Online marketing and advertising can be a complicated process since the internet has opened new channels that did not previously exist before the technology age’s expansion. Now, with the advent of sophisticated technologies, business owners, startups, and entrepreneurs have more options when it comes to online marketing and advertising. They…
Articles Posted in Technology
Electronic Discovery: How to Handle Electronically Stored Information
Electronic discovery is complicated because it’s a multifaceted procedure. The parties must review the computer network that yields the electronically stored information. They must identify the relevant electronically stored information (“ESI”) and understand the network infrastructure. The collection process is the next step wherein the parties must be able to…
Quantum Computer: Its Technology and Legal Effects
Quantum computing technology will certainly have an effect on state, federal, and international laws. A quantum computer is a much more capable electronic device and has the ability to process data faster. In general, computers can manage, control, and process information by using individual bits that store information as binary…
Electronic Discovery and Data Retention Policies
The management of electronic records in litigation is important. In general, there should be a data retention policy for all business entities especially if they are part of a highly-regulated industry such as health care, energy, securities, and banking. There are state and federal laws that regulate the management of…
Is Internet Gambling Legal?
This article has been prepared to discuss the legality of online gambling and the relevant rules and regulations. These laws affect individuals, businesses, startups, and entrepreneurs as they’ve recently expressed their interests in this topic. Therefore, we will discuss the relevant state and federal laws. It’s important to note that…
What Is Cryptojacking?
Cryptojacking (or “malicious cryptomining”) happens when the culprits hijack a third party’s network bandwidth without authorization to use for their cryptocurrency mining efforts. The malicious software conceals itself on the electronic communication device and utilizes its resources. Obviously, the culprits engage in such clandestine activities to gain profit or else…
Class Action Lawsuits: Privacy Violations
There has been an increase in privacy violations that have led to class action lawsuits. For example, Facebook was forced to pay $550 million to settle a class action lawsuit for privacy violations. In that case, it was ordered to pay the plaintiffs due to an alleged systematic violation of…
Electronic Discovery Rules and Regulations
Electronic discovery (“eDiscovery”) rules and regulations must be understood when dealing with digital or electronic evidence. It is the concept of locating, identifying, collecting, and producing electronically stored information (“ESI”) as part of a response to production of documents in a pending legal action. Electronically stored information may include electronic messages, files,…
Coronavirus Online Scams
The coronavirus pandemic has affected us on a national and global level. This pandemic has caused a financial and health crisis for most of us. Now, the bad actors are taking advantage of this tragic situation by engaging in online scams. For example, our law firm’s investigation has determined that…
Identity Theft Laws
Identity theft has been described as the use of one person’s identity by another to commit fraud. See Remsburg v. Docusearch, Inc. (2003) 149 N.H. 148, 155, 816 A.2d 1001, 1007. This case was about an individual seeking personal information (e.g., date-of-birth, social security number, work address) about someone else from…