The Internet of Things (“IoT”) is the next evolution and is making a remarkable impact on technology and our way of life. In fact, the availability of an omnipresent network connectivity has fostered the widespread use of smart devices. Devices are now able to communicate with each other through embedded…
Internet Lawyer Blog
eDiscovery, ESI, and Data Collection Guidelines
Electronic discovery (a/k/a “eDiscovery”) is the process of identifying, locating, preserving, collecting, preparing, reviewing, and producing electronically stored information in the context of the legal process. Electronically stored information (“ESI”) includes anything that can be stored in electronic form on a computer or other media device. A computer is defined…
Internet Dating Services and Legal Liability
In these days, many people spend time on their electronic devices to become members of internet dating services. Many companies are now providing online dating services to their members. In general, the online dating services require their members to submit a profile, which may include personal information (e.g., name, email…
Online Banking Fraud – Part II
Online banking is an electronic payment system that enables customers of a financial institution to conduct financial transactions on the web. In today’s high-tech world, online banking fraud is committed on a daily basis. As such, sometimes customers may not be liable for certain unauthorized online transactions, subject to the…
Online Advertising and Pay-Per-Click Fraud
Pay-per-click (“PPC”) advertising is a profitable online service that search engines, such as Google, Yahoo, or Microsoft, provide their customers. Now recently, PPC fraud has developed and caused loss of revenues for businesses and advertisers. PPC fraud occurs when someone or a program clicks on a company’s advertisement without intending…
Cell Phone Privacy, GPS Technology, and Invasion of Privacy
In recent years, global positioning system (“GPS”) technology has increased in usage on various GPS-enabled devices (e.g., cars, smartcards, handheld computers, and cell phones). This technology brings value to its users, however, it has caused a significant decrease in privacy. Private and public organizations are able to collect and use…
e-Residencies, e-States, And The Risk of Cyberattacks on Digital Societies
In recent times, e-residencies (a/k/a “electronic residency”) have become a trend in some European societies. For example, the Republic of Estonia implemented this concept into its banking systems in order to permit people to manage their funds in an electronic environment. According to the Information System Authority, in 2001, the…
What Happens If You Fail to Participate in Alternative Dispute Resolution?
In general, the interested parties in litigation engage in some sort of “alternative dispute resolution,” or ADR, in order to resolve disputes. In fact, ADR may be used to settle cases that are still pending in court. Both the judicial and legislative branches of government have established new programs in…
E-Commerce Merchant’s Liabilities Towards Hacking and Fraud
In recent years, much of consumer retail consumption has transitioned to the online marketplace. So, many of us engage in e-commerce, especially when shopping for the upcoming holiday season. While e-commerce is convenient and easy, consumers are becoming more aware of the risks posed by hackers that commit online fraud.…
Update On Telephone Consumer Protection Act
The best advertising directs a company’s message directly to the customer. Direct telephone marketing is an effective way to accomplish this kind of advertising. However, the Telephone Consumer Protect Act (“TCPA”) now restricts how businesses can engage in direct telephone marketing. But, there are many other ways companies can directly…