminal offenses of: (1) property theft by computer occurring as part of a scheme to defraud; (2) altering, damaging, or destroying information in, or preventing the authorized use of, a federal interest computer; and (3) trafficking in computer access passwords. It eliminates the special conspiracy provisions for computer crimes. These conspiracies shall be treated under the general federal conspiracy statutes. It amends penalty provisions to remove the cap on fines for certain computer crimes. Finally, it exempts authorized law enforcement or intelligence activities.

Whoever (1) having knowingly accessed a computer without authorization or exceeding authorized access, and by means of such conduct having obtained information that has been determined by the United States Government pursuant to an Executive order or statute to require protection against unauthorized disclosure for reasons of national defense or foreign relations, or any restricted data, as defined in paragraph y. of section 11 of the Atomic Energy Act of 1954, with reason to believe that such information so obtained could be used to the injury of the United States, or to the advantage of any foreign nation willfully communicates, delivers, transmits, or causes to be communicated, delivered, or transmitted, or attempts to communicate, deliver, transmit or cause to be communicated, delivered, or transmitted the same to any person not entitled to receive it, or willfully retains the same and fails to deliver it to the officer or employee of the United States entitled to receive it;

(2) intentionally accesses a computer without authorization or exceeds authorized access, and thereby obtains:

Ireland’s Data Protection Commission (“DPC”) has reached its final decision related to Meta Platforms Ireland Limited (“MPIL”) which is Facebook’s data controller in that country. The DPC announced last month that it will be imposing a fine of €265 million against the company and will issue a set of corrective measures.

The investigation was instigated last year based on reports of published personal data on the internet that Facebook controlled and managed. In fact, there was a report of a data leak involving the personal information of 533 million users around the world. The investigation started by examining and assessing Facebook’s search, messenger contact importer, and Instagram contact importer tools. The main issue was whether Facebook complied with the GDPR obligation for data protection by design and default. Therefore, the investigating body – i.e., DPC – examined the technical and organizational measures under Article 25 of the GDPR and determined that MPIL had infringed Articles 25(1) and 25(2) of the GDPR and imposed a reprimand and order compelling the company to remedy the issues within certain deadlines.

Articles 25, and its subparts, were drafted to address data protection by design and default. These articles state as follows:

The Cybersecurity and Infrastructure Security Agency (“CISA”) released the second version of its cloud security Technical Reference Architecture (“TRA”) several months ago. CISA is the country’s cyber defense agency that works with other interagency partners to improve cybersecurity. The purpose of the TRA is to outline the suggested approaches to data protection or cloud migration. The federal government is slowly transitioning to the cloud and the reference architecture is designed to provide guidance. The TRA also explains the considerations for shared services, cloud security posture management, and cloud migration.

It’s important to know how to securely migrate information to the cloud. There are important considerations when transferring information from one database to another one. Data migration can be a multi-faceted process that requires information evaluation. In other words, the information that is being transferred should be categorized based on its sensitivity – e.g., non-confidential, confidential, highly confidential. In that way, the data migration team can implement the necessary safeguards.

President Joseph Biden recently issued Executive Order 14028 called “Improving the Nation’s Cybersecurity” in an effort to support cybersecurity and safeguard critical infrastructures. The key points of the executive order are as follows:

It’s a crime when you use interstate wire communications (e.g., phone, radio, television, internet) to engage in a scheme to defraud or to obtain money by false pretenses. Wire fraud is one type of cybercrime that takes place by using technology. In most cases, the culprit uses some kind of software or hardware technology to inject him or herself into the private computer network of a third party such as an escrow/title company or financial institution. The culprit spies on the third party’s internal communications to gain access to confidential information such as bank wire instructions.

Wire fraud is similar to mail fraud except that it requires the communications to be transmitted by wire rather than conventional mail. Generally, the plaintiff must prove the existence of a fraudulent scheme, usage of wire, radio, television, or internet communications to further that scheme, and intent to commit fraud. The culprit commits the wire fraud by deceiving the victim into thinking that he or she is dealing with a legitimate party. For example, the culprit intervenes in a pending real estate transaction by using a fake email account and sends a message to instruct the victim into transferring the funds to another bank account. The victim, who has been dealing with multiple individuals (e.g., real estate agent, broker) legitimately believes that he is sending the money to the right financial institution. However, unbeknownst to the victim, the culprit’s fraudulent scheme is intended to send the funds to a different bank or financial institution.

These situations are extremely time sensitive and complicated because the victims have a limited time to determine the facts – i.e., who, what, when, where, and how the wire fraud was committed without their authorization. The victims will need to contact law enforcement agencies and a qualified lawyer who know the intricacies of these matters. The government agencies usually collaborate with the victim’s lawyer to locate and identify the culprits. These government agencies include, but are not limited to, the local police, Federal Bureau of Investigation, United States Secret Service, or United States Treasury Department. Nonetheless, a tremendous amount of time and resources are necessary to initiate and finalize the investigations.

A business organization has legal responsibilities when it comes to data access, control, and management. The government has recently issued an opinion regarding disclosure requirements for the so-called “inferred data” which comprise of internally generated inferences within the context of a consumer’s right of access request. California Civil Code Section 1798.140(v)(1)(K) defines “inferred data” as inferences drawn from a consumer’s personal information to create a profile which reflects the consumer’s preferences, characteristics, psychological trends, predispositions, behaviors, attitudes, intelligence, abilities and aptitudes.

Under California Civil Code Section 1798.110(a)(1), consumers have the right to know the specific pieces of personal information a business organization has collected about them. The California Consumer Privacy Act (“CCPA”) did not address inferred data in its provisions and only implied that businesses should disclose personal data they collected from consumers. However, the Attorney General’s Office issued Opinion No. 20-303 to address whether business organizations that are subject to the CCPA should include inferred data when a consumer submits a Data Subject Access Request (“DSAR”). In short, with limited exceptions (e.g., trade secret protection), the answer was affirmative.

The question is whether inferred data elements fall under trade secret protection rules. In his opinion, the state Attorney General stated that the CCPA only mandates a business to share the product of its internal algorithms even though the algorithms themselves are protected trade secrets. In fact, internal algorithms fall under the classic definition of trade secrets because they’re not publicly accessible to competitors, they confer a competitive advantage, their secrecy is maintained from external disclosure. See California Civil Code § 3426.1(d)(2) for more information about trade secrets. In fact, trade secrets include customer lists, processes, and software or commercial methods. It is conceivable, and probably foreseeable that, a business may withhold inferences because they’re protected trade secrets but it has the burden of proof. So, in short, a business has two options when it comes to disclosing inferred data. First, it can fulfill the DSAR according to the most recent opinion and face the risk of exposing its internal algorithm. Second, it can withhold the data inferences and face the risk of receiving a non-compliance notice from the state Attorney General’s office.

The term “big data” is generally used for the collection and analysis of a large amount of electronic data by using special and complex algorithms. The process is to analyze the correlation between large data sets which would not make sense independently. Now, another reason for its expansion is because the cost of storing data has decreased so it has become an easier process.

The problem with big data is that there isn’t a uniform set of rules or regulations that would govern the collection of electronic information. Obviously, the owners of the data sets are usually the consumers who somehow relinquish access to their information. So, privacy and security are major concerns. It’s important to realize that even if metadata (i.e., data about the data) is removed from the information, it can also reveal the user’s identity by looking at the relationship between the pieces of information. Also, it’s important to obtain consent from the users when collecting that information.

The potential privacy concerns have been addressed by using a mechanism called “differential privacy” which is when the data collector makes a promise to the data owner that he or she won’t be affected by giving access to the particular information. It is a type of mathematical guarantee of privacy to the interested party – e.g., the consumer. This type of mechanism has been used by large technology companies and government agencies. Nonetheless, with every new technology or mechanism that has been used by the private or public sector, there have been instances of state or federal litigation. For example, the State of Alabama filed a lawsuit in district court against the United States Census Bureau regarding this new mechanism’s viability. In fact, several years ago, the Obama Administration addressed this issue to minimize the privacy risks. Yet, there are many unanswered questions that should be addressed by lawmakers. For example, what are the potential harms and risks? Is there any kind of uniform law? And if not, should there be state and federal laws focusing on big data? What level of transparency should be required? What type of technological parameters should be implemented? Should we follow other countries’ rules and regulations? In response, the federal government granted an opportunity to the public to disclose their concerns. The government released a Department of Justice 2014 Report as a result of another lawsuit wherein the president was warned about the dangers of law enforcement agency’s predictive analytics. This report was in relation to the general public’s historical data and how a defendant’s actions may impact criminal history.