As cyberspace becomes a larger part of everyday life, the threat of cybercrimes becomes more prevalent. Consumers conduct all sorts of business over the Internet, which involves storing and transferring personal information on various online sites. Accordingly, the wealth of personal information available over the Internet has drawn in a…
Articles Posted in Technology
Website Copyrights
Copyright protection is commonly known to apply to inventions and artwork to protect original work from copyright infringement. However, copyright protections also extend to websites. Today, the Internet, and especially personal websites extend to all avenues of the marketplace. Individuals have blogs, businesses have websites to advertise and inform about…
Leahy-Smith America Invents Act Changes the Face of U.S. Patent Law
The central provisions of the Leahy-Smith America Invents Act (the “AIA”) went into effect in March 2013, revolutionizing the United States patent system. Traditionally, the United States had maintained a “first-to-invent” patent system, which awarded patent rights to the first inventor who created a unique invention. However, as the AIA…
Recent Cases in Cybersquatting
Cybersquatting has been a highly litigated issue since Congress passed the Anti-Cybersquatting Consumer Protection Act (the “ACPA”) in 1999, codified under Title 15 U.S.C. § 1125(d). The ACPA establishes a cause of action for the bad faith registration of a domain name that is substantially similar to a trademark or…
International Websites and U.S. Internet Laws
Any company conducting e-commerce with consumers in the United States must follow the applicable U.S. Internet laws. Otherwise, the company and its managers may face civil liability and criminal prosecution for violating U.S. laws. However, in the event that a business’s website is also accessible internationally, that business may also…
Defending Against the Growing Threat of Identity Theft
Few crimes affect as broad a scope of people as identity theft. With social networks, credit cards, personal information, and contact information so interconnected, perpetrators can trespass into a person’s life by breaking past a single password-protected account. Accordingly, the Los Angeles County District Attorney’s Office has created a special…
A Call for Laws Against Online Piracy
The illegal downloads of music and movies, and the corresponding financial consequences for music labels and movie production companies, introduced online piracy to the forefront of newsworthy discussions. Today, online piracy has expanded into an online market that allows criminals to profit from stealing intellectual property (such as patents, trademarks,…
IMAGiNE Group Faces Counts of Criminal Copyright Infringement
After an investigation by U.S. Immigration Customs Enforcement’s Homeland Security Investigations unit, U.S. District Judge Arenda L. Wright found members of IMAGiNE Group guilty of criminal copyright infringement. The court found IMAGiNE Group, an Internet piracy circle, guilty of perpetuating an effort to release movies available only in movie theaters.…
Threat of International Cyber Attacks
The news outlets have been reporting that the Chinese have allegedly been hacking into American infrastructures. Assuming this report is accurate, the United States is not equipped to handle the consequences of such an attack. These hackers would possess the power to disable the critical infrastructure in this country, eliminating…
President Obama Signs an Executive Order to Protect Cybersecurity
In light of recent news that America’s cyber-network is vulnerable to outside attack, President Obama signed an Executive Order to improve cyber-security for the nation’s “critical infrastructure.” According to the Order, “critical infrastructure” applies to the vital physical and virtual systems in the United States that are essential to the…