877.791.9571 |

About the Author:

Daniel Dimov is an independent legal consultant (www.dimov.pro) based in Belgium. Daniel Dimov is a PhD student at the Center for Law in the Information Society at Leiden University, the Netherlands. He did traineeships with the European Commission (Brussels), European Digital Rights (Brussels), and T.M.C. Asser Institute (the Hague). He has a Master's Degree in Bulgarian Law (Bulgaria), a Master's Degree in European law (The Netherlands), and a certificate in Public International Law from the Hague Academy of International law. Daniel is a legal consultant with InfoSec Institute.
Privacy02182014

Ten Important Privacy Threats

1. Introduction

As the Internet becomes more and more important to our lives, the challenge is to enjoy the conveniences of online activities while reducing the risks of privacy violations. […]

NetNeutrality02112014

The Debate Over Network Neutrality in the EU and the USA

1. Introduction

Network neutrality (also known as net neutrality or Internet neutrality) refers to a general principle that Internet service providers (ISPs) should not control how their customers lawfully use […]

TheInternet-11142013

Privacy Implications of the Internet of Things

,

Introduction

The term “Internet of Things” refers to the use of the Internet for monitoring, tracking, controlling, and interconnecting everyday objects. For example, home appliances can be connected to the […]

Google-Maps-06192013

The new Google Maps: a perfect place for review fraud

1. Introduction

In 2006, Jeff Howe coined the concept of crowdsourcing. Crowdsourcing is an act of outsourcing a job, previously done by workers, to a large group of people in […]

GoogleGlass06132013

Privacy Implications of Google Glass

Introduction

Google Glass is a wearable computer worn like a standard pair of glasses. The device displays information on a glass screen in front of the eyes of the user. […]

paypal_logo-feature

PayPal: Chargebacks and Dispute Resolution

Introduction

PayPal Inc. is a global provider of online payment services established in 1998 in Palo Alto, California. In 2012, PayPal Inc. generated a total revenue of $5.6 billion USD. […]

e-money-fraud

E -Money Fraud

1. Introduction

Electronic money (e-money) is the digital equivalent of cash that is stored on an electronic device or remotely at a server. It is a relatively new payment instrument […]

Software Patent Law: EU, New Zealand, and the US compared

Software Patent Law: EU, New Zealand, and the US compared

1. Introduction

A patent is defined as an exclusive right or rights provided by a government to an inventor for a certain period of time in exchange for the public […]

Online-gambling03132013

Legal Aspects of Online Gambling

1. Introduction

Since the website of the first online casino appeared in 1995, that time, the online gambling business has grown tremendously. H2 Gambling Capital, one of the most widely […]

mobile-phone-spy-03082013

Mobile Phone Spying Software: Legality, Symptoms, and Removal

Introduction

At present, there are many websites offering mobile phone spying software. Typical examples of such websites are SpyBubble (http://www.spybubble.com/), Mobile-Spy (http://www.mobile-spy.com/), and Stealthgenie (http://http://www.stealthgenie.com/). By installing mobile phone spying […]

Crowdsourcing-02052013

Using Crowdsourcing for Collecting Information about Security Vulnerabilities

Introduction

The concept of crowdsourcing was coined by Jeff Howe in 2006. Crowdsourcing is an act of outsourcing a job, previously done by workers, to a large group of people […]

social-media-restrict-sized

Restricting social media at work

Introduction

Employees using social networks such as Facebook and Google+ may not only waste a lot of their working time, but also spread viruses on their work computers. Due to […]

SSN-identity-theft-sized

Identity Theft: The Means, Methods and Recourse

Introduction
Identity theft occurs when a person uses the identity of another person with the intent to obtain benefits illegally. The victim of the identity theft may not only suffer […]

privacy_law-sized

Differences between the privacy laws in the EU and the US

Introduction

Everything we do in the Internet leaves digital fingerprints. Therefore, it is only logical that many web users are worried about the issue of privacy. Their worry is not […]

gTLDs-sized

Domain name parking of gTLDs

Introduction

Over the past ten years, there has been a steady increase in the number of generic top-level domain names (gTLD). As a result, people can currently register various gTLDs […]

US-China-copyright-sized

Differences in Copyright Enforcement between the U.S. and China

Introduction

China and the U.S. have signed the Berne Convention and the Agreement on Trade Related Aspects of Intellectual Property Rights (TRIPS Agreement). These two agreements set minimum standards for […]

domain-sized

Domain theft and the possibilities for recovery of the stolen domain names

Introduction

On October 24th 2012, Diigo, a social bookmarking website allowing signed-up users to bookmark and tag web pages, had its domain, diigo.com, stolen by a domain name thief. . […]

laptop

Legal and Technological Concerns Regarding the Use of BIOS Anti-theft Technologies

1. Introduction

In 2006, a laptop containing personal and health data of 26,500,000 veterans was stolen from a data analyst working for the US Department of Veterans Affairs. The data […]