Internet Law and Technology Law
Internet and Technology laws are a fast-growing area for policy makers, lawyers, business owners, and individual consumers. As technology changes at a rapid pace, consumer rights and business e-commerce rights may be challenged in new and unusual ways.
Cyber laws and related amendments can protect consumers and enforce regulations regarding Internet crime, Internet fraud, Internet business practices, Internet marketing and more. Two acts that protect Internet users are the CAN-SPAM Act of 2003 (Controlling the Assault of Non-Solicited Pornography and Marketing Act) and the Electronic Communications Privacy Act of 1986.
Internet and Email Fraud
Internet Privacy Issues
Electronic Communications Privacy Act
Internet CrimeAs the use of the Internet grows, so does the use of the Internet to perpetrate crime. Internet crime includes Internet fraud, violations of Internet business practices, violations of CAN-SPAM, violations of privacy laws and identity theft.
Internet crime is investigated by the Internet Crime Complaint Center (IC3), which is a partnership between the Federal Bureau of Investigation (FBI), the National White Collar Crime Center (NW3C), and the Bureau of Justice Assistance (BJA).
Back To Top
Internet and Email FraudInternet and email fraud include scams that are conducted online. They include websites promoting fraudulent goods or services, or emails sent to consumers with the intent of scamming them of their money or obtaining personal information to commit fraud.
According to the Internet Crime Complaint Center, current Internet schemes include auction fraud, counterfeit cashier's checks, credit card theft/fraud, debt elimination or debt consolidation schemes, fake or illegal employment/business opportunities, internet extortion, investment fraud, phishing, pyramid schemes and spam.
Back To Top
Internet Privacy IssuesVarious states have laws regarding privacy on the Internet. For example, Nevada and Minnesota require Internet Service Providers (ISPs) to keep certain customer information private unless the customer has given permission to disclose the information. Furthermore, both states prohibit disclosure of information that personally identifies an Internet user. California requires nonfinancial businesses to disclose to customers the types of personal information that business shares with or sells to a third party for direct marketing purposes or for compensation.
Items that have the potential to violate a user's privacy include cookies (information a Web site puts on the user's hard drive so it can remember something about the user at a later time), spyware (gathers information about the user without the user's knowledge), web bugs (placed on a Web page or in an e-mail message to monitor user behavior) and phishing (email fraud—an email that looks legitimate is sent out to gather personal information from recipients, often passwords to secure accounts).
Back To Top
Identify TheftOnline identity theft occurs when a person gains access to someone else's personally identifying information—including their name, social security number or credit card number—and uses that information to commit fraud or other crimes. Although some identity theft can be solved quickly, identity theft can be costly and time-consuming to resolve. Victims may lose their money and may also discover their credit rating is negatively affected by identity theft.
Back To Top
Internet MarketingSome Internet companies and social media websites have come under fire for their marketing tactics. One example of this is Facebook's Beacon advertising system, which was discontinued in September 2009 as part of a settlement. A class action lawsuit against Facebook and Beacon affiliates—including Blockbuster and Overstock.com—alleged the companies violated a series of laws including the Electronic Communications Privacy Act and the Video Privacy Protection Act.
Beacon was a program in which Facebook users' actions were broadcast back to their friends. For example, if a Facebook user made a purchase at a participating website, that purchase was broadcast to the user's friends. The idea was that this would be a form of "social" advertising because the purchase was basically an endorsement of the product.
Another company that has faced lawsuits is Tagged.com, which the New York Attorney General alleged used illegal marketing to increase its client base.
Back To Top
CAN-SPAM ActThe CAN-SPAM Act (Controlling the Assault of Non-Solicited Pornography and Marketing) regulates the use of commercial email. CAN-SPAM applies to bulk email and all commercial messages, defined as "any electronic mail message the primary purpose of which is the commercial advertisement or promotion of a commercial product or service." Penalties for failing to follow CAN-SPAM include fines of up to $16,000 per email.
Some of the requirements of CAN-SPAM:
Electronic Communications Privacy ActThe Electronic Communications Privacy Act (ECPA) regulates the access, use, disclosure, interception and privacy protections of electronic communications. Although it was aimed at regulating invasions of privacy by the government, it also regulated the actions of private-sector electronic communications providers. The ECPA prohibits a third party from intercepting or disclosing communications without prior authorization.
The act protects information in transit—that is while it is being communicated—as well as in storage.
Back To Top
INTERNET/TECHNOLOGY HOT ISSUES
INTERNET/TECHNOLOGY ARTICLES AND INTERVIEWS
INTERNET/TECHNOLOGY EMERGING ISSUES
FEATURED LAW FIRM
Internet/Technology Legal Help
If you have suffered losses due to internet fraud, please click the link below to send your complaint to a lawyer to evaluate your claim at no cost or obligation.