Personal Data Privacy and Consumer Privacy Bill

Personal data privacy and Consumer Privacy Bill may meet to give people more control over their personal information is in the horizon. Concern however remains with companies and data brokers having discretion. The proposed Consumer Privacy Bill of Rights Act, sets some requirements on companies that process personal information. The idea is to establish some…

Details

Data Protection Harm

Data Protection Law – Consumer Protection Law Data protection harm has become key in courts determining standing in data breach cases.  Data protection harm was analyzed in a case involving breaches and hacking of personal information.  The 7th Circuit’s attention was drawn where it reversed a district court ruling holding that where future harm suffices…

Details

eCommerce and Medicine results in Telemedicine

eCommerce Law Imagine receiving medical diagnosis via web as eCommerce and medicine results in telemedicine.  Would the FCC approve it?  Not so fast.   FCC is concerned that these services would require prioritization for data and real time performance, i.e., reliability of service.  The FCC is concerned with equality and at the same time, it is…

Details

Domain Names and Trademark Suffixes

Domain Names and trademark suffixes being used brings a question to the forefront.  Can a generic top-level domain (gTLD) just be considered as part of a web address or should it be considered a source of the domain name registry? Top-level domains (TLDs) are administered by the Internet Assigned Numbers Authority (IANA) for the domain…

Details

Trademark Free Riding

Many brands in a strong competitive industry have the challenge of trademark free riding posed by not necessarily their own competitors.  Company brands struggle against other entities that are not necessarily in their industry, benefiting by their use of a similar if not identical mark from the reputation they have tried to build. This “free-riding”…

Details

Trade Secrets and Source Code

Intellectual property lawyers are scratching their heads as state courts are struggling with archaic laws on trade secrets and source code misappropriation cases.. For instance, the New York Supreme Court determined in a trade secret case ruled, resulting in overturning a conviction as it defined ‘tangible’ as not the same as when source code is electronically transferred.…

Details

Software Development

Software development and implementation is critical to the growth of a company’s innovation program. The source code is software development is a valuable trade secret and is transferable easily through varied mediums.  This is a challenging concern for trade secret – software owners. Challenging issues for intellectual property owners and the pursuit of prosecuting trade…

Details

Internet Privacy – Florida Privacy Protection Act

Internet Privacy Law – Florida Internet Privacy Law The flow of information from internet usage and ‘ Internet of Things’  is easily accompanied with its collection and systemic use for other purposes. Digital profiles are created with every online user’s key stroke, site visited, and key word used. In 2015, the Florida Legislature addressed many…

Details

Internet of Things, Privacy Law & Data Security Concerns

Internet of things is frequently used phrase to capture the essence of the interconnected aspects of devices.  Internet law lawyers see the “Internet of Things” and networks of embedded devices, sought for useful purposes, presenting harm as well as good to data security. The coding inside a control area network (CAN) which is used for…

Details

Right To be Forgotten and Personal Information

The right to be forgotten and the availability of personal information is being debated in the European Union.  Google has been restricted by the EU high Court from having personal information accessible in its search process respecting the right to be forgotten. Yet, while information is not available about people on search vehicles provided by…

Details

Internet Password Security

Internet password security is a growing concern about internet user’s privacy. Services provided address the management of passwords to enhance password security and privacy on the internet.  There are considerations.  Pros – they offer secure storage, sync usernames and passwords, help prevent password reuse with provide password reminders, identify emails used as identifiers, use email confirmation…

Details