Request Legal Help Now - Free

Advertisement
LAWSUITS NEWS & LEGAL INFORMATION

Internet Law and Technology Law

Internet and Technology laws are a fast-growing area for policy makers, lawyers, business owners, and individual consumers. As technology changes at a rapid pace, consumer rights and business e-commerce rights may be challenged in new and unusual ways.

Cyber laws and related amendments can protect consumers and enforce regulations regarding Internet crime, Internet fraud, Internet business practices, Internet marketing and more. Two acts that protect Internet users are the CAN-SPAM Act of 2003 (Controlling the Assault of Non-Solicited Pornography and Marketing Act) and the Electronic Communications Privacy Act of 1986.

Internet Crime
Internet and Email Fraud
Internet Privacy Issues
Identity Theft
Internet Marketing
CAN-SPAM Act
Electronic Communications Privacy Act

FREE CASE EVALUATION

Send your internet/technology claim to a Lawyer who will review your claim at NO COST or obligation.
Get Legal Help Now

Internet Crime

Internet CrimeAs the use of the Internet grows, so does the use of the Internet to perpetrate crime. Internet crime includes Internet fraud, violations of Internet business practices, violations of CAN-SPAM, violations of privacy laws and identity theft.

Internet crime is investigated by the Internet Crime Complaint Center (IC3), which is a partnership between the Federal Bureau of Investigation (FBI), the National White Collar Crime Center (NW3C), and the Bureau of Justice Assistance (BJA).

Back To Top

Internet and Email Fraud

Internet and email fraud include scams that are conducted online. They include websites promoting fraudulent goods or services, or emails sent to consumers with the intent of scamming them of their money or obtaining personal information to commit fraud.

According to the Internet Crime Complaint Center, current Internet schemes include auction fraud, counterfeit cashier's checks, credit card theft/fraud, debt elimination or debt consolidation schemes, fake or illegal employment/business opportunities, internet extortion, investment fraud, phishing, pyramid schemes and spam.

Back To Top

Internet Privacy Issues

Various states have laws regarding privacy on the Internet. For example, Nevada and Minnesota require Internet Service Providers (ISPs) to keep certain customer information private unless the customer has given permission to disclose the information. Furthermore, both states prohibit disclosure of information that personally identifies an Internet user. California requires nonfinancial businesses to disclose to customers the types of personal information that business shares with or sells to a third party for direct marketing purposes or for compensation.

Items that have the potential to violate a user's privacy include cookies (information a Web site puts on the user's hard drive so it can remember something about the user at a later time), spyware (gathers information about the user without the user's knowledge), web bugs (placed on a Web page or in an e-mail message to monitor user behavior) and phishing (email fraud—an email that looks legitimate is sent out to gather personal information from recipients, often passwords to secure accounts).

Back To Top

Identify Theft

Internet CrimeOnline identity theft occurs when a person gains access to someone else's personally identifying information—including their name, social security number or credit card number—and uses that information to commit fraud or other crimes. Although some identity theft can be solved quickly, identity theft can be costly and time-consuming to resolve. Victims may lose their money and may also discover their credit rating is negatively affected by identity theft.

Back To Top

Internet Marketing

Some Internet companies and social media websites have come under fire for their marketing tactics. One example of this is Facebook's Beacon advertising system, which was discontinued in September 2009 as part of a settlement. A class action lawsuit against Facebook and Beacon affiliates—including Blockbuster and Overstock.com—alleged the companies violated a series of laws including the Electronic Communications Privacy Act and the Video Privacy Protection Act.

Beacon was a program in which Facebook users' actions were broadcast back to their friends. For example, if a Facebook user made a purchase at a participating website, that purchase was broadcast to the user's friends. The idea was that this would be a form of "social" advertising because the purchase was basically an endorsement of the product.

Another company that has faced lawsuits is Tagged.com, which the New York Attorney General alleged used illegal marketing to increase its client base.

Back To Top

CAN-SPAM Act

Internet PrivacyThe CAN-SPAM Act (Controlling the Assault of Non-Solicited Pornography and Marketing) regulates the use of commercial email. CAN-SPAM applies to bulk email and all commercial messages, defined as "any electronic mail message the primary purpose of which is the commercial advertisement or promotion of a commercial product or service." Penalties for failing to follow CAN-SPAM include fines of up to $16,000 per email.

Some of the requirements of CAN-SPAM:
  • Do not use false or misleading header information, including the "From," "To," "Reply-To" and routing information
  • Do not use deceptive subject lines
  • Identify the message as an advertisement
  • Tell recipients how to opt out of receiving future email
  • Honor opt-out requests promptly
  • Monitor what others are doing on your behalf (for companies who hire a different company to handle email marketing)
Back To Top

Electronic Communications Privacy Act

The Electronic Communications Privacy Act (ECPA) regulates the access, use, disclosure, interception and privacy protections of electronic communications. Although it was aimed at regulating invasions of privacy by the government, it also regulated the actions of private-sector electronic communications providers. The ECPA prohibits a third party from intercepting or disclosing communications without prior authorization.

The act protects information in transit—that is while it is being communicated—as well as in storage.

Back To Top


INTERNET/TECHNOLOGY ARTICLES AND INTERVIEWS

  • Optimize Financial Management: The Role of Law Firm Billing Software
  • Google Gmail is “Creepy”, says a Non-Gmail User Filing Complaint
  • Google Mail California Claims Expire end of September: File Now, Attorney Urges
MORE NEWS ARTICLES

INTERNET/TECHNOLOGY LAWSUITS

MORE LAWSUITS

FEATURED LAW FIRM

Heskia - Hacmun Law Firm
Heskia - Hacmun Law Firm
Israeli Law Firm located in Tel Aviv, specializing in Litigation, Commercial and Corporate Law, International Transactions, Tax Law, Real Estate and Inheritance and Estate matters.
CONTACT THIS LAWYER


Internet/Technology Legal Help

If you have suffered losses due to internet fraud, please click the link below to send your complaint to a lawyer to evaluate your claim at no cost or obligation.

Updated on

Request Legal Help Now! - Free