OneLogin recently suffered from a major security breach. This breach has compromised private and confidential information, which is managed by its datacenter. OneLogin provides a service that is used by organizations to secure their data. It is basically a password manager for corporations. It allows employees, customers, and partners to…
Internet Lawyer Blog
Impression Products, Inc. v. Lexmark International, Inc.
The United States Supreme Court came out with a new patent law decision in Impression Products, Inc. v. Lexmark International, Inc. For those who are not familiar with patents, a patent grants the holder an exclusive right to exclude others from making, using, importing, and selling the patented innovation for a limited time.…
President’s Executive Order on Cybersecurity
President Donald Trump has signed an executive order on cybersecurity as a response to the WannaCry ransomware attack. This executive order is entitled as “Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure.” The executive order contains three main sections and a fourth category that includes some definitions of terms…
Who Is Responsible for the WannaCry Attack?
On May 12, 2017, what is believed to be the largest ransomware attack in history occurred on the internet. A global search is heating up trying to locate those who are responsible for the attack. While this search is occurring, there is also a question of how much blame for…
Copyright Preemption Laws
For example, you have a lawsuit against another party for infringing on your personal rights of privacy. The other party takes a photograph they had taken of you, and then licenses it to other individuals without your consent. Those individuals use it as a basis for a character in another…
Mavrix Photographers, LLC v. LiveJournal, Inc.
In theory, a moderator is a sound idea for any individual running a website that allows user interaction. Presumably, moderators can filter out comments and content that is disreputable, disrespectful, and patently offensive. The moderator can keep discourse civil and help foster insightful positions. Perhaps the website can even rely…
Non-Compete Agreements in California
Different states have different rules regarding the validity of non-compete agreements. In California, non-compete agreements are heavily disfavored and will usually only be upheld in a limited number of circumstances. When drafting a non-compete agreement, it is important to keep in mind where the employment will be taking place, so…
Star Athletica v. Varsity: Copyright Protection Issues
From the idea of product design, who wouldn’t want to protect more of their products? A producer should be able to profit off the sweat of labor, and creativity that they have mustered to bring the product. Yet, if a design brings utility, then the individual that comes up with…
Facebook v. Power Ventures: Unlawful Access To Computer Networks
After this month’s discussion on the statutes that prohibit the unauthorized access of email accounts and digital assets, one might wonder how these statutes may apply in a case. However, in the lengthy saga of Facebook v. Power Ventures, the Ninth Circuit issued a determination giving a bright line example…
Fiduciary’s Access Rights To Decedent’s Digital Assets
What happens to a person’s digital assets when he or she passes away? They still have email, social media, and bank accounts. This could be an uncomfortable topic. However, any unauthorized access to a person’s online account that is password protected will constitute a violation of state or federal law.…