The Internet has become an important aspect in our lives. With the Internet, people can pay bills, make appointments, and buy or sell products. For example, websites like Amazon, Craigslist, and eBay allow the public to buy and sell products. So, due to the ease of e-commerce transactions, counterfeiters have…
Articles Posted in Internet Law
Online Counterfeiting
The United States Census Bureau releases statistics for e-commerce activities on a regular basis. These statistics compare the percentages from previous years in order to show the growth of the e-commerce industry. So far, the reports have indicated that the rates are rising, and this trend will most likely continue…
Amendments to the Federal Rules of Civil Procedure
If you have ever been involved in a federal civil lawsuit, you may be familiar with the Federal Rules of Civil Procedure (FRCP). The FRCP are a set of rules that regulate federal civil lawsuits. The rules address issues from court and party obligations to enforcement of remedies. The FRCP…
FTC v. Wyndham Worldwide Corporation
On August 24, 2015, the United States Court of Appeals for the Third Circuit handed down its decision in favor of the Federal Trade Commission (FTC) against Wyndham Worldwide Corporation. This lawsuit was against the defendant and its subsidiaries for their failure to implement proper cybersecurity measures and protect consumers’…
Radio Frequency Identification and Related Issues
The term RFID is everywhere these days. Consumers are seeing RFID blocking wallets, credit card holders, and passport covers as the holidays approach. However, many still do not know what it is and how it is used in their every day life. What is RFID? RFID stands for “Radio Frequency…
Data Breach Notification and Applicable Laws
This year saw the data breaches of Sony Pictures, Ashley Madison, and Experian Credit Bureau. The increasing commonality of data breaches has prompted the federal and state legislatures to review their data breach notification laws. What is a data breach? A data breach occurs when an unauthorized user (i.e., hacker)…
Eagle v. Morgan: Employer Access to Employee Social Media Accounts
The case of Eagle v. Morgan is about an employer’s access to employee’s social media account. This case highlights the importance of companies having social media policies to address the ownership of social media accounts during and after employment. What is the case about and how does it affect your…
E-commerce Transactions: Issues and Disputes
From a practical perspective, transactions that occur over the Internet can face similar issues that regular business transactions may encounter in their daily operations. However, e-commerce transactions have the added problems associated with cyberspace laws. It is nearly impossible for a business to be successful these days without having a…
E-commerce Transactions
The phrase “e-commerce transactions” invokes thoughts of a complicated and technical phenomenon. In fact, many people partake in e-commerce transactions every day. What is an e-commerce transaction? An electronic commerce (a/k/a “e-commerce”) transaction involves a commercial transaction that takes place over the Internet. So, any trading of products or services…
Internet of Things and Security
The Internet of Things (“IoT”) is the network of electronic devices that communicate with each other via the Internet without human intervention. It has caused concerns regarding security since vast amounts of unsecure electronic devices are being used to send and receive information. Furthermore, the data breaches that lead to…