Monthly Archives: April 2015

Domestic Violence Protection Order Process Washington State

Types of Protection Orders Available "I need a Restraining Order." This is what people often say to the Court Clerk when requesting an order to prevent abuse. However, this term can be confusing, because a restraining order is only one kind of court order. There are also domestic violence protection orders, no-contact orders, and civil…
Read more

Fake law firm websites using real lawyers’ profiles are increasing

A growing number of fake law firm websites are potentially scamming “clients” and gathering their confidential financial information, a European regulator is warning the public. Additionally, since fake law firm websites are often using real attorneys’ profiles and branding, law firms need to be watchful to prevent their advertising efforts from being misappropriated, the Law…
Read more

When is posting on social media a crime? Panel debates the issue

Michael Moore, Rusty Hardin and Jeffrey Dion made up a panel moderated by Sherri Bevan Walsh that addressed the balance between free speech rights and threats issued online. Photo by Kathy Anderson. In the recent U.S. Supreme Court case Elonis v. United States, argued in December, lawyers for Anthony Elonis said he should not have…
Read more

Does Facebook’s facial recognition technology violate privacy laws?

An Illinois man is suing Facebook, contending that its facial recognition technology violates the state’s privacy laws, the Chicago Tribune reports. The lawsuit, filed Wednesday, argues that the social media company was required by Illinois law to inform Carlo Licata in writing that it would collect and retain his “biometric data,” and specify when it…
Read more

World’s Biggest Data Breaches

Presented by Washington State Investigators as part of the Identity Theft series visit the website. This article is about big data and data breaches. We invite you to read the entire article here: http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/ Let us know if we missed any big data breaches. » Safely check if your details have been compromised in any…
Read more

Cyber Threat Trends

Why can’t my information technology staff or security consultants just handle the problem? You monitor and manage the continuing volatility in the global capital and credit markets. You closely watch the development of a competitor’s product that could result in a blow to your sales. Yet a cyber breach could result in the loss of…
Read more

Securing Your Home Network

A protected home network means your family can use the Internet safely and securely. Most households now run networks of devices linked to the Internet, including computers, laptops, gaming devices, TVs, tablets, and smartphones that access wireless networks. To protect your home network and your family, you need to have the right tools in place…
Read more