In our last blog post, we mentioned eBay, Inc. v. Bidder’s Edge, Inc. While the case wasn’t related directly to ransomware, it creates an important precedent for tort liability. Specifically, it supports the idea that common law torts can be carried out and applied in the digital world. So, what…
Internet Lawyer Blog
What Are Ransomware Laws?
Now, we know what ransomware is and a little on how to fight against it. So, what are the applicable statutes and how can you recover? Naturally, after a person pays the ransom, or loses their data, they have been harmed by a violation. This could be potentially devastating to…
What Is Ransomware?
A business’s computer network, which may comprise of network and database servers, is the operation’s lifeline. A successful business should require its computer network to be secure and protected. There are many ways that these measures can go wrong. Yes, sometimes hackers can get in and access sensitive information (e.g.,…
Doxing: Is It A Violation of Privacy Laws?
In the last article, we ended our comments with anonymous online speech and the related complications. However, unmentioned before is an act that’s generally prohibited on websites, and indeed, it will probably be prohibited pursuant to state, federal, or international laws. This is “doxing” which is a practice of taking…
Anonymous Online Speech and Related Complications
Following from libel proof individuals to the realm of Twitter, and the “Wild-West” approach towards online statements, comes an interesting idea. It is given that most people will communicate anonymously on the web. So, if a person is a victim of libel, then how can he/she recover? The online service…
The Libel-Proof Theory and Its Real-World Application
On the Internet, individuals can go out and make attempts to rib each other, or to mock certain celebrities or infamous individuals. This opens the realm of libel and slander laws to expand towards online activities. Yet, depending on the person’s history, defamation may be borderline impossible. If defamation is…
Reverse Engineering: Fair Use and Other Rights
Among the rights people have, many are unknown or unsung until there is a dispute and the courts get involved in the process. Rarely recognized is the right to reverse engineer under the Fair Use Doctrine and Digital Millennium Copyright Act. However, this is not an absolute right. Rather, it…
How Does The First Amendment Apply To Online Speech?
This month, we’re looking at various constitutional issues and tangential actions. Of these, there’s a recent hot-button issue regarding the purpose of “freedom of speech” online. From fake news to political speech on websites, the notion of “what is allowed” and “what should be allowed” is still raised by people.…
Digital Assistants
As we close out the year and enjoy the new technology from the holiday season, one piece of technology stands out as a forerunner. It is something that we’ve dreamed and written about to the point it is a staple in science fiction. An artificial intelligence that anticipates and responds…
Wearable Devices: Privacy and Security
Wearable devices become more popular as the holiday season approaches. Among various new technologies, there’s a focus on the idea of wearable devices, which include items like smartwatches, fitness trackers, and other electronic accessories that can help make life easier. However, with that comes the risk of privacy and security.…