Internet Law│Ecommerce Law │Trademarks │Copyrights │Cyber Security │Data Breaches │Digital Media

Internet Advertising │Internet Marketing │Trade Secrets │Business Law │ Litigation 

 

Lorenzo-Law-logo-sm2015v2

Working to Protect Your Business, Ideas, and Property on the Web.”®

As lawyers working on Internet Law issues, our firm’s work is founded on over 18 years of work counseling and representing clients on contracts, data security, trademarks, copyright, technology projects, trade secrets, privacy, advertising, marketing, and defamation.  Our work on Internet issues has been before Internet law issues became a vogue law practice or headline news event.  Our work integrates business law, internet law, and intellectual property law principles for transactions, planning, dispute resolutions and litigation.  Our litigation addresses cyber harassment and hacking claims, violations of privacy, data security breaches, technology contracts, trademark infringement, copyright infringement, online defamation, consumer protection, business torts and contract disputes.  Since its inception, we have provided a multi-jurisdictional approach serving people with creative ideas, entrepreneurs and businesses of all sizes from locations in D.C. and Florida, serving clients from coast to coast and overseas.

Our clients have been from the artistic and service providing to the technology driven.  We have counseled and represented clients on international business issues.  We can’t help but be business oriented, endeavoring into the entrepreneurial interests and goals of clients who have business ideas, want to venture into starting a business, or are seeking to innovate their business.  From start-ups to established enterprises, we work to the needs of our clients.  Day-to-day, we work on client eCommerce Internet business issues counseling our clients on regulatory requirements of their online business and their brick and mortar businesses regarding their advertising, transactions, trademarks, copyrights, business formations and documents, marketing, advertising, and website audits.  We work to help our clients’ business to stay competitive in the marketplace. Competition never stops in the marketplace of ideas, products, services, and innovation.

Our intellectual property law work encompasses the Internet, digital media, and Internet of Things issues.  We counsel and litigate disputes regarding intellectual property whether it is a contract, trademark, literary or music copyright, brand, digital media, video licensing, design, trade secrets, product or service trade dress, patents, domain names, and software development.

All in all, we are dedicated to working for your goals, always “Working to protect your business, ideas, and property on the web.” ® Contact us today!

Contact Us Today

INTERNET NEWS

  • Internet Security – Passwords’ Way into a Life

    Internet account security and weak passwords are all too common when causes to cyber incidents are investigated.  The ease of use of one’s birthdate, anniversary, and the incredibly savvy use of ‘admin’ or ‘password’, not to mention ‘12345,’ has gotten many in a serious predicament.  Not following through on login processes and seeking shortcuts has…

  • Online Contracts Consent and Choice of Law

    Online contracts trip the line that draws on possible arguments for applying the choice of law principles.  Platform terms of service, though frequently updated, may not be providing appropriate notice to inform the public user.  Data collection practices of social media platforms for purposes of claimed efforts to provide enhanced services to the user public…

  • Internet, Internet of Things and Cyber Threats

    Internet of Things or “IoT,’ as commonly referred to, have proliferated our culture and will continue as they acquire growing attention with functionality and ease.  Their attraction is in their usefulness engendering efficiency, productivity, and an expectation of enhancing one’s fitness and along with self-awareness. The idea of IoT has brought the attention of platform…

  • Trade Secrets Extraordinary Provisions

    Trade secrets are going to be dealt differently now that the President has signed into law the new Defend Trade Secrets Act (DTSA).  Through the bipartisan efforts of Sen. Orrin Hatch, R-Utah, and Sen. Choons, D-Del., DTSA is meeting the desired measure that has long been sought by businesses to address the delicate nature of…

  • Internet Technology and Employer Internet of Things

    Internet technology and the internet of things pervasive expansion in our everyday lives has become a crazy, a thing to do, and something to use by employers.  The risks of privacy are overlooked as well as liabilities when an employer goes too far.  The application of technological uses to keep track of employees, staying in…

  • Copyright Protection Standard for Clothing

    Copyright protection standard for clothing articulated as conceptual separability will now be entertained by the U.S. Supreme Court amid the background of disparate circuit court views.  Copyright protection applies to the features pertaining to design, of say, articles, and pictures.  The garment sector items fall into the dichotomy of use or utility, as the design…

  • Data Security and the Internal and External Cyber – Insecurity

    Data security and the insecurity of electronically stored information (ESI) is ephemeral and any anticipation of its occurrence or origin is absolutely unpredictable.  All attention is always on the external incidents but little is focused on the internally sourced infraction.  Seldom do entities envision the internally sourced incident.  The risk from internal unauthorized access to…

  • Social Media Self-Modification

    Self-Modification by social media platforms has struggled to ensure that the Internet is acceptable to all cultures, religions, political persuasion, and to all values of countries.  This exercise in Internet Governance is tall and detailed and comes under criticism for being too heavy handed towards exercising censorship.  Though easy to say, it becomes difficult to…

  • Ransom Seeking Malware, What to know and Do

    Ransom seeking malware is nefarious and it comes in different flavors.  The hedge of control is to hold hostage vital information within your network in exchange for compensation.  Healthcare providers, financial institutions, and government entities have been the victim.  Its variants and its methods are complicated means of affecting ways an entity accesses its information…

  • Data Security Relevance to More than Just PII

    Data security relevance is customarily popping up in everyday life, business, and in our system of society.  To think that billions use handheld devices for entertainment, staying informed of news, and to also be able to know where they are and where they are going, there is another segment of our network life infrastructure, growingly…

  • Data Security Breaches Settled and Filed

    Data security breaches are becoming too common for comfort and ease as we engage in daily as participants in the marketplace.  Companies, governmental institutions, nonprofits, and organizations are quickly learning that cyber incidents could be a day away.  If they claim that their information is secure their claim can be checked and they can be…