Close

Articles Posted in Internet Law

Updated:

How to Detect and Address Online Counterfeiters

The Internet has become an important aspect in our lives. With the Internet, people can pay bills, make appointments, and buy or sell products.  For example, websites like Amazon, Craigslist, and eBay allow the public to buy and sell products.  So, due to the ease of e-commerce transactions, counterfeiters have…

Updated:

Online Counterfeiting

The United States Census Bureau releases statistics for e-commerce activities on a regular basis.  These statistics compare the percentages from previous years in order to show the growth of the e-commerce industry.  So far, the reports have indicated that the rates are rising, and this trend will most likely continue…

Updated:

Amendments to the Federal Rules of Civil Procedure

If you have ever been involved in a federal civil lawsuit, you may be familiar with the Federal Rules of Civil Procedure (FRCP).  The FRCP are a set of rules that regulate federal civil lawsuits. The rules address issues from court and party obligations to enforcement of remedies. The FRCP…

Updated:

FTC v. Wyndham Worldwide Corporation

On August 24, 2015, the United States Court of Appeals for the Third Circuit handed down its decision in favor of the Federal Trade Commission (FTC) against Wyndham Worldwide Corporation.  This lawsuit was against the defendant and its subsidiaries for their failure to implement proper cybersecurity measures and protect consumers’…

Updated:

Data Breach Notification and Applicable Laws

This year saw the data breaches of Sony Pictures, Ashley Madison, and Experian Credit Bureau. The increasing commonality of data breaches has prompted the federal and state legislatures to review their data breach notification laws. What is a data breach? A data breach occurs when an unauthorized user (i.e., hacker)…

Updated:

Eagle v. Morgan: Employer Access to Employee Social Media Accounts

The case of Eagle v. Morgan is about an employer’s access to employee’s social media account. This case highlights the importance of companies having social media policies to address the ownership of social media accounts during and after employment. What is the case about and how does it affect your…

Updated:

E-commerce Transactions: Issues and Disputes

From a practical perspective, transactions that occur over the Internet can face similar issues that regular business transactions may encounter in their daily operations.  However, e-commerce transactions have the added problems associated with cyberspace laws.  It is nearly impossible for a business to be successful these days without having a…

Updated:

E-commerce Transactions

The phrase “e-commerce transactions” invokes thoughts of a complicated and technical phenomenon.  In fact, many people partake in e-commerce transactions every day. What is an e-commerce transaction? An electronic commerce (a/k/a “e-commerce”) transaction involves a commercial transaction that takes place over the Internet. So, any trading of products or services…

Updated:

Internet of Things and Security

The Internet of Things (“IoT”) is the network of electronic devices that communicate with each other via the Internet without human intervention.  It has caused concerns regarding security since vast amounts of unsecure electronic devices are being used to send and receive information. Furthermore, the data breaches that lead to…

Contact Us