This document summarizes key aspects of privacy and marketing law as it relates to email communications. It discusses the origins of anti-spam laws in California and the subsequent passage of the federal CAN-SPAM Act in 2003. The summary outlines major provisions of CAN-SPAM, including its definition of commercial email, labeling and opt-out requirements. It also reviews related FTC regulations and case law addressing issues like designated senders, subject lines and preemption of state anti-spam statutes.
Legal experts and regulators map out the legal minefields of affiliate marketing providing critical updates on advertising and online marketing law plus FTC and state enforcement actions.
Trademark Partners Catherine Holland and Jeff Van Hoosear recently authored "To Tweet or Not to Tweet - Social Media and Intellectual Property Issues" for the Orange County Business Journal.
Presentation on Cyber Harassment at 2009 Georgetown Law Reunion Weekend.
Some of the rantings made in response to his presentation are the work of Vanessa Kachadurian who is a defendant in a cyber harassment suit currently pending in federal court in Fresno. http://kachadurianlit.wordpress.com/
Legal experts and regulators map out the legal minefields of affiliate marketing providing critical updates on advertising and online marketing law plus FTC and state enforcement actions.
Trademark Partners Catherine Holland and Jeff Van Hoosear recently authored "To Tweet or Not to Tweet - Social Media and Intellectual Property Issues" for the Orange County Business Journal.
Presentation on Cyber Harassment at 2009 Georgetown Law Reunion Weekend.
Some of the rantings made in response to his presentation are the work of Vanessa Kachadurian who is a defendant in a cyber harassment suit currently pending in federal court in Fresno. http://kachadurianlit.wordpress.com/
California Bar Cyberspace Committee presentation on the essentials of cyberspace law focusing on user generated content, privacy and online advertising. President by Committee Co-Chair Bennet Kelley, Vice Chair Robert Hawn and Committee member Nicole Ozer.
In the last several years, substantial data breaches or hacker attacks in the U.S. have shown no signs of abating. Neither have the class actions that typically follow in their wake. Bradley Arant discusses litigation trends in data breach class actions. The video will touch on evolving issues in these cases, including recent loosening of consumer standing requirements (in cases after the Supreme Court’s Clapper decision), class certification and other issues raised in the Target litigation. We will also provide an overview of recent settlements of data breach class actions and what they might mean for later cases. The webinar will address several issues pending before the Supreme Court this term that could have significant impact, including whether a statutory violation without other injury confers Article III standing, and the extent to which statistical evidence can be used to justify class certification.
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Shawn Tuma
This presentation was delivered by Shawn E. Tuma, Cybersecurity and Data Privacy Attorney, to the Joint Meeting of ISACA and IIA North Texas on January 12, 2017.
This presentation was significantly updated from past presentations and included a discussion of the groundbreaking New York Department of Financial Services (NYDFS) Cybersecurity Requirements for Financial Services Companies.
The main points of this presentation are:
(1) Cybersecurity events create a crisis situation and should be treated as such;
(2) Cybersecurity incidents are as much legal events as they are IT or Business / Public Relations events;
(3) Companies must have a cybersecurity breach response plan in place and tested, in advance;
(4) While consumer class action data breach litigation is a significant threat to companies and their leadership, it is not as great of a threat as regulatory enforcement by agencies such as the FTC and SEC, or the shareholder derivative claims for officer and director liability; and
(5) The odds are that all company will be breached, but preparation and diligence can help minimize the likelihood that such a breach from being a catastrophic event.
This presentation addresses the role of attorneys as the first responders in leading their clients through cybersecurity and data loss crisis events. The discussion begins by looking at the risk business have of being the victim of a cybersecurity or data loss incident and examining the nature of such incidents and the crisis environment they create. Then, because of this crisis environment, the need for leadership in helping keep the parties calm, rational, and making deliberate, calculated decisions.
The discussion then explains why cybersecurity events are legal events and legal counsel is the natural leader that should fulfill this role and how they can do so. It will then discuss the process legal counsel will take, including assembling the key players in such an event, both internally and externally. It discusses the obligations for responding to such an event, the steps that must be taken, those that must be considered, and certain factors that go into the decision-making process. It briefly addresses the costs of such an incident and the liability issues that can arise from such an incident and failing to properly respond to the incident. This section includes a discussion of the cybersecurity lawsuit landscape, cybersecurity regulatory landscape, and the issue of cybersecurity-related officer and director liability stemming from shareholder derivative lawsuits based on cybersecurity incidents.
It concludes with a discussion of the steps that companies can take to prepare for and be in a better position to respond to and mitigate the negative repercussions of such an incident.
Cybersecurity & Computer Fraud - The ConvergenceShawn Tuma
In this presentation, Cybersecurity & Data Protection attorney Shawn Tuma discusses the convergence of similar legal issues involving cybersecurity and computer fraud, and explains how they are really two sides of the same coin.
This presentation was delivered on April 20, 2016 at the Association of Certified Fraud Examiners Fort Worth Chapter meeting.
1Austin ButlerDr. William Matter Subject Name05 March 20.docxfelicidaddinwoodie
1
Austin Butler
Dr. William Matter
Subject Name
05 March 2018Free The Internet
Since the early nineties the use of the internet has increased substantially due to the increase of media such as video and mp3’s. The ability to share and receive these formats has become so easy due to websites like youtube, spotify, facebook and other social media companies. Thes sites cause a lot of traffic, or large internet activity, by using more bandwidth. ISP’s or Internet Service Providers like Verizon and AT&T sold the right use these activities so there content would only be available through them. Net neutrality is the principle that all content whether it be sites or services should treated equally without any bias based on user activity, content, brand, application or communication. This contentedly forced ISP’s to not make deals with companies to allow a better traffic speed for their content by charging at a higher rate.
After a vote by the FCC, Federal Communications Commission, to remove the Net Neutrality,an uproar of support towards a free internet exploded. These Rule restricted ISP’s from slowing down sites or charging access to higher priority companies. While this is not going to cause changes so soon. It presumably means companies will be able to not only charge you for the inter service you use but also the sites and services we use on a daily basis.
Big name companies should not have the right to be able to discriminate lesser used net services,due to the lack of usage or popularity. For some companies this topic is seen as a desirable way to improve quality because they are bigger companies with more money. This can be equally, if not more so, harmful to smaller companies just starting up. Many internet application companies like Google,Reddit,eBay,Amazon etc support net neutrality regulation.Google in 2008 stated, opposing market power of broadband providers to control access to their content and other applications. These Site favor an open Internet. Every site or company should have equal opportunity for customers to have access to content across the entire world wide web.
Many of these companies are starting to fight back, “Several tech companies including Etsy, Kickstarter, Foursquare and Shutterstock filed a petition on Monday afternoon challenging the Federal Communications Commission's rollback of net neutrality protections”. (Horrowitz,Tech Companies).
Any news, website or forum is accessible under net neutrality, given it has legality to exist. Theoretically ISP’s can charge you more or less to use these services. An open internet allows friendly and EQUAL competition, this ensures that a company has un-altered access to their content and level the playing field for larger companies to be treated the same as small start-ups.
Portugal, sadly, does not have net neutrality. Their services charge users by the month for using apps and websites. MEO, an ISP there, charge five euro every month to use individual types of content ...
The Trademark Review is a monthly newsletter prepared by Knobbe Martens attorneys covering relevant and current issues in trademark law.
In this Issue:
Facebook Stops FACEMAIL
The Battle of the Rolled Chips
Quiksilver Hit with $3.5 Million Punitive Damages Award
This new publication, Cyber Claims Insight from Aon Benfield’s Cyber Practice Group, empowers readers with the resources and tools they need to understand the cyber landscape, including legal trends, claims and insurance coverage disputes.
Provide updates on CAN-SPAM, keyword search liability and the recent FTC affiliate marketing rules to identify how audience members can ensure that their campaigns produce results, not liabilities.
This presentation explores the risk facing all charities and businesses if adequate thought is not given to the protection and security of one of its most treasured assets, its website.
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Shawn Tuma
This presentation was delivered by Shawn E. Tuma, Cybersecurity and Data Privacy Attorney, at the January 27, 2017 meeting of (ISC)² Dallas Fort Worth Chapter.
This presentation was significantly updated from past presentations and included a discussion of the groundbreaking New York Department of Financial Services (NYDFS) Cybersecurity Requirements for Financial Services Companies.
The main points of this presentation are:
(1) Cybersecurity events create a crisis situation and should be treated as such;
(2) Cybersecurity incidents are as much legal events as they are IT or Business / Public Relations events;
(3) Companies must have a cybersecurity breach response plan in place and tested, in advance;
(4) While consumer class action data breach litigation is a significant threat to companies and their leadership, it is not as great of a threat as regulatory enforcement by agencies such as the FTC and SEC, or the shareholder derivative claims for officer and director liability; and
(5) The odds are that all company will be breached, but preparation and diligence can help minimize the likelihood that such a breach from being a catastrophic event.
This presentation addresses the role of attorneys as the first responders in leading their clients through cybersecurity and data loss crisis events. The discussion begins by looking at the risk business have of being the victim of a cybersecurity or data loss incident and examining the nature of such incidents and the crisis environment they create. Then, because of this crisis environment, the need for leadership in helping keep the parties calm, rational, and making deliberate, calculated decisions.
The discussion then explains why cybersecurity events are legal events and legal counsel is the natural leader that should fulfill this role and how they can do so. It will then discuss the process legal counsel will take, including assembling the key players in such an event, both internally and externally. It discusses the obligations for responding to such an event, the steps that must be taken, those that must be considered, and certain factors that go into the decision-making process. It briefly addresses the costs of such an incident and the liability issues that can arise from such an incident and failing to properly respond to the incident. This section includes a discussion of the cybersecurity lawsuit landscape, cybersecurity regulatory landscape, and the issue of cybersecurity-related officer and director liability stemming from shareholder derivative lawsuits based on cybersecurity incidents.
It concludes with a discussion of the steps that companies can take to prepare for and be in a better position to respond to and mitigate the negative repercussions of such an incident.
Failed injunction attempt by Maria Crimi Speth and Adam Kunz of Jaburg & Wilk fail against protest group. No doubt an appeal will be filed but interesting concept that will likely be copied by others.
Also some pretty good information from the courts I intend to use for my own law suit. The word extortion used by the judge.
Premium MEAN Stack Development Solutions for Modern BusinessesSynapseIndia
Stay ahead of the curve with our premium MEAN Stack Development Solutions. Our expert developers utilize MongoDB, Express.js, AngularJS, and Node.js to create modern and responsive web applications. Trust us for cutting-edge solutions that drive your business growth and success.
Know more: https://www.synapseindia.com/technology/mean-stack-development-company.html
LA HUG - Video Testimonials with Chynna Morgan - June 2024Lital Barkan
Have you ever heard that user-generated content or video testimonials can take your brand to the next level? We will explore how you can effectively use video testimonials to leverage and boost your sales, content strategy, and increase your CRM data.🤯
We will dig deeper into:
1. How to capture video testimonials that convert from your audience 🎥
2. How to leverage your testimonials to boost your sales 💲
3. How you can capture more CRM data to understand your audience better through video testimonials. 📊
Kseniya Leshchenko: Shared development support service model as the way to ma...Lviv Startup Club
Kseniya Leshchenko: Shared development support service model as the way to make small projects with small budgets profitable for the company (UA)
Kyiv PMDay 2024 Summer
Website – www.pmday.org
Youtube – https://www.youtube.com/startuplviv
FB – https://www.facebook.com/pmdayconference
Enterprise Excellence is Inclusive Excellence.pdfKaiNexus
Enterprise excellence and inclusive excellence are closely linked, and real-world challenges have shown that both are essential to the success of any organization. To achieve enterprise excellence, organizations must focus on improving their operations and processes while creating an inclusive environment that engages everyone. In this interactive session, the facilitator will highlight commonly established business practices and how they limit our ability to engage everyone every day. More importantly, though, participants will likely gain increased awareness of what we can do differently to maximize enterprise excellence through deliberate inclusion.
What is Enterprise Excellence?
Enterprise Excellence is a holistic approach that's aimed at achieving world-class performance across all aspects of the organization.
What might I learn?
A way to engage all in creating Inclusive Excellence. Lessons from the US military and their parallels to the story of Harry Potter. How belt systems and CI teams can destroy inclusive practices. How leadership language invites people to the party. There are three things leaders can do to engage everyone every day: maximizing psychological safety to create environments where folks learn, contribute, and challenge the status quo.
Who might benefit? Anyone and everyone leading folks from the shop floor to top floor.
Dr. William Harvey is a seasoned Operations Leader with extensive experience in chemical processing, manufacturing, and operations management. At Michelman, he currently oversees multiple sites, leading teams in strategic planning and coaching/practicing continuous improvement. William is set to start his eighth year of teaching at the University of Cincinnati where he teaches marketing, finance, and management. William holds various certifications in change management, quality, leadership, operational excellence, team building, and DiSC, among others.
Falcon stands out as a top-tier P2P Invoice Discounting platform in India, bridging esteemed blue-chip companies and eager investors. Our goal is to transform the investment landscape in India by establishing a comprehensive destination for borrowers and investors with diverse profiles and needs, all while minimizing risk. What sets Falcon apart is the elimination of intermediaries such as commercial banks and depository institutions, allowing investors to enjoy higher yields.
Affordable Stationery Printing Services in Jaipur | Navpack n PrintNavpack & Print
Looking for professional printing services in Jaipur? Navpack n Print offers high-quality and affordable stationery printing for all your business needs. Stand out with custom stationery designs and fast turnaround times. Contact us today for a quote!
Implicitly or explicitly all competing businesses employ a strategy to select a mix
of marketing resources. Formulating such competitive strategies fundamentally
involves recognizing relationships between elements of the marketing mix (e.g.,
price and product quality), as well as assessing competitive and market conditions
(i.e., industry structure in the language of economics).
[Note: This is a partial preview. To download this presentation, visit:
https://www.oeconsulting.com.sg/training-presentations]
Sustainability has become an increasingly critical topic as the world recognizes the need to protect our planet and its resources for future generations. Sustainability means meeting our current needs without compromising the ability of future generations to meet theirs. It involves long-term planning and consideration of the consequences of our actions. The goal is to create strategies that ensure the long-term viability of People, Planet, and Profit.
Leading companies such as Nike, Toyota, and Siemens are prioritizing sustainable innovation in their business models, setting an example for others to follow. In this Sustainability training presentation, you will learn key concepts, principles, and practices of sustainability applicable across industries. This training aims to create awareness and educate employees, senior executives, consultants, and other key stakeholders, including investors, policymakers, and supply chain partners, on the importance and implementation of sustainability.
LEARNING OBJECTIVES
1. Develop a comprehensive understanding of the fundamental principles and concepts that form the foundation of sustainability within corporate environments.
2. Explore the sustainability implementation model, focusing on effective measures and reporting strategies to track and communicate sustainability efforts.
3. Identify and define best practices and critical success factors essential for achieving sustainability goals within organizations.
CONTENTS
1. Introduction and Key Concepts of Sustainability
2. Principles and Practices of Sustainability
3. Measures and Reporting in Sustainability
4. Sustainability Implementation & Best Practices
To download the complete presentation, visit: https://www.oeconsulting.com.sg/training-presentations
The key differences between the MDR and IVDR in the EUAllensmith572606
In the European Union (EU), two significant regulations have been introduced to enhance the safety and effectiveness of medical devices – the In Vitro Diagnostic Regulation (IVDR) and the Medical Device Regulation (MDR).
https://mavenprofserv.com/comparison-and-highlighting-of-the-key-differences-between-the-mdr-and-ivdr-in-the-eu/
Company Valuation webinar series - Tuesday, 4 June 2024FelixPerez547899
This session provided an update as to the latest valuation data in the UK and then delved into a discussion on the upcoming election and the impacts on valuation. We finished, as always with a Q&A
VAT Registration Outlined In UAE: Benefits and Requirementsuae taxgpt
Vat Registration is a legal obligation for businesses meeting the threshold requirement, helping companies avoid fines and ramifications. Contact now!
https://viralsocialtrends.com/vat-registration-outlined-in-uae/
VAT Registration Outlined In UAE: Benefits and Requirements
PLI Can Spam
1. Privacy Concerns in
Marketing and Commercial
Communications – Part 1
Bennet Kelley
Internet Law Center
bkelley@InternetLaw
bkelley@InternetLawCenter.net
LawCenter.net
We Know the Internet
3. There was California . . .
“We are saying that unsolicited e-mail cannot be sent
and there are no loopholes . . . We don't differentiate
between Disney and Viagra.
If you go out and rent a list of e-mail addresses, by
definition you are not a legitimate business. You are
the person we are trying to stop.”
Former California State Senator Kevin Murray
Author of SB 186
4. 84 days later . . .
President George W. Bush signing the CAN-SPAM Act (Dec. 16, 2003).
Controlling the Assault of Non-Solicited Pornography And Marketing Act
on-
5. CAN-SPAM Act of 2003
CAN-SPAM IS . . . CAN-SPAM DOES NOT . . .
• anti-
An anti-fraud and disclosure • “Can Spam” – except for wireless spam
statute
• Include a “Do Not Email Registry”
• Applies to an email where the
“primary purpose” is commercial
advertisement or promotion of a • Impose an “ADV” labeling requirement
product or service
• Create a general private right of action
• Applicable to bulk and single
emails • Generate stimulating cocktail party
conversations
6. Regulatory Timeline
2004: FTC Final Rule on Adult Labeling
FCC CAN-SPAM Rules
2005: FTC (1) Final Rule on Primary Purpose of Email; and
(2) Proposed Discretionary Rules
2006:
2006
2007:
2008: FTC Final Discretionary Rules
8. CAN-
CAN-SPAMENCLATURE
SENDER -- means a person who initiates a
commercial e-mail and whose product, service,
or Internet web site is advertised or promoted
by the message.
INITIATE -- means to originate or transmit, or
procure the origination or transmission of, such
an e-mail message.
PROCURE -- means intentionally to pay or
induce another person to initiate the message
on one's behalf, while knowingly or consciously
avoiding knowing the extent to which that
person intends to comply with this Act.
10. From Line
FTC: must give the recipient enough
information to know who is sending the
message
Not deceptive to use multiple domains
Kleffman v. Vonage Holding Corp. (C.D. Cal. 2007).
Not misleading to use non-corporate address
where domain may be checked using “Who
Is”
Gordon v. Virtumundo, Inc. (W.D. Wash. 2007)
Fake address can get you in the dog house.
11. Designated Sender Rule
Must Be a Sender
• Name must be in the “From” Line CAN-
Under CAN-SPAM
• Must be Responsible for CAN-SPAM Cannot designate
compliance Non-
Non-Sender
• Dropped requirement that Designated
Sender be in control of the content or the
mailing list used
13. Subject Lines
• Senate Report
– test is whether the person initiating the message knows
that the subject heading would be likely to mislead a
reasonable recipient about a material fact regarding the
content or subject matter of the message
• “New MySpace Phone” subject line misleads consumers
by creating false sense of sponsorship by MySpace.
– MySpace, Inc. v. The Globe.com, Inc. (C.D. Cal. Feb. 27, 2007)
• “Free Gift” subject lines violate CAN-SPAM
– FTC v. Adteractive, Inc. (C.D. Cal. 2007)
14. Opt-Out Mechanism
• Opt-Out Basics
– May offer options, but total opt-out must be
opt-
one of them
– 10 days to remove
– No further use of email address after opt-out
opt-
– Separate Business Units:
Opt- opt-
Opt-out for Saab not opt-out for all of GM
• Discretionary Regs
– Cannot impose any conditions on opt-out
opt-
requests (e.g, fee or provide information)
15. CAN-SPAM Plaintiffs
No Consumer Private Right of Action
FTC & State AGs
Internet Access Service Provider (IASP)
Adversely Effected by Violation
Must demonstrate substantial harm
Civil Penalties
$25 – $250 per email
$2 million maximum
Damage Adjustments
Treble damages if willful
Reduction if violation occurred despite
commercially reasonable efforts to maintain
compliance”
15
16. CAN-SPAMIGATORS
Faux ISPs Established to Prosecute
CAN-SPAM Actions
Small, free service can qualify
Hypertouch v. Kennedy-Western University, 2006 WL 648688 (N.D. Cal. 2006)
But must demonstrate substantial
harm
- e.g., bandwidth, hardware, connectivity,
overhead, staffing or equipment costs
Asis Internet Services, v. Optin Global, Inc., 2008 WL 1902217 (N.D. Cal. March
27, 2008 )
17. Sender Liability
FTC unsuccessful in seeking strict
liability
Advertiser liable if “actual knowledge,
or by consciously avoiding knowing”
about affiliate violations
Strict anti-spam policies and policing of affiliates
defeated allegation of intent.
Hypertouch v. Kennedy-Western University, 2006 WL 648688 (N.D. Cal. 2006)
– No duty to investigate
Asis Internet Services, v. Optin Global, Inc., 2008 WL 1902217 (N.D. Cal. March 27, 2008 )
18. CAN-SPAM PREEMPTS ALL
STATE REGULATION OF
EMAIL EXCEPT STATE LAWS
• Regulating falsity or deception in
email
• Not specific to email, including
State trespass, contract, or tort law;
or
• Other State laws to the extent that
those laws relate to acts of fraud or
computer crime
19. Rulings On State Spam
Regulation
• Misrepresentation must be
material
Omega World Travel, Inc. v. Mummagraphics, Inc. (4th Cir. 2006).
• States cannot dictate form of
from line
Kleffman v. Vonage Holding Corp. (C.D. Cal. 2007); Gordon v.
Virtumundo, Inc.(W.D. Wash. 2007).
• Courts split on whether state
regulation must be based on
traditional notions of fraud
• Yes. ASIS Internet Service v. Optin Global, Inc. (N.D. Cal.
2008); Hypertouch v. ValueClick, (LA Super. Ct. May 4, 2009).
• No. ASIS Internet Service v. Vista Print (N.D.Cal. 2009).
• First Amendment requires
that it not impinge non-
commercial email
Virginia v. Jaynes (Va. 2008).
20. TOP 5 TIPS
#1 – Always
assume CAN-SPAM applies
#2 – The Grandmother Rule
#3 – The Hand Grenade Rule
#4 -The Academy Rule
#5 – The Einstein-Dilbert Conundrum
21. Selected Cases: CAN-SPAM Act
CAN-
Advertiser Liability
ASIS Internet Services, v. Optin Global, Inc., 2008 WL
Inc.,
1902217 (N.D. Cal. March 27, 2008 )
Hypertouch v. Kennedy-Western University, 2006 WL
Kennedy- University,
648688 (N.D. Cal. 2006)
US v. Cyberheat, 2007 U.S. Dist. LEXIS 15448 (N.D. Ariz.
Cyberheat,
2007)
US v. Implulse Marketing, No. CV05-1285RSL (W.D.
Marketing, CV05-
Wash. June 8, 2007)
From and Subject Lines
FTC v. Adteractive, Inc., No. Case No. CV-07-5940 SI
Adteractive, Inc., CV-07-
(C.D. Cal. 2007)
Gordon v. Virtumundo, Inc., Case No. 06-0204-JCC (W.D.
Virtumundo, Inc., 06-0204-
Wash. May 15, 2007)
Kleffman v. Vonage Holding Corp., Case No. CV 07-
Corp., 07-
2406GAFJWJX (C.D. Cal. May 23, 2007)
MySpace, Inc. v. The Globe.com, Inc. No. CV 06-3391-
06-3391-
RGK (JCx) (C.D. Cal. Feb. 27, 2007)
(JCx)
22. CAN-
CAN-SPAM Cases Pt 2
Preemption
Asis Internet Services, v. Optin Global, Inc., 2008 WL 1902217 (N.D. Cal.
March 27, 2008 )
Asis Internet Services v. VistaPrint USA, Inc., No. C 08-5261-SBA (N.D.
Cal. May 5, 2009)
Free Speech Coalition, Inc. v. Shurtleff, No. 2:05CV949DAK, 2007 U.S.
Dist LEXIS 21556 (D. Utah Mar. 23, 2007)
Gordon v. Virtumundo, Inc., Case No. 06-0204-JCC (W.D. Wash. May
15, 2007)
Hypertouch, Inc. v. ValueClick, Inc., L.A. Super. Ct. No. C081000 (May
4, 2009).
Kleffman v. Vonage Holding Corp., Case No. CV 07-2406GAFJWJX
(C.D. Cal. May 23, 2007)
Omega World Travel, Inc. v. Mummagraphics, Inc., 469 F.3d 348 (4th
Cir. 2006)
Virginia v. Jaynes, 666 S.E.2d 303 (Va. 2008).
23. Bennet Kelley
Bennet Kelley founded the Internet Law Center
in 2007 after a decade of activity in many of the
hottest internet issues including behavioral
targeting, cyber squatting, internet marketing
and promotions, net neutrality, privacy, spam
and spyware. Prior to launching the Internet
Law Center, Bennet worked in-house with
companies such as ETM Entertainment Network,
SpeedyClick.com, Hi-Speed Media and
ValueClick.
bkelley@internetlawcenter.net
Bennet is Co-Vice Chair of the California Bar's
Cyberspace Committee and has been a regular
contributor to the Journal of Internet Law.
24. Internet Law Center
The Internet Law Center is dedicated to helping businesses
navigate the evolving legal standards for today's digital
economy, while also contributing to the development of the
policies of tomorrow. The firm serves a diverse client base
that includes startups and public companies both online and
offline across North America.
The professionals of the Internet Law Center possess years of
practical experience as both lawyers and entrepreneurs with
internet companies and have played a leading role in shaping
Internet law and policy. This unprecedented combination of
Santa Monica business, legal and policy experience not only makes the
(310) 452-0401 Internet Law Center uniquely qualified to provide the
professional advice needed to address emerging issues of
Washington, D.C. internet law in an uncertain economy, but also enables us to
(202)689-5660 provide practical solutions to brick and mortar and online
businesses alike.
Columbia, SC The Internet Law Center is based in Santa Monica but also has
(803) 727-0154 a presence in Washington, D.C. and Columbia, S.C. The
firm’s e-newsletter, Monday Memo, was named one of the top
100 Internet Law resources and has been nominated for the
www.InternetLawCenter.net
Los Angeles Press Club’s Southern California Journalism
Award for best In-house or corporate publication.