About
Hemu Nigam has worked inside the largest prosecuting agencies, software companies, media…
Articles by Hemanshu
Activity
-
Please don't miss our session tomorrow at 11am PT at #DigitalHollywood's Summer Summit on AI & the Law: A Deep Dive - Fair Use, Copyright and the…
Please don't miss our session tomorrow at 11am PT at #DigitalHollywood's Summer Summit on AI & the Law: A Deep Dive - Fair Use, Copyright and the…
Liked by Hemanshu Nigam
-
We ended last week by delivering two incredibly insightful assessments of how two different entities were protecting the freedom of expression and…
We ended last week by delivering two incredibly insightful assessments of how two different entities were protecting the freedom of expression and…
Shared by Hemanshu Nigam
Experience
Education
Licenses & Certifications
Volunteer Experience
Publications
-
Youth Safety on a Living Internet: Report of the Online Safety & Technology Working Group
NTIA, U.S. Dept. of Commerce
The 150 pp. report to Congress from the OSTWG, a national task force formed by the Protecting Children in the 21st Century Act and co-chaired by myself and Hemu Nigam, who co-authored its executive summary
Other authorsSee publication
Patents
-
Methods and Systems for Providing Mobile Consent Verification
Issued US 10,873,547
See patent in product - https://syndesy.io/
-excerpt-
Current approaches to addressing the issues of sexual harassment, sexual abuse, and other violations of consent, focus on punishment instead of prevention. In contrast, disclosed herein is a consent verification system, which is focused on solutions. Furthermore, the consent verification system provides resources to proactively educate users on the intricacies of consent and where the line is crossed into sexual harassment or abuse…See patent in product - https://syndesy.io/
-excerpt-
Current approaches to addressing the issues of sexual harassment, sexual abuse, and other violations of consent, focus on punishment instead of prevention. In contrast, disclosed herein is a consent verification system, which is focused on solutions. Furthermore, the consent verification system provides resources to proactively educate users on the intricacies of consent and where the line is crossed into sexual harassment or abuse. Accordingly, the consent verification system is focused on communication and prevention of violations of sexual consent.
Various embodiments provide methods and systems for providing on-line verified consent before people enter into a sexual relationship. In some embodiments a consent verification system can include one or more data collection modules and a mobile consent application (a "consent app" or the "app"). The consent app, which is downloadable to a smart device, provides methods for parties to communicate on their smart devices and to accept (consent to) a sexual relationship between the parties. The consent app can communicate with a data collection module, which time-stamps each communication and tags the GPS location of the communication for encrypted archival and record keeping. The data collection module can use protocol to meet the evidentiary requirements to be used in a court of law, or other dispute resolution forums. -
Methods and Systems for Providing Online Verification and Security
Issued US 10,225,248
As web traffic continues to increase, electronic identification theft has been growing exponentially. Such electronic identification theft can originate from anywhere in the world. Electronic identification theft costs many millions of dollars in losses and can have a lasting emotional effect on the victims. Accordingly, new methods and systems for providing online verification and security are needed.
The methods and systems are designed to utilize an integrated combination of just in…As web traffic continues to increase, electronic identification theft has been growing exponentially. Such electronic identification theft can originate from anywhere in the world. Electronic identification theft costs many millions of dollars in losses and can have a lasting emotional effect on the victims. Accordingly, new methods and systems for providing online verification and security are needed.
The methods and systems are designed to utilize an integrated combination of just in time, just in place, and just on device actions connected to an image recognition process to reduce or remove the risk of a User utilizing fake or stolen credentials in order to get verified. -
Methods and Systems for Providing Online Monitoring of Released Criminals by Law Enforcement
Issued US 10,225,248
The methods and systems are designed to utilize an integrated combination of just in time, just in place, and just on device actions connected to an image recognition process for monitoring criminals who are probation, offenders who are on parole, sex offenders, and witnesses under protection by law enforcement.
Honors & Awards
-
Lawyers of Distinction nominee
Lawyers of Distinction
Recognizing excellence in the practice of law.
-
Chief Security Officer of the Year (finalist)
CSO Magazine
Finalist for Chief Security Officer of the Year for CSO Magazine
Languages
-
English
Full professional proficiency
-
Hindi
Native or bilingual proficiency
Other similar profiles
Explore top content on LinkedIn
Find curated posts and insights for relevant topics all in one place.
View top content