Internet Law

Communications Decency Act

Over the past few years, you may have heard various people express support for or opposition to Section 230 of the Communications Decency Act. While President Trump and others have accused Internet content publishers of using it to discriminate against conservative points of view, the reality is quite different and actually not political at all. While people will […]

User Data Privacy

How much personal data do you collect from customers, and what privacy laws apply to your business? Recent privacy violations have resulted in penalties of thousands or millions of dollars, with Facebook paying a record FTC fine of $5 billion. Every business needs to know its compliance requirements and potential exposure. Yet the current proliferation […]

Hammer

The ongoing pandemic has not stopped progress in the world of privacy protection. This month there have been huge developments that may have profound implications for commerce between United States and the European Union (EU). We have written extensively about the European “General Data Protection Regulation” or the GDPR. This is a set of privacy regulations that govern […]

Digital Millennium Copyright Act

 In 1998, the Digital Millennium Copyright Act (DMCA) became law. That year, Chumbawamba’s “Tubthumping” topped the charts, Mark McGwire broke the home run record, Google, Inc. was formed, and smartphones didn’t yet exist. The Web was in its infancy, but online service providers were concerned about their potential liability for hosting users’ content. The DMCA […]

Internet Domains

The Amazon River is the longest, mightiest river in the world.  Its headwaters lie in the Andes of Peru but numerous rivers of the Amazon Basin drain into the Amazon River as it meanders towards the Atlantic Ocean. The Amazon Basin, or Amazonas, is massive, comprised of seven countries – Bolivia, Colombia, Ecuador, Guyana, Peru, […]

Internet Domains

Bad actors are after your data.  They want to turn your data into money any way that they can.  That may involve using your data to steal your online banking passwords and account numbers, or may involve stealing personal and contact data to make a phishing attack more convincing and effective.  Why?  So that you […]