Jaburg Wilk

News/Publications

Internet and Technology

  • Getting Divorced? Four Cautionary Tips about Accessing Your Spouse’s Electronic Information

    Getting Divorced? Four Cautionary Tips about Accessing Your Spouse’s Electronic Information

    Question:  I know my spouse’s passwords to their social media accounts, bank accounts and/or email accounts, can I log into their account and get the information we need to help win my case? 

    Answer: While this might sound like a really good idea, you shouldn’t do this for a few reasons. First of all, even though your spouse may have given you their& … Read More

    Categories: Family Law, Internet and Technology, Article

  • Is Your Website Accessible to Disabled Users? If Not, Courts Say You Could Be Violating the ADA

    Is Your Website Accessible to Disabled Users? If Not, Courts Say You Could Be Violating the ADA

    Yes, seriously. This is no longer a remote threat cautioned by overzealous lawyers. This is now a real threat that business owners should address now. If you own and/or operate a business, and the business has a website that markets its goods or services, you could be liable for violating the Americans with Disabilities Act (“ADA”) if your website is not accessible to disabled users. That … Read More

    Categories: Business & Corporate, Internet and Technology, Article

  • Top 7 Reasons Why Websites Need a DMCA Agent

    Top 7 Reasons Why Websites Need a DMCA Agent

    The Digital Millennium Copyright Act (DMCA) provides copyright protection and some limitations of liability for online copyright infringement if safe harbors are used.  It governs the majority of US-based websites and internet service providers.    

    What is a DMCA agent?

    In order to employ the safe harbor protections offered by the DMCA, certain types of internet service providers have … Read More

    Categories: IP Law, Internet and Technology, Article

  • Trademark Owners Beware of Chinese Domain Name Marketing Ploy

    Trademark Owners Beware of Chinese Domain Name Marketing Ploy

    Some e-mail marketing ploys are pretty clever and some spam or phishing attempts brilliantly disguised as valid e-mail. While there are many great reasons to register your trademark with the United States Patent & Trademark Office, including: 

    Constructive notice nationwide of the trademark owner’s trademark rights

    Preventing others from … Read More

    Categories: IP Law, Internet and Technology, Article

  • Bring Your Own Device (BYOD) Seminar

    Bring Your Own Device (BYOD) Seminar

    Laura Rogal and Neal Bookspan are presenting on BYOD (mobile devices in the workplace) policies. 

    What: They will address issues and tips related to Bring Your Own Device (BYOD) policies to allow your company to easily implement a program that increases productivity, reduces risk, and keeps proprietary information safe.  

    Where: Seminar is at the offices of Jaburg Wilk, 3200 North Central, … Read More

    Categories: Business & Corporate, Employment, Intellectual Property, Internet and Technology, Seminars

  • Why Employers Need Social Media Policies

    Why Employers Need Social Media Policies

    Although social media is great for developing business, expanding a brand or building a network, it is not without pitfalls. There are an increasing number of cases where an employee’s use of social media has created problems for the employer. The best practice is to maintain a well-written social media policy.   Real-world problems can and do arise from the use of social media. & … Read More

    Categories: Employment, Intellectual Property, Internet and Technology, Blog

  • Do You Know Where Your Data Is Located? Why Knowing is Half the Battle

    Do You Know Where Your Data Is Located? Why Knowing is Half the Battle

    Whether you realize it or not, you are probably storing some personal or business data in the cloud. The National Institute of Standards and Technology (NIST) defines cloud computing as a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released … Read More

    Categories: IP Law, Internet and Technology, Article

  • Does Pokémon GO Lure You in With a Dangerous Privacy Policy and Terms of Use?

    Does Pokémon GO Lure You in With a Dangerous Privacy Policy and Terms of Use?

    For years, we have been lamenting that our young people spend too much  time indoors playing computer games and not enough time outside or connecting with others.  Yet, those same critics now condemn young Pokémon Go players who venture out on Pokémon hunts for a myriad of perceived sins including inattentiveness and irresponsible behavior. Critics also revel in slamming … Read More

    Categories: Internet and Technology, Article

  • Why You Need to Learn About BYOD

    Why You Need to Learn About BYOD

    Some of you may be saying to yourselves, “What is BYOD and why do I need to learn about it?” The answer is because it is 2015 and each of us is carrying around a computer in the form of a phone in our pocket or purse, not to mention all of the iPads, Surfaces, laptops, etc. So what exactly is BYOD?

    BYOD is the acronym for “bring your own device”, which refers to employees who bring their own … Read More

    Categories: Internet and Technology

  • Maria Crimi Speth to Present Legal Traps on the Internet

    Maria Crimi Speth to Present Legal Traps on the Internet

    Maria Crimi Speth and Arizona Technology Council’s  Startup and Entrepreneurship Committee will be presenting ‘It’s a (VIRTUAL) Jungle Out There! Legal Traps on the Internet’, on Thursday Oct. 1 from 11:30 a.m. to 1:00 p.m. at the Unexpected Art Gallery located at 734 W. Polk, Phoenix, AZ 85007. 

    Attendees will learn how to avoid common, costly mistakes when launching apps or … Read More

    Categories: Intellectual Property, Internet and Technology, News Release