Cybersecurity is paramount to secure online communications whether they are for sending or receiving sensitive or confidential information – e.g., trade secrets, intellectual properties, financial information. Many people assume they are protected on the internet when transferring or receiving files over computer networks. They may attach tax-related documents to their…
Internet Lawyer Blog
Internet Fraud Rules and Regulations
Internet fraud and scams have exponentially increased in recent years. There are several reasons for this development which include the expansion of technology and usage of electronic devices in our daily lives. The fraudsters find different ways to retrieve sensitive or confidential information in order to commit their crimes. For…
Discovery of Electronically-Stored Information
The parties are generally entitled to discovery of relevant and admissible evidence during litigation. This process includes the discovery of electronically-stored information (“ESI”) which can be stored at internal and external locations such as the local area network and cloud. It has become more prevalent for companies to transfer their…
What is Sextortion?
Sextortion is a type of online blackmail. It’s one kind of sexual exploitation that takes place on the internet when an anonymous individual threatens to distribute the victim’s explicit videos or pictures if he or she does not comply with the demands which can include transferring funds through digital currencies.…
United States Privacy Laws – Part III
We’ve discussed how the states have passed privacy laws to protect their residents. We have also referenced the state and federal rules or regulations that are designed to promote transparency, security, accuracy, proper data collection, and accountability. The Federal Constitution has not expressly mentioned the right to privacy. However, under…
United States Privacy Laws – Part II
We have briefly discussed some of the state and federal privacy laws that are applicable to consumers and commercial organizations. It is important to understand how personal information is being obtained and distributed by businesses. Personal information is also being obtained and distributed by bad actors – i.e., criminals who…
United States Privacy Laws – Part I
There are state and federal privacy laws that are applicable to consumers and commercial organizations. There has been much activity with the collection and distribution of private or confidential information in recent years. Personal information can be collected through several methods such as voluntary disclosures, cookies, website bugs, tracking software,…
International E-Commerce Laws – Part III
International e-commerce laws have been evolving since the inception of the information technology age. International e-commerce transactions take place over a network of computers and have become more streamlined with technology advancements. The following topics will be evaluated and addressed in this article: alternative dispute resolution and insurance. Alternative Dispute…
International E-Commerce Laws – Part II
International e-commerce laws have been evolving since the inception of the information technology age. International e-commerce transactions which take place over the vast network of computers have become more streamlined with the advancement of technology. The following topics will be evaluated and addressed in these series of articles: Intellectual properties,…
International E-Commerce Laws – Part I
International e-commerce laws pertain to online commercial transactions that takes place for the purchase or sale of goods and services. Electronic contracts are used for the purchase or sale of software through shrink-wrap, click-wrap, and browse-wrap agreements. In general, these electronic transactions have a correlation to taxes, duties, and custom…