Internet Law

udrp process

The UDRP Process

The acronym UDRP is one that many website owners may have seen or heard before, but what it is, where it came from, and why we need it may be less familiar if you have never been involved in a domain dispute. But, whether you know it or not, youThe acronym UDRP is one that many website owners may have seen or heard before, but what it is, where it came from, and why we need it may be less familiar if you have never been involved in a domain dispute. But, whether you know it or not, you

What is Revenge Porn?

Revenge porn is the posting of explicit photos or videos of another person without his or her permission, commonly by exes or a significant other. These videos or photos may have been consensual at the time they were taken,

Revenge porn is the posting of explicit photos or videos of another person without his or her permission, commonly by exes or a significant other. These videos or photos may have been consensual at the time they were taken,

computer

Victory For Data Brokers

In a 6-2 decision, the Supreme Court disagreed with the Court of Appeals and handed a victory to Spokeo.com in their fight against Thomas Robins. Spokeo is a data broker that offers its subscribers access to its database, which contains personal information about hundreds of thousands of people.In a 6-2 decision, the Supreme Court disagreed with the Court of Appeals and handed a victory to Spokeo.com in their fight against Thomas Robins. Spokeo is a data broker that offers its subscribers access to its database, which contains personal information about hundreds of thousands of people.

DC COA net neutrality

DC Court of Appeals Protects Net Neutrality

This week, the Court of Appeals for the D.C. Circuit upheld the Federal Communications Commission’s (FCC) net neutrality rules. The net neutrality rules in place prevent internet service providers (ISPs) from blocking, disrupting, or diminishing internet traffic that may not be profitable. The rules effectively classify high-speed internet as aThis week, the Court of Appeals for the D.C. Circuit upheld the Federal Communications Commission’s (FCC) net neutrality rules. The net neutrality rules in place prevent internet service providers (ISPs) from blocking, disrupting, or diminishing internet traffic that may not be profitable. The rules effectively classify high-speed internet as a

revenge porn victim rights

Revenge Porn: Victims’ Rights

There is currently no federal law regulating the distribution of revenge porn, also known as nonconsensual pornography (NCP). The Cyber Civil Rights Initiative has created a model for what the federal government could eventually adopt. The model essentially lays out that if a person knowingly distributes sexually explicit material aboutThere is currently no federal law regulating the distribution of revenge porn, also known as nonconsensual pornography (NCP). The Cyber Civil Rights Initiative has created a model for what the federal government could eventually adopt. The model essentially lays out that if a person knowingly distributes sexually explicit material about

eu data protection laws

EU Data Protection Laws: Friend or Foe to US Business?

The European Union (EU) Parliament recently passed new EU-wide data protection legislation. In the EU, data protection is a fundamental human right, so it only seems fitting that the continent would work to create a single set of rules that would govern everyone instead of allowing the member states toThe European Union (EU) Parliament recently passed new EU-wide data protection legislation. In the EU, data protection is a fundamental human right, so it only seems fitting that the continent would work to create a single set of rules that would govern everyone instead of allowing the member states to

eu electronic signature laws

Changes in EU Electronic Signature Laws

Now that so much government, economic, and business activity has moved from paper hard copy to digital formats electronic signature (e-signature) capabilities are more vital than ever. While most developed countries/regions have an e-signature code or act to abide by, not all as coherent as one might hope. The EuropeanNow that so much government, economic, and business activity has moved from paper hard copy to digital formats electronic signature (e-signature) capabilities are more vital than ever. While most developed countries/regions have an e-signature code or act to abide by, not all as coherent as one might hope. The European

us swiss safe harbor agreement

US-Swiss Safe Harbor Agreement: Bridging the Gap to Privacy Concerns

There has been widespread suggestion that privacy concerns will be this generation’s biggest and most daunting issue. Thanks to the Internet and society’s ever-growing reliance on it – posting our life stories on Social Media, using online banking systems, online shopping, and so forth – more and more people areThere has been widespread suggestion that privacy concerns will be this generation’s biggest and most daunting issue. Thanks to the Internet and society’s ever-growing reliance on it – posting our life stories on Social Media, using online banking systems, online shopping, and so forth – more and more people are

revenge porn laws

Revenge Porn Laws

Revenge porn is the posting of explicit photos or videos of another person without his or her permission, commonly by exes or a significant other. Currently there are 27 states that criminalize revenge porn. These states include Alaska, Arizona, Arkansas, California, Colorado, D.C., Delaware, Florida, Georgia, Hawaii, Idaho, Louisiana, Maine,Revenge porn is the posting of explicit photos or videos of another person without his or her permission, commonly by exes or a significant other. Currently there are 27 states that criminalize revenge porn. These states include Alaska, Arizona, Arkansas, California, Colorado, D.C., Delaware, Florida, Georgia, Hawaii, Idaho, Louisiana, Maine,

trouble for tinder users

New App Could Be Trouble for Tinder Users

It’s generally accepted in today’s society that once something is put online, it is no longer private. Most people are cautious about what they put on their social media profiles because they understand that employers or other people can access those profiles. However, are people equally cautious about their onlineIt’s generally accepted in today’s society that once something is put online, it is no longer private. Most people are cautious about what they put on their social media profiles because they understand that employers or other people can access those profiles. However, are people equally cautious about their online