Internet Law Lawyers

Our clients’ legal situations require us to provide and secure forensic screening and tracking, to address the online events that command attention, such as hacking, cybersquatting, computer abuse, fraud, defamation, bullying, deceptive and unfair trade, and false light publication.


Ecommerce Law Lawyers

As we work to bring state, federal and international regulatory requirements to online businesses and their transactions, we provide general counsel services on site documents, B2B contracts, B2C purchase-sell-delivery agreements, intellectual property use agreements, affiliate marketing agreements, and site development and maintenance agreements.


Intellectual Property Lawyers

We address our clients’ online intellectual property concerns, i.e., online trademark infringement; online copyright infringement; trade secrets misappropriate; breach of confidentiality agreements – nondisclosure agreements; cybersquatting, domain name infringements, reverse domain name hijacking and brand infringement.


Cyberlaw Lawyers

As “Cyber Lawyers” our counsel and representation is the umbrella over internet operational events, ecommerce activities, intellectual property, and regulatory rights and protection issues. We provide counsel on many cyber issues and requirements, i.e., data security, mobile transaction information, records retention, personal data privacy, business trade secrets, artistic and literary rights, before in state, federal, and overseas bodies.

Lorenzo Law Firm, P.A. “LLF”

LLF represents clients on issues pertaining to activities in Cyberspace / “Cyberlaw,” which encompasses the internet, e-commerce, digital media, security, privacy, intellectual property, social media, digital marketing, cloud processing, terrorism, identity theft, domain names, and confidential personal information. Our clients have been from Central and South America, the United States, and Europe.

As internet law lawyers, we have worked on, to mention several: photo copyright infringement; food grocery ecommerce; online gambling; online auctions; data protection violation; athlete image and branding; website compliance; defamation; breach of contract; misappropriation of trade secrets; copyright protection; trademark protection; deceptive business practices, and violation of privacy. We represent photographers, entrepreneurs, artists, musicians, writers, inventors, amateur and professional athletes, website designers, and private individuals. LLF provides businesses with general counsel services on best practices, policies, contracts, negotiations, litigation, corporate, and intellectual property issues.

Our work takes us before federal and state courts, administrative venues, such as, the U.S. Patent Trademark Office (USPTO), the Trademark Trial Appeal Board (TTAB), the World Intellectual Property Organization (WIPO), the Internet Corporation for Assigned Names and Numbers (ICANN), National Arbitration Forum (NCAF), and the International Trade Commission (ITC).


LLF Founder

J.B. Lorenzo, served in key posts, from clerking in the anti-fraud division for the Federal Trade Commission in 1991 through engaging in federal and state government service, as well in the private sector. His work as an internet law lawyer working on cyber issues started as he counseled the Division of Communications of Florida Department of Management Services as it transitioned to become the State Technology Office. He counseled and negotiated the contract for the establishment of the Portal, the expansion of Florida’s 800 MHz Law Enforcement Radio system, and served as counsel to the 911 Cell Phone Commission. He advised the Florida Office of Student Financial Assistance’s and the Prepaid College Board’s Internet Portal operations. Many of the integrated issues in his experience involved Digital Media and Internet Regulation, Data Protection, Privacy, Information Technology Management, Copyrights, Trademarks, Trade Secrets, Fair Use Doctrine, Fraud and Identity Theft Prevention, Data Protection, Esignatures, Administrative and Federal Regulatory Law, Government Contracts, and Administrative and Civil Litigation. He has also written on the Extra-Territorial application of Antitrust Laws – a study of determining jurisdiction and has written on the EU Trademark System, and been as well a conference speaker on Privacy and Data Protection requirements under the Federal Trade Commission’s “Red Flags,” and Gramm-Leach-Bliley Acts requirements.

He holds a Ph.D degree from the Josef Korbel School of International Studies, University of Denver, in International Law and has a double major B.A. degree from the American University – School of International Service, Washington, D.C.  He was appointed by Governors Jeb Bush and Charlie Crist to serve on the Judicial Nominating Commission for the 2nd Judicial Circuit of Florida, where he served for nine years, including serving as Vice Chair and Chair.

He is admitted before the U.S. Supreme Court, 11th Circuit Court of Appeals, U.S. District Court for the Southern, Middle, and Northern Districts of Florida, Supreme Court of Florida, and the District of Columbia Court of Appeals.


  • Assessing Cyber Security Insurance Needs – An Internet Law Lawyer comment

    Securing insurance coverage for cyber-attack events should address your cyber liability. Considerations should address monitoring, risk assessment to prevent gaps in coverage, lower deductibles with the use of encryption, phishing attacks, negotiating sub limits for potential claims, coverage for legal representation, and forensic analysis. One needs to be aware that claim coverages have set sub…


    Internet law lawyers experience the changes in business models daily, from brick-n-mortar constructs to digital information transfers, from a letter or phone call to a “textmail” or “e-mail.” The process has brought a down scaling in what used to be large administrative organizations to efficient self-employed entrepreneurs. The latter is the future and it is…

  • Encrypting News Websites

    The Washington Post wants readers to feel safe from monitoring eyes. Intelligence agencies are routinely seeking to monitor readership and their internet access. But when social media sites and newspaper sites exert efforts to protect its readership and users, they thwart governmental agencies monitoring efforts. In order to protect the privacy of readership from surveillance…

  • FCC considering not to expand Wireless Spectrum

    In July FCC will vote on auction rules for low band spectrum. Smaller wireless providers seek expansion of the spectrum from 30 megahertz to 40 megahertz. Low band spectrum was reserved to keep larger wireless providers from higher quality spectrum. FCC Commissioner is recommending to not expand the spectrum to 40 MHz as requested by…

  • Transnational ‘WWW’ Regulation or Piecemeal Decisions?

    The freedom of the internet may not be as free as it once was in short order as countries peer in to assess cross border information flow. National courts are determining internet content in a growing rate causing inconsistency in the ‘www.’ Canada, France, China, Iran, Saudi Arabia, Russia and Turkey are setting example for…

  • Concerns over Facial Recognition Feature Stalls Photo-sharing App in Europe

    The facial recognition technology can identify Facebook friends to whom users can then forward the photos. Canadian and European regulators are not favorable of social network’s use of facial recognition technology. The general concern is that with the ubiquity of smartphone use, people can be identified by unknown entities and businesses using facial recognition technology.…

  • What is an IP address and what can it reveal about you?

    The nomenclature of the web is vast. But even though words become commonplace, people often don’t know what they really mean. But they should. An IP address, for instance, is a ubiquitous part of the online experience, but few know what it is. And, even scarier, many don’t know the kind of information IP addresses…

  • Google takes aim at the internet of things with new Brillo operating system

    Google intends to be the center of the connected home with its new “internet of things” operating system, Brillo. Google Brillo is designed to run on and connect multiple low-power devices, connecting anything from a washing machine to a rubbish bin and linking in with existing Google technologies. The move is an expansion of the company’s Android…

  • Yahoo Will Face A Class Action Lawsuit For Spying On Emails

    (Reuters) – A U.S. judge ordered Yahoo Inc to face a nationwide class-action lawsuit accusing it of illegally intercepting the content of emails sent to Yahoo Mail subscribers from non-Yahoo Mail accounts, and using the information to boost advertising revenue. In a decision late Tuesday night, U.S. District Judge Lucy Koh in San Jose, California…

  • Here’s How to Download and Delete What Google Search Knows About You

    Have you ever wondered what Google Search really knows about you? Well, now you can check, as Google has added a new feature that lets you view and download your entire search history. Yep. Everything. The feature, which was spotted by the unofficial Google Operating System Blog — though VentureBeat points out that the function was made available in January —…

  • Cutting the Cord: Few options for streaming live news

    Live TV news and digital streaming sound like a pair headed for an inevitably intertwined future. But for cord-cutters, it’s been a rocky path. The pay-TV industry’s tight grip on 24-hour news channels — similar to sports programming — underscores its need to hold onto news junkies who otherwise might ditch cable. Cable news operators…

  • Even hackers are concerned Obama’s and Clinton’s emails remain vulnerable

    Cybersecurity experts are increasingly concerned that both President Barack Obama’s government emails and Hillary Clinton’s private, encrypted email system are too vulnerable to attack by sophisticated hackers who may be working for foreign powers. Obama carries a specially secured BlackBerry device for top-secret communications. It appears so far to have proved safe from cyber spies. But a…