View allAdvertisingAdvertising DisclosuresAIAnti-CompetitionAnti-competitive AgreementsAnti-SLAPPAntitrust LawArtificial Intelligencebroadband telecommunicationsBroadcast Rightscell technologyCloud DataCloud Data ManagementCommunications Decency ActComputer AbuseComputer AccessComputer Access AbuseComputer LawComputer processConsumer PrivacyConsumer Protection LawContractsCopyright LawCyber securityCyber Security InsuranceCyberbullyingCybercrimeCybersquattingData Breach NotificationData CollectionData Protection LawDeceptive AdvertisingDeceptive Business PracticesDefamationDefamatory commentsDigital Media LawDomainsDoxingDoxxedEcommerce LawEconomic Espionage ActelectricityFalse Light PublicityFCCFirst AmendmentFree SpeechFreedom of ExpressionFTCHIPAAIdea PatentIntellectual PropertyIntellectual Property LawInternational Copyright LawInternational Internet LawInternet ContractsInternet GovernanceInternet LawInternet Law LawyerInternet of ThingsInternet PrivacyInternet SecurityInvasion of privacyLa RedLibelLinel Per SelitigationMalwareMarketing LawMedia & Entertainment LawMedia LawMedias SocialesMobile CommerceMobile CommereceMusic PerformancenewsNoticiasOnline Defamation LawOnline HarassmentOnline ServicesPassword Sharingpatent lawPatentsPersonal InformationPlanningPrivacyProteccion de dataRansomwareright-of-waySection230Social Media Account InformationSocial Media/PrivacySoftware PatentSoftware PatentsStandingTechnology ManagementTerms of ServiceTrade SecretsTrademark LawUncategorizedunfair business practicesutilityVideo PerformanceWireless telecommunications

Social Media Self-Modification

Self-Modification by social media platforms has struggled to ensure that the Internet is acceptable to all cultures, religions, political persuasion, and to all values of countries.  This exercise in Internet Governance is tall and detailed and comes under criticism for being too heavy handed towards exercising censorship.  Though easy to say, it becomes difficult to…

Details

Internet of Things, Risks and Security

Internet of things and the interconnectedness of devices has inherent drawbacks.  Initially, the convenience of using interconnected devices overcomes the awareness of the lack of control over the information that is gathered about their use.  The convenience and allure of the novelty of Internet of Things catch everyone’s whim to acquire the latest. But unfortunately,…

Details

Privacy Issue of FCC over ISPs

Privacy is a late to-come-by issue of the Federal Communications Commission (FCC) as Internet Service Providers (ISP) were reclassified.  As part of the push for net neutrality, ISPs were soon to be treated as common carriers by the FCC.  This has left the door open for broadband providers to access customer information that is proprietary…

Details

Music Access Going Offline

Music Access in time past was always a concern for the nostalgic music enthusiast, especially the desire to hold on to music treasures from one’s growing up years. There was the concerned about scratching and breaking and not being able to find another issue.  The digital innovation has liberated the music industry allowing for creative…

Details

Cyber Security Events and Lessons of 2015

The process of cyber security is an everyday occurrence in every entity, from government to small and large enterprises.  A handful of events took place in 2015, each shedding a lesson or two going forward.  Counseling clients on requirements always involves sharing best practices, despite them not being a guarantee.  But always the focus is…

Details

Child Privacy and the Apps They Play

Child privacy while playing with apps is something to consider.  The Federal Trade Commission (FTC) has been concerned.  The aspect of how information, that is children’s personal information, is shared with advertisers and the related networks brings to mind the requirements of the Children Online Privacy Protection Act (COPPA). In 2013, the FTC amended the…

Details

How Private is our Privacy

Privacy may not be as private as we would consider, and not much more than what we are capable of to keep private, as long as we live a cyber life.  Take for instance, the wearables that caught the craze throughout 2015 and became a popular item to buy at Christmas and other items that…

Details

Cybercrime Considerations for Cases

There are cybercrime considerations for cases as well as there is a judicial learning curve when it comes to cybercrime and judges  are not alone.  Cybercrime harm cannot be assessed with the mindset of assessing punishment as if it was a physical criminal act without assessing the extenuating consequences of a cyber-criminal act.  In cases…

Details

Cloud Technology Use for a ‘God View’

Uber’s cloud technology use for a ‘God view’ was exciting to experience among its employees.  With every innovative creation there is always the bit of excitement and a bit of dreaming of the capability devoid of cognition for security and for its ramifications.  To insert concepts of security and considerations of ramifications is a downer,…

Details

Digital Economy Fighting Copyright Piracy

Digital economy partnerships drawing close to fight copyright piracy have struck a chord that could have a significant impact to prevent Internet digital media piracy.  The piracy of digital media is an international cottage industry costing billions.  From content creators, ISPs, advertising agencies, network systems, and search engines, to data managers, and e-payment platforms, have…

Details

Advertising Guidelines from FTC

Advertising guidelines from the Federal Trade Commission underscore the deceptive features of ‘native’ advertising.  Prior to Christmas the FTC released its “Enforcement Policy Statement on Deceptively Formatted Advertisements.”  The attention was towards the use of native advertising which is ‘dressed’ or ‘tailored’ to appear as if it is an actual editorial.  The FTC notes the…

Details