View allAdvertisingAdvertising DisclosuresAIAnti-CompetitionAnti-competitive AgreementsAnti-SLAPPAntitrust LawArtificial Intelligencebroadband telecommunicationsBroadcast Rightscell technologyCloud DataCloud Data ManagementCommunications Decency ActComputer AbuseComputer AccessComputer Access AbuseComputer LawComputer processConsumer PrivacyConsumer Protection LawContractsCopyright LawCyber securityCyber Security InsuranceCyberbullyingCybercrimeCybersquattingData Breach NotificationData CollectionData Protection LawDeceptive AdvertisingDeceptive Business PracticesDefamationDefamatory commentsDigital Media LawDomainsDoxingDoxxedEcommerce LawEconomic Espionage ActelectricityFalse Light PublicityFCCFirst AmendmentFree SpeechFreedom of ExpressionFTCHIPAAIdea PatentIntellectual PropertyIntellectual Property LawInternational Copyright LawInternational Internet LawInternet ContractsInternet GovernanceInternet LawInternet Law LawyerInternet of ThingsInternet PrivacyInternet SecurityInvasion of privacyLa RedLibelLinel Per SelitigationMalwareMarketing LawMedia & Entertainment LawMedia LawMedias SocialesMobile CommerceMobile CommereceMusic PerformancenewsNoticiasOnline Defamation LawOnline HarassmentOnline ServicesPassword Sharingpatent lawPatentsPersonal InformationPlanningPrivacyProteccion de dataRansomwareright-of-waySection230Social Media Account InformationSocial Media/PrivacySoftware PatentSoftware PatentsStandingTechnology ManagementTerms of ServiceTrade SecretsTrademark LawUncategorizedunfair business practicesutilityVideo PerformanceWireless telecommunications

Internet Claims

Internet claims about what people experience negatively from the their use of the Internet is paramount.  Internet claims span from invasion of privacy, defamation, to misappropriating someone’s identity online. The Internet gives users a freedom that is immeasurable. It gives users more flexibility to express ideas and conduct activities.  Its use generates data about what…

Details

Doxing Personal Information

Doxing personal information is a growing concern to all, to say the least.  Personal information online is common, however, with the Internet being so prevalent. Many records are found online, such as, voting, property ownership, even bankruptcies, and new business filings.  But what is doxing? Doxing ‘may’ occur when someone publishes online someone else’s personal…

Details

Doxing Information

Doxing information is not a household term.  It is slowly becoming part of the daily conversation especially by people who have had their personal information publicized online. Internet information that is available to read on the Internet about anyone is surprising.  The Internet hosts way too much information.  All users are contributing to its data. …

Details

Cybersecurity Term Use

Cybersecurity term use may not be as clear as it is used in every day conversation.  Cybersecurity as a term has been bouncing around by many without carefully determining what it encompasses.  The same can be said of ‘data security,’ it’s sibling.  From an operational aspect advising client it is important that there be clear…

Details

Consumer Data Privacy Versus Data Economy

Consumer data privacy versus the data economy concern has had recurring attention and does not seem to stop. There are too many occurrences of loose transfers of consumer data.  From a consumer perspective, it appears it has been ignored as a result of the cycle of benefit and compromises, along with the cyber vulnerabilities, and…

Details

Consumer Data Privacy

Consumer data privacy concerns have taken a prominent position among the list of concerns over our economy and laws. We all hear about digital data privacy needing protection and we also read about the events that have led to infringements of consumer data privacy on the occurrence of data breaches.  Essentially, privacy is desired by all. …

Details

Startup Technical Issues

Startup technical issues vary depending on the business purpose. The Internet presence of a startup will not always be the same as for other startups and other startups may not always be the best example to follow.  The technical aspects of a business surpass the threshold requirements of having a computer and a phone.  Considering…

Details

Contracts Online, With Who?

Contracts online are formed every day without any thought to their import.  They may be enforceable or not.  Many parents allow their minors to use their parents’ credits cards or the debt card given to them by their parents to shop online, for say, school clothes. That mad rush for tax free holiday prior to…

Details

Data Breach Injury In fact

Data breaches catch all by surprise.  The data breach itself stifles the entity that had the breach.  But to anyone outside that wonders if they have been affected, their opportunity to claim is not that easy to depict.  Standing is an issue that has to be overcome.   The compromise of personal identifiable information (PII) has…

Details

Social Media Privacy Trust

Social media privacy trust is easily and all too often not evaluated by users.  Social media usage in its carefree, beach-like social setting, is all about people enjoying keeping up with friends and sharing life events and experiences with friends.  However, it has become blatantly clear that by using the platform to share with friends,…

Details

Cyber Security Claims Can be Deceptive

Cyber security is increasingly a reported issue in the news.  How entities report their cyber incident, depends on their own preparedness and willingness to confront unacknowledged vulnerabilities.  At times it is a matter of employee negligence, lack of training, failure of the entity to have in place stop-gaps and a detection process.  Cyber security incident…

Details