The answer to many questions is an online search away. However, online searches are not free of all consequences. Indeed, search engines can track and store a user’s search history and even sell this personal information to third parties for profit. What someone types into a search bar then becomes part of a permanent link tied to that Internet Protocol (“IP”) address. This certainly raises several concerns regarding online and individual privacy. In a highly digitized era, this affects anyone with Internet access, a computer, and even a cellphone.

What are the Main Concerns of Search Engine Privacy?

Search engines track personal information using users’ search history, including a user’s IP address, search terms, name, and location. Websites, such as Google and Yahoo, can then use this information for their marketing, or they can sell users’ search history to marketing firms. Online search history generates an impression of the user, which the public can then use to its advantage–e.g., for criminal investigations, employment opportunities, and to fuel personal disputes. Public opinion in this area strongly disfavors this level of surveillance. As a result, websites have begun to compete in terms of which search engine provides the greater privacy protection. Efforts to improve search engine privacy consider, among other standards, how long a search engine stores user information, how a search engine deletes such information, whether the search engine engages in behavioral targeting (i.e. whether a site uses search history to provide targeted advertisements), and whether the search engine uses profile information to manipulate advertisements. Based on a recent survey by CNet, only Ask.com does not record search terms. Outside the circle of the large search engines, sites such as ixquick.com allege that they do not record IP addresses when users conduct searches through their website. According to the survey, Google also does not engage in behavioral targeting.

Online sales markets are in a state of expansion as more consumers continue to conduct their purchases online. Indeed, the topic of an Internet sales tax has been in debate in the California Legislature for some time. And now, with the possibility that the federal government may pass the Marketplace Fairness Act of 2013, online sales taxes could change across the country. If you are a consumer who makes purchase online, or a business that conducts sales online, the California Internet sales tax provisions apply to you. Please contact us today to speak with an attorney who can help explain how changing tax requirements could affect your online transactions.

What Is California’s Online Sales Tax Now?

Currently, the standard tax rule in California, and across America, is that online retailers must collect sales tax from customers who are located in states where the online retailer maintains a “physical presence.” Online retailers maintain a physical presence in states where they have a warehouse, a store, a corporate office, or a sales representative. In states where online retailers do not collect an online sales tax, customers nonetheless have a duty to report and pay a sales tax on online purchases. In this case, the tax is a “use tax,” not a “sales tax.” However, these standards differ between each state and for federal taxes. The federal government has also been considering the Marketplace Fairness Act of 2013, which would allow businesses to collect taxes on sales in individual states, regardless of where the seller is located. However, any businesses that are not physically located in a state and make less than $1 million a year would not be required to follow this tax schedule. This law would also require states to reform their current sales tax laws to make online sales tax collection simpler. For California, this new law will not make a substantial difference because the largest online sellers, such as Amazon, already maintain a physical presence in California. Therefore, California online shoppers already pay an online sales tax for most of their online purchases.

The decision of where to register a legal entity–such as a corporation, partnership, or LLC–affects the management and operation of such a business. For example, different states have different tax standards for registered entities, different operational requirements, and ultimately, the law effects businesses differently based on where they are registered. Indeed, legal entities are free to register wherever they prefer. Accordingly, California businesses can take advantage of certain benefits based on where they register. Please contact us today to speak to an attorney about the circumstances and characteristics of your business to decide the most advantageous state in which to register your business.

What Are the Advantages of Registering a Legal Entity in California or Nevada?

Nevada is a favorable jurisdiction where legal entities can register primarily because it does not have corporate or personal income tax liabilities. Nevada also does not have a franchise tax for legal entities. Furthermore, a corporation that is registering in Nevada enjoys an extremely strong defense against attempts to “pierce the corporate veil.” Accordingly, in the event that the corporation is involved in a lawsuit, Nevada’s corporate law makes it difficult for a claimant against the corporation to hold the individual officers responsible for personal liability. In fact, this level of protection for corporate officers stems from a California case. As such, California corporations also enjoy a similar level of protection for corporate officers. Indeed, California also provides heightened confidentiality for corporate officers–a corporation must only disclose its corporate director and resident agents, not its stockholders. Also, California provides corporations with a greater level of flexibility in its management. Other than requiring a president, secretary, and chief financial officer, California corporate law allows corporations to organize as they see fit.

A celebrity’s image is the most vital marketable quality in the business of entertainment. Indeed, this image, like other forms of intellectual property, is very much the product that a famous personality offers into the economy for a profit. However, while other forms of intellectual property enjoy protection under copyright and trademark laws, an image is vulnerable to all sorts of cyber attacks that can cause severe and irreparable damage. Nonetheless, a celebrity can prepare and prevent cyberspace threats by speaking with an attorney to establish a plan to monitor online activity and prevent harm. Furthermore, acting immediately at the first sign of an attack can prevent on-going and permanent harm to reputation.

What is the Threat to Celebrities In Cyberspace?

Since a famous personality’s name, image, and reputation make up the underlying fame and fortune, any attack can harm the ability to work successfully. However, taking steps to secure a reputation is especially difficult in the case of public figures. For example, First Amendment free speech protections allow for public discussions involving public figures. Accordingly, it can be even more difficult to bring defamation claims where the victim of offensive remarks is in the public eye. Unfortunately, this harmful publicity can limit a celebrity’s capacity to secure future employment. Musicians face the added threat of the unauthorized use of their work product, especially over the Internet. While some use, even though it is unauthorized, provides free publicity over the Internet, this use can prove to be harmful to economic viability. Also, leaking new music allows users to learn about an artist’s new work, but it takes away from the artist’s ability to make a profit.

A business’s trade secrets are an essential component of its foundation, growth, and development. A trade secret is any sort of confidential and proprietary information that a company seeks to protect from unauthorized access.  For example, a trade secret, includes a formula, pattern, compilation, program, device, method, technique, or process (e.g., computer algorithm).  By definition, a trade secret is only valuable so long as it remains a secret.   In recent years, as businesses conduct more transactions over cyberspace, there is a higher probability of trade secret theft or loss. However, the constantly changing nature of cyberspace, and the anonymity users enjoy over the Internet, make protecting trade secrets a complex issue.

What is the Threat to Trade Secrets in Cyberspace?

Trade secrets in cyberspace, which involve software and digital information, can be misappropriated or wrongfully taken and used without detection.  It is also known as “cybertheft.”  For example, an online user has the capacity to view and distribute trade secrets without detection within minutes.   Online message boards allow users to post trade secrets over the web anonymously.  By concealing their identity, it is possible to steal a trade secret without detection.  Indeed, the courts continue to issue decisions that recognize individual privacy rights in digital trade secret misappropriation cases, preventing the trade secret owner from seeking legal remedies. Furthermore, in the past, trade secret theft was intended to secure an economic advantage between competing companies. However, recent cases, such as Ford Motor Co. v. Lane, illustrate that trade secrets are vulnerable to dissatisfied employees who distribute trade secrets only to harm an employer.  On a side note, hackers may even steal and distribute trade secrets simply to show off their technical skills.

In the aftermath of the Snowden scandal, and an on-going concern for cyber-surveillance practices, the United States Congress and the American people are increasingly concerned that their online privacy is at risk. The government continues to wrestle with the possibility of including mandatory data retention standards for Internet Service Providers (“ISPs”). While this poses a serious threat to individual privacy, supporters of data retention argue that these standards are essential to national and personal safety.

What Is Data Retention?

Data retention is the practice of ISPs monitoring and storing information tied to an IP address, including, but not limited to, browsing history. ISPs that also provide email services may store email logs, but not the content of those emails. ISPs also have the capacity to identify which third-party email service providers are tied to an IP address. Law enforcement agencies could require ISPs to turn over this information in the course of a criminal investigation. PRISM, the National Security Agency’s avenue of access to online data, is similar to traditional data retention practices, except that PRISM targets cloud-based services. Currently, there are no mandatory data retention policies in America. However, governmental pressures and international influences may be pushing America to join Europe in its data retention practices. In March 2013, James Sensenbrenner, Republican House representative from Wisconsin and the author of the Patriot Act, argued that America should adopt ISP data retention laws similar to those in Europe. Indeed, the Justice Department has fully supported data retention policies. The Justice Department argues that the lack of data retention policies dramatically hinders law enforcement efforts. However, regardless of whether the government implements policies requiring ISPs to store personal data, ISPs currently maintain the freedom to monitor and track online activity. Indeed, Time Warner currently retains user data for six months, and Verizon retains data for eighteen months. Then, under the Stored Communications Act, which is codified under 18 U.S.C. § 2701 et seq., the government may access this data.

In recent times, alternative dispute resolution (“ADR”) is emerging as a favorable option for legal disputes due to rising litigation costs and the strain of growing caseloads for California state and federal courts. While state courts adopted ADR as an option to legal resolution earlier, federal courts are adopting various ADR options now as a means of resolving cases. ADR includes any method of seeking a legal resolution outside of court other than traditional civil litigation, which takes place in court. The various ADR options, include, but are not limited to, early neutral evaluation, mediation, arbitration, and negotiation. As federal courts look to these options to resolve cases, ADR continues to move to the forefront as a viable tool for all types of legal disputes.

What Role Does ADR Play in Federal Courts?

While parties can instigate ADR proceedings on their own, often courts will refer cases to ADR in order to resolve a legal dispute. Indeed, according to a study by the Federal Judicial Center, all federal courts authorize some type of alternative dispute resolution. Today, more than 30% of federal courts allow for various forms of ADR proceedings. Mediation has emerged as the most common form of ADR for federal cases. Courts will refer cases to mediation in an attempt to resolve the conflicting issues outside of court, which also allows a resolution that is mutually-beneficial and less hostile than litigation. Arbitration and Early Neutral Evaluation are also common forms of ADR in federal cases. Most recently, federal courts have adopted ADR programs for pro se litigants, or parties who are not represented by attorneys.

A federal court recently issued a decision establishing that “abstract ideas” do not enjoy patent protection. In Accenture Global Services, et al. v. Guidewire Software, Inc. the United States District Court for District of Delaware found that a patent for computer software for insurance-related businesses was invalid. Therefore, Accenture did not enjoy exclusive patent-holder rights for the software. Do you own patents that relate to the software industry? Are you looking to secure and protect your exclusive patents rights for an invention? At the Law Offices of Salar Atrizadeh, an attorney with experience and knowledge in the changing field of patent law can help explain the latest developments in this area to protect your intellectual property interests.

What Is Patent Law?

According to Article I, Section 8 of the United States Constitution, Congress has the power to regulate “science and useful arts” by granting exclusive rights for such inventions and creations. Under this constitutional authority, Congress enacted Title 35 of the United States Code as the federal body relating to patents. A “patent” is a set of exclusive rights granted by the United States Patent and Trademark Office to an inventor for a limited period of time. In return, the inventor makes the underlying patented invention available to the public, which promotes intellectual growth and new developments.

In January 2012, the European Union (“EU”) introduced a draft regulation that would make it more difficult for companies within the EU to gather personal data from consumers. In the wake of recent developments that the National Security Agency has been involved in questionable surveillance practices in the United States, the European Union is certainly taking steps to provide greater individual privacy protections.

What Are the Terms of the New EU Personal Data Directive?

The right to privacy is an important component of the European Convention on Human Rights, a highly developed area of law in Europe. According to the new regulation, institutions may only access personal data if the purpose for gathering the personal data falls within three categories. First, a company or agency may collect and process personal data if the individual is first informed. For example, among other preliminary requirements, the individual must initially be aware of the purpose for gathering personal data. Germany’s chancellor, Angela Merkel, has urged the EU to adopt additional restrictions to require internet companies to reveal details about the companies they will be sharing personal data with. Next, a company or agency may collect personal data if the data is “adequate, relevant and not excessive” in relation to the purpose for the collection. Additional restrictions may apply if the data is more personal, such as when the data goes to religious beliefs, political affiliations, sexual orientation, or racial association. Finally, personal data may be gathered and processed for a “legitimate purpose.” However, this is a very narrow category and the reasoning behind the data collection must be very specific. As an added safeguard, any data collected within the EU may only be transferred to countries outside the EU if those countries provide substantial levels of personal privacy protection as well. This requirement would pose an obstacle for social media websites, such as Facebook, that exist across the world and gather information from users to share with companies that operate under different privacy-protection standards.

In recent times, the threat of privacy invasions has spread far beyond domestic governmental agencies, but to also include foreign and international governments. Do you travel outside of the United States? Do you travel with electronic devices, such as a cellphone or laptop? Do these devices hold any sensitive information, such as passwords or confidential communications? If yes, then your electronic privacy may be compromised when you travel abroad.

What Is the Threat to Privacy Abroad?

The simple truth is that border patrol agents in countries around the world take data from cellphones, laptops, and other electronic devices as tourists cross their borders. This data can include, but is certainly not limited to, passwords, files, and emails. Although, this is a common practice around the world, most tourists have no idea that their personal information becomes increasingly more vulnerable to invasions of privacy when they leave the United States. Indeed, the threat extends to hotels that may extract information from electronic devices through their free wireless systems.