Part I: DMV Sale of Personal Information A group has investigated and allegedly found that the California Department of Motor Vehicles has earned more than $50 million by selling personal information of drivers to third parties without consent. This data may include names, addresses, and registration information. The DMV claims…
Internet Lawyer Blog
Different Types of Copyright Applications
The copyright application process is three parts: (1) application form; (2) nonrefundable filing fee; and (3) a nonreturnable deposit of the work’s copy. In general, the copyright owner should submit a separate application for each work. However, the following exceptions apply for registering multiple works in one application: Collective Works:…
Quantum Computing Technology and Legal Issues
Quantum computing technology will be affecting most of us in a direct or indirect way. We have stated in a prior article that: “A quantum computer is a highly-advanced computer system that works exponentially faster than today’s conventional computers. Quantum computing is the practice of studying quantum computers and their potential. This…
The Basic Rules For Commercial Emails
The basic rules for commercial emails should be known by all business organizations. They should include having proper identifiers, opt-out mechanisms, and a valid mailing address in all commercial emails. In fact, the CAN-SPAM Act states that the senders of commercial emails will be acting legally if: 1) The header of…
Internet Spam and Robocall Violations
Internet spam violations have increased in the past years. For example, the spammers use the interconnected network of computers that links us together in the world to disseminate malware. The spammers also use the internet to send junk email that fills up email accounts and can be used to commit…
Spammers and Legal Issues
There have been cases where spammers have transmitted spam via email and text messages. These messages can include improper content, propaganda, hidden messages, and malware (e.g., virus, trojan, ransomware, adware, spyware). The spammers use the Internet Service Provider’s and user’s bandwidth to disseminate spam which results in bandwidth saturation, lost…
When Does Federal Arbitration Law Preempt California Law?
Both California and the federal government have enacted statutes that regulate arbitration agreements and awards. The Federal Arbitration Act (FAA) and California Arbitration Act (CAA) are similar in many aspects but they have differences that can sometimes lead to conflict. Other state and federal statutes can also conflict with the…
California Landlord-Tenant Lawsuit Addresses Eminent Domain
When the government needs to acquire private property for public use, it can do so through a procedure known as eminent domain. The Fifth Amendment to the United States Constitution prohibits the government from taking property from a private individual or business “without just compensation.” Eminent domain is intended to…
Mediations and Confidentiality Rules
Mediation gives the parties to a dispute, either during an ongoing lawsuit or in an effort to avoid one, a chance to present their cases to a neutral third party trained in dispute resolution. In order to promote candor during the mediation process, anything that is said during mediation is…
Forgery of Real Estate Documents
Laws against forgery of documents have existed for almost as long as writing itself has existed. For most of that time, forgery techniques did not change very much. However, modern digital technology has significantly expanded opportunities for people to create fraudulent documents. Real estate transactions are making increasing use of…