Close

Articles Posted in Internet Law

Updated:

What Is Ransomware?

A business’s computer network, which may comprise of network and database servers, is the operation’s lifeline.  A successful business should require its computer network to be secure and protected.  There are many ways that these measures can go wrong.  Yes, sometimes hackers can get in and access sensitive information (e.g.,…

Updated:

Doxing: Is It A Violation of Privacy Laws?

In the last article, we ended our comments with anonymous online speech and the related complications.  However, unmentioned before is an act that’s generally prohibited on websites, and indeed, it will probably be prohibited pursuant to state, federal, or international laws.  This is “doxing” which is a practice of taking…

Updated:

Anonymous Online Speech and Related Complications

Following from libel proof individuals to the realm of Twitter, and the “Wild-West” approach towards online statements, comes an interesting idea.  It is given that most people will communicate anonymously on the web.  So, if a person is a victim of libel, then how can he/she recover? The online service…

Updated:

The Libel-Proof Theory and Its Real-World Application

On the Internet, individuals can go out and make attempts to rib each other, or to mock certain celebrities or infamous individuals. This opens the realm of libel and slander laws to expand towards online activities. Yet, depending on the person’s history, defamation may be borderline impossible.  If defamation is…

Updated:

How Does The First Amendment Apply To Online Speech?

This month, we’re looking at various constitutional issues and tangential actions. Of these, there’s a recent hot-button issue regarding the purpose of “freedom of speech” online. From fake news to political speech on websites, the notion of “what is allowed” and “what should be allowed” is still raised by people.…

Updated:

Wearable Devices: Privacy and Security

Wearable devices become more popular as the holiday season approaches. Among various new technologies, there’s a focus on the idea of wearable devices, which include items like smartwatches, fitness trackers, and other electronic accessories that can help make life easier.  However, with that comes the risk of privacy and security.…

Updated:

Can Internet of Things Be Misused?

In recent years, we have all heard the expression before, but how does someone really “break the Internet?” Recently, an incident arose where a large network of electronic devices joined together resulting in a major interference with online businesses and services. Amazon, Netflix, and Yahoo, were hobbled temporarily due to…

Updated:

The Digital Millennium Copyright Act

We have discussed protecting someone’s image using the right of publicity, right to privacy, and the privacy laws that protect biometrics. Yet, images are first and foremost images.  So, certain rights exist for the protection of images. Firstly, it includes copyright laws. An ongoing trend is how individuals, famous and…

Updated:

EU-US Privacy Shield

We’ve discussed the nature of this before, but the EU-US Privacy Shield has gone into full effect. This program essentially restricts the ability of U.S. commercial entities to do business in the European Union due to the ability of the U.S. government to use international businesses to improperly conduct surveillance…

Contact Us