Close

Articles Posted in Internet Law

Updated:

Fiduciary’s Access Rights To Decedent’s Digital Assets

What happens to a person’s digital assets when he or she passes away? They still have email, social media, and bank accounts.  This could be an uncomfortable topic.  However, any unauthorized access to a person’s online account that is password protected will constitute a violation of state or federal law.…

Updated:

Unauthorized Wiretapping Laws

In addition to California’s precautions against unauthorized email access, there are additional Federal measures to protect privacy. Compared to state measures, this gives another way for an individual to seek legal remedies in a federal court. This is broken up into three different statutes, as part of the Electronic Communications…

Updated:

Who Are Script Kiddies?

There are few things that you consider when forming a cybersecurity framework. Naturally, chief among them are the perpetrators such as hackers who engage in mysterious online threats by constantly adapting to new technology. These hackers might seem indomitable, clever, and always working to break down security.  Yet, this is…

Updated:

Ransomware: Does A Tort Claim Apply?

In our last blog post, we mentioned eBay, Inc. v. Bidder’s Edge, Inc. While the case wasn’t related directly to ransomware, it creates an important precedent for tort liability. Specifically, it supports the idea that common law torts can be carried out and applied in the digital world.  So, what…

Updated:

What Is Ransomware?

A business’s computer network, which may comprise of network and database servers, is the operation’s lifeline.  A successful business should require its computer network to be secure and protected.  There are many ways that these measures can go wrong.  Yes, sometimes hackers can get in and access sensitive information (e.g.,…

Updated:

Doxing: Is It A Violation of Privacy Laws?

In the last article, we ended our comments with anonymous online speech and the related complications.  However, unmentioned before is an act that’s generally prohibited on websites, and indeed, it will probably be prohibited pursuant to state, federal, or international laws.  This is “doxing” which is a practice of taking…

Updated:

Anonymous Online Speech and Related Complications

Following from libel proof individuals to the realm of Twitter, and the “Wild-West” approach towards online statements, comes an interesting idea.  It is given that most people will communicate anonymously on the web.  So, if a person is a victim of libel, then how can he/she recover? The online service…

Updated:

The Libel-Proof Theory and Its Real-World Application

On the Internet, individuals can go out and make attempts to rib each other, or to mock certain celebrities or infamous individuals. This opens the realm of libel and slander laws to expand towards online activities. Yet, depending on the person’s history, defamation may be borderline impossible.  If defamation is…

Contact Us