View allAdvertisingAdvertising DisclosuresAIAnti-CompetitionAnti-competitive AgreementsAnti-SLAPPAntitrust LawArtificial Intelligencebroadband telecommunicationsBroadcast Rightscell technologyCloud DataCloud Data ManagementCommunications Decency ActComputer AbuseComputer AccessComputer Access AbuseComputer LawComputer processConsumer PrivacyConsumer Protection LawContractsCopyright LawCyber securityCyber Security InsuranceCyberbullyingCybercrimeCybersquattingData Breach NotificationData CollectionData Protection LawDeceptive AdvertisingDeceptive Business PracticesDefamationDefamatory commentsDigital Media LawDomainsDoxingDoxxedEcommerce LawEconomic Espionage ActelectricityFalse Light PublicityFCCFirst AmendmentFree SpeechFreedom of ExpressionFTCHIPAAIdea PatentIntellectual PropertyIntellectual Property LawInternational Copyright LawInternational Internet LawInternet ContractsInternet GovernanceInternet LawInternet Law LawyerInternet of ThingsInternet PrivacyInternet SecurityInvasion of privacyLa RedLibelLinel Per SelitigationMalwareMarketing LawMedia & Entertainment LawMedia LawMedias SocialesMobile CommerceMobile CommereceMusic PerformancenewsNoticiasOnline Defamation LawOnline HarassmentOnline ServicesPassword Sharingpatent lawPatentsPersonal InformationPlanningPrivacyProteccion de dataRansomwareright-of-waySection230Social Media Account InformationSocial Media/PrivacySoftware PatentSoftware PatentsStandingTechnology ManagementTerms of ServiceTrade SecretsTrademark LawUncategorizedunfair business practicesutilityVideo PerformanceWireless telecommunications

Music Access Going Offline

Music Access in time past was always a concern for the nostalgic music enthusiast, especially the desire to hold on to music treasures from one’s growing up years. There was the concerned about scratching and breaking and not being able to find another issue.  The digital innovation has liberated the music industry allowing for creative…

Details

Copyright Challenge – Ideas and Expression

Copyright for many individuals appears to be anything they write, express, or present on paper.  By putting content on a book one assumes it’s copyrightable, whether it is text, photos, or drawings.  For a yoga studio in California this was the mindset.  That which they organized together in the form of photos displaying poses was…

Details

How Private is our Privacy

Privacy may not be as private as we would consider, and not much more than what we are capable of to keep private, as long as we live a cyber life.  Take for instance, the wearables that caught the craze throughout 2015 and became a popular item to buy at Christmas and other items that…

Details

Cybercrime Considerations for Cases

There are cybercrime considerations for cases as well as there is a judicial learning curve when it comes to cybercrime and judges  are not alone.  Cybercrime harm cannot be assessed with the mindset of assessing punishment as if it was a physical criminal act without assessing the extenuating consequences of a cyber-criminal act.  In cases…

Details

Cloud Technology Use for a ‘God View’

Uber’s cloud technology use for a ‘God view’ was exciting to experience among its employees.  With every innovative creation there is always the bit of excitement and a bit of dreaming of the capability devoid of cognition for security and for its ramifications.  To insert concepts of security and considerations of ramifications is a downer,…

Details

Cybersecurity Breach Aftermath with FTC

Cybersecurity and cybersecurity breach are difficult topics to discuss with clients because of the unknown variants and for their simple trepidation toward addressing the vulnerabilities and investing the capital for prevention and training.  From internal planning involving establishing a process to addressing external intrusion possibilities they tend to be cumbersome for a company’s administration to…

Details

Identity Theft Event Responses

Identity theft laws in states may vary by state but a notice requirement is common among them.  The frequency and extent of data breaches is staggering with the Identity Theft Resource Center (ITRC) recording over 700 breaches so far recorded in 2015 affecting roughly 200 million records.  The previous year, the ITRC recorded for 2014…

Details

Idea Patent

Many consider having an idea patent and living the entrepreneurial dream.  For those who enjoy abstractions that is the beginning of something that could be valuable for all to use.  Many clients have the same query, “I have an idea and would like to know how to protect it.”  Ideas are not expressions that can…

Details

Internet Freedom of Speech at Risk

Internet freedom of speech is not given the attention it merits while the EU ponders on its EU Data Protection Regulation.  Many rightfully fear that censorship is looming near and is nearer than one imagines.  While the General Data Protection Regulation (GDPR) has lingered since the 1990s, many countries have followed the EU aspiration of…

Details

Cross Device Tracking

The Federal Trade Commission has noted that cross device tracking which is a consequence of the Internet of Things (IoT) falls essentially within its auspices.  Considering the concerns with transparency and the required notices to consumers, cross device tracking is just not getting attention for purposes of enhancing consumer protection.  The advertising industry representatives as…

Details

Fate of the Internet

Life has changed with the Internet but it will change even more as the fate of the Internet is in court hands once again. The U.S. Court of Appeals for the D.C. Circuit will determine how Internet providers will change how we use the internet, what content will be permitted, and how we access and…

Details