Internet Law Lawyer,  Data Security Law & Intellectual Property Law  

Lorenzo-Law-logo-sm2015v2

Working to Protect Your Business, Ideas, and Property on the Web.“®

CONTACT US! 

We are lawyers dedicated to addressing clients’ Internet Law issues, embracing their Data Security Law and Intellectual Property Law daily concerns.  Businesses becoming digitally inclined is not new to us.  Our Internet law work precedes its trend in the field and in headline news stories.  We integrate our  internet law, data security law, and intellectual property law practice for the benefit of our clients.   Since its inception, Lorenzo Law Firm – LLF, has provided a multi-jurisdictional approach serving people with creative ideas, entrepreneurs and businesses of all sizes from locations in D.C. and Florida, serving clients from coast to coast and from overseas.

We serve a variety of clients from the artistic and service providing to the technology driven.  We counsel and represent regarding international law issues.   From start-ups to established enterprises, we work to the competitive needs of our clients.  Competition never stops in the marketplace of ideas, products, services, and innovation.  Day-to-day, our work involves E-commerce and client online business efforts needing to meet regulatory requirements of their online business and their brick and mortar businesses.  Our intellectual property law work encompasses digital media law issues and Internet of Things issues.  We counsel and litigate disputes regarding data breaches, breach of contracts, copyright and trademark infringements, licensing, and much more.

All in all, we are dedicated to working for your goals, always “Working to protect your business, ideas, and property on the web.” ® Contact us today!

Contact Us Today

INTERNET NEWS

  • Internet Speech Immunity

    Internet speech immunity exceptions are sought frequently by individuals and businesses who are affected by someone else’s comments about them via an online site.  Online sites are today’s marketplace of ideas to enhance the “competition of the market.”[1]  And so, the claim usually asserted is a defamation claim directed to the website from where the…

  • Website Crawling and Data Scraping Thoughts

    Website crawling and data scraping have burdened the growth of e-commerce as website owners are witnessing their data scraped.  The legal questions have lingered.  Many questions stand out.  The prevalence of crawling and scraping has become too of the norm for those using web content for business, research, or marketing purposes. The common theme is…

  • Data Security Practices

    Data security practices are increasingly becoming a theme among management and employees in the administration of business and their daily work process.  The common element in data breaches is the element of human negligence, training or the underestimation of needed attention.   The extent that incidents are occurring, information technology personnel and operations personnel are finding…

  • Data Breach Notification and the Ransomware HIPAA Question

    Notification of a data breach is a worrisome step of any governmental entity, association, medical office, law office, data management entity, and even of a school or university. The provisions that attempt to address this progressing act of cyber attempts to acquire data, of any sort, are evolving.   An initial reaction to an incident is…

  • Data Breach Insurance

    Data breach insurance is becoming a growing concern and a topic for businesses to address their risk management administrative panoply. Considerations may sway a business towards a third-party insurance coverage or a first-party insurance coverage or both depending on the services provided.  Previously posted writing regarding the cyber insurance needs, we discussed the limits that…

  • Data Breach Case Standing and Relevance of Harm

    Data breach case standing is the critical element in determining the case’s viability to continue along with the relevance of harm incurred.  As data security breach occurrences amount with frequency, the menu of their handling also adds to the list of settled and or filed. The usual person is petrified when hearing that his or…

  • Computer Abuse by Password Sharing

    Computer abuse can occur by the simple act of password sharing to gain access to a computer and its network. Password sharing for use of a computer is seldom realized as a wrongful use.  It is as well not realized by many account holders that sharing their account passwords or access passwords is as well…

  • Advertising Disclosures

    Advertising disclosures required by the Federal Trade Commission are addressing numerous issues with regard enhancing disclosures of sources of the statements being made in an advertisement.  As creativity increases so will the efforts for the FTC to find aspects, not to their liking.  As the FTC pursues companies using native advertisers or influencer programs, restrictions will…

  • Cloud Storage of Data Across Borders

    Cloud storage of data for business brings efficiencies and as well could bring unbeknown reasons for concern.  Data is not static and neither is how it be directed for load balancing.  It is not only stored, it is shared via transfers and as such it is accessed by users. How the data is accessed and…

  • Cloud Service Agreement Considerations – Business and Legal Issues II

    Cloud service agreement considerations are many but few are addressed when cloud subscription services are sought.  In previous posts on this subject, the emphasis was on having an exit strategy[1] and embracing the possible regulatory requirements.[2]  A business’ or an institutions’ data could be at the mercy of the cloud service provider (CSP).  The growth…

  • Defamation Online Issues

    Defamation online in reviews posted by readers and comments stated in social media platforms throughout the United States and across its borders, raise legal questions. The aspects of posts in general also raise the issues of responsibility an individual has in controlling the content of one’s Facebook page or blog.  The Communication Decency Act, Section…