Internet Business Law Services (IBLS)
16320 Bake Parkway, Suite 100, Irvine, CA 92618 US
Phone: 9497560906 Website: www.ibls.com
123 articles found for Online Security

Article Search Results

From the News Portal
Title/Abstract
Data Protection and Security in the European Union
Peter J. Hustinx, European Data Protection Supervisor
...
Phishing
Taken from Onguard Online
...
LINKdotNET Helping to Make Cyberspace Safe for Surfers
Taken from www.Link.net
...
Computer and Data Security Breaches
Martha L. Arias, IBLS Director
Due to the predominance of Internet transactions computer and data security is becoming a busy area of law. Many are the parties interested ...
Internet Voting becomes a Reality in Estonia; Global Experts Question Online Security and Inclusiveness
Editor, Maricelle Ruiz, IBLS Director – Europe
Despite global warnings on e-voting systems, some 18,000 registered Estonians dared to vote online last Sunday, during the first national Internet election in the ...
Cooperation Agreement between Europol and Croatia signed in Vienna
Europol
...
The EU spends millions to boost its classified telecom network
Editor, Maricelle Ruiz, IBLS Director -- Europe
The European Union is spending more than 200 million euros to protect its confidential communication network against hackers and use this critical tool to ...
Safer Internet Day 2006: EU stresses commitment to safer use of the Internet
European Union
...
Research And Technology: An Imperative For European Defence
JAVIER SOLANA, EU High Representative for the Common Foreign and Security Policy, Head of the European Defence Agency
...
Online social networks may pose risks for the youth
Martha L. Arias, LL.B., J.D., LL.M.
It was wide-spread news last month, a United States 16-year-old girl met a Middle East 20-year-old man in MySpace.com, a United States (US) top ...
Security & Privacy- Made Simpler: New Tool by the BBB to Help Small Companies Protect Private Information.
Martha L. Arias, IBLS Director.
The United States (U.S.) Better Business Bureau (BBB) has published a comprehensive guide to help small and middle size companies on the enormous job ...
Annual Worldwide Security Conference To Take Place In Brussels
World Customs Organization
...
ENISA Quarterly
European Network and Information Security Agency
...
E-Banking Booklet: E-banking Risks
www.ffiec.gov
...
The availability principle: EDPS wants the exchange of police information to be introduced more cautiously
European Data Protection Supervisor
...
India: Background Paper on Cyber Security - Education and Awareness
India Department of Information Technology
...
Working Party on Information Security and Privacy
Organization for Economic Co-operation and Development- OECD
...
Radio-Frequency Identification (RFID): Drivers, Challenges and Public Policy Considerations
Organization for Economic Co-operation and Development- OECD
...
Advance-Fee Credit Card’ Swindlers Settle FTC Charges
Federal Trade Commission
...
Cyber Sleuths Call For New 'Smart Swarms'
Internet News.com (Tim Scannell)
...
Identity Theft topped the FTC complaints during 2005
Martha L. Arias, LL.B., J.D., LL.M.
Accounting for 225.000 cases (37%) out of 686.000 complaints filed with the Federal Trade Commission (FTC) during the year 2005, according to the agency ...
World Cup triggers Internet security threats; Checklist issued to protect companies from legal liability
Editor, Maricelle Ruiz, IBLS Director -- Europe
The 2006 FIFA World Cup Germany brings to the forefront more than superb football champions. It creates Internet security problems for worldwide companies, where ...
Data Protection Law in Philippines’ Business Process Outsourcing Industry
Martha L. Arias, IBLS Director.
Offshore Business Process Outsourcing (“BPO”) is a growing industry in Eastern Europe and Asia countries. Typical BPO include customer and support call centers, ...
Continuing Data Loss Debacle Creates UK Government IT Circus
Kelly O'Connell, IBLS Editor
In a seeming unending series of lost data blunders creating the distinct impression of British Government technological incompetence, analysts are now debating methods to ...
NATO Agrees to Create Cyber Defence Management Authority
IBLS Editor
The North Atlantic Treaty Organisation has finally gotten around to finalizing plans for fighting cyber-attacks against its members. It has committed to creating a ...
Identifying Malicious Software
IBLS Editorial Staff
Malicious software is one of the greatest threats to Internet security. Spyware, also known as adware, creates pop-up ads and may be deposited on ...
Government’s Internet and Computer Network Connections v. Temporary Restraining Orders to Disconnect

Government and private entities rely on technological systems to conduct their day-to-day dealings, and they are bound to secure these systems to protect confidential ...
Bosnia & Herzegovina Protection of Personal Data
IBLS Editorial Department
Concerns about cybercrime and identity theft lead to the enactment of Bosnia and Herzegovina Law on the Protection of Personal Data 2006, which intends ...
Damages and Losses Under the Computer Fraud and Abuse Act
IBLS Editor
The United States (“US”) Computer Fraud and Abuse Act (“CFAA’), 18 U.S.C. Sec 1030 et. seq., is the US federal statutory law typifying illegal ...
The FTC’s Website Privacy and Security Rules for Every Business
IBLS Contributor: Mark F. Foley, Partner, Foley & Lardner LLP
The Federal Trade Commission ("FTC”) has authority under the Federal Trade Commission Act to bring enforcement actions to stop “unfair and deceptive acts ...
New Boeing 787 Dreamliner May Be Vulnerable to a Cyber-Hjacking
Kelly O'Connell, IBLS Editor
Completing the greatest year in the history of aviation marketing with sales of over 800 units, upon the development of its new gas-efficient airplane ...
Internet Disclosure of Civil Court Records: State Public Records Laws v. Privacy?
Martha L. Arias, IBLS Director
Very simple; defrauders, including businesses, can easily, and at no cost, use Internet published civil court records to supply their 'data collection.' ...
Study Reveals Large Holes in NYC Retailer Wireless Security
Kelly O'Connell, IBLS Editor
The recent National Retail Federation trade show in New York City had a surprise that shocked many small business owners when WLAN wireless defense ...
Beware Chatters: Net-Crooks Have Your Number
Kelly O'Connell, IBLS Editor
Next time you are relaxing with a cup of java and Internet messaging a friend, beware that cyber-crooks could be using your spontaneous recreation ...
online security, online churches, Internet attacks, hacking, scientologists, Youtube video, church web sites, denial of service attack, website attack, blocking websites
Kelly O'Connell, IBLS Editor
In a war rivaling the plot-line of science fiction writer and founder L. Ron Hubbard's novel Battlestar Earth, Scientologists are bracing for an assault ...
IRS Warns of Tax Rebate Phishing Scam
Kelly O'Connell, IBLS Editor
The Internal Revenue Service is warning taxpayers that a clever new email and phone scam has been hatched to defraud those looking for the ...
The Impact of Network Security Flaws in Public Companies
Martha L. Arias, Immigration & Internet Law Attorney, Miami; IBLS Director
A network security flaw is an extremely complex issue for any company nowadays; particularly, for public companies. Network security flaws may compromise not only ...
Is your Yahoo ID a Means of Identification under the Identity Theft Statute?
Martha L. Arias, Immigration & Internet Law Attorney; IBLS Director
In September 2008, we heard the news and reported it here in www.IBLS.com, that a person, without authorization, gained access to Sara Palin's Yahoo ...
 
From the Digital Library
Title/Abstract
U.K. STATUTE REGULATING CHILDREN'S WEBSITE MODERATORS
IBLS Editorial Board - Staff Attorney
From October 12, 2009, pursuant to a commencement order expanding Schedule 4 of the Safeguarding Vulnerable Groups Act 2006, organizations with interactive Web sites ...
ACCESSING FORMER EMPLOYER'S E-MAIL MAY VIOLATE THE U.S. STORED COMMUNICATIONS ACT
IBLS Editorial Board - Staff Attorney
A United States federal district court held that intentionally accessing personal e-mails belonging to others may constitute a violation of the Stored Communications Act ...
Court Upholds Validity of a Union's Resolution Requiring Campaign Websites to Have Password-Protection
IBLS Editorial Board - Staff Attorney
The Unites States District Court for the District of Columbia upheld a union resolution requiring a union local’s election Website to be password-protected. The ...
COMPUTER PASSWORDS AND FIFTH AMENDMENT PLEADINGS
IBLS Editorial Board - Staff Attorney
The U.S. District Court for the District of Vermont held that a criminal suspect has a Fifth Amendment right not to disclose a computer ...
New Jersey State’s Constitutional Right to Privacy for Internet Users
IBLS Editorial Board - Staff Attorney
The Supreme Court of New Jersey has recognized an Internet user’s right to privacy as a basis for suppressing evidence in court. ...
ALASKA CRIME OF UNAUTHORIZED EMAIL ACCESS & APPLICABLE LAW
IBLS Editorial Board - Staff Attorney
On September 17, 2008, an email account used by US vice presidential candidate Sarah Palin was breached by a hacker. The contents of her ...
APPLYING THE WIRETAP ACT TO E-MAIL HACKING
IBLS Editorial Board - Staff Attorney
A number of recent court decisions have addressed the issue of whether the hacking or stealing of e-mails violates the Federal Wiretap Act, reaching ...
FEDERAL ANTI-HACKING LAW DOES NOT PROHIBIT VERBAL DISCLOSURE OF COMPUTER SECURITY FLAWS
IBLS Editorial Board - Staff Attorney
The U.S. District Court in Massachusetts recognized the right of several MIT student hackers to publicly expose flaws in the ticketing methods of the ...
SUPREME COURT OF ILLINOIS THWARTS ATTEMPTS OF A DATA MINING COMPANY TO COLLECT INFORMATION ABOUT ATTORNEYS
IBLS Editorial Board - Staff Attorney
The Supreme Court of Illinois issued an order on July 15, 2008, denying Avvo Inc., a for-profit organization, which provides a directory of lawyers ...
WASHINGTON STATE’S ANTI-SPYWARE LEGISLATION AND CASE LAW
IBLS Editorial Board - Staff Attorney
Washington State enacted a Computer Spyware Act (the “Act”) in 2005 with the intention of preventing the installation and use of unauthorized spyware software ...
ETHICAL CHALLENGES POSED BY THE TRANSMISSION OF METADATA
IBLS Editorial Board - Staff Attorney
Several U.S. attorney disciplinary bodies have issued opinions on the dangers of counsel’s inadvertently transmitting attorney-client confidences within metadata embedded within electronic documents, and ...
BROWSER HIJACKING AS A DEFENSE IN LEGAL PROCEEDINGS
IBLS Editorial Board - Staff Attorney
A number of criminal cases have been tried in the past, where those accused of viewing illicit Websites, such as those containing child pornography, ...
STOCK OPTIONS BACKDATING BY TECHNOLOGY COMPANIES
IBLS Editorial Board - Staff Attorney
Backdating stock options is not illegal per se, and is actually a common practice in online and tech companies. However, it is illegal not ...
PERSONAL DATA PROTECTION ACT 2000 OF THE CZECH REPUBLIC
IBLS Editorial Board - Staff Attorney
The Czech Personal Data Protection Act 2000 (the “Act”) is designed to protect personal data that is processed by state authorities, territorial self-administration bodies, ...
Personal Data Protection In Finland
IBLS Editorial Board - Staff Attorney
A survey conducted by the European Working Committee showed that a great number of Finland's residents over 15 years of age and six out ...
Data Protection Laws In Slovenia
IBLS Editorial Board - Staff Attorney
The Constitution of Slovenia guarantees protection of personal data and Slovenia legislature has enacted comprehensive laws in the area of data protection, which accords ...
NEW CHANGES TO FEDERAL RULES OF CIVIL PROCEDURE FOR ELECTRONIC DISCOVERY 2008
IBLS Editorial Board - Staff Attorney
The US Congress amended the Federal Rules of Civil Procedure (FRCP) on December 1, 2006, to adapt discovery rules to the proliferation of electronic ...
CALIFORNIA DATA BREACH NOTIFICATION LAW NOW COVERS MEDICAL INFORMATION
IBLS Editorial Board - Staff Attorney
California’s security breach notification law, or S.B. 1386, went into effect on July 1, 2003. It states that any California business that maintains computerized ...
ENCRYPTION LAW IN ISRAEL
IBLS Editorial Board - Staff Attorney
Encryption is an important issue in Israel because of security concerns and the need to keep communications private, especially bearing in mind Israel's many ...
THE UNITED STATES POSTAL SERVICE AND INTERNET FRAUD
IBLS Editorial Board - Staff Attorney
The Untied States Postal Inspection Service (USPIS) is the law enforcement agency assigned with the task of protecting U.S. mail and U.S. postal facilities. ...
CALIFORNIA’S FRAMEWORK TO COMBAT INTERNET INVESTMENT FRAUD
IBLS Editorial Board - Staff Attorney
California has taken a progressive stance in preventing and prosecuting Internet investment fraud. California state authorities have worked with other states through the ...
FIGHTING COMPUTER CRIME IN SINGAPORE
IBLS Editorial Board - Staff Attorney
The Government of Singapore has devoted significant effort to combating computer crime. It passed legislation in 1993 and periodically amends this legislation as ...
PROSECUTION OF CYBER STALKING IN NEW JERSEY
IBLS Editorial Board - Staff Attorney
New Jersey uses its general anti-stalking statutes and sex offender statutes to prosecute and prevent cyber stalking. This article will answer the following questions: ...
UK CYBERSTALKING: PROTECTION FROM HARASSMENT ACT 1997 & THE FELICTY JANE LOWDE PROSECUTION
IBLS Editorial Board - Staff Attorney
A recent British court case has highlighted the importance of the U.K. Protection from Harassment Act of 1997, in a situation involving two bloggers. ...
MAURITIUS COMPUTER MISUSE AND CYBERCRIME ACT 2003
IBLS Editorial Board - Staff Attorney
Mauritius is an island located in the Atlantic, near Southern Africa, in the Indian Ocean, east of Madagascar. It was first explored by Portuguese ...
THAI COMPUTER RELATED OFFENSES ACT OF 2007
IBLS Editorial Board - Staff Attorney
A much-needed computer crimes law was passed in Thailand, in 2007. The results have baffled Internet freedom advocacy groups, with one labeling it “incomprehensible. ...
U.K. FRAUD ACT 2007 BATTLES PHISHING
IBLS Editorial Board - Staff Attorney
Acts of U.K. online fraud are now at epidemic levels, rising by 40% in 2006. The U.K., in trying to get its arms around ...
TOUGH NEW GERMAN ANTI—HACKING LAW THREATENS 10 YEARS IN PRISON
IBLS Editorial Board - Staff Attorney
Hackers in Germany should be very careful to cover their tracks after the Bundestag passed a law in May 2007 that makes such computer ...
INTERNET UNDER ATTACK BY ZOMBIE COMPUTERS
IBLS Editorial Board - Staff Attorney
Innocent PC users may have unknowingly contributed to massive attacks by hackers on the root servers of the Internet many times. It is believed ...
PRECAUTIONS TAKEN BY E-BUSINESSES AND OTHER COMPANIES TO AVOID IDENTITY THEFT
IBLS Editorial Board - Staff Attorney
While not all identity theft crimes can be prevented, much harm can be avoided if users and companies holding private data take appropriate steps ...
IN THE UINTED STATES INTERNET CRIMES WILL NOT REMAIN UNREPORTED ANYMORE
IBLS Editorial Board - Staff Attorney
According to the United States Federal Bureau of Investigation (FBI), the vast majority of cyber crimes are not reported, which allows the perpetrators to ...
419 SCAM:A NEW WAY FOR IDENTITY THEFT
IBLS Editorial Board - Staff Attorney
The 419 scam or the 'Nigerian Advance Fee' fraud is a fraudulent e-mail scam which takes the form of e-mail messages that generally claim ...
E-MAIL BOMBING AND LOGIC BOMBING
IBLS Editorial Board - Staff Attorney
E-mail bombing and logic bombing are among the latest trends in cyber crime. The term E-mail bombing refers to sending a large amount of ...
“HEY, THAT’S MY NAME!!” HOW TO FIGHT FOR YOUR INTELLECTUAL PROPERTY RIGHTS AGAINST CYBERSQUATTERS
IBLS Editorial Board - Staff Attorney
Recognizing the Internet is an irreplaceable cornerstone of any country’s modern economy, legislators are increasingly passing laws to reinforce the rights of owners of ...
THE STATE OF GLOBAL CYBERSQUATTING IN 2007
IBLS Editorial Board - Staff Attorney
The World Intellectual Property Organization (WIPO) reports Internet cybersquatting is exploding globally, up 25% in 2006 over the previous year, as even software colossus ...
THE CHILD EXPLOITATION SECTION OF UNITED STATES IMMIGRATION AND CUSTOMS ENFORCEMENT IS RESOLUTE TO APPREHEND INTERNET CHILD PORNOGRAPHERS
IBLS Editorial Board - Staff Attorney
The United States Immigration and Customs Enforcement’s (ICE) Cyber Crimes Center has achieved vast success in identifying and apprehending Internet child pornographers over the ...
INTERNET IDENTITY THEFT LAWS: INTERNET USERS DETERMINED TO HANDCUFF IDENTITY THIEVES
IBLS Editorial Board - Staff Attorney
The Internet provides new ways for criminals to steal users’ personal information and to commit fraud. This has made people hesitate to purchase ...
IDENTITY THEFT OVER THE INTERNET AND AUSTRALIAN LEGISLATIONS
IBLS Editorial Board - Staff Attorney
In order to protect individuals’ personal information from unnecessary intrusion or misuse, many countries have enacted data protection laws. In Australia, there is the ...
IDENTIFYING SPYWARE AND MALWARE
IBLS Editorial Board - Staff Attorney
Malicious software is one of the greatest threats to Internet security. Spyware, also known as adware, creates pop-up ads and may be deposited ...
ETHICAL HACKERS IN THE UNITED STATES
IBLS Editorial Board - Staff Attorney
Businesses and governments want to utilize the Internet for electronic commerce, advertising, and other similar means of communication, but today computer security is a ...
Cyber Stalking
IBLS Editorial Board - Staff Attorney
In the United States, most stalking laws require the wrongdoer to become a threat to the victim or to the victim's family members. The ...
Amnesty Launches Campaign To Pressure Companies To Respect Internet Freedom
IBLS Editorial Board - Staff Attorney
A major human rights organization based in London has launched a worldwide campaign to compel governments and technology companies to respect Internet freedom. Amnesty ...
Europe Roots Out Cyberstalking
IBLS Editorial Board - Staff Attorney
As Internet users increase in Europe, the prevalence of cyberstalking is escalating as well. Law enforcement and company executives are taking no chances and ...
Smart Card: The Council Of The European Union Dictates The First Rules
IBLS Charter Partner - Staff Attorney
Smart Cards may be found everywhere today. From automated parking lots and Laundromats to tourism and health care. They can hold vast amounts of ...
The Security Policy Document Under The Italy New Privacy Code
IBLS Charter Partner - Staff Attorney
The new Privacy Code has given rise to some uncertainties with respect to the Security Policy Document (DPS) that Data Controllers are required to ...
Real Name Based Internet Election Campaign
IBLS Charter Partner - Staff Attorney
On March 22, 2004, the Korean National Assembly passed the Public Election and Election Unjustness Prevention Act (“Election Act” or EA) in light of ...
Digital Signature In Argentina
IBLS Charter Partner - Staff Attorney
Regulatory Decree 2028/02 constitutes the regulatory framework of Digital Signatures in Argentina. We will briefly present the main aspects of this law, and the ...
How to Prevent Software Piracy?
IBLS Editorial Board - Staff Attorney
Copyright infringement of software, also called “software piracy” by those seeking to prevent it, is one of the main threats faced by software companies, ...
INTERNET STANDARD SPECIFICATIONS
IBLS Editorial Board - Staff Attorney
The use of Internet Societies globally has provided a source of leadership to issues that have involved the Internet. The Requests for Comments ...
Internet Engineering Steering Group (iesg)
IBLS Editorial Board - Staff Attorney
The use of Internet Societies globally has provided a source of leadership to issues that have involved the Internet. The Internet Engineering Steering ...
Internet Research Task Force (irtf)
IBLS Editorial Board - Staff Attorney
The use of Internet Societies globally has provided a source of leadership to issues that have involved the Internet. The Internet Research Task ...
Internet Society Code Of Conduct
IBLS Editorial Board - Staff Attorney
The use of Internet has determined that certain rules or conduct should be followed. Specifically the Internet Society has drafted their own code ...
Use Of Pseudorandom Number Generators
IBLS Editorial Board - Staff Attorney
The use of encryption has become to play a greater role in the transit of commercial goods. However, the use of pseudorandom number ...
The Diminishment Of Personal Privacy By The Removal Of Checks On Government Intelligence
IBLS Editorial Board - Staff Attorney
The USA Patriot Bill once it was introduced was a heavily debated piece of legislation. The legislation has not been proposed with modifications ...
Maintaining Computer Records (united Kingdom)
IBLS Editorial Board - Staff Attorney
There needs to be some guidance for small and medium sized enterprises (SMEs) in the UK when they begin trading on the Internet for ...
Electronic Fund Transfer Act
IBLS Editorial Board - Staff Attorney
The use of electronic banking poses many potential concerns with privacy, online theft and identity theft. The use of these processes may hold ...
The Use Of Electronic Banking
IBLS Editorial Board - Staff Attorney
The use of electronic banking poses many potential concerns with privacy, online theft and identity theft. The use of these processes may hold ...
Electronic Communications Act 2000 (United Kingdom)
IBLS Editorial Board - Staff Attorney
The changing arena of the Internet and the expanding use of telecommunications has prompted legislation to be passed to address different areas of technology ...
Fair Credit Reporting Act
IBLS Editorial Board - Staff Attorney
The online identity theft in chat rooms can hold criminal liability for impersonating another person under either forgery, fraud, or identity theft. ...
Website Privacy Policies Concerns
IBLS Editorial Board - Staff Attorney
Determining what type of materials should be included in a website to inform users of their privacy rights has been one of contention. ...
Identify Theft And Assumption Deterrence Act
IBLS Editorial Board - Staff Attorney
The online identity theft has become more rampant as the use of the Internet has become more widespread. Online identify theft has been ...
Consumer Sentinel’s Identity Theft Data Clearinghouse
IBLS Editorial Board - Staff Attorney
The online identity theft has become more rampant as the use of the Internet has become more widespread. Online identify theft has been ...
Consumer Sentinel
IBLS Editorial Board - Staff Attorney
The Consumer Sentinel has been proposed to deal with Internet fraud and has worked to enhance consumer protection in electronic commerce. Consumer Sentinel ...
Data Matching for Detecting Fraud (United Kingdom)
IBLS Editorial Board - Staff Attorney
The data matching process is used by the HM Customs and Excise in their efforts to solve criminal activities including fraud. ...
Information Commissioner (united Kingdom)
IBLS Editorial Board - Staff Attorney
The Information Commissioner has the role of enforcement of two important pieces of legislation, the Data Protection Act 1998 and the Freedom of Information ...
Review Requests And Licenses Required For The Export Control Policy
IBLS Editorial Board - Staff Attorney
The use of export controls and encryption has become to play a greater role in the transit of commercial goods. The use of ...
Privacy Protection Act Of 1988
IBLS Editorial Board - Staff Attorney
The Privacy Protection Act of 1988 (PPA) limits the right of government agents to search for or seize documents that are related to the ...
Electronic Discovery
IBLS Editorial Board - Staff Attorney
The use of electronic discovery has become more commonly used with the increasing use of computers in businesses and home use. The fact ...
Encryption and Cybercrime
IBLS Editorial Board - Staff Attorney
Encryption can be used as a measure of preventing cybercrimes including planned security breaches but also as a means of protecting intellectual property crimes ...
Trade Secret Dissemination In Cyberspace
IBLS Editorial Board - Staff Attorney
Trade secret cybercrime can occur by the theft of the trade secret by potentially a former employee or by the use of espionage tactics. ...
Business Opportunity Fraud
IBLS Editorial Board - Staff Attorney
Internet Fraud has been increasing on a global basis. The use of fraud in the forms of identify theft, online retail sales, investment ...
Internet Fraud
IBLS Editorial Board - Staff Attorney
Internet Fraud has been increasing on a global basis. The use of fraud in the forms of identify theft, online retail sales, investment ...
Electronic Communications Privacy Act
IBLS Editorial Board - Staff Attorney
The Electronic Communications Privacy Act (ECPA) involves the disclosure of confidential communications or the interception of electronic communications by improper means such as hacking ...
U.S. Economic Espionage Act of 1996
IBLS Editorial Board - Staff Attorney
The criminal liability for the dissemination of trade secrets has become more commonplace as the Internet has been growing at a rapid rate and ...
The Use Of Secure Socket Layer And Its Assistance With Providing Secure Communications
IBLS Editorial Board - Staff Attorney
The use of payment card systems have been used more often in the marketplace of electronic commerce. However, with the use of credit ...
The Use Of Secure Electronic Transmission And Its Assistance With Providing Secure Communications
IBLS Editorial Board - Staff Attorney
The fraudulent use of credit cards in the electronic commerce marketplace has prompted the use of secure protocols to address these problems. Secure ...
The Use Of Payment Card Systems
IBLS Editorial Board - Staff Attorney
The use of payment card systems has been used more often in the marketplace of electronic commerce. However, with the use of credit ...
Digital Money And Its Implications On Electronic Commerce
IBLS Editorial Board - Staff Attorney
Digital money has been used to signify electronic payment mechanisms that will be used to make electronic commerce payments. These electronic payments have ...
Drafting An Adequate Privacy Policy
IBLS Editorial Board - Staff Attorney
Drafting an adequate privacy policy depends on whether the Internet user and potentially an electronic commerce shopper receives adequate information about the information that ...
Pixel Tags And Their Effect On Privacy Issues
IBLS Editorial Board - Staff Attorney
The use of pixel tags have raised privacy concerns. Pixel tags have been compared to the use of cookies, but they are distinct, ...
Australia’s Privacy Law Implications
IBLS Editorial Board - Staff Attorney
Australia’s privacy law affects how companies manage their information systems. The privacy law requires companies to secure personal and sensitive electronic data stored on ...
The Use of Open-Source Software
IBLS Editorial Board - Staff Attorney
Recommendations suggest that governments should require the use of open source software because of substantial benefits, including reduced costs, and that the software they ...
Publication of Decryption Software Violates DMCA
IBLS Editorial Board - Staff Attorney
This article addresses the issue of the application of the Digital Millennium Copyright Act (DMCA) to the publishing of software-decryption information on an Internet ...
CYBERCRIME AND ITS SOCIOLOGICAL ASPECT
IBLS Editorial Board - Staff Attorney
Cybercrime is on the rise on the Internet. Cybercrimes include intellectual property theft, unauthorized network access, fraud, identity fraud, child pornography, denial of service ...
Online Security Concerns Forces Businesses To Develop Secure Technology
IBLS Editorial Board - Staff Attorney
Since the terrorist activities of September 2001, online security concerns have increasing forcing technology to catch up with the Internet’s speed. Spending more ...