On May 12, 2017, what is believed to be the largest ransomware attack in history occurred on the internet. A global search is heating up trying to locate those who are responsible for the attack. While this search is occurring, there is also a question of how much blame for…
Articles Posted in Internet Law
Copyright Preemption Laws
For example, you have a lawsuit against another party for infringing on your personal rights of privacy. The other party takes a photograph they had taken of you, and then licenses it to other individuals without your consent. Those individuals use it as a basis for a character in another…
Mavrix Photographers, LLC v. LiveJournal, Inc.
In theory, a moderator is a sound idea for any individual running a website that allows user interaction. Presumably, moderators can filter out comments and content that is disreputable, disrespectful, and patently offensive. The moderator can keep discourse civil and help foster insightful positions. Perhaps the website can even rely…
Facebook v. Power Ventures: Unlawful Access To Computer Networks
After this month’s discussion on the statutes that prohibit the unauthorized access of email accounts and digital assets, one might wonder how these statutes may apply in a case. However, in the lengthy saga of Facebook v. Power Ventures, the Ninth Circuit issued a determination giving a bright line example…
Fiduciary’s Access Rights To Decedent’s Digital Assets
What happens to a person’s digital assets when he or she passes away? They still have email, social media, and bank accounts. This could be an uncomfortable topic. However, any unauthorized access to a person’s online account that is password protected will constitute a violation of state or federal law.…
Unauthorized Wiretapping Laws
In addition to California’s precautions against unauthorized email access, there are additional Federal measures to protect privacy. Compared to state measures, this gives another way for an individual to seek legal remedies in a federal court. This is broken up into three different statutes, as part of the Electronic Communications…
Unauthorized Access To Email
This article discusses the remedies for unauthorized access to email in the State of California. Now, email is an essential part of our lives and has been granted extensive protections in the state and federal spheres. Beyond that, it can occur in a variety of ways such as: (i) leaving…
Who Are Script Kiddies?
There are few things that you consider when forming a cybersecurity framework. Naturally, chief among them are the perpetrators such as hackers who engage in mysterious online threats by constantly adapting to new technology. These hackers might seem indomitable, clever, and always working to break down security. Yet, this is…
Ransomware: Does A Tort Claim Apply?
In our last blog post, we mentioned eBay, Inc. v. Bidder’s Edge, Inc. While the case wasn’t related directly to ransomware, it creates an important precedent for tort liability. Specifically, it supports the idea that common law torts can be carried out and applied in the digital world. So, what…
What Are Ransomware Laws?
Now, we know what ransomware is and a little on how to fight against it. So, what are the applicable statutes and how can you recover? Naturally, after a person pays the ransom, or loses their data, they have been harmed by a violation. This could be potentially devastating to…