Can a generic top-level domain (gTLD) just be considered as part of a web address or should it be considered a source of the domain name registry? Top-level domains (TLDs) are administered by the Internet Assigned Numbers Authority (IANA) for the domain name system we call the internet. One can simply see it as…
Internet Law Lawyers
Our clients’ legal situations require us to litigate on their behalf and to provide and secure forensic screening and tracking, to address the online events that command attention, such as data breach violations “hacking,” cybersquatting, computer abuse, online fraud, defamation, online bullying and harassment, deceptive and unfair trade, invasion of privacy, and false light publication.
Ecommerce Law Lawyers
As we work to bring state, federal and international regulatory requirements to online businesses and their transactions, we provide general counsel services on site documents, B2B contracts, B2C purchase-sell-delivery agreements, intellectual property use agreements, affiliate marketing agreements, and site development and maintenance agreements. We litigate against deceptive practices, fraudulent marketing, breach of franchise sales and marketing agreements, and against interferences with business relations.
Intellectual Property Lawyers
We address and litigate on behalf of our clients’ online intellectual property concerns, i.e., online trademark infringement; online copyright infringement; trade secrets misappropriate; breach of confidentiality agreements – nondisclosure agreements; cybersquatting, domain name infringements, reverse domain name hijacking and brand infringement.
As “Cyber Lawyers” our counsel and representation is the umbrella over internet operational events, ecommerce activities, intellectual property, and regulatory rights and protection issues. We provide counsel on many cyber issues and requirements, i.e., data security, mobile transaction information, records retention, personal data privacy, business trade secrets, artistic and literary rights, before in state, federal, and overseas bodies.
Lorenzo Law Firm, P.A. “LLF”
LLF represents clients on issues pertaining to activities in Cyberspace encompassing the internet, e-commerce, digital media, data security, privacy, intellectual property, social media, digital marketing, cloud processing, terrorism, identity theft, domain names, and confidential personal information. Our clients have been from Central and South America, the United States, and Europe.
As internet law lawyers, we have worked on, to mention several: photo copyright infringement; food grocery ecommerce; online gambling; online auctions; data protection violations; athlete image and branding; website compliance; defamation; breach of contracts; misappropriation of trade secrets; copyright protection; trademark protection; deceptive business practices, computer use abuses, and violations of privacy. We represent photographers, entrepreneurs, artists, musicians, writers, inventors, amateur and professional athletes, website designers, and private individuals. LLF provides businesses with litigation and general counsel services on best practices, policies, contracts, negotiations, litigation, corporate, and intellectual property issues.
Our work takes us before federal and state courts, administrative venues, such as, the U.S. Patent Trademark Office (USPTO), the Trademark Trial Appeal Board (TTAB), the World Intellectual Property Organization (WIPO), the Internet Corporation for Assigned Names and Numbers (ICANN), National Arbitration Forum (NCAF), and the International Trade Commission (ITC).
J.B. Lorenzo, served in key posts, from clerking in the anti-fraud division for the Federal Trade Commission in 1991 through engaging in federal and state government service, as well in the private sector. His work as an internet law lawyer working on cyber issues started as he counseled the Division of Communications of Florida Department of Management Services as it transitioned to become the State Technology Office. He counseled and negotiated the contract for the establishment of the MyFlorida.com Portal, the expansion of Florida’s 800 MHz Law Enforcement Radio system, and served as counsel to the 911 Cell Phone Commission. He advised the Florida Office of Student Financial Assistance’s and the Prepaid College Board’s Internet Portal operations. Many of the integrated issues in his experience involved Digital Media and Internet Regulation, Data Protection, Privacy, Information Technology Management, Copyrights, Trademarks, Trade Secrets, Fair Use Doctrine, Fraud and Identity Theft Prevention, Data Protection, Esignatures, Administrative and Federal Regulatory Law, Government Contracts, and Administrative and Civil Litigation. He has also written on the Extra-Territorial application of Antitrust Laws – a study of determining jurisdiction and has written on the EU Trademark System, and been as well a conference speaker on Privacy and Data Protection requirements under the Federal Trade Commission’s “Red Flags,” and Gramm-Leach-Bliley Acts requirements.
He holds a Ph.D degree from the Josef Korbel School of International Studies, University of Denver, in International Law and has a double major B.A. degree from the American University – School of International Service, Washington, D.C. He was appointed by Governors Jeb Bush and Charlie Crist to serve on the Judicial Nominating Commission for the 2nd Judicial Circuit of Florida, where he served for nine years, including serving as Vice Chair and Chair.
He is admitted before the U.S. Supreme Court, 11th Circuit Court of Appeals, U.S. District Court for the Southern, Middle, and Northern Districts of Florida, Supreme Court of Florida, and the District of Columbia Court of Appeals.
INTERNET LAW & ECOMMERCE NEWS
Company brands struggle against other entities that are not necessarily in their industry, benefiting by their use of a similar if not identical mark from the reputation they have tried to build. This “free-riding” effectively could dilute the reputation of an established trademark. The protection of a trademark’s reputation should be protected even to the…
Intellectual property lawyers are scratching their heads as state courts are struggling with archaic laws on trade secret theft cases. For instance, the New York Supreme Court determined in a trade secret case ruled, resulting in overturning a conviction as it defined ‘tangible’ as not the same as when source code is electronically transferred. The court determined…
The flow of information from internet usage and ‘ Internet of Things’ is easily accompanied with its collection and systemic use for other purposes. Digital profiles are created with every online user’s key stroke, site visited, and key word used. In 2015, the Florida Legislature addressed many aspects of privacy. It addressed systemic data gathering;…
Internet law lawyers see the networks of embedded devices, sought for useful purposes, presenting harm as well as good. The coding inside a control area network (CAN) which is used for syncing information within a vehicle, bus, airplane, or a house, are based on standard codes. Interconnect items could be on same network and using…
Internet Law Lawyer Issues & Notes – Florida Legislature passed HB 175/SB 222 this year to create the “Computer Abuse and Data Recovery Act” (“CADRA”) allowing for civil cause of action for the hacking of business computers. CADRA seeks to fill the gaps between the Florida Computer Crimes Act (“CCA”) in Section 815, F.S. and…
Google has been restricted by the EU high Court from having personal information accessible in its search process. Yet, while information is not available about people on search vehicles provided by Google, the information remains available through traditional sources. The issues debated in Europe are several. One is the right of an individual to not…
Pros – they offer secure storage, sync usernames and passwords, help prevent password reuse with provide password reminders, identify emails used as identifiers, use email confirmation on account changes, and monitor unused IP addresses. Cons- they have an inherent vulnerability of being one place to access information, singular event access point, phishing attempts could have…
Securing insurance coverage for cyber-attack events should address your cyber liability. Considerations should address monitoring, risk assessment to prevent gaps in coverage, lower deductibles with the use of encryption, phishing attacks, negotiating sub limits for potential claims, coverage for legal representation, and forensic analysis. One needs to be aware that claim coverages have set sub…
Internet law lawyers experience the changes in business models daily, from brick-n-mortar constructs to digital information transfers, from a letter or phone call to a “textmail” or “e-mail.” The process has brought a down scaling in what used to be large administrative organizations to efficient self-employed entrepreneurs. The latter is the future and it is…
The Washington Post wants readers to feel safe from monitoring eyes. Intelligence agencies are routinely seeking to monitor readership and their internet access. But when social media sites and newspaper sites exert efforts to protect its readership and users, they thwart governmental agencies monitoring efforts. In order to protect the privacy of readership from surveillance…
In July FCC will vote on auction rules for low band spectrum. Smaller wireless providers seek expansion of the spectrum from 30 megahertz to 40 megahertz. Low band spectrum was reserved to keep larger wireless providers from higher quality spectrum. FCC Commissioner is recommending to not expand the spectrum to 40 MHz as requested by…