Trademark Internet Use Collides Regionally in Florida

A trademark used in a particular region of the country may not be absolutely alone with the existence of the Internet.  Marketing a business on the Internet has a ubiquitous presence to the service seeking potential customer.  Whether your business is in the southeast, such as Florida, and there is the existence of a wider…

Music Access Going Offline

Music Access in time past was always a concern for the nostalgic music enthusiast, especially the desire to hold on to music treasures from one’s growing up years. There was the concerned about scratching and breaking and not being able to find another issue.  The digital innovation has liberated the music industry allowing for creative…

Broadcasting Competition of Distribution Agreements

Broadcasting competition of distribution agreements has been in the Federal Communications Commission’s (FCC) cross-hairs.  While under less than unusual circumstances a provider can enter into a contract to distribute its product exclusively or non-exclusively, the same cannot be said regarding agreements of communications content provider.  The concerns is with content that could draw an overwhelming…

How Private is our Privacy

Privacy may not be as private as we would consider, and not much more than what we are capable of to keep private, as long as we live a cyber life.  Take for instance, the wearables that caught the craze throughout 2015 and became a popular item to buy at Christmas and other items that…

Cloud Technology Use for a ‘God View’

Uber’s cloud technology use for a ‘God view’ was exciting to experience among its employees.  With every innovative creation there is always the bit of excitement and a bit of dreaming of the capability devoid of cognition for security and for its ramifications.  To insert concepts of security and considerations of ramifications is a downer,…

Internet Product Listing Infringing on Trademark

Internet product listing was argued to be infringing on the trademark of a watch manufacturer.  The watch manufacturer argued that it did not sell its watches to Amazon for resale nor did it authorize resale through the online retailer. The plaintiff in this case, Multi Time Machine (MTM), argued that the online retailer, Amazon was…

IP address and You

An IP address and you are central to how the Internet functions.  The IP address reveals information about you, your trends, location, and a whole lot more.  By use of an email, say sending an email, the recipient can learn your location.  Through the IP address your internet service provider can be learned as well.…

Cloud Access Security Broker

As service providers and developers seek to encourage cloud service adoption, the role of a cloud access security broker, i.e., CASB, is seen as central to the effort.  The efforts to arrive at standard practices for cloud data security processes, are essential operational benefits of employing a CASB.  The role of a CASB is enhanced…

Personal Data Privacy in Wearable Tech

The industry is concerned with personal data privacy in wearable tech you buy and use. The personal data privacy in wearable tech that is collected has gotten the attention of the consumer electronic industry and have promulgated some guidelines.  They has set a voluntary standard of principles to follow. The CEA, Consumer Electronics Association has…

Website Defamation Immunity

Website operators, either as defendants or plaintiffs have resorted to Section 230 of the Communications Decency Act (CDA) to determine website defamation immunity and defamation liability.  Under the Section 230, blogs or forums, for instance, benefit from website immunity from tort liability if the information was from a third-party.  That third-party could be a subscriber,…

Social Media Information Used in Litigation

Social media use and its information is telling of someone and it is increasingly sought after in court cases where we see social media information used in litigation. Many times social media accounts are a well-spring of vital information that can tip a case on its head. The information can reveal truthfulness or the lack…

Data Protection Harm

Data Protection Law – Consumer Protection Law Data protection harm has become key in courts determining standing in data breach cases.  Data protection harm was analyzed in a case involving breaches and hacking of personal information.  The 7th Circuit’s attention was drawn where it reversed a district court ruling holding that where future harm suffices…

Internet Privacy – Florida Privacy Protection Act

Internet Privacy Law – Florida Internet Privacy Law The flow of information from internet usage and ‘ Internet of Things’  is easily accompanied with its collection and systemic use for other purposes. Digital profiles are created with every online user’s key stroke, site visited, and key word used. In 2015, the Florida Legislature addressed many…