Crpyto Currency Regulation World Survey

Full Report: https://www.loc.gov/law/help/cryptocurrency/cryptocurrency-world-survey.pdf Comparative Summary This report surveys the legal and policy landscape surrounding cryptocurrencies around the world.  While not dissimilar in form to the 2014 Law Library of Congress report on the same subject, which covered forty foreign jurisdictions and the European Union, this report is significantly more comprehensive, covering 130 countries as well as some regional organizations that … Read More

Fleer v. Topps–Litigation Concerning Baseball Cards

If you were not aware, the Library of Congress is the place for baseball cards.  Comprised of both donated collections and items deposited with the U.S. Copyright office, the Library’s collection is unparalleled (absent the elusive Honus Wagner card). You can view items from our collection in the Library’s Baseball Americana exhibition where cards are featured in several of the display cases. Even if you … Read More

Data Breach Response: A Guide for Business

You just learned that your business experienced a data breach. Whether hackers took personal information from your corporate server, an insider stole customer information, or information was inadvertently exposed on your company’s website, you are probably wondering what to do next. What steps should you take and whom should you contact if personal information may have been exposed? Although the … Read More

App Developers: Start with Security

App developers: How does your app size up? Have your built security in from the start? The FTC has a dozen tips to help you develop kick-app security for your product. More than a thousand new apps are hitting the market each day. In this fast-moving era of entrepreneurship and creativity, is security keeping up? Apps and devices often rely … Read More

Stopping Unsolicited Mail, Phone Calls, and Email

Tired of having your mailbox crammed with unsolicited mail, including preapproved credit card applications? Fed up with getting telemarketing calls just as you’re sitting down to dinner? Fuming that your email inbox is chock-full of unsolicited advertising? The good news is that you can cut down on the number of unsolicited mailings, calls, and emails you receive by learning where … Read More

Protecting Your Child’s Privacy Online

As a parent, you have control over the personal information companies collect online from your kids under 13. The Children’s Online Privacy Protection Act gives you tools to do that. The Federal Trade Commission, the nation’s consumer protection agency, enforces the COPPA Rule. If a site or service is covered by COPPA, it has to get your consent before collecting … Read More

Phishing

Phishing is when a scammer uses fraudulent emails or texts, or copycat websites to get you to share valuable personal information – such as account numbers, Social Security numbers, or your login IDs and passwords. Scammers use your information to steal your money or your identity or both. Scammers also use phishing emails to get access to your computer or … Read More

Computer Security

Scammers, hackers and identity thieves are looking to steal your personal information – and your money. But there are steps you can take to protect yourself, like keeping your computer software up-to-date and giving out your personal information only when you have good reason. Update Your Software. Keep your software – including your operating system, the web browsers you use … Read More

Five Ways to Help Protect Your Identity

Identity theft happens. It’s an unfortunate fact of modern life. But there are certain steps you can take to help keep your personal information from falling into the wrong hands. Every day, you do things to protect what’s most important to you. And you know what? You do them almost automatically. Routine things like looking both ways before you cross, … Read More