Advertising Guidelines from FTC

Advertising guidelines from the Federal Trade Commission underscore the deceptive features of ‘native’ advertising.  Prior to Christmas the FTC released its “Enforcement Policy Statement on Deceptively Formatted Advertisements.”  The attention was towards the use of native advertising which is ‘dressed’ or ‘tailored’ to appear as if it is an actual editorial.  The FTC notes the…

Details

Cybersecurity, Internet of things in the Last Quarter

Cybersecurity and internet of things did capture Capitol Hill in this last quarter of 2015, pardon the football metaphor, and needless to say net-neutrality as well.  With physical objects being interconnected and collecting user data and sharing data as well, regulators and privacy groups saw the improved efficiency accompanied with the torment of loss privacy…

Details

Online Music Video Publishing

Online music video publishing give many singers and performers an avenue for promoting their work.  The birth of a new music star is dreamed every time someone seeks publishing with intermediary providers such as YouTube.  The principals of content publication still holds true even with the utilization of third-party audience aggregators like YouTube.  The terms…

Details

Cloud Service Use and Having an Exit Strategy

Cloud service uses, methods and liability considerations are all involved in an appropriately devised exit strategy for any enterprise.  This could be in the form of a backup method for redundancy in service delivery or data management.  For many businesses, the cloud use transitioning process is key for being able to maintain reliable services.  Minimizing…

Details

Identity Theft Event Responses

Identity theft laws in states may vary by state but a notice requirement is common among them.  The frequency and extent of data breaches is staggering with the Identity Theft Resource Center (ITRC) recording over 700 breaches so far recorded in 2015 affecting roughly 200 million records.  The previous year, the ITRC recorded for 2014…

Details

Anti-Slapp in Florida

Anti-Slapp in Florida was put to the test in Roca Labs, Inc. v. Consumer Opinion Corp.(Pissed Consumer). In its original lawsuit, Roca Labs argued that the defendant’s consumer review website was fostering defamation, effectively causing tortuous interference, committing unfair competition.  The defense argued immunity under Section 230 of the Communication Decency Act, formally known as…

Details

Crowdfunding and New Conditions

Crowdfunding, an Internet based means of raising capital is getting a lot of attention.  The attention it has garnered is not only from businesses resorting to it but from the SEC as well.  Crowdfunding is instrumental for startups and small business, but it has originally been a vehicle for fund raising for worthy and charitable…

Details

Cybersecurity Buzz in Washington

Cybersecurity is at issue and a buzz in Washington with a bit of urgency and cluelessness.  From addressing anti-hacking methods to cyber security threat sharing, Congress, federal agencies, and the White House are trying to flatten their learning curve.  Private companies have been drawn in to give their two-bits and compare notes on cyber security…

Details

Idea Patent

Many consider having an idea patent and living the entrepreneurial dream.  For those who enjoy abstractions that is the beginning of something that could be valuable for all to use.  Many clients have the same query, “I have an idea and would like to know how to protect it.”  Ideas are not expressions that can…

Details

Internet Product Listing Infringing on Trademark

Internet product listing was argued to be infringing on the trademark of a watch manufacturer.  The watch manufacturer argued that it did not sell its watches to Amazon for resale nor did it authorize resale through the online retailer. The plaintiff in this case, Multi Time Machine (MTM), argued that the online retailer, Amazon was…

Details

Internet Freedom of Speech at Risk

Internet freedom of speech is not given the attention it merits while the EU ponders on its EU Data Protection Regulation.  Many rightfully fear that censorship is looming near and is nearer than one imagines.  While the General Data Protection Regulation (GDPR) has lingered since the 1990s, many countries have followed the EU aspiration of…

Details

Internet Technology and Encryption

Internet technology and encryption is placed at the forefront of the debate about how to process, store, secure, report, you get the picture, of communication that are otherwise deemed private.  The discussion embraces the ideas of using back-door means for law enforcement to peruse and search for possible suspects of the terror and their plots…

Details