Breaking down the DOJ Section 230 Workshop: Stuck in the Middle With You

The current debate over Section 230 of the Communications Decency Act (47 U.S.C. § 230) (often referred to as “Section 230” or “CDA”) has many feeling a bit like the lyrics from Stealers Wheel – Stuck in The Middle With You, especially the lines where it says “clowns to the left of me, jokers to my right, here I am stuck in the middle with you.” As polarizing as the two extremes of the political spectrum seem to be these days, so are the arguments about Section 230.  Arguably the troubling debate is compounded by politicians who either don’t understand the law, or purposefully make misstatements about the law in attempt to further their own political agenda.

For those who may not be familiar with the Communications Decency Act, in brief, it is federal law enacted in 1996 that, with a few exceptions carved out within the statute, protects the owners of websites/search engines/applications (each often synonymously referred to as “platforms”) from liability from third-party content.  Platforms that allow third-party content are often referred to as user generated content (“UGC”) sites.  Facebook, Twitter, Snapchat, Reddit, TripAdvisor, and Yelp are all examples of such platforms and reasonable minds would likely agree that there is social utility behind each of these sites. That said, these household recognized platform “giants” aren’t the only platforms on the internet that have social utility and benefit from the CDA.  Indeed, it covers all of the smaller platforms, including bloggers or journalists who desire to allow people to comment about articles/content on their websites. 

So, what’s the debate over?  Essentially the difficult realities about humans and technology.  I doubt there would be argument over the statement that the Internet has come a long way since the early days of CompuServe, Prodigy and AOL. I also believe that there would be little argument that humans are flawed.  Greed was prevalent and atrocities were happening long before the advent of the Internet.  Similarly, technology isn’t perfect either.  If technology were perfect from the start, we wouldn’t ever need updates … version 1.0 would be perfect, all the time, every time.  That isn’t the world that we live in though … and that’s the root of the rub, so to speak.

Since the enactment of the CDA, an abundance of lawsuits have been initiated against platforms, the results of which further defined the breadth of the law.  For those really wanting to learn more and obtain a more historical perspective on how the CDA came to be, one could read Jeff Kosseff’s book called The Twenty Six Words That Created the Internet.  To help better understand some of the current debate over this law which will be discussed shortly, this may be a good opportunity to point out a few of the (generally speaking) practical implications of Section 230:

  1. Unless a platform wholly creates or materially contributes to content on its platform, it will not be held liable for the content created by a third-party.  This immunity from liability has also been extended to other tort theories of liability where it is ultimately found that such theory stems from the third-party content.
  2. The act of filtering content by a platform does not suddenly transform it into a “publisher” aka the person that created the content in the first place, for the purposes of imposing liability.
  3. A platform will not be liable for their decision to keep content up, or take content down, regardless of whether such information may be perceived as harmful (such as content alleged to be defamatory). 
  4. Injunctive relief (such as a take down order from a court) is legally ineffective against a platform if such order relates to content that they would have immunity for.

These four general principals are the result of litigation that ensued against platforms over the past 23+ years. However, a few fairly recent high-profile cases stemming from atrocities, and our current administration (from the President down), has put Section 230 in the crosshairs and desires for another amendment.  The question is, amendment for what?  One side says platforms censor too much, the other side says platforms censor too little, platforms and technology companies are being pressured to  implement stronger data privacy and security for their users worldwide while the U.S. government is complaining about measures being taken are too strong and therefore allegedly hindering their investigations.  Meanwhile the majority of the platforms are singing “stuck in the middle with you” trying to do the best they can for their users with the resources they have, which unless you’re “big Internet or big tech” is typically pretty limited.  And frankly, the Mark Zuckerberg’s of the world don’t speak for all platforms because not all platforms are like Facebook nor do they have the kind of resources that Facebook has.  When it comes to implementation of new rules and regulations, resources matter.

On January 19, 2020 the United States Department of Justice announced that they would be hosting a “Workshop on Section 230 of the Communications Decency Act” on February 19, 2020 in Washington, DC.  The title of the workshop “Section 230 – Nurturing Innovation or Fostering Unaccountability?”  The stated purpose of the event was to “[D]iscuss Section 230 … its expansive interpretation by the courts, its impact on the American people and business community, and whether improvements to the law should be made.”  The title of the workshop was intriguing because it seemed to suggest that the answer was one or the other when the two concepts are not mutually exclusive.

On February 11, 2020 the formal agenda for the workshop (the link to which has since been removed from the government’s website) was released.  The agenda outlined three separate discussion panels:

  • Panel 1:  Litigating Section 230 which was to discuss the history, evolution and current application of Section 230 in private litigation;
  • Panel 2: Addressing Illicit Activity Online which was to discuss whether Section 230 encourages or discourages platforms to address online harms, such as child exploitation, revenge porn, and terrorism, and its impact on law enforcement; and
  • Panel 3: Imagining the Alternative which was to discuss the implications on competition, investment, and speech of Section 230 and proposed changes. 

The panelists were made up of legal scholars, trade associations and a few outside counsel who represent plaintiffs or defendants.  More specifically, the panels were filled with many of the often empaneled Section 230 folks including legal scholars like Eric Goldman, Jeff Kosseff; Kate Klonik, Mary Ann Franks, and staunch anti- Section 230 attorney Carrie Goldberg, a victim’s rights attorney that specializes in sexual privacy violations.  Added to the mix was also Patrick Carome who is famous for his Section 230 litigation work, defending many major platforms and organizations like Twitter, Facebook, Google, Craigslist, AirBnB, Yahoo! and the Internet Association.  Other speakers included Annie McAdams, Benjamin Zipupsky, Doug Peterson, Matt Schruers, Yiota Souras, David Chavern, Neil Chilson, Pam Dixon, and Julie Samuels.

A review of the individual panelist’s bios would likely signal that the government didn’t want to include the actual stakeholders, i.e., representation from any platform’s in-house counsel or in-house policy.  While not discounting the value of the speakers scheduled to be on panel, one may find it odd that those who deal with the matters every day, who represent entities that would be the most impacted by modifications to Section 230, who would be in the best position to determine what is or is not feasible to implement in the terms of changes, if changes to Section 230 were to happen, had no seat at the discussion table.  This observation was wide spread … much discussion on social media about the lack of representation of the true “stakeholders” took place with many opining that it wasn’t likely to be a fair and balanced debate and that this was nothing more than an attempt by U.S. Attorney General William Barr to gather support for the bill relating to punishing platforms/tech companies for implementing end-to-end encryption.  One could opine that the Bill really has less to do with Section 230 and more to do with the Government wanting access to data that platforms may have on a few perpetrators who happen to be using a platform/tech service.

If you aren’t clear on what is being referenced above, it bears mentioning that there is a Bill titled “Eliminating Abusive and Rampant Neglect of Interactive Technologies Act of 2019” aka “EARN IT Act of 2019” that was proposed by Senator Lindsey Graham.  This bill came approximately two weeks after Apple was ordered by AG Barr to unlock and decrypt the Pensacola shooter’s iPhone.  When Apple responded that they couldn’t comply with the request, the government was not happy.  An article written by CATO Institute stated that “During a Senate Judiciary hearing on encryption in December Graham issued a warning to Facebook and Apple: ‘this time next year, if we haven’t found a way that you can live with, we will impose our will on you.’”  Given this information, and the agenda topics, the timing of the Section 230 workshop seemed a bit more than coincidence.  In fact, according to an article in Minnesota Lawyer, Professor Eric Goldman pointed out that the “DOJ is in a weird position to be convening a roundtable on a topic that isn’t in their wheelhouse.”

As odd as the whole thing may have seemed, I had the privilege of attending the Section 230 “Workshop”.  I say “workshop” because it was a straight lecture without the opportunity for there to be any meaningful Q&A dialog from the audience.  Speaking of the audience, of the people I had direct contact with, the audience consisted of reporters, internet/tech/first amendment attorneys, in-house counsel/representatives from platforms, industry association representatives, individual business representatives, and law students.  The conversations that I personally had, and personally overheard, was suggestive that the UGC platform industry (the real stakeholders) were all concerned or otherwise curious about what the government was trying to do to the law that shields platforms from liability for UGC.

PANEL OVERVIEW:

After sitting through nearly four hours’ worth of lecture, and even though I felt the discussion to be a bit more well-rounded than I anticipated, I still feel that the entire workshop could be summarized as follows: “humans are bad and do bad things; technology is a tool in which bad humans do bad things; technology/platforms need to find a way to solve the bad human problem or face liability for what bad humans occasionally do with the tools they create; we want to make changes to the law even though we have no empirical evidence to support the position that this is an epidemic rather than a minority…because bad people.”

Perhaps that is a bit of an oversimplification but honestly, if you watch the whole lecture, that’s what it boils down to.

The harms discussed during the different panels included:

  • Libel (brief mention)
  • Sex trafficking (Backpage.com, FOSTA, etc.)
  • Sexual exploitation of children (CSAM)
  • Revenge porn aka Non-Consensual Pornography aka Technology Facilitated Harassment
  • Sale of drugs online (brief mention)
  • Sale of alleged harmful products (brief mention)
  • Product liability theory as applied to platforms (ala Herrik v. Grindr)

PANEL #1:

In traditional fashion, the pro-Section 230 advocates explained the history of the CDA, how it is important to all platforms that allow UGC, not just “big tech” and resonated on the social utility of the Internet … platforms large and small.  However, the anti-Section 230 panelists pointed to mainly harms caused by platforms (though not elaborated on which ones) by not removing sexually related content (though defamation was a short mention in the beginning). 

Ms. Adams seemed to focus on sex trafficking – touching on how once Backpage.com was shut down that a similar close site started up in Amsterdam. She referred to the issues she was speaking about as a “public health crisis.” Of course, Ms. Goldberg raised argument relating to the prominent Herrik v Grindr case wherein she argued a product liability theory as a work around Section 230. That case ended when writ was denied by the U.S. Supreme Court in October of 2019. I’ve heard Ms. Goldberg speak on this case a few times and one thing she continually harps on is the fact that the Grindr didn’t have way to keep Mr. Herrik’s ex from using their website. She seems surprised by this. As someone who represents platforms, it makes perfect sense to me. We must not forget that people can create multiple user profiles, from multiple devices, from multiple IP addresses, around the world. Sorry, Plaintiff attorneys…the platforms’ crystal ball is in the shop on these issues … at least for now. Don’t misunderstand me. I believe Ms. Goldberg is fighting the good fight, and her struggle on behalf of her clients is real! I admire her work and no doubt she sees it with a lens from the trenches she is in. That said, we can’t lose sight of reality of how things actually work versus how we’d like them to work.

PANEL #2:

There was a clear plea from Ms. Franks and Ms. Souras for something to be done about sexual images, including those exploiting children.  I am 100% in agreement that while 46 states have enacted anti “revenge porn” or better termed Non-Consensual Pornography laws, such laws aren’t strong enough because of the malicious intent requirement.  All a perpetrator has to say is “I didn’t mean to harm victim, I did it for entertainment” or another seemingly benign purpose and poof – case closed.”  That struggle is difficult! 

No reasonable person thinks these kinds of things are okay yet there seemed to be an argument that platforms don’t do enough to police and report such content.  The question becomes why is that?  Lack of funding and resources would be my guess…either on the side of the platform OR, quite frankly, on a under-funded/under-resourced government or agency to actually appropriately handle what is reported.  What would be the sense of reporting unless you knew for sure that content was actionable for one, and that the agency it is being reported to would actually do anything about it?

Interestingly, Ms. Souras made the comment that after FOSTA no other sites (like Backpage.com) rose up.  Curiously, that directly contradicted Ms. Adams’s statement about the Amsterdam website popping up after Backpage.com was shut down.  So which is it?  Pro-FOSTA statements also directly contradicts what I’ve heard last October at a workshop put on by ASU’s Project Humanities entitled “Ethics and Intersectionality of the Sext Trade” which covered the complexities of sex trafficking and sex work.  Problems with FOSTA was raised during that workshop.  Quite frankly, I see all flowery statements about FOSTA as nothing more than trying to put lipstick on a pig; trying to make a well-intentioned, emotionally driven, law look like it is working when it isn’t.

Outside of the comments by Ms. Franks and Ms. Souras, AG Doug Peterson out of Nebraska did admit that the industry may self-regulate and sometimes that happens quickly, but he still complained that the state criminal law preemption makes his job more difficult and advocated for an amendment to include state and territory criminal law to the list of exemptions.  While that may sound moderate, the two can be different and arguably such amendment would be overbroad when you are only talking about sexual images.  Further, the inclusion of Mr. Peterson almost seemed as a plug in for a subtle push about how the government allegedly can’t do their job without modification to Section 230 – and I think a part of the was leaning towards, while not making a big mention about it, was the end-to-end encryption debate.  In rebuttal to this notion, Matt Schruers suggested that Section 230 doesn’t need to be amended but that the government needs more resources so they can do a better job with the existing laws, and encouraged tech to work to do better as they can – suggesting efforts from both sides would be helpful

One last important point made during this panel was Kate Klonik making the distinction between the big companies and other sites that are hosting non-consensual pornography.  It is important to keep in mind that different platforms have different economic incentives and that platforms are driven by economics.  I agree with Ms. Klonik that we are in a massive “norm setting” period where we are trying to figure out what to do with things and that we can’t look to tech to fix bad humans (although it can help).  Sometimes to have good things, we have to accept a little bad as the trade-off.

PANEL #3

This last panel was mostly a re-cap of the benefits of Section 230; the struggles that we fact when trying to regulate with a one-size fits all mentality and, I think most of the panelists seem to be agreeing that there needs to be some research done before we go making changes because we don’t want unintended consequences.  That is something I’ve been saying for a while and reiterated during the ABA’s Forum on Communications Law Digital Communications Committee hosted a free CLE titled “Summer School: Content Moderation 101” wherein Jeff Kosseff and I, in a moderated panel by Elisa D’Amico, Partner at K&L Gates, discussed Section 230 and a platform’s struggle with content moderation.  Out of this whole panel, the one speaker that had most people grumbling in the audience was David Chavern who is the President of News Media Alliance.  When speaking about solutions, Mr. Chavern likened Internet platforms to that of traditional media as if he was comparing two oranges and opined that platforms should be liable just like newspapers.  Perhaps he doesn’t understand the difference between first party content and third-party content.  The distinction between the two is huge and therefore I found his commentary to be the least relevant and helpful to the discussion. 

SUMMARY:

In summary, there seem to be a few emotion evoking ills in society (non-consensual pornography, exploitation of children, sex trafficking, physical attacks on victims, fraud, and the drug/opioid crisis) that the government is trying to find methods to solve.  That said, I don’t think amending Section 230 is the way to address that unless and until there is reliable and unbiased data that would suggest that the cure won’t be worse than the disease. Are the ills being discussed really prevalent, or do we just think they are because they are being pushed out through information channels on a 24-hour news/information cycle?

Indeed, reasonable minds would agree that we, as a society, should try and stop harms where we can, but we also have to stop regulating based upon emotions.  We saw that with FOSTA and arguably, it has made things more difficult on law enforcement, victims alike and has had unintended consequences, including chilling speech, on others.  You simply cannot regulate the hate out of the hearts and minds of humans and you cannot expect technology to solve such a problem either.  Nevertheless, that seems to be the position of many of the critics of Section 230.

For more reading and additional perspectives on the DOJ Section 230 Workshop, check out these additional links:

Disclaimer: This is for general information purposes only and none of this is meant to be legal advice and should not be relied upon as legal advice.

Don’t Let Scammers During COVID-19 Fool You!

If COVID-19 wasn’t stressful enough, now you have to watch out for scammers trying to take advantage of you. Below are a few tips:

  • Watch out for any links that get texted to your phone that promise to track coronavirus (through an app or otherwise). This might be malware designed to spy on you or get other information such as logins and passwords.
  • Watch our for links in random emails talking about the coronavirus. Phishing attempts are running rampant right now. If you aren’t sure about a link in an email you get, don’t click on it. If you aren’t sure about an email that’s in your inbox, simply call the company to ensure it’s a legitimate email and safe to open. Better to make a phone call than be sorry.
  • Understand that there is a flood of disinformation/misinformation about the virus, including remedies, cures, etc. This is especially true among the naturopath/DIY groups. If it is not coming from a reputable source (local hospital, your doctor’s office, the CDC, WHO, etc.) please don’t share it. If you do share information, cite the source that you obtained the information from so others can determine reliability of the information. Remember, anyone can buy a domain and anyone can make a meme.
  • If you receive a call from someone claiming to be from a charity, asking for personal information of financial information, hang up. If you want to give to a charity, go directly to their website. Also, only go to known charities. Just because a website looks like a “charity” doesn’t mean it is. Again, anyone can buy a domain and make a website.
  • If random strangers are showing up at your house, suggesting they are there to do coronavirus testing, etc., do not let them in your house! Ask for credentials/information and then call the organization that they say they are with to confirm they are who they say they are. Remember, anyone can lift a picture or information off of a website and make a fake badge, etc.

Some related reading:

https://arstechnica.com/information-technology/2020/03/the-internet-is-drowning-in-covid-19-related-malware-and-phishing-scams/

https://www.forbes.com/sites/thomasbrewster/2020/03/18/coronavirus-scam-alert-covid-19-map-malware-can-spy-on-you-through-your-android-microphone-and-camera/

https://www.usatoday.com/story/opinion/2020/03/17/fda-chief-stop-using-unapproved-products-claiming-prevent-coronavirus-column/5041971002/

https://www.military.com/daily-news/2020/03/16/army-white-house-issue-warnings-about-coronavirus-hoaxes-and-scams.html

Lexington PD advises of COVID-19 related phone scam

Disclaimer: This is for general information purposes only and none of this is meant to be legal advice and should not be relied upon as legal advice.

“Internet Law” explained

For some reason, every time one says “lawyer” people tend to think of criminal law, family law or personal injury law.  Perhaps because those are very common.  Most people even understand the concept of a corporate or business lawyer, someone who handles trust and estates, or even one that handles intellectual property.  However, when we say “Internet Law” many people get the most confused look on their face and say: “What the heck is that?” If that is you, you’re in good company.  And, to be fair, the Internet really hasn’t been around all that long.

If you were to read the “IT law” page on Wikipedia you’d see a section related to “Internet Law” but even that page falls a little short on a solid explanation – mostly because the law that surrounds the Internet is incredibly vast and is always evolving.

When we refer to “Internet Law” we are really talking about how varying legal principles and surrounding legislation influence and govern the internet, and it’s use.  For example, “Internet Law” can incorporate many different areas of law such as privacy law, contract law and intellectual property law…all which were developed before the internet was even a thing.  You also have to think how the Internet is global and how laws and application of those laws can vary by jurisdiction.

Internet Law can include the following:

  • Laws relating to website design
  • Laws relating to online speech and censorship of the same
  • Laws relating to how trademarks are used online
  • Laws relating to what rights a copyright holder may have when their images or other content is placed and used online
  • Laws relating to Internet Service Providers and what liabilities they may have based upon data they process or store or what their users do on their platforms
  • Laws relating to resolving conflicts over domain names
  • Laws relating to advertisements on websites, through apps, and through email
  • Laws relating to how goods and services are sold online

As you can see just from the few examples listed above, a lot goes into “Internet Law” and many Internet Law attorneys will pick only a few of these areas to focus on because it can be a challenge just to keep up.  Indeed, unlike other areas of law, “Internet Law” is not static and is always evolving.

Do you think you have an Internet Law related question? If you are in the state of Arizona and are looking for that solid “friend in the lawyering business” consider Beebe Law, PLLC!  We truly enjoy helping our  business and individual clients and strive to meet and exceed their goals!  Contact us today.

All information contained in this blog (www.beebelawpllc.blog.com) is meant to be for general informational purposes only and should not be misconstrued as legal advice or relied upon.  All legal questions should be directed to a licensed attorney in your jurisdiction.

 

 

 

 

Data Privacy: Do most people even deserve it?

Repeat after me: Everything connected online is hackable.  Nothing online is really ever totally private. Most everything about my online activity is likely being aggregated and sold.  This is especially true if the website is free for me to use. 

Okay, before we get going, realize that this article is not discussing things that we would like to think is relatively safe and secure…like banking and health records.  Even then, please repeat the statements above because even for those situations it still holds true.  What I’m going to talk about is the more run of the mill websites and platforms that everyone uses.

The truth of the matter is, most people never read a website’s terms of service or privacy policy and readily click the “I agree” or “I accept” button without knowing if they have just agreed to give away their first born or shave their cat.  Or, to be more realistic, that a free to use website which you don’t have to spend a penny to use is likely to track your behavior so they can render you ads of products and services that you might be interested in and/or sell aggregated data and/or your email address to marketers or other businesses that might be interested in you as a customer or to learn more about consumer habits in general.  Hello people…NOTHING IS FREE!  Indeed, most humans are lazy as sh*t when it comes to all of that reading and so forth because really, who in the hell wants to read all that?  Hey, I’m guilty of it myself,  although since I write terms of service and privacy policies as a way to make a living sometimes I will read them for pure entertainment.  Don’t judge me…I’m a nerd like that.

We are quick to use, click or sign up on a website without knowing what it is that we are actually agreeing to or signing up for…because we want entertainment and/or convenience…and we want it NOW.  Talk about an instant gratification society right? Think about the following situations as an example: Go to the grocery store and buy ingredients then take another 35-40 minutes to make dinner or simply use an app to order pizza? Send someone a handwritten letter through the mail (snail mail) or shoot them an email? Sit down and write checks or schedule everything through bill-pay? Pick up a landline phone (they do still exist) and call someone or send them a text from your mobile device?  Go to the local box office and purchase tickets to your favorite concert or buy them online? Stand in line at the theater for tickets or pre-pay on an app ahead of time and walk right in using a scan code through that app? Remember and type in your password all the time or ask your computer or use your thumb print to remember it all?  Take pictures with a camera that has film, get it developed and send those images to family and friends or take pictures with your phone and instantly upload them to a social media platform like Facebook to share with those same people, for free? By now you should be getting my point…and that is that we want convenience, and technology has been great at providing that, but for that convenience we often forget the price that is associated with it, including a loss of data privacy and security.

Low and behold, and not surprisingly (to me anyway), something like the Facebook – Cambridge Analytica situation happens and Every. Damn. Person. Loses. Their. Mind!  Why? Well, because mainstream media makes it into a bigger story than it is…and suddenly everyone is “conveniently” all concerned about their “data privacy.”  So let me get this straight: You sign up for a FREE TO USE platform, literally spend most of your free time on said platform pretty much posting everything about yourself including who your relatives are, what you like and don’t like, the last meal you ate, your dirty laundry with a significant other, spend time trolling and getting into disputes on bullsh*t political post (that are often public posts where anyone can see them), check in at every place you possibly go, upload pictures of yourself and your family…all of this willingly (no one is holding a gun to your head) and you are surprised that they sell or otherwise use that data?  How do you think they are able to offer you all these cool options and services exactly? How do you think they are able to keep their platform up and running and FREE for you to use?  At what point does one have to accept responsibility for the repercussions from using a website, signing up or clicking that “I agree” button?  Damn near ever website has a terms of service and privacy policy (if they don’t steer clear of them or send them my way for some help) and you SHOULD be reading it and understand it…or at least don’t b*tch when you end up getting advertisements as per the terms of service and privacy policy (that you didn’t bother to read)…or any other possible option that could be out there where someone might use your information for – including the possibility that it will be used for nefarious purposes.

I’m not saying that general websites/platforms that house such content shouldn’t have reasonable security measures in place and that terms of service and privacy policies shouldn’t be clear (though its getting harder and harder to write for the least common denominator).  But again, nothing is 100% secure – there will always be someone that will find away to hack a system if they really want to and it’s really your fault if you fail to read and understand a website or platforms terms of service and privacy policy before you use it or sign up for something.  Why should people scream and cry for the “head” of a platform or website when people freely give their data away?  That’s like blaming the car dealership for theft when you take your fancy new car to a ghetto ass neighborhood, known for high crime and car theft, leave it parked on a dark street, unlocked and with the keys in it.  “But they should have watned me it would get stolen!” Wait! What?Okay, maybe that’s a little too far of an exaggeration but seriously, the internet is a blessing and a curse.  If you don’t know of the potential dangers, and you don’t take the time to learn them, perhaps you shouldn’t be on it?  Remember, entertainment and convenience is the reward for our sacrifice of data privacy and security.

You know who has a heightened level of privacy, doesn’t have social media accounts hacked, data isn’t mined from online habits and doesn’t get spammed to death?  My dad.  Why? He doesn’t get on computers let alone get online and he doesn’t even own a smart phone.  True story.  The dude still has checks, writes hand written notes, and hunts for his meat and gardens for his vegetables. Can you say “off the grid”?  Want heightened data privacy?  Be like dad.

Repeat after me: Everything connected online is hackable.  Nothing online is really ever totally private. Most everything about my online activity is likely being aggregated and sold and sold.  This is especially true if the website is free for me to use.

All information contained in this blog (www.beebelawpllc.blog.com) is meant to be for general informational purposes only and should not be misconstrued as legal advice or relied upon.  All legal questions should be directed to a licensed attorney in your jurisdiction. 

 

 

10 Online Safety Hacks You Can Implement Today

Every day you read about major companies, or even law firms, getting hacked.  Talk about some frustrating stuff! It’s even worse when it actually happens to you.  Of course, with the increase of technological convenience comes greater cyber security risk.  One of my personal favorite cyber security gurus and “Shark Tank” star Robert Herjavec recently provided insight for an article that outlined 10 safety hacks that are easy to implement if you aren’t already doing them.  What are those 10 safety hacks?  Continue reading…

Some of these seem pretty intuitive.  Others perhaps not so much but are a good idea.

  1. Enable multi-factor authentication (MFA) for all of your accounts.
  2. Cover internal laptop cameras.
  3. Don’t do any shopping or banking on public Wi-Fi networks.
  4. Ensure that websites are SSL secure (https instead of http) before making financial transactions online.
  5. Delete old, unused software applications and apps from your devices.
  6. Update your anti-virus software as soon as updates become available.
  7. Refresh your passwords every 30 days for all accounts and use unique passwords for each account.
  8. Update computer/mobile software regularly.
  9. Don’t click on unknown links or open unknown attachments.
  10. Change the manufacturer’s default passwords on all of your software.

One of my favorites is the “cover internal laptop cameras.”  I personally used to get made fun of because I would place a sticky note over the top of my camera on my computer.  I suppose it didn’t help that it was bright green (or hot pink) depending on what color sticky note I had handy so it drew attention until I was given a better one (a plastic slider made specifically for this purpose) at a networking event from Cox Business. Now it doesn’t seem so silly after all.

Another one that I know is important, but probably more difficult to do, is to “refresh your passwords every 30 days for all accounts and use unique passwords for each account.”  Holy moly!  Think of how many accounts have passwords these days?  Literally every different system/app/website that you use requires a password! One LinkedIn user listed as a “Cyber Security Specialist” for a software company offered the solution of a program like LastPass.  Apparently, according to this particular individual anyway, LastPass saves all of your passwords in a securely encrypted container on their servers and have many other built in safety features in the event of stolen or hacked data.  This way all you have to know is one password and LastPass will do the rest.  While surely there are other similar solutions out there, if you are interested, you can read more about LastPass on their How It Works page. Sounds pretty cool, right!?! It might help you break out of that password hell.

A little common sense plus adding in these 10 security hacks can go a long way! Do you have any security hacks to share? Have a favorite password protector that you use? Let us know in the comments!

If you are in the state of Arizona and are looking for that solid “friend in the lawyering business” consider Beebe Law, PLLC!  We truly enjoy helping our  business clients meet and exceed their goals!  Contact us today.

All information contained in this blog (www.beebelawpllc.blog.com) is meant to be for general informational purposes only and should not be misconstrued as legal advice or relied upon.  All legal questions should be directed to a licensed attorney in your jurisdiction.