Close

Articles Posted in Internet Law

Updated:

International Alternative Dispute Resolution

International alternative dispute resolution is a necessary variable when it comes to internet and e-commerce transactions. In most cases, the parties have entered into a written agreement that yields an arbitration or mediation clause. Therefore, it is important for legal counsel to ensure the relevant provisions properly address the following…

Updated:

Electronic Discovery: How to Handle Electronically Stored Information

Electronic discovery is complicated because it’s a multifaceted procedure. The parties must review the computer network that yields the electronically stored information. They must identify the relevant electronically stored information (“ESI”) and understand the network infrastructure. The collection process is the next step wherein the parties must be able to…

Updated:

Quantum Computer: Its Technology and Legal Effects

Quantum computing technology will certainly have an effect on state, federal, and international laws. A quantum computer is a much more capable electronic device and has the ability to process data faster.  In general, computers can manage, control, and process information by using individual bits that store information as binary…

Updated:

Electronic Discovery and Data Retention Policies

The management of electronic records in litigation is important. In general, there should be a data retention policy for all business entities especially if they are part of a highly-regulated industry such as health care, energy, securities, and banking. There are state and federal laws that regulate the management of…

Updated:

Is Internet Gambling Legal?

This article has been prepared to discuss the legality of online gambling and the relevant rules and regulations. These laws affect individuals, businesses, startups, and entrepreneurs as they’ve recently expressed their interests in this topic. Therefore, we will discuss the relevant state and federal laws. It’s important to note that…

Updated:

What Is Cryptojacking?

Cryptojacking (or “malicious cryptomining”) happens when the culprits hijack a third party’s network bandwidth without authorization to use for their cryptocurrency mining efforts. The malicious software conceals itself on the electronic communication device and utilizes its resources. Obviously, the culprits engage in such clandestine activities to gain profit or else…

Updated:

Electronic Discovery Rules and Regulations

Electronic discovery (“eDiscovery”) rules and regulations must be understood when dealing with digital or electronic evidence. It is the concept of locating, identifying, collecting, and producing electronically stored information (“ESI”) as part of a response to production of documents in a pending legal action. Electronically stored information may include electronic messages, files,…

Updated:

Identity Theft Laws

Identity theft has been described as the use of one person’s identity by another to commit fraud. See Remsburg v. Docusearch, Inc. (2003) 149 N.H. 148, 155, 816 A.2d 1001, 1007.  This case was about an individual seeking personal information (e.g., date-of-birth, social security number, work address) about someone else from…

Contact Us