Overview of the FTC
Internet law is a relatively new field of legal practice: state and federal courts and agencies are creating it on an ad hoc basis, attempting...
Software Products: As Goods for Sale Or a License?
A sale contract in a supplier's order form involves a software program to be delivered or shipped in compact disc (CD-ROM) for a stated price,...
A Potential of 20 Million Hackers Each Using Technology Worth Barely 500 Dollars Considered
Thankfully, the United States government and the United States military is finally getting serious about Cyberwarfare, and the potential of serious threats to our economic...
Cybersquatting – How Can I Get That Domain Name? Is a Lawyer Necessary?
Cybersquatting has been a major problem for trademark owners since the mid 1990's. When domains were initially introduced as "addresses" on the Internet, some individuals...
The David Nugent – Jason Lowen Controversy: Freedom and Abuse of Speech
The David Nugent - Jason Lowen controversy is a series of events that involved a Jewish-American blogger Jason Lowen who published allegations against his former...
Physicians-Only Social Network?
Do physicians-only online networks really have the potential to drastically change the face of healthcare collaboration and education?Already, websites like sermo.com and ozmosis.com restrict access...
Internet Privacy and Data Security Concerns
The year 2010 has shaped-up to be a decisive year for issues concerning Internet advertising, privacy and regulation.Baseline privacy standards for the handling of consumers'...
Florida Law Firm Website Ruling
FLORIDA LAW FIRM PROPOSED WEB SITE RULES SPARK ARGUMENTS FROM FLORIDA LAW FIRMSReported by an article inside the Florida Bar news, Eight major law firms...
The Good, The Bad, and The SLAPP Lawsuit: Don’t Sue For Speech Without Consulting With Counsel
While legitimate criticism is protected, postings which constitute defamation are not. Ibid.; see also Chaker v. Crogan, 428 F.3d 1215, 1223 (9th Cir. 2005). The...
Basics of Information Security
Accessing information stored in a computer ordinarily will implicate the owner's reasonable expectation of privacy in the information. See United States v. Barth, 26 F....