Topic: legal liability

  • US Data at Risk as Key Cyber Law Expires

    US Data at Risk as Key Cyber Law Expires

    The Cybersecurity Information Sharing Act (CISA 2015) has expired, removing legal immunity for companies that share cyber threat intelligence and exposing them to lawsuits. Experts warn the lapse undermines national security by discouraging threat data sharing, increasing risks like software supp...

    Read More »
  • Meta's Child Safety Leak: A Damaging Turn for the Worse

    Meta's Child Safety Leak: A Damaging Turn for the Worse

    Whistleblowers revealed that Meta is actively suppressing research on child safety risks in VR to avoid legal liability, rather than addressing known dangers. Despite official age restrictions, children under 13 routinely access Meta's VR platforms, where immersive technology poses uniquely invas...

    Read More »
  • Olga Kornienko on C2PA, Content Authenticity & DRM at Streaming Media 2025

    Olga Kornienko on C2PA, Content Authenticity & DRM at Streaming Media 2025

    EZDRM's COO emphasized the collaboration between content provenance, C2PA standards, and DRM to protect media authenticity and creators from synthetic media threats. The C2PA standard establishes a chain of custody for content, verifying origin and tracking changes without judging truth, enabling...

    Read More »
  • Chat Control: Is Your Privacy at Risk?

    Chat Control: Is Your Privacy at Risk?

    The EU's proposed Chat Control legislation aims to combat child sexual abuse by requiring digital platforms to scan for illegal content, but cybersecurity experts warn it could critically undermine digital security and personal privacy. The regulation is incompatible with end-to-end encryption, e...

    Read More »
  • Navigating the Legal Risks of Hacking Back

    Navigating the Legal Risks of Hacking Back

    Hacking back poses significant legal and ethical risks, often violating international laws and escalating conflicts; safer alternatives like bug bounty programs are recommended. Cross-border cyber incidents create jurisdictional challenges, with laws like the U.S. Computer Fraud and Abuse Act pro...

    Read More »