The news outlets have been reporting that the Chinese have allegedly been hacking into American infrastructures. Assuming this report is accurate, the United States is not equipped to handle the consequences of such an attack. These hackers would possess the power to disable the critical infrastructure in this country, eliminating…
Internet Lawyer Blog
President Obama Signs an Executive Order to Protect Cybersecurity
In light of recent news that America’s cyber-network is vulnerable to outside attack, President Obama signed an Executive Order to improve cyber-security for the nation’s “critical infrastructure.” According to the Order, “critical infrastructure” applies to the vital physical and virtual systems in the United States that are essential to the…
SMS Advertising Spam
Under the Telephone Consumer Protection Act, commercial entities are barred from freely soliciting customers using a short message service (“SMS”). A SMS typically allows vendors to send short text messages to consumers’ mobile phones. In this case, vendors send text messages to customers, or potential customers, advertising their deals and…
FTC Adopts Amendments to the Child Online Privacy Protection Act
In 1998, Congress passed the Children’s Online Privacy Protection Act (“COPPA”) to ensure online privacy for children under the age of thirteen. Under this Act, online operators must obtain parental consent before they begin to collect information about online users under the age of thirteen. The Federal Trade Commission (“FTC”)…
Washington D.C. Nonprofit Organization Act
As part of a recent move to revise its body of business law, the Council of Washington D.C. has adopted an amended Title 29 of the District of Columbia Code on Business Organizations. Chapter 4 applies specifically to rules pertaining to Nonprofit Organizations. Also known as the Nonprofit Corporation Act…
Validity and Enforceability of Non-Compete Agreements
Employers use non-compete agreements often to protect trade secrets and keep valuable employees from moving to competing firms. Most employers who conduct business involving highly valuable business secrets require employees to sign non-compete agreements before commencing employment. These contracts prohibit employees from releasing trade secrets to competing companies. Additionally, non-compete…
Cloud Computing and Privacy Laws
The proliferation of cloud computing has given rise to increased privacy concerns. These concerns are especially grounded in Google’s new terms of service that allow the company to gather user information and data and release it to government entities upon request, without obtaining user consent. According to these new terms,…
Digital Estate Planning
The Electronic Communications Privacy Act of 1986 (“ECPA”) prohibits disclosure of stored communications without a court order. This includes instant messages, emails, and communications on Facebook. The issues that can arise from such a standard came to light in 2005, when Loren Williams died in a motorcycle accident in Arizona,…
Access to Websites for Persons With Disabilities
The Americans with Disabilities Act (“ADA”) requires public businesses to provide equal access to their venues for persons with disabilities. Under Subchapter III of the ADA, such public establishments include, among others, restaurants, movie theaters, stores, and places of education. Now, the increases in businesses that operate exclusively online, without…
Legal Implications of Online Impersonation
The possibility of identity theft is a growing concern. However, banks, credit card companies, and various other institutions that house private information regularly take steps to protect customers’ identities. Nonetheless, a different type of identity theft continues to thrive. Online impersonation is a quick and easy form of identity theft…