eCommerce and Medicine results in Telemedicine

eCommerce Law Imagine receiving medical diagnosis via web as eCommerce and medicine results in telemedicine.  Would the FCC approve it?  Not so fast.   FCC is concerned that these services would require prioritization for data and real time performance, i.e., reliability of service.  The FCC is concerned with equality and at the same time, it is…

Details

Domain Names and Trademark Suffixes

Domain Names and trademark suffixes being used brings a question to the forefront.  Can a generic top-level domain (gTLD) just be considered as part of a web address or should it be considered a source of the domain name registry? Top-level domains (TLDs) are administered by the Internet Assigned Numbers Authority (IANA) for the domain…

Details

Trademark Free Riding

Many brands in a strong competitive industry have the challenge of trademark free riding posed by not necessarily their own competitors.  Company brands struggle against other entities that are not necessarily in their industry, benefiting by their use of a similar if not identical mark from the reputation they have tried to build. This “free-riding”…

Details

Trade Secrets and Source Code

Intellectual property lawyers are scratching their heads as state courts are struggling with archaic laws on trade secrets and source code misappropriation cases.. For instance, the New York Supreme Court determined in a trade secret case ruled, resulting in overturning a conviction as it defined ‘tangible’ as not the same as when source code is electronically transferred.…

Details

Software Development

Software development and implementation is critical to the growth of a company’s innovation program. The source code is software development is a valuable trade secret and is transferable easily through varied mediums.  This is a challenging concern for trade secret – software owners. Challenging issues for intellectual property owners and the pursuit of prosecuting trade…

Details

Internet Privacy – Florida Privacy Protection Act

Internet Privacy Law – Florida Internet Privacy Law The flow of information from internet usage and ‘ Internet of Things’  is easily accompanied with its collection and systemic use for other purposes. Digital profiles are created with every online user’s key stroke, site visited, and key word used. In 2015, the Florida Legislature addressed many…

Details

Internet of Things, Privacy Law & Data Security Concerns

Internet of things is frequently used phrase to capture the essence of the interconnected aspects of devices.  Internet law lawyers see the “Internet of Things” and networks of embedded devices, sought for useful purposes, presenting harm as well as good to data security. The coding inside a control area network (CAN) which is used for…

Details

Right To be Forgotten and Personal Information

The right to be forgotten and the availability of personal information is being debated in the European Union.  Google has been restricted by the EU high Court from having personal information accessible in its search process respecting the right to be forgotten. Yet, while information is not available about people on search vehicles provided by…

Details

Internet Password Security

Internet password security is a growing concern about internet user’s privacy. Services provided address the management of passwords to enhance password security and privacy on the internet.  There are considerations.  Pros – they offer secure storage, sync usernames and passwords, help prevent password reuse with provide password reminders, identify emails used as identifiers, use email confirmation…

Details

Cyber Security and Assessing Cyber Liability – An Internet Law Lawyer’s comment

Cyber security is an aspect of insurance that new and growing and with it there is the need to assess liability and the needs of the business.  Securing insurance coverage for cyber-attack events should address your cyber liability. Considerations should address monitoring, risk assessment to prevent gaps in coverage, lower deductibles with the use of…

Details

Encrypting Websites

Encrypting news websites is being pursued to enhance the privacy of readers. The Washington Post wants readers to feel safe from monitoring eyes. Intelligence agencies are routinely seeking to monitor readership and their internet access. But when social media sites and newspaper sites exert efforts to protect its readership and users, they thwart governmental agencies…

Details