California Bar Cyberspace Committee presentation on the essentials of cyberspace law focusing on user generated content, privacy and online advertising. President by Committee Co-Chair Bennet Kelley, Vice Chair Robert Hawn and Committee member Nicole Ozer.
Wikileaks, Hactivism, and Government: An Information WarThomas Jones
Given the exhaustive plethora of information regarding Wikileaks, Anonymous, and the U.S. Government, this is a comparatively superficial overview of the impact of Information Warfare on the Internet and our rights.
My apologies for the somewhat informal research aesthetic.
To understand the significance of the Computer Fraud and Abuse Act, we must consider its history, the use, scope, and function of the Internet at the time of the Act’s inception, and the recurring nature which Congress amended the Act in order to keep up with the advancements of computer and computer-based communications.
We must also consider the evolution of precedence over the course of its history with respect to charges under the Act.
Further, we must address the root cause of the contentious nature of this Act as written, and look to other industry models which can assist in amending the Act according to contemporary use of computers, and the modern Internet.
Privacy & Security of Consumer and Employee Information - Conference MaterialsRachel Hamilton
The ever increasing use of social media by employees in the workforce, privacy violations with online behavioral advertising,and potential privacy and security risks associated with social media sites have prompted federal and state regulators to create stricter enforcement initiatives to protect the privacy of consumer and employee information. The industry is one step closer to a national cyber notification law which will not only pre-empt state notification bills but permanently change how companies and organizations respond to data breaches.
Wikileaks, Hactivism, and Government: An Information WarThomas Jones
Given the exhaustive plethora of information regarding Wikileaks, Anonymous, and the U.S. Government, this is a comparatively superficial overview of the impact of Information Warfare on the Internet and our rights.
My apologies for the somewhat informal research aesthetic.
To understand the significance of the Computer Fraud and Abuse Act, we must consider its history, the use, scope, and function of the Internet at the time of the Act’s inception, and the recurring nature which Congress amended the Act in order to keep up with the advancements of computer and computer-based communications.
We must also consider the evolution of precedence over the course of its history with respect to charges under the Act.
Further, we must address the root cause of the contentious nature of this Act as written, and look to other industry models which can assist in amending the Act according to contemporary use of computers, and the modern Internet.
Privacy & Security of Consumer and Employee Information - Conference MaterialsRachel Hamilton
The ever increasing use of social media by employees in the workforce, privacy violations with online behavioral advertising,and potential privacy and security risks associated with social media sites have prompted federal and state regulators to create stricter enforcement initiatives to protect the privacy of consumer and employee information. The industry is one step closer to a national cyber notification law which will not only pre-empt state notification bills but permanently change how companies and organizations respond to data breaches.
When the World Wide Web Becomes the World Wild Web: PIPA, SOPA, OPEN Act, CIS...Thomas O. Dubuisson
It is not a secret anymore: digital technology is transforming copyright, for better and for worse. Infringement is widespread and this situation needs to change. An attempt has already been made in the past. In 1998, congressional enactment of the “anti-circumventions” provisions of the Digital Millennium Copyright Act (DMCA) was a remarkably forward-looking effort to stop copyright infringers and balancing interests of intellectual property (IP) holders and potential innovators. Since then, the Internet has evolved. The creation of a DMCA II was welcome. Instead of going through this “safe” next step, the United States Congress has embarked on a particularly slippery slope. As a result, bills are so repressive today and they may dictate the way the next technologies are going to operate, in whole or in part. The current reality that laws are incapable of catching the development of new technologies, based on the American comedy-drama film “Catch Me If You Can”, is perhaps not a fiction anymore. But not at any price, especially when it affects the Internet democracy.
In fact, the creation of a global legal framework for intellectual property right protection, particularly for (digital) copyright, needs to meet at least three challenges: the fact that laws change, that laws differ between countries, and that laws are open to interpretation. More precisely, cyberspace “demands a new understanding of how regulation works. It compels us to look beyond the traditional lawyer’s scope – beyond laws, or even norms. It requires a broader account of “regulation”, and most importantly, the regulation of a newly salient regulator.” SOPA and PIPA demonstrate how difficult it is for an established democracy to protect both intellectual property and the fight for the intellectual freedom on the Internet.
This research paper will be devised in five parts. The first part will analyze the legal issues of these controversial bills and more precisely the sections concerning copyright infringement. The second part will address how the OPEN Act might be a respectable middle in comparison to SOPA and PIPA and what are the legal solutions proposed in this bill. The third part briefly concerns the new method to prevent cyber-attacks, through CISPA, with its impact on intellectual property rights. The fourth part will discuss the recent developments in Europe with ACTA, namely the issues concerning the European ratification and the future of ACTA in the world. Finally, the fifth part will be devoted to the online and offline Internet revolution/Internet blackout that occurred in January and February 2012.
The Communications Decency Act with Maria Crimi SpethJaburgWilk
Phoenix business law firm Jaburg Wilk Intellectual Property attorney and author of Protect Your Writing's Maria Crimi Speth presents on The Communications Decency Act.
PELTON PowerPoint: ABA Cyberspace Institute 2011-01-28erikpelton
"Trademark Strategies for 2012" Presentation to the American Bar Association's Cyberspace Institute in Austin Texas on January 28, 2011. The presentation explores recent changes to the practice of trademark law, and what the future might hold for trademark owners and attorneys who advise them.
Federal Computer Fraud and Abuse Act & Texas Computer Hacking StatutesShawn Tuma
Federal Computer Fraud and Abuse Act & Texas Computer Hacking Statutes is a presentation that Shawn Tuma delivered to the Intellectual Property Section Track at the State Bar of Texas Annual Meeting in Fort Worth, Texas on June 17, 2016. This presentation focused on the practical "how to" for practitioners to use the Computer Fraud and Abuse Act (CFAA) and the Texas Breach of Computer Security (BCS) and Harmful Access by Computers Act (HACA) statutes to combat privileged-user / insider misuse as well as outsider threats.
Managing the Legal Concerns of Cloud ComputingAmy Larrimore
Presented at the 2013 Pennsylvania Bar Institute as an edition in an annual series on legal concerns around cloud computing ,. This one covers how technology overlaps and where the risk needs to be managed in between systems.
When the World Wide Web Becomes the World Wild Web: PIPA, SOPA, OPEN Act, CIS...Thomas O. Dubuisson
It is not a secret anymore: digital technology is transforming copyright, for better and for worse. Infringement is widespread and this situation needs to change. An attempt has already been made in the past. In 1998, congressional enactment of the “anti-circumventions” provisions of the Digital Millennium Copyright Act (DMCA) was a remarkably forward-looking effort to stop copyright infringers and balancing interests of intellectual property (IP) holders and potential innovators. Since then, the Internet has evolved. The creation of a DMCA II was welcome. Instead of going through this “safe” next step, the United States Congress has embarked on a particularly slippery slope. As a result, bills are so repressive today and they may dictate the way the next technologies are going to operate, in whole or in part. The current reality that laws are incapable of catching the development of new technologies, based on the American comedy-drama film “Catch Me If You Can”, is perhaps not a fiction anymore. But not at any price, especially when it affects the Internet democracy.
In fact, the creation of a global legal framework for intellectual property right protection, particularly for (digital) copyright, needs to meet at least three challenges: the fact that laws change, that laws differ between countries, and that laws are open to interpretation. More precisely, cyberspace “demands a new understanding of how regulation works. It compels us to look beyond the traditional lawyer’s scope – beyond laws, or even norms. It requires a broader account of “regulation”, and most importantly, the regulation of a newly salient regulator.” SOPA and PIPA demonstrate how difficult it is for an established democracy to protect both intellectual property and the fight for the intellectual freedom on the Internet.
This research paper will be devised in five parts. The first part will analyze the legal issues of these controversial bills and more precisely the sections concerning copyright infringement. The second part will address how the OPEN Act might be a respectable middle in comparison to SOPA and PIPA and what are the legal solutions proposed in this bill. The third part briefly concerns the new method to prevent cyber-attacks, through CISPA, with its impact on intellectual property rights. The fourth part will discuss the recent developments in Europe with ACTA, namely the issues concerning the European ratification and the future of ACTA in the world. Finally, the fifth part will be devoted to the online and offline Internet revolution/Internet blackout that occurred in January and February 2012.
The Communications Decency Act with Maria Crimi SpethJaburgWilk
Phoenix business law firm Jaburg Wilk Intellectual Property attorney and author of Protect Your Writing's Maria Crimi Speth presents on The Communications Decency Act.
PELTON PowerPoint: ABA Cyberspace Institute 2011-01-28erikpelton
"Trademark Strategies for 2012" Presentation to the American Bar Association's Cyberspace Institute in Austin Texas on January 28, 2011. The presentation explores recent changes to the practice of trademark law, and what the future might hold for trademark owners and attorneys who advise them.
Federal Computer Fraud and Abuse Act & Texas Computer Hacking StatutesShawn Tuma
Federal Computer Fraud and Abuse Act & Texas Computer Hacking Statutes is a presentation that Shawn Tuma delivered to the Intellectual Property Section Track at the State Bar of Texas Annual Meeting in Fort Worth, Texas on June 17, 2016. This presentation focused on the practical "how to" for practitioners to use the Computer Fraud and Abuse Act (CFAA) and the Texas Breach of Computer Security (BCS) and Harmful Access by Computers Act (HACA) statutes to combat privileged-user / insider misuse as well as outsider threats.
Managing the Legal Concerns of Cloud ComputingAmy Larrimore
Presented at the 2013 Pennsylvania Bar Institute as an edition in an annual series on legal concerns around cloud computing ,. This one covers how technology overlaps and where the risk needs to be managed in between systems.
A CLE presentation at the New York County Lawyer Association by Monique Altheim, Esq. with Joseph Bambara, followed by a panel discussion with Hon. James C. Francis, U.S. Magistrate Judge, Southern District of New York.
Frequently Asked Questions on the judgment of the Court
of Justice of the European Union in Case C-311/18 - Data
Protection Commissioner v Facebook Ireland Ltd and
Maximillian Schrems
A 53-count third-superseding indictment (the “Indictment”) was unsealed today in federal court in Brooklyn charging sports marketing executives Hernan Lopez and Carlos Martinez, formerly of 21st Century Fox, Inc. (“Fox”); Gerard Romy, former co-CEO of Spanish media company Imagina Media Audiovisual SL (“Imagina”); and Uruguayan sports marketing company Full Play Group S.A. (“Full Play”) (collectively, the “New Defendants”) with wire fraud, money laundering and related offenses – including, as to Romy and Full Play, racketeering conspiracy – in connection with the government’s long-running investigation and prosecution of corruption in organized soccer.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Essentials Of Cyberspace Law Cal Bar Cyberspace Commt
1. Business Law Essentials Series
Essentials of Cyberspace Law
User Generated Content, Privacy, and Advertising
California Bar Cyberspace Committee
January 27, 2010
2. A Presentation of the Cyberspace Law Committee
Essentials of Business Law Series
January 27, 2010
5. Enforceability
Best Practices
Notice is Key
Require Consent
“I agree” buttons
Required scrolling
Does Use Indicate Consent?
6. Enforceability
Specht v. Netscape Communications Corp., 306 F.3d 17 (2d Cir.
2002) (lack of notice vitiates consent)
Register.com Inc. v. Verio Inc. 126 F.Supp.2d 238 (S.D.N.Y. 2000),
aff’d 356 F.3d 393 (2nd Cir. 2004) (post-download notice on
(post-
repeated downloads constitutes notice)
Southwest Airlines Co. v. BoardFirst LLC (N.D. Tex 2007) (home
page legend provides sufficient notice for binding contract)
Ticketmaster LLC v. RMG Techs. Inc. (C.D. Cal. 2007) (in
preliminary injunction matter, terms of use enforceable where court
believed that defendants would be shown to have been notified of
and assented to terms)
7. Modification
Douglas v. U.S. District Court for the Central District of
California 495 F.3d 1062 (9th Cir. 2007) (customer was
not bound to revised contract terms because the
customer had not received notice of, or assented to, the
changes)
Harris v. Blockbuster Inc. 622 F. Supp. 2d 396 (N.D. Tex
2009) (unlimited unilateral ability to modify or terminate
renders contract illusory, citing Morrison v. Amway Corp.
517 F.3d 248 (5th Cir. 2008) and distinguishing In re
Halliburton 80 S.W.3d 566 (Tex. 2002)
8. Modification
Notice is Key
Best Practices
Establish Modification Right Initially and Clearly
Highlight all Material Changes
Collect and Retain Evidence of Assent
Create An Opportunity for Rejections
Use Common Sense
9. Provisions
Contract Language
Situational
General
Entire Agreement
Privacy Policies
(A.V. v. iParadigms 544F.Supp.2d 473 (E.D. Va. 2008)(browse wrap terms unenforceable
when not incorporated into click through license)
Modification Process
Social Networking Specific Provisions
Copyright Infringement Notices (DMCA)
Content Limitations
Redistribution Rights
Indemnification
Right to Remove Posting and Terminate Account
10. ALI Principles
ALI Principles of the Law of Software Contracts,
May 19, 2009
Modification requires consents after notice of the
modification and termination requires reasonable
notice
Disclaimable implied IP infringement
indemnification obligation
Nondisclaimable warranty of no hidden material
defects
11.
12. ECPA and the Impact of
Outdated Privacy Law
Essentials of Cyberspace Law
January 27, 2010
Nicole A. Ozer
Technology and Civil Liberties
Policy Director
ACLU of Northern California
www.aclunc.org/tech
nozer@aclunc.org
13. The 4th Amendment clearly
protects your data…
• At home or on a device in your possession
– Judicial search warrant (probable cause)
– Notice at time of search
• BUT much weaker if in another’s hands
– Couch (accountant)
– Miller (bank)
– Smith (telephone company)
14. Congress tried in ECPA (1986)
For the person or business whose records are
involved, the privacy or proprietary interest in that
information should not change. Nevertheless,
because it is subject to control by a third party
computer operator, the information may be
subject to no constitutional privacy protection .
Thus, the information may be open to possible
wrongful use and public disclosure by law
enforcement authorities as well as unauthorized
private parties.
- Senate Judiciary Committee (1986)
15. Federal communications
privacy laws
• Wiretap Act or “Title III” (part of ECPA)
– interception = getting content of communications in real
time (in transit)
• Pen register and trap-and-trace statute
– addressing data of communications in real time
• Stored Communications Act (SCA) (also ECPA)
– access to stored communications, records of
communications, subscriber data
16. Always complex
and getting worse
• “famous (if not infamous) for its lack of clarity”
– Steve Jackson Games v. U.S. Secret Service
(5th Cir. 1994)
• “fraught with trip wires”
– Forsyth v. Barr (5th Cir. 1994)
• “a fog of inclusions and exclusions”
– Briggs v. American Air Filter (5th Cir. 1980)
17. Just a few things have changed
since 1986:
Cloud computing
2006: Google docs launched
Rise of social networking
2004: Facebook launched
Internet search
1998: Google founded
1994: Yahoo & Amazon founded
The beginning of everything
1990: World Wide Web created
Cell phones … VOiP … Online book search …
18. ECPA challenges today
• It’s confusing and outdated
– ECPA defines service providers in language that does
not make sense in today’s technological world.
– Different levels of protection can apply to the same
piece of communication over it’s lifetime.
– It clearly applies to public providers, like hotmail. But
what about a nonpublic provider like a university?
• New technologies are left behind
– It’s not clear if or how it applies to modern digital
services, like cloud computing, social networking, or
Internet search history.
19. Lifecycle of an email
Unopened < 180 days Warrant
> 180 days
Opened Subpoena
or 2703(d)
with notice
Header info
Subpoena
Basic subscriber or 2703(d)
info (name, address, NO notice req’d
connection records, etc)
20. That’s confusing. And email was
one of the specific technologies
that existed in 1986 and that
ECPA was intended to protect.
What about newer services
that didn’t exist in 1986? How
does ECPA protect them?
31. Initial Interest Confusion
31
Use of another
trademark “in a manner
calculated to capture
initial consumer
attention, even though
no actual sale is finally
completed as a result of
the confusion.”
Brookfield Communications Inc. v. West
Coast Entertainment Corp., 174 F.3d 1036
(9th Cir. 1999).
B Tal
32. Rationale
32
• Improperly Benefits From Goodwill
of Trademark
• False Detour From Information
Super-highway
– Analogy to false detour sign directing
consumers to take wrong exit. “Unable to
locate West Coast, but seeing the Blockbuster
store right by the highway entrance, they may
simply rent there.” Brookfield Communications,
Inc. v. West Coast Entertainment Corp., 174 F.3d
1036, 1062 (9th Cir. 1999).
• Bait and Switch
– “Initial interest confusion can be viewed as a
variation on the practice of ‘bait and switch.’”
3 J. Thomas McCarthy, McCarthy on Trademarks & Unfair
Competition § 23:26 (4th ed. 2003).
34. Counterpoint
34
Not a Detour, Merely a Lane Change
Web surfers are accustomed to false starts
and are unlikely to be dissuaded when they
end up at the wrong site. Chatam Int'l v.
Bodum, Inc., 157 F.Supp.2d 549, 559 (E.D.
PA 2001).
No different than supermarket placing
products.
store brand next to branded products
FragranceNet.com, Inc. v. FragranceX.com,
493 F. Supp. 2d)(E.D.N.Y 2007)
Legally Significant Confusion?
“The [District] court’s refusal to enter the
‘initial interest confusion’ thicket is well
taken given the unlikelihood of ‘legally
significant’ confusion.” Hasbro Inc. v. Clue
Computing, Inc., 232 F.3d 1, 2 (1st Cir.
2000).
36. Cyber Squatting Remedies
36
ICANN’s Uniform Domain Name Dispute
Resolution Policy
Establishes arbitration process for bad
faith domain registration
2329 cases filed in 2008
Only remedy is transfer of domain
Anti-Cyber Squatting Consumer Protection Act
(15 U.S.C. § 1125(d))
Lanham Act remedies for bad faith registration of
domain name
38. Dealing with Gripe Sites
38
Trademark Claims
Absent commercial use
no TM violation or
cyber squatting
Copyright
Fair use defense
Defamation
First Amendment and
SLAPP protection
Third-Party postings
Website immune under
Communications
Decency Act
39. Dealing with Gripe Sites
39
Trademark Claims
Absent commercial use
no TM violation or
cyber squatting
Copyright
Fair use defense
Defamation
First Amendment and
SLAPP protection
Third-Party postings
Website immune under
Communications
Decency Act
41. CAN-SPAM Act of 2003
41
CAN-
CAN-SPAM IS . . . CAN-
CAN-SPAM DOES NOT . . .
anti-
An anti-fraud and disclosure “Can Spam” – except for
statute wireless spam
Applies to an email where Include a “Do Not Email
the “primary purpose” is Registry”
commercial advertisement or
promotion of a product or
service Impose an “ADV” labeling
requirement
Non profits are not exempt
No volume requirement Create a general private right
of action
42. CAN-SPAM Principal Requirements
42
From line must
identify initiator
Subject line must not be deceptive.
Adult Messages must provide notice.
UCE must be
identified
as
“advertisement”
Requires Working Opt-Out
Mechanism for Advertiser Postal Address for Advertiser
43. CAN-SPAM Plaintiffs
43
FTC
State AGs
Internet Access Service
Provider (IASP)
Adversely Effected by
Violation
Cannot be faux-IASP
No Consumer Private
Right of Action
44. Preemption of State Law
44
CAN-
CAN-SPAM PREEMPTS ALL
STATE REGULATION OF EMAIL
EXCEPT STATE LAWS:
Regulating falsity or deception in
email
Not specific to email, including State
trespass, contract, or tort law; or
Other State laws to the extent that
those laws relate to acts of fraud or
computer crime
47. The Offer
47
*
*Earnings Disclaimer - Your level of
success in attaining the results claimed in
our materials depends on the time you
devote to the program, ideas and
techniques mentioned, your finances,
knowledge and various skills.
*By submitting this form you request that
your account be activated and give your
authorization to immediately charge your
credit card $2.98 for access to the Business
Kit for Google. After the 7 day trial you will
be billed $89.90 each month for continued
access to the Business Kit for Google. Your
Business Kit access will continue each
month until revoked by you. You may
cancel at anytime by writing to 230 West
400 South, Suite 100 Salt Lake City, UT
84101 or calling 1-800-497-4988 or
International customers please call 00-1-
646-205-0230
51. FTC Complaint
51
FTC v. Infusion Media, Inc., Civil Action No. 09-CV-01112 (D. Nev. 2009)
52. FTC Advertising Guidelines
52
Advertising Dot Com Comparative Advertising
Disclosures: Information Statement of Policy Regarding
About Online Advertising Comparative Advertising
[PDF]
Deception FTC Policy Statement
Advertising and Marketing on on Deception
the Internet: The Rules of the
Road
Deceptive Pricing FTC Guides
Frequently Asked Advertising Against Deceptive Pricing
Questions: A Guide for Small
Business Dietary Supplements Dietary
Joint FTC/FCC guides on Long Supplements: An Advertising
Distance Advertising [PDF] Guide for Industry
Advertising Substantiation FTC Staff Comment on Draft
FTC Policy Statement Report of the Commission on
Regarding Advertising Dietary Supplement Labels
Substantiation FTC Staff Comment on FDA
Bait Advertising FTC Guides Proposed Rule on Statements
Against Bait Advertising Made for Dietary Supplements
53. FTC Advertising Guidelines (con’t)
53
Endorsements and Testimonials Food Advertising Enforcement
FTC Guide Concerning the Use Policy Statement on Food
of Endorsements and Advertising
Testimonials
Jewelry Guides for the Jewelry,
Precious Metals, and Pewter
Environment FTC Guides for the Industries
Use of Environmental Market
Claims (Green Guides) Unfairness FTC Policy Statement on
Unfairness
Eye-
Eye-Care Surgery FDA/FTC Joint
Letter on PRK Vocational and Distance Education
Schools Guides for Private
FTC Staff Guides on Refractive Vocational and Distance Education
Eye Surgery Schools [PDF]
Use of the Word "Free" FTC Weight-
Weight-Loss Products Red Flag:
Guide Concerning the Use of Bogus Weight Loss Claims Web Site
the Word "Free" Red Flag: Bogus Weight Loss Claims
Brochure
54. About the Internet Law Center
54
The Internet Law Center is dedicated to helping businesses navigate
the evolving legal standards for today’s digital economy, while also
contributing to the development of the policies of tomorrow. The
firm serves a diverse client base that includes startups and public
companies both online and offline across North America and Asia.
The professionals of the Internet Law Center possess years of
practical experience as lawyers and entrepreneurs with internet
companies and have played a leading role in shaping Internet law
and policy. This unprecedented combination of business, legal and
policy experience makes the Internet Law Center uniquely qualified
to provide the professional advice needed to address emerging
issues of internet law in an uncertain economy.
Sign up for the Cyber Report – our award winning newsletter which
was named one of the Top 100 Internet Law Resources. It is also
available on our blog (along with other materials) at
www.ilccyberreport.wordpress.com. .
55. About Bennet Kelley
55
Bennet is one of the nation’s leading Internet attorneys
and founder of the Internet Law Center. He is Co-Chair
of the California Bar Cyberspace Committee and a
frequent speaker on the latest developments in Internet
law at conferences throughout North America. Bennet
also is a regular guest on Webmaster Radio’s “InBoxed”.
Bennet has played a leading role in shaping Internet
law and policy having testified and lobbied on Internet
issues in Washington and Sacramento, winning praise
from a key Congressional committee for his
contributions to federal spyware legislation.
In addition, the Internet Law Center’s newsletter, Cyber
Report, was named one of the top 100 Internet law
resources and recognized by the LA Press Club.
56. 56 Contact
Bennet Kelley
Internet Law Center
100 Wilshire Blvd, Suite 950, Santa Monica, CA 90401
(310) 452-0401
bkelley@internetlawcenter.net
www.internetlawcenter.net
Twitter: InternetLawCent / SlideShare: InternetLawCenter
57. Business Law Essentials Series
Essentials of Cyberspace Law
User Generated Content, Privacy, and Advertising
California Bar Cyberspace Committee
January 27, 2010