Internet privacy laws have been implemented to protect us from legal violations. These laws are meant to protect us against cyber threats and data intrusions which are designed to extract personal or confidential information (e.g., intellectual properties, trade secrets) without authorization. Data privacy is paramount when it comes to the…
Internet Lawyer Blog
Ransomware: What is it and what are the relevant laws?
In general, ransomware is a type of malware (i.e., malicious software) that is designed to take control of an electronic communication device, prevent its owner from accessing the electronic communication device, notify its owner that the electronic communication device has been held ransom, demand payment from the owner, and return…
Cloud Computing and Cybersecurity Laws
Cloud computing has become the normal protocol to store data for most individuals and businesses. The fact that online storage is cheaper these days has contributed to the expansion of this technology. There are numerous companies out there that provide cloud storage facilities which may be inside or outside of…
Are Computer Programs and Videogames Copyrightable?
The question is whether you can copyright computer programs and videogames. The Copyright Act was amended to expressly include the right to register computer programs and videogames. What is a computer program and how can you copyright it? A computer program is a set of statements or instructions to be…
DMV Sale of Personal Information and TrueDialog Text Message Leak
Part I: DMV Sale of Personal Information A group has investigated and allegedly found that the California Department of Motor Vehicles has earned more than $50 million by selling personal information of drivers to third parties without consent. This data may include names, addresses, and registration information. The DMV claims…
Different Types of Copyright Applications
The copyright application process is three parts: (1) application form; (2) nonrefundable filing fee; and (3) a nonreturnable deposit of the work’s copy. In general, the copyright owner should submit a separate application for each work. However, the following exceptions apply for registering multiple works in one application: Collective Works:…
Quantum Computing Technology and Legal Issues
Quantum computing technology will be affecting most of us in a direct or indirect way. We have stated in a prior article that: “A quantum computer is a highly-advanced computer system that works exponentially faster than today’s conventional computers. Quantum computing is the practice of studying quantum computers and their potential. This…
The Basic Rules For Commercial Emails
The basic rules for commercial emails should be known by all business organizations. They should include having proper identifiers, opt-out mechanisms, and a valid mailing address in all commercial emails. In fact, the CAN-SPAM Act states that the senders of commercial emails will be acting legally if: 1) The header of…
Internet Spam and Robocall Violations
Internet spam violations have increased in the past years. For example, the spammers use the interconnected network of computers that links us together in the world to disseminate malware. The spammers also use the internet to send junk email that fills up email accounts and can be used to commit…
Spammers and Legal Issues
There have been cases where spammers have transmitted spam via email and text messages. These messages can include improper content, propaganda, hidden messages, and malware (e.g., virus, trojan, ransomware, adware, spyware). The spammers use the Internet Service Provider’s and user’s bandwidth to disseminate spam which results in bandwidth saturation, lost…