360 Central Ave., 8th Floor, St. Petersburg, FL 33701
Search
Facebook Twitter LinkedIn Client Portal
Nelson Cyber Law, PLLC

Call today for a FREE 30 minute consultation

1-800-440-5536

Recent blog posts

Tampa online privacy policy attorneyAs a business owner, you know how important your website is for attracting new customers and generating sales. But are you confident that your Terms of Service and Privacy Policy pages are up-to-date with current laws and fully protecting you from potential lawsuits?

A Privacy Policy is required by law when your website collects customer emails, phone numbers, shipping addresses, or other personally identifiable information (PII). The Terms of Service can be equally important to protect your business from legal liability. This article will focus strictly on Privacy Policy, with a future article addressing Terms of Service.

Consumer Privacy Laws Are Becoming More Strict

...

Florida copyright infringement lawyerDo you create copyrighted works, either as your main source of income or as a tool for marketing your business? You surely take great pride in your creations. Naturally, you want as many people as possible to see and buy your work.

The internet enables you to reach potentially millions of people with your copyrighted material. But it has also made it incredibly easy for unscrupulous people to discover your work and use it for their own purposes. Theft of copyrighted content happens every day to bloggers, photographers, ebook authors, graphic artists, YouTube video producers, songwriters, and many more. 

At some point, you may be infuriated to discover that someone is distributing or selling your work for their own benefit. Whether you call it plagiarism, piracy, copyright infringement, content jacking, or theft of intellectual property (IP), it is unethical, illegal, and financially costly for you. Now, what can you do about it?

...

Tampa cyber law attorney cyber attack damagesCyber threats are a serious and growing risk for American and global businesses. A 2017 study by the Ponemon Institute and Accenture, based on data from over 250 large companies across seven countries, reported an average of 130 security breaches per company in 2017, a 27% increase over the prior year. Ransomware attacks are a particular concern, and the reported frequency of these attacks doubled from 2016 to 2017.

Computer system hackers may be aiming to steal trade secrets, obtain personal data that can be used for identity theft, or simply cause trouble for a business out of spite. Whatever the motive, any type of security breach can cost a business thousands or even millions of dollars in system repair costs and loss of revenue.

Cyber Damages Claims Under Federal and Florida State Law

...

Tampa master services agreement attorneyWhenever two businesses expect to have an ongoing relationship, with one providing services to the other on a project-by-project basis, a master services agreement can simplify their repeated transactions.

Many types of businesses can benefit from using a master services agreement, including those who sell website creation and maintenance services, software-as-a-service (SaaS), and cloud computing services. 

But what exactly should be included in your MSA? Here are some tips for creating a strong MSA for your business:

...

Florida cyber law attorney master services agreementAre you tired of jumping through legal approval hoops every time you start a new project with an existing client? Then your business probably needs a master services agreement (MSA). 

A master services agreement is a contract that spells out the general terms and conditions that will govern the relationship between two parties (supplier and buyer). Then, for each new project, the parties need only sign off on a statement of work (SOW), which defines the specific work to be done, the price to be paid, and the timeline of the project. 

The Benefits of Having a Master Services Agreement

...

Florida cyber lawyerBusiness owners are naturally sensitive to online defamation, that is, false and damaging statements made about their business online, whether published by a major media outlet, a blogger, or on a social media site.

The easiest response is to contact the offender directly and request that they reconsider and delete the offending material. Or simply post a rebuttal in a prominent place. In more serious cases, an attorney can send a cease and desist letter or even file a lawsuit seeking remedial action (e.g., retraction of defamatory material and possibly compensatory damages).

But is filing a lawsuit likely to result in a desirable outcome? It depends on the nature and extent of the statements made against you and your business, as well as the damages you’ve sustained.

...

Florida trademark attorneyYou might think “intellectual property” is limited to inventions that a business has patented. But the definition is actually much broader, including such things as:

  • Your website domain name.
  • Copyrighted works of writing, art, or music.
  • Trademarked brand names and logos.
  • The trade dress of your business, which includes unique visual aspects of your website as well as products, packaging, and even building architecture.
  • Trade secrets, including proprietary processes and methods, algorithms, patterns, client lists … any information you would closely guard to keep it out of the hands of competitors.

Here are four questions every business owner should ask and answer with regard to intellectual property:

Do you know the value of your intellectual property? If you really think about the scope of your business, you probably have more intellectual property than you first thought. List your most important IP assets, and ask yourself two questions. First, do I have sufficient protections in place, given the value of this IP? Second, how much am I willing to spend to defend this IP? If a competitor should infringe on your intellectual property rights, you will want to react quickly to avoid potential losses and to collect compensation for any financial damage that may have already occurred. At the same time, you need to take a cost-effective approach to protecting your IP, considering the financial investment and future revenue at stake.

...

Posted on in Cyber Crime

b2ap3_thumbnail_shutterstock_356278754.jpgComputer hacking continues to attract a great deal of attention from those charged with keeping company networks safe. However, in May of last year, a computer virus began infecting networks around the world. The never-before-seen malware was disrupting service in the healthcare, automobile manufacturing, telecom and worldwide shipping industries, among others, around the world. While the virus wreaked havoc across the globe, it took but a single computer expert to shut down the spread and potentially save companies billions of dollars.

Anonymous Hacker Hero

In May of 2018, a young man known only by his Twitter handle, “Malware Tech,” was able to do what IT professionals at some of the world’s largest businesses were unable to accomplish. With a few simple keystrokes, he was able to shut down one of the world’s largest cyber-attacks to ever occur.

...

b2ap3_thumbnail_shutterstock_319177193.jpgMany businesses rely on relationships with outside agencies or individuals to ensure ongoing productivity and profitability. Creating and implementing third party reseller agreements ensure distribution of your products or services are done in manner that upholds your company’s brand image and reputation. However, while researching and drafting these agreements, it is important to consider variables that might create confusion or poor results.

Consider These Relevant Issues

  • Start small and grow gradually: When opening a new agreement allow a distributor to prove themselves on a small scale. Once doing so you can reward that distributor with a larger piece of territory. Do not assign too much, too soon.
  • Reasons for Termination: If an agreement allows only for Termination for Cause, it can delay action while partners argue the definition of “cause.” Termination for Convenience and for Cause enables a company to take steps to nullify a relationship while following defined and prescribed steps.
  • Writing semi-automatic renewal and annual termination terms into an agreement allows either party to exit an agreement once a year. This bases a partnership on performance, and the most experienced partners desire an ongoing relationship that is based on performance.
  • Exclusive vs Non Exclusive agreements: There are pros and cons to both, but find a way to maintain an advantage while allowing for some flexibility that appeals to the distributor.
  • Address issues of price changes: An agreement that permits price changes based on market demand, and only a period of advance notice can help resolve conflicts over this issue.
  • Termination of the agreement by one or both parties: The best distributor agreements allow for either partner to end the relationship.
  • Allow the nature of the relationship to change: Variables in the marketplace can impact how both a manufacturer and a distributor do business. Write an agreement that permits both parties to recommend change on an ongoing basis allows the partnership to evolve with the market without undue pressure.
  • Stay involved in the process: Attorneys are important to writing fair and legal agreements, but the input of those with practical experience can help keep matters relevant and on point.

Retain an Experienced Florida Online Contracts Attorney to Install Sound Reseller Agreements

...

Posted on in Defamation Online

b2ap3_thumbnail_shutterstock_391180594.jpgAs the Internet continues to grow and evolve, there are some things about this amazing information-sharing resource that never seem to change. Many businesses and high-profile individuals frequently face the threat of damage to their reputation when instances of online defamation appear and then go viral. Fortunately, there are laws to help victims of such attacks fight back, and highly-skilled legal professionals who know how to use those laws to your advantage.

Strategies for Responding to Cyber Defamation

A business has a couple of ways they can respond when faced with a case of online defamation. Each comes with pros and cons, but it is up to each victim to determine which route would best serve them moving forward.

...

Posted on in Cyber Crime

b2ap3_thumbnail_shutterstock_302508602.jpgBusinesses of all sizes dedicate considerable resources every year to develop, secure and defend their computer network. Software companies constantly introduce new firewalls and other anti-virus programs to fight off illegal breaches. Despite best efforts, network hacking continues making headlines and compromising sensitive information.

Giving In To Hackers’ Demands

In what has become a widely publicized case of hacking, that seems to feature the release of new details on what feels like a weekly basis, ride-sharing giant Uber acknowledged that it paid hackers $100,000 to delete the data they stole in 2016. The personal information of nearly 57 million Uber drivers and riders was accessed illegally by two, yet-to-be-identified electronic thieves.

...

Posted on in Cyber Crime

b2ap3_thumbnail_Untitled-design-22.jpgEven when you take proactive steps to protect your company’s network and stored data, there are individuals constantly looking for opportunities to expose and exploit any weaknesses. Hacking is a major issue facing companies and, if the news is any indication, electronic thieves and computer hackers are showing no signs of reducing their illegal and damaging activities.

Companies are Being Hit by Hackers

There have been a number of high-profile hacking incidents that made the news over the past few years that impacted major retailers and financial institutions, as well as their customers and clients. The latest company to fall victim was the ride-sharing business, Uber.

...

Posted on in Cyber Crime

Florida cyber crime and hacking attorneyThe term “hacking” conjures images of illegal activities by highly-motivated cyber criminals looking to steal and exploit vast amounts of business and personal information. However, as the internet changes and laws evolve to keep pace with the rapid growth of cyber activity, the federal government has begun considering ways by which companies might use hacking to their advantage.

Hacking to Combat Hacking

Until recently, a business’s only defense against a cyber attack or hacking might be the installation of updated firewalls or software to combat electronic intrusions. However, it seemed that as soon as new defensive software was created, hackers were finding and exploiting inherent weaknesses or developing techniques to subvert network protection.

...

St. Petersburg cyber law attorney cyber crime legislationWhen the digital age took hold in America, and an increasing number of businesses began conducting trade online, it became necessary to protect commerce, transactions, and other online activity from illegal access and fraud. The Computer Fraud and Abuse Act (CFAA) is a federal anti-hacking law that was passed in 1986, and is now the subject of updates in order to keep up with the constantly evolving digital world.

Why the CFAA Needs Updating

In its current form, the CFAA does not allow a business to go beyond its own network to fight or protect against cyber attacks, such as the installation of malware. While the CFAA was expanded upon in 1996, proponents of this newest legislation do not believe the existing language goes far enough in allowing businesses to protect their digital property.

...

Florida privacy policy lawyerDue in large part to the hacking of websites and subsequent theft of the personal information belonging to millions of consumers, company and website privacy policies are facing renewed scrutiny. When storing huge amounts of data and concern for personal privacy both demand attention, it is critical for companies to establish clear guidelines for gathering and retaining information at the onset.

Protecting Privacy While Doing Business

Privacy is a cherished right, yet it is one most web users surrender every time they visit a website. As businesses strive to know more about their target audience and build stores of information as a way to grow their customer base, the use of technology to gather information is more prevalent than ever. However, building trust between a business and a customer (or potential customer) is an important part of doing business, and that is where strong privacy policies come into play.

...

Florida cyber security attorney data breachWhen credit reporting giant Equifax announced that millions of consumer records were exposed to hackers by means of a data breach, it was just the latest in the series of recent commercial cyber attacks which have impacted millions of people. Perhaps the primary takeaway from this news is that if this type of breach can happen to a company as large as Equifax, it can happen to any company that maintains digital business and client records.

How Can a Business Protect Company and Client Data?

By most accounts, the breach at Equifax was due to complacency in addressing a software flaw in the company’s website involving a tool which consumers used to contact the company and address issues with their credit reports. Every company should be aware that hackers will seek to expose any flaw in your company’s software or website protocol.

...

Floridy business cyber security lawyerBusinesses of all sizes are being targeted by hackers and other electronic criminals more and more frequently in modern times. Incidents involving large corporate entities such as Target and Equifax make national headlines, but it is a fact that even small businesses are attacked by hackers. In fact, experts agree that nearly 43 percent of all cyber attacks are launched at small businesses. 

Protecting Your Business

Being unprepared is no longer acceptable, as the cost of repairing your business’s reputation and defending your company from subsequent legal action can drain resources and even result in bankruptcy. Because physical storage of records and data is costly and can require an inordinate amount of space that could be better used for other business purposes, storage of customer information and proprietary company data is frequently converted to some electronic format. This action makes that data vulnerable to breach and theft. Here are some basics steps to follow when considering how to best protect your company’s cyber assets:

...

Tampa cyber security lawyer biometricsNo longer is it necessary for one to key-in a password of letters and numbers in order to gain access to computers, smartphones, or other electronically-secured information. The use of one’s facial features, fingerprints, and even their iris for electronic security purposes is becoming more common, yet concerns pertaining to personal privacy and use of stored information is now facing legal challenges.

Wide Use for Biometric Technology  

The use of biometric technology has allowed various businesses to enhance service and security for their customers. Some examples include:

...

Posted on in Cyber Crime

cyber security, Florida cyber law attorney,  electronic scammers, phishing, email scamRecently, the Internal Revenue Service issued a warning that electronic scammers were using official-looking emails to illegally obtain information and hold it for ransom. Despite frequent cyber security warnings that the IRS does not solicit information by means of email, businesses have reported falling victim to this and other forms of phishing activity.

Phishing Exhibitions with Official-Looking Bait

Hackers, online scammers, and other electronic thieves have elevated their efforts in order to obtain personal, confidential, or otherwise critical data as a way to make money. A few of the latest attempts include very official looking emails:

...

Posted on in Intellectual Property

cyber law, Florida cyber law attorney, Cloud usage, intellectual property, Cloud servicesThe use of computers by companies doing business in a variety of industries started years ago, and continues to grow. However, with that growth came the need to to use valuable office space for servers and data storage equipment. Now companies are migrating digital information to virtual storage known as “the Cloud,” which frees up physical space, but comes with some risks.

Benefits of Cloud Usage

It stands to reason that Cloud storage usage would not be popular among companies if it did not offer valuable benefits. In addition to reducing or eliminating the need for on-site data storage, other advantages of Cloud usage include the following:

...
Back to Top