Online Defamation  

Online defamation has become all-too common.  From the individual to the business they all have become subject of ill comments online.  Many, espousing their belief in their First Amendment right to free speech, have misused that right.  Doing so, they claim immunity from defamation claims. Many claim truth, they were privileged, or that their statement…

IoT Security

Internet of Things security claims have caught the attention of lawmakers and regulators. The Internet has been interesting to follow and work with as a realm of process and information exchange.  As the devices used to transmit information increase in our lives and work, protecting what is transmitted from unwanted eyes is not necessarily going…

Internet Information

Internet information has allowed millions to enhance their learning and allow them to share information.  It has also allowed for the sharing of specious and harmful information.  Advertising and marketing industries have benefited and will continue to benefit into the future by this medium of information, surpassing the television. Yet, what is concerning to many…

Cloud Data Usage

Cloud storage of data for business brings efficiencies and as well could bring unbeknown reasons for concern.  Transmitting data through varied network in daily process comes with numerous issues regarding security, privacy and the amount that is being transmitted, i.e., load.  Data is not static and neither is how it could be directed for load…

Cybersecurity Responsibility

Cyber aspects of business functions involving the Internet, email network systems, and cloud platform usage are related to the need for data security.  Cybersecurity responsibilities are, at times, not met with the requisite level of diligence for compliance in managing data and transfers in daily work process.  Standards for compliance, for many businesses, institutions, and…

Internet Cybersecurity and Data Security

Internet news events are reported daily about computer abuse, hacking, data theft and malware, nationally and internationally.  The concept of cybersecurity, as a term, appears bounced around by writers, scholars, politicians, and news media, short of carefully determining what it encompasses and how cybersecurity relates to the Internet.  Around the world the term is used…

Artificial Intelligence Liability

Liability, as an issue, seldom arises in common conversations.   When discussions in the work place occur, liability is not on the top of the list of issues.  Yet, there are a plethora of law firm ads about personal injury claims, insurance commercials, and medical malpractice issues.  From watching and reading ads you are left…

Consumer Privacy versus Data Economy Ecosystem

We all hear about privacy needing protection and we also read about the events that have led to infringements of privacy on the occurrence of data breaches.  Essentially, privacy is desired by all and many believe that it is an aspect of life that is common understanding and it is worth respect and consideration. The courts have…

Data Privacy

Data protection sought in daily entity operations and in its actual delivery of services, should coexist with the responsibilities for consumer data privacy.  This second piece follows its previous writing which addressed the coexistence of protection and privacy from an institutional perspective.  In furtherance of that theme, this piece will touch upon the organizational aspect involved to see…

Internet Computing Terms

Internet computing terms are commonly mentioned in a law firm’s discussions where the practice focuses on issues in the market engaging the Internet, and among other aspects, e.g., computing, e-commerce, data protection, software development, application development, data management infrastructure, cloud processing, and cyber security, to mention as few.  As these terms arise in conversation, contracts…

Cybersecurity Rule Setting the Mark

Cybersecurity rule ideas, so far, have been piecemeal throughout the United States despite the numerous efforts.  Opposite to the European Union’s efforts through their General Data Protection Regulation (GDPR) initiative, in the U.S. we have no such thing.  We do have bolstering amendments to Gramm-Leach-Bliley Act, embodied in the Consumer Data Security and Notification Act…

Internet of Things Security Claims

Internet of Things security claims have caught the attention of lawmakers and regulators. The Internet has been interesting to follow and work with as a realm of process and information exchange.  As the devices used to transmit information increase in our lives and work, protecting what is transmitted from unwanted eyes is not necessarily going…

Data Security Negligence

Data security responsibilities are, at times, not met with the requisite level of diligence for compliance.  Standards for compliance, for many businesses, institutions, and service entities, are not as specified as one would be drawn to believe.  The disjuncture between responsibilities and efforts are becoming more evident with passing days as cyber incidents leave alarming…

Internet Mugshot Publishing Curtailed

Internet mugshot published online haunts a person for years with embarrassment.  For many, as well, the mugshots do not bear a meaningful purpose for others throughout the Internet to know.  What remains is the ill circumstance of having future employment out of reach or present employment terminated, for the inadvertent past event. The harm lingers…

FTC Advertising Guidelines

The Federal Trade Commission under its Act, particularly Section 5, is seeking advertisers to be clearer about how they convey their ads.  Advertising disclosures required by the Federal Trade Commission are addressing numerous issues about enhancing disclosures of sources of the statements and claims made in an advertisement.  As creativity increases so will the efforts for the…

Online Personal Information, What’s the Harm?

Personal Information is accessed so easily through the Internet that it causes concern for its privacy, handling of personally identifiable information (PII), and its correctness. With the use of a credit card and picking anyone’s name and selecting a state of some form of known or suggested relevance to an individual, anyone can acquire information on one’s profile. Whether…

Internet Speech and Defamation I

Internet speech has drawn concern for its limitless, it seems, availability for anyone to air their comments about something.  While there are certain protections for speech, the inherent lack of truth in the statements or the lack of concern for the truth in making such a statement online about someone, engenders a considerable amount of…

Trade Secrets in Databases

Database as a Trade Secret Trade secrets in database records fall victim to many who seek the potential value of stored records from a variety of entities, either from government agencies and competitor businesses, to also include medical and financial enterprises, and even from their own employer or client.  Intruding into another’s database is becoming…

Internet Information the Malady of Doxing, “You’ve been Doxed”

Internet information that is available to read on the Internet about someone or anyone to see is startling.  There is a lot to be said about the amount of information available on the Internet.  Many are surprised on how their information got on the Internet and the ease with which public information and personal information…

Internet Speech Immunity

Internet speech immunity exceptions are sought frequently by individuals and businesses who are affected by someone else’s comments about them via an online site.  Online sites are today’s marketplace of ideas to enhance the “competition of the market.”[1]  And so, the claim usually asserted is a defamation claim directed to the website from where the…

Website Crawling and Data Scraping Thoughts

Website crawling and data scraping have burdened the growth of e-commerce as website owners are witnessing their data scraped.  The legal questions have lingered.  Many questions stand out.  The prevalence of crawling and scraping has become too of the norm for those using web content for business, research, or marketing purposes. The common theme is…

Data Security Practices

Data security practices are increasingly becoming a theme among management and employees in the administration of business and their daily work process.  The common element in data breaches is the element of human negligence, training or the underestimation of needed attention.   The extent that incidents are occurring, information technology personnel and operations personnel are finding…

Data Breach Notification and the Ransomware HIPAA Question

Notification of a data breach is a worrisome step of any governmental entity, association, medical office, law office, data management entity, and even of a school or university. The provisions that attempt to address this progressing act of cyber attempts to acquire data, of any sort, are evolving.   An initial reaction to an incident is…

Data Breach Insurance

Data breach insurance is becoming a growing concern and a topic for businesses to address their risk management administrative panoply. Considerations may sway a business towards a third-party insurance coverage or a first-party insurance coverage or both depending on the services provided.  Previously posted writing regarding the cyber insurance needs, we discussed the limits that…

Computer Abuse by Password Sharing

Computer abuse can occur by the simple act of password sharing to gain access to a computer and its network. Password sharing for use of a computer is seldom realized as a wrongful use.  It is as well not realized by many account holders that sharing their account passwords or access passwords is as well…

Cloud Storage of Data Across Borders

Cloud storage of data for business brings efficiencies and as well could bring unbeknown reasons for concern.  Data is not static and neither is how it be directed for load balancing.  It is not only stored, it is shared via transfers and as such it is accessed by users. How the data is accessed and…

Cloud Service Agreement Considerations – Business and Legal Issues II

Cloud service agreement considerations are many but few are addressed when cloud subscription services are sought.  In previous posts on this subject, the emphasis was on having an exit strategy[1] and embracing the possible regulatory requirements.[2]  A business’ or an institutions’ data could be at the mercy of the cloud service provider (CSP).  The growth…

Cloud Computing Service Considerations

Cloud computing service considerations are developing as the concept catches on.  Incidents of a breach, contract disputes, hacking, and ongoing lawsuits are serving the way for conditions to be highlighted.  Nascent, cloud computing contracts were conceived as a data storage solution for businesses, municipal entities, and state organizations.  So long as remote access was guaranteed,…

Trademark Nominative Fair Use and Confusion

Trademark use and the element of fair use in business snags many businesses trying to market their service or product, while seemingly using a competitor’s trademark. Liability may not be avoided by relying on the fair use defense.  Words and their message are usually held to a standard regarding the possibility of consumer confusion.  There…

Website Safe Harbor Copyright Notice Designation

Website safe harbor takedown requirements by the Copyright Office is soon to undergo changes.  According to the Copyright Office, it is the responsibility of a website owner or online service entity to make it easy for a copyright holder to contact the website regarding the possibility of content infringement.  The agent designation requirement[1] process form,…

Internet Security – Passwords’ Way into a Life

Internet account security and weak passwords are all too common when causes to cyber incidents are investigated.  The ease of use of one’s birthdate, anniversary, and the incredibly savvy use of ‘admin’ or ‘password’, not to mention ‘12345,’ has gotten many in a serious predicament.  Not following through on login processes and seeking shortcuts has…

Online Contracts Consent and Choice of Law

Online contracts trip the line that draws on possible arguments for applying the choice of law principles.  Platform terms of service, though frequently updated, may not be providing appropriate notice to inform the public user.  Data collection practices of social media platforms for purposes of claimed efforts to provide enhanced services to the user public…

Data Security and the Internal and External Cyber – Insecurity

Data security and the insecurity of electronically stored information (ESI) is ephemeral and any anticipation of its occurrence or origin is absolutely unpredictable.  All attention is always on the external incidents but little is focused on the internally sourced infraction.  Seldom do entities envision the internally sourced incident.  The risk from internal unauthorized access to…

Social Media Self-Modification

Self-Modification by social media platforms has struggled to ensure that the Internet is acceptable to all cultures, religions, political persuasion, and to all values of countries.  This exercise in Internet Governance is tall and detailed and comes under criticism for being too heavy handed towards exercising censorship.  Though easy to say, it becomes difficult to…

Consumer Data Security Claims Monitored

Consumer data security claims by many businesses seek to settle the fears and doubts of many consumers engaging in electronic payments.  Those representations should be tempered with an accurate description of its practices to keep consumer information and transaction data secure.  Several agencies have been tasked with a different scope of authority.  Data security has…

Cybersquatting by Website Designer

Cybersquatting by a website designer is seldom a thought of concern by potential clients who are in the midst of working or are considering the work of a website designer for their start up a business.  Terms are rarely dickered with to ensure the handling of the domain selection and eventful registration.  When an unauthorized…

Trademark Internet Use Collides Regionally in Florida

A trademark used in a particular region of the country may not be absolutely alone with the existence of the Internet.  Marketing a business on the Internet has a ubiquitous presence to the service seeking potential customer.  Whether your business is in the southeast, such as Florida, and there is the existence of a wider…

Music Access Going Offline

Music Access in time past was always a concern for the nostalgic music enthusiast, especially the desire to hold on to music treasures from one’s growing up years. There was the concerned about scratching and breaking and not being able to find another issue.  The digital innovation has liberated the music industry allowing for creative…

Broadcasting Competition of Distribution Agreements

Broadcasting competition of distribution agreements has been in the Federal Communications Commission’s (FCC) cross-hairs.  While under less than unusual circumstances a provider can enter into a contract to distribute its product exclusively or non-exclusively, the same cannot be said regarding agreements of communications content provider.  The concerns is with content that could draw an overwhelming…

Trademark Infringement and Sibling Rivalries

Trademark infringements may be common in the business world, but they are as well not unheard of among family members in business who are competing in the same products.  The Southern District Court in Ohio heard a case between siblings which touched on pivotal points regarding trademarks. The court wrestled with the issue of ‘use’…

Cyber Security Events and Lessons of 2015

The process of cyber security is an everyday occurrence in every entity, from government to small and large enterprises.  A handful of events took place in 2015, each shedding a lesson or two going forward.  Counseling clients on requirements always involves sharing best practices, despite them not being a guarantee.  But always the focus is…

Child Privacy and the Apps They Play

Child privacy while playing with apps is something to consider.  The Federal Trade Commission (FTC) has been concerned.  The aspect of how information, that is children’s personal information, is shared with advertisers and the related networks brings to mind the requirements of the Children Online Privacy Protection Act (COPPA). In 2013, the FTC amended the…

Copyright Challenge – Ideas and Expression

Copyright for many individuals appears to be anything they write, express, or present on paper.  By putting content on a book one assumes it’s copyrightable, whether it is text, photos, or drawings.  For a yoga studio in California this was the mindset.  That which they organized together in the form of photos displaying poses was…

How Private is our Privacy

Privacy may not be as private as we would consider, and not much more than what we are capable of to keep private, as long as we live a cyber life.  Take for instance, the wearables that caught the craze throughout 2015 and became a popular item to buy at Christmas and other items that…

Cybercrime Considerations for Cases

There are cybercrime considerations for cases as well as there is a judicial learning curve when it comes to cybercrime and judges  are not alone.  Cybercrime harm cannot be assessed with the mindset of assessing punishment as if it was a physical criminal act without assessing the extenuating consequences of a cyber-criminal act.  In cases…

Cloud Technology Use for a ‘God View’

Uber’s cloud technology use for a ‘God view’ was exciting to experience among its employees.  With every innovative creation there is always the bit of excitement and a bit of dreaming of the capability devoid of cognition for security and for its ramifications.  To insert concepts of security and considerations of ramifications is a downer,…

Digital Economy Fighting Copyright Piracy

Digital economy partnerships drawing close to fight copyright piracy have struck a chord that could have a significant impact to prevent Internet digital media piracy.  The piracy of digital media is an international cottage industry costing billions.  From content creators, ISPs, advertising agencies, network systems, and search engines, to data managers, and e-payment platforms, have…

Cybersecurity, Internet of things in the Last Quarter

Cybersecurity and internet of things did capture Capitol Hill in this last quarter of 2015, pardon the football metaphor, and needless to say net-neutrality as well.  With physical objects being interconnected and collecting user data and sharing data as well, regulators and privacy groups saw the improved efficiency accompanied with the torment of loss privacy…

Cloud Service Use and Having an Exit Strategy

Cloud service uses, methods and liability considerations are all involved in an appropriately devised exit strategy for any enterprise.  This could be in the form of a backup method for redundancy in service delivery or data management.  For many businesses, the cloud use transitioning process is key for being able to maintain reliable services.  Minimizing…

Crowdfunding and New Conditions

Crowdfunding, an Internet based means of raising capital is getting a lot of attention.  The attention it has garnered is not only from businesses resorting to it but from the SEC as well.  Crowdfunding is instrumental for startups and small business, but it has originally been a vehicle for fund raising for worthy and charitable…

Internet Freedom of Speech at Risk

Internet freedom of speech is not given the attention it merits while the EU ponders on its EU Data Protection Regulation.  Many rightfully fear that censorship is looming near and is nearer than one imagines.  While the General Data Protection Regulation (GDPR) has lingered since the 1990s, many countries have followed the EU aspiration of…

Consumer Harm in Data Breach Cases

Consumer harm in data breach cases is a critical element to be proven.  Many cases are dismissed when standing is not established.   Commonly, the claims raised assert that some sort of reasonable and appropriate security measures to protect personal identifiable information in a company’s networks was not implemented. Any failure to do such is arguably…

Cloud Access Security Broker

As service providers and developers seek to encourage cloud service adoption, the role of a cloud access security broker, i.e., CASB, is seen as central to the effort.  The efforts to arrive at standard practices for cloud data security processes, are essential operational benefits of employing a CASB.  The role of a CASB is enhanced…

Cross Device Tracking

The Federal Trade Commission has noted that cross device tracking which is a consequence of the Internet of Things (IoT) falls essentially within its auspices.  Considering the concerns with transparency and the required notices to consumers, cross device tracking is just not getting attention for purposes of enhancing consumer protection.  The advertising industry representatives as…

Fate of the Internet

Life has changed with the Internet but it will change even more as the fate of the Internet is in court hands once again. The U.S. Court of Appeals for the D.C. Circuit will determine how Internet providers will change how we use the internet, what content will be permitted, and how we access and…

Copyright Basis

Copyright basis draws the question of whether copyright law is based on government granting a monopoly, if you will, vis-à-vis against any other potential entrepreneur.  Many see it that way and tend to deny copyrights having a proprietary property right for the creator of the work.  Historically the value of crafting an idea composed was…

Linking Defamatory Content Online

A case from Washington state dealt with online defamation from linking defamatory content online.  The court wrestled with the issues of proving defamation online.  The court articulated that the First Amendment freedom speech is to be protected and the courts hold to that as well when it comes to online speech and linking defamatory content.  In the era of…

Copyright and Derivative Work

In the realm of intellectual property, copyright and derivative work gets attention when the issue of collaborative rights arises. Copyright and derivative work controversies happen when the joint contributing plans do not materialize as intended between, for example software developers, researchers, writers, or production designers. The scenario is similar to one dealt with by the…

Standing in Data Breach Cases

After years of hesitation to find standing in data breach cases, federal courts are now viewing factors to base standing.  When the matter has been the disclosure of personally identifiable information (PII), the courts have not found standing in data breach cases because they required evidence of actual usage of that PII.  The actual suffering…

Personal Identifiable Information under VPPA

Digital media law and the digital media industry wrestles with how courts define personal identifiable information under the Video Privacy Protection Act.  This definition is important to companies that stream deliver videos to customers. How broadly the court define the scope of liability will remain a concern with personal identifiable information under the VPPA. In…

Website Defamation Immunity

Website operators, either as defendants or plaintiffs have resorted to Section 230 of the Communications Decency Act (CDA) to determine website defamation immunity and defamation liability.  Under the Section 230, blogs or forums, for instance, benefit from website immunity from tort liability if the information was from a third-party.  That third-party could be a subscriber,…

Net Neutrality European Points

Net Neutrality European Points Net neutrality European points are going before the EU Parliament soon where several proposals will be weighed.  The concept of an open internet without restrictions on traffic, how the networks manage traffic and how traffic is categorized is being considered in the EU Parliament.  There is a draft regulation proposed expressing…

Security of Internet of Things

The security of internet of things is unknowingly pervading our everyday life.  Items that can be remotely accessed for information, turned on to operate, adjust their operation settings, and process into a network are all fraught with vulnerabilities.  Security of internet of things is just becoming news worthy to some and ignored by great majority.…

International Service of Lawsuits Via Email

International service of lawsuits via email is an option when the physical address of an international defendant is unknown.  According to the Hague Convention on the Service Abroad (Hague Convention), when the physical address is unknown the Hague Convention does not apply.  In practice, as long as the email address does not return an undeliverable…

Electronic Self-Publishing Considerations

Electronic self-publishing considerations are overlooked by many who venture on to electronic self-publishing.  The efforts to do so could be for self-publication or out of an egalitarian purpose of making materials easily available. The issues for self-publishing for those seeking to venture are immaterial to the purpose  Initial costs of publishing can be limited which is…

Cloud Service Considerations – Business and Legal Issues

Software service – Data storage – Data Management – Internet Security Cloud service considerations – business and legal issues include many operational facets of a business’s management.   Each may have their own unique risks as well as benefits.  Cloud services are not new.  Remote access to business data has been part of business and…

Trade Secrets and Employee Misappropriation

Employers overwhelmingly experience theft of trade secrets and employee misappropriation of employer intellectual property.  Employees transferring company confidential communications, business information, and items normally considered trade secret to a thumb drive or personal drives and accounts, could face being sued for a sundry of claims, including misappropriating trade secrets (violating the Uniform Trade Secrets Act),…

Copyright Protection of Photos of Architectural Structures

Photographers commonly take photos of buildings and landscapes and of views that encompass structures and then sell them under license and it times do not account for the copyright protection of photos of architectural structures.  Under the Copyright Act, a private place though open to the public for touring is still not considered a public…

Copyright Filings and the Library of Congress

Copyright law – Intellectual property law There is a unique requirement with copyright filings and the Library of Congress. Seldom does one wonder how the Library of Congress is the world’s largest library with over 140 million materials that include maps, films, sounding recordings, software programs, photographs, and books. The Registry processes nearly half of…

Personal Data Privacy and Consumer Privacy Bill

Personal data privacy and Consumer Privacy Bill may meet to give people more control over their personal information is in the horizon. Concern however remains with companies and data brokers having discretion. The proposed Consumer Privacy Bill of Rights Act, sets some requirements on companies that process personal information. The idea is to establish some…

Trademark Free Riding

Many brands in a strong competitive industry have the challenge of trademark free riding posed by not necessarily their own competitors.  Company brands struggle against other entities that are not necessarily in their industry, benefiting by their use of a similar if not identical mark from the reputation they have tried to build. This “free-riding”…

Software Development

Software development and implementation is critical to the growth of a company’s innovation program. The source code is software development is a valuable trade secret and is transferable easily through varied mediums.  This is a challenging concern for trade secret – software owners. Challenging issues for intellectual property owners and the pursuit of prosecuting trade…

Internet Privacy – Florida Privacy Protection Act

Internet Privacy Law – Florida Internet Privacy Law The flow of information from internet usage and ‘ Internet of Things’  is easily accompanied with its collection and systemic use for other purposes. Digital profiles are created with every online user’s key stroke, site visited, and key word used. In 2015, the Florida Legislature addressed many…

Internet of Things and Google

Internet of things and Google is the theme underlining Google establishing an internet of things (Iot) central system called Brillo. Google Brillo is designed to run on and connect multiple low-power devices, connecting anything from a washing machine to a rubbish bin and linking in with existing Google technologies. The move is an expansion of the company’s…

Spying On Emails

(Reuters) – Spying on emails has drawn the attention of the courts. A U.S. judge ordered Yahoo Inc to face a nationwide class-action lawsuit accusing it of illegally intercepting the content of emails sent to Yahoo Mail subscribers from non-Yahoo Mail accounts, and using the information to boost advertising revenue. In a decision late Tuesday…