I can answer questions regarding all forms of Internet, technology, and multimedia law. Specific areas may include: website terms and conditions, privacy policies, copyright, trademark, domain name disputes, software and technology licensing, and website and software development agreements. More information can be found at informationlaw.com.
I've practiced law since 1994, representing dozens of ecommerce, Internet, and software companies.
NJ State Bar Association PA State Bar Association American Bar Association American Corporate Counsel Association Internet & Computer Law Committee of the New Jersey State Bar Association Somerset County Business Partnership Philadelphia Volunteer Lawyers for the Arts National Academy of Television Arts & Sciences Licensing Executives Society Free Speech Coalition Board of Advisors, Stevens Institute of Technology Communications
BA, Political Science; JD.
Oracle Corporation, BEA Systems
|Allen||01/20/14||10||10||10||Thank you, I appreciate your help.|
|Corrina||11/28/13||10||10||10||Thank you very much!|
|J||10/25/13||10||10||10||Thank you so much for getting back .....|
|clark||10/17/13||10||10||10||I would like to thank the expert .....|
|Prashant S Akerkar||10/04/13||10||10||10||Dear Dan Thank you. Thanks & Regards .....|
Marcus, I think your bigger issue is living under one roof with an unresolved dispute like this. In short, there is no simple answer to any of your questions. Without any verbal or written agreements
Remy, I am assuming that the emails were access from a computer owned by your employer and located at your workplace. As such, your co-worker's access of your email becomes a question of whether it
Leigh, I think at this point, having your friend mark all of the FB email as spam is her best bet. Typically Facebook allows for an opt-out of receipt of email from them, so it's unclear why that's
Laurie, I cannot provide specific legal advice in this forum. If you take a look at some of the other answers I have provided here, you can find some information about privacy laws and how they affect
Jane, You really would need to hire a computer forensics expert who is qualified to detect this type of activity. You would then need to operate under your local court rules to determine the process