Close

Articles Posted in Technology

Updated:

International Websites and U.S. Internet Laws

Any company conducting e-commerce with consumers in the United States must follow the applicable U.S. Internet laws. Otherwise, the company and its managers may face civil liability and criminal prosecution for violating U.S. laws. However, in the event that a business’s website is also accessible internationally, that business may also…

Updated:

Defending Against the Growing Threat of Identity Theft

Few crimes affect as broad a scope of people as identity theft. With social networks, credit cards, personal information, and contact information so interconnected, perpetrators can trespass into a person’s life by breaking past a single password-protected account. Accordingly, the Los Angeles County District Attorney’s Office has created a special…

Updated:

A Call for Laws Against Online Piracy

The illegal downloads of music and movies, and the corresponding financial consequences for music labels and movie production companies, introduced online piracy to the forefront of newsworthy discussions. Today, online piracy has expanded into an online market that allows criminals to profit from stealing intellectual property (such as patents, trademarks,…

Updated:

IMAGiNE Group Faces Counts of Criminal Copyright Infringement

After an investigation by U.S. Immigration Customs Enforcement’s Homeland Security Investigations unit, U.S. District Judge Arenda L. Wright found members of IMAGiNE Group guilty of criminal copyright infringement. The court found IMAGiNE Group, an Internet piracy circle, guilty of perpetuating an effort to release movies available only in movie theaters.…

Updated:

Threat of International Cyber Attacks

The news outlets have been reporting that the Chinese have allegedly been hacking into American infrastructures. Assuming this report is accurate, the United States is not equipped to handle the consequences of such an attack. These hackers would possess the power to disable the critical infrastructure in this country, eliminating…

Updated:

President Obama Signs an Executive Order to Protect Cybersecurity

In light of recent news that America’s cyber-network is vulnerable to outside attack, President Obama signed an Executive Order to improve cyber-security for the nation’s “critical infrastructure.” According to the Order, “critical infrastructure” applies to the vital physical and virtual systems in the United States that are essential to the…

Updated:

SMS Advertising Spam

Under the Telephone Consumer Protection Act, commercial entities are barred from freely soliciting customers using a short message service (“SMS”). A SMS typically allows vendors to send short text messages to consumers’ mobile phones. In this case, vendors send text messages to customers, or potential customers, advertising their deals and…

Updated:

FTC Adopts Amendments to the Child Online Privacy Protection Act

In 1998, Congress passed the Children’s Online Privacy Protection Act (“COPPA”) to ensure online privacy for children under the age of thirteen. Under this Act, online operators must obtain parental consent before they begin to collect information about online users under the age of thirteen. The Federal Trade Commission (“FTC”)…

Updated:

Cloud Computing and Privacy Laws

The proliferation of cloud computing has given rise to increased privacy concerns. These concerns are especially grounded in Google’s new terms of service that allow the company to gather user information and data and release it to government entities upon request, without obtaining user consent. According to these new terms,…

Contact Us