Internet Mugshot Publishing Curtailed

Internet mugshot published online haunts a person for years with embarrassment.  For many, as well, the mugshots do not bear a meaningful purpose for others throughout the Internet to know.  What remains is the ill circumstance of having future employment out of reach or present employment terminated, for the inadvertent past event. The harm lingers…

Details

Cyber Security Claims

Cyber security claims are seldom tempered with an entities acknowledgement of its insecurity of electronically stored information (ESI) and its handling of consumer personal identifying information (PII).  Their efforts and planning executed, though they may be diligent, cannot anticipate cyber incidents and breach incidents nor should their efforts to prevent them be overstated.  All attention…

Details

Internet Advertising Under FTC Eyes

Internet advertising has become intricate and keen.  Internet advertising may involve multiple participants.  The purpose is essentially to sway readers to purchase products by making representations that at times appear too good to be true.  That is what the Federal Trade Commission and the State of Connecticut determined prior to suing  LeanSpa.  The claims embraced…

Details

FTC Advertising Guidelines

The Federal Trade Commission under its Act, particularly Section 5, is seeking advertisers to be clearer about how they convey their ads.  Advertising disclosures required by the Federal Trade Commission are addressing numerous issues about enhancing disclosures of sources of the statements and claims made in an advertisement.  As creativity increases so will the efforts for the…

Details

Internet Cloud Options

Internet cloud options for data computing services are developing as the concept catches on.  Incidents of a breach, contract disputes, hacking, and ongoing lawsuits are serving the way for conditions to be highlighted.  Nascent, cloud computing contracts were conceived as a data storage solution for businesses, municipal entities, and state organizations.  So long as remote…

Details

Online Personal Information, What’s the Harm?

Personal Information is accessed so easily through the Internet that it causes concern for its privacy, handling of personally identifiable information (PII), and its correctness. With the use of a credit card and picking anyone’s name and selecting a state of some form of known or suggested relevance to an individual, anyone can acquire information on one’s profile. Whether…

Details

Internet Speech and Defamation I

Internet speech has drawn concern for its limitless, it seems, availability for anyone to air their comments about something.  While there are certain protections for speech, the inherent lack of truth in the statements or the lack of concern for the truth in making such a statement online about someone, engenders a considerable amount of…

Details

Trade Secrets in Databases

Database as a Trade Secret Trade secrets in database records fall victim to many who seek the potential value of stored records from a variety of entities, either from government agencies and competitor businesses, to also include medical and financial enterprises, and even from their own employer or client.  Intruding into another’s database is becoming…

Details

Internet Information the Malady of Doxing, “You’ve been Doxed”

Internet information that is available to read on the Internet about someone or anyone to see is startling.  There is a lot to be said about the amount of information available on the Internet.  Many are surprised on how their information got on the Internet and the ease with which public information and personal information…

Details

Internet Speech Immunity

Internet speech immunity exceptions are sought frequently by individuals and businesses who are affected by someone else’s comments about them via an online site.  Online sites are today’s marketplace of ideas to enhance the “competition of the market.”[1]  And so, the claim usually asserted is a defamation claim directed to the website from where the…

Details

Website Crawling and Data Scraping Thoughts

Website crawling and data scraping have burdened the growth of e-commerce as website owners are witnessing their data scraped.  The legal questions have lingered.  Many questions stand out.  The prevalence of crawling and scraping has become too of the norm for those using web content for business, research, or marketing purposes. The common theme is…

Details

Data Security Practices

Data security practices are increasingly becoming a theme among management and employees in the administration of business and their daily work process.  The common element in data breaches is the element of human negligence, training or the underestimation of needed attention.   The extent that incidents are occurring, information technology personnel and operations personnel are finding…

Details