- Who should own the copyright to #Githeriman’s photograph?The Internet has been abuzz since the 8th August 2017 when Martin Kamotho, now christened #Githeriman whose photo was taken while enjoying his githeri as he awaited to cast his vote during the Kenyan Presidential Elections was taken and posted online. He has become an overnight celebrity and an Internet sensation. Individuals have resorted to […]
- Time is ripe for the Criminalisation of “Revenge Porn” in KenyaThe internet has changed the landscape in which a breach of privacy, such as non-consensual pornography, may occur. When misused, technology has the ability to aggravate the harm associated with this breach of privacy. Perpetrators can be anonymous, disconnecting them from their victim and the consequences of their actions, at the same time creating a […]
Video Deposition Preparation Guide from Litigation Services
EU Internet Law & Policy Blog
- New Baker Hostetler Partner Says Trump Administration's Cybersecurity Agenda Still 'A Big Question Mark'Fresh off a move from Sheppard Mullin to Baker & Hostetler, cybersecurity expert Laura Jehl chats corporate security under the Trump administration, new cyber threats and more.
- University Usage of ESI Technology Gives Rise to Alternative Career Paths for LawyersFor iCONECT, certifying future lawyers on XERA at the university level may help solve a talent gap issue as well as increase licensing from potential buyers of the platform.
- Kenyan Elections and Alleged Hacking: A Look at the available evidenceOur preliminary analysis rules out hacking based on the evidence presented. Considering that absence of evidence does not imply evidence of absence, this should not be taken to mean the IEBC may not have been hacked. That conclusion requires access to the election system which we do not have. Continue reading →
- Quick Thoughts on Biometrics, General Elections and Security in KenyaBy Francis Monyango** In 1927, Liberian opposition presidential candidate Thomas J Faulkner was confident of unseating the incumbent in the general …Continue reading →
- Study highlights prevalence of counterfeit and fraudulent goods onlineThe MarkMonitor study shows that significant percentages of ordinary Internet users are simply too trusting of what they find online.
- Who reads privacy policies?It’s not just consumers who aren’t reading the privacy policies. The companies who write and post them need to ensure that they read, understand, and comply with their own policies.
- News aggregators – Link, don’t replace, your sourcesAt first blush, aggregation may seem illegitimate or infringing, as the aggregator benefits from the sweat of others’ news gathering and writing. But there is a twist to aggregation on the web.