May 11, 2006 | Legaltech News
'Dual-Use' Spam Preys on the Charitable"Dual-use" spammers send out unsolicited, noncommercial e-mails to raise money for charity, which is not regulated by the the Controlling the Assault of Non-Solicited Pornography and Marketing Act. After raising the money, the spammer adds the e-mail addresses of people who donated to his commercial target list.
By Jonathan Bick
8 minute read
December 08, 2003 | New Jersey Law Journal
Exploitation of Trademarks on the InternetWhile the Anticybersquatting Consumer Protection Act adequately addresses the legal difficulties associated with bad faith registration of trademarked names by nontrademark holders, e-exploitation of trademarks is still a problem for trademark holders.
By Jonathan Bick
10 minute read
May 10, 2004 | New Jersey Law Journal
A Hole in the CAN-SPAM ActContrary to widely held belief, use of proxy servers by bulk e-mailers is not a per-se violation of the CAN-SPAM Act of 2003.
By Jonathan Bick
9 minute read
October 03, 2005 | New Jersey Law Journal
The Internet as Governmental ActionIf the Internet is governmentally controlled, then Internet users have a First Amendment right to use the Internet for public speech. For the time being, however, it appears that the courts have failed to find that the government's Internet involvement rises to the level of state action.
By Jonathan Bick
7 minute read
September 20, 2004 | New Jersey Law Journal
Franchise Law Applies to InternetAmerican companies are using Internet franchises to proffer an assortment of services - from offshore casinos to domestic home loans. Internet franchises face the same legal consequences as traditional franchises.
By Jonathan Bick
8 minute read
November 02, 2007 | New Jersey Law Journal
How Safe Are E-Telephone Calls?Traditional telephone privacy is strictly sheltered by existing case law and statute, while VoIP is arguably unprotected in many instances.
By Jonathan Bick
6 minute read
June 07, 2004 | New Jersey Law Journal
Authenticating and Enforcing E-signaturesFor companies doing business over the Internet, authenticating and enforcing e-signatures is critical.
By Jonathan Bick
8 minute read
June 09, 2004 | Law.com
Authenticating and Enforcing E-SignaturesWhile the Internet continues to replace traditional forms of commerce communication, the use of contracts to memorialize business agreements remains constant. To fully implement the transition to Internet commerce communications, businesses are struggling to find an appropriate replacement for traditional authentication procedures. Among the goals: Replace traditional signatures with lawful electronic ones. There are currently at least six viable e-signature options.
By Jonathan Bick
8 minute read
August 22, 2008 | Legaltech News
Problems in Policing the InternetAs the Internet and virtual spaces gain breadth and depth in people's everyday lives, lawyers struggle to formulate and implement laws governing their use. But the Net presents special challenges where no entity has the sole authority to draft, implement and enforce regulation.
By Jonathan Bick
10 minute read
February 22, 2008 | New Jersey Law Journal
Monitoring Employee Internet UseAs employee Internet use swells, the employers' obligation to scrutinize employee e-conduct has also increased. The use of monitoring technology helps to minimize employee Internet bad acts. Employers can also adopt, implement and enforce an Internet asset use policy.
By Jonathan Bick
10 minute read