NEXT

Jonathan bick

Jonathan bick

May 11, 2006 | Legaltech News

'Dual-Use' Spam Preys on the Charitable

"Dual-use" spammers send out unsolicited, noncommercial e-mails to raise money for charity, which is not regulated by the the Controlling the Assault of Non-Solicited Pornography and Marketing Act. After raising the money, the spammer adds the e-mail addresses of people who donated to his commercial target list.

By Jonathan Bick

8 minute read

December 08, 2003 | New Jersey Law Journal

Exploitation of Trademarks on the Internet

While the Anticybersquatting Consumer Protection Act adequately addresses the legal difficulties associated with bad faith registration of trademarked names by nontrademark holders, e-exploitation of trademarks is still a problem for trademark holders.

By Jonathan Bick

10 minute read

May 10, 2004 | New Jersey Law Journal

A Hole in the CAN-SPAM Act

Contrary to widely held belief, use of proxy servers by bulk e-mailers is not a per-se violation of the CAN-SPAM Act of 2003.

By Jonathan Bick

9 minute read

October 03, 2005 | New Jersey Law Journal

The Internet as Governmental Action

If the Internet is governmentally controlled, then Internet users have a First Amendment right to use the Internet for public speech. For the time being, however, it appears that the courts have failed to find that the government's Internet involvement rises to the level of state action.

By Jonathan Bick

7 minute read

September 20, 2004 | New Jersey Law Journal

Franchise Law Applies to Internet

American companies are using Internet franchises to proffer an assortment of services - from offshore casinos to domestic home loans. Internet franchises face the same legal consequences as traditional franchises.

By Jonathan Bick

8 minute read

November 02, 2007 | New Jersey Law Journal

How Safe Are E-Telephone Calls?

Traditional telephone privacy is strictly sheltered by existing case law and statute, while VoIP is arguably unprotected in many instances.

By Jonathan Bick

6 minute read

June 07, 2004 | New Jersey Law Journal

Authenticating and Enforcing E-signatures

For companies doing business over the Internet, authenticating and enforcing e-signatures is critical.

By Jonathan Bick

8 minute read

June 09, 2004 | Law.com

Authenticating and Enforcing E-Signatures

While the Internet continues to replace traditional forms of commerce communication, the use of contracts to memorialize business agreements remains constant. To fully implement the transition to Internet commerce communications, businesses are struggling to find an appropriate replacement for traditional authentication procedures. Among the goals: Replace traditional signatures with lawful electronic ones. There are currently at least six viable e-signature options.

By Jonathan Bick

8 minute read

August 22, 2008 | Legaltech News

Problems in Policing the Internet

As the Internet and virtual spaces gain breadth and depth in people's everyday lives, lawyers struggle to formulate and implement laws governing their use. But the Net presents special challenges where no entity has the sole authority to draft, implement and enforce regulation.

By Jonathan Bick

10 minute read

February 22, 2008 | New Jersey Law Journal

Monitoring Employee Internet Use

As employee Internet use swells, the employers' obligation to scrutinize employee e-conduct has also increased. The use of monitoring technology helps to minimize employee Internet bad acts. Employers can also adopt, implement and enforce an Internet asset use policy.

By Jonathan Bick

10 minute read