The recreational use of drones, or unmanned aerial vehicles (UAV), has become increasingly popular in the United States. While such use has gone largely unregulated due to the unlikeliness that these drones will obstruct air traffic, commercial and governmental use of drones—especially larger drones—has sparked safety and privacy concerns leading…
Internet Lawyer Blog
The Legality of Penny Auctions
In an online penny auction, participants purchase bids for a fee, with each bid placed on a particular item increasing the price of the item by a small increment (e.g., one penny) and extending the bidding period for that item by a few seconds. The last participant to place a…
Protecting Against Data Breaches
The recent cyberattack on Anthem, Inc., one of the largest health insurance companies in the United States, illustrates the persistence and severity of the risk of data breaches. On February 4, 2015, Anthem confirmed that one of its databases had been hacked. The data breach exposed personal information of approximately…
Moving Towards Net Neutrality
Net neutrality refers to the principle that Internet service providers and governments should treat all Internet traffic equally, regardless of the source. Among other implications, net neutrality includes the idea that a website should not be given the option to pay an Internet service provider a premium to speed up…
What is the Future of Virtual Currencies?
Virtual currencies have become a popular tool for allowing direct peer-to-peer online transactions using electronic payments that eliminate the need for conversion between currencies. Over the past few years, Bitcoin has enjoyed a considerable amount of praise as the virtual currency of choice. This hype carried with it significant funding…
Online Privacy and Related Issues
In general, online privacy falls under two categories. First, is personal privacy. Second, is corporate privacy. For example, corporate privacy concerns the protection of corporate data (e.g., electronic communications) from retrieval or interception by unauthorized parties. Security is important for the protection of trade secrets, proprietary information, and privileged communications.…
Internet of Things, Privacy, Security and Related Issues
The Internet of Things (“IoT”) is the next evolution and is making a remarkable impact on technology and our way of life. In fact, the availability of an omnipresent network connectivity has fostered the widespread use of smart devices. Devices are now able to communicate with each other through embedded…
eDiscovery, ESI, and Data Collection Guidelines
Electronic discovery (a/k/a “eDiscovery”) is the process of identifying, locating, preserving, collecting, preparing, reviewing, and producing electronically stored information in the context of the legal process. Electronically stored information (“ESI”) includes anything that can be stored in electronic form on a computer or other media device. A computer is defined…
Internet Dating Services and Legal Liability
In these days, many people spend time on their electronic devices to become members of internet dating services. Many companies are now providing online dating services to their members. In general, the online dating services require their members to submit a profile, which may include personal information (e.g., name, email…
Online Banking Fraud – Part II
Online banking is an electronic payment system that enables customers of a financial institution to conduct financial transactions on the web. In today’s high-tech world, online banking fraud is committed on a daily basis. As such, sometimes customers may not be liable for certain unauthorized online transactions, subject to the…