+1-800-650-1559 U.S.contact@amdlawgroup.com

Internet Law

GOOGLE UPDATES: Advancing Website Security

The Secure Socket Overlay (SSL), was created in 1995 by Netscape.  The software was built to combat the growing unease about internet security. In theory, SSL would encrypt the information that was sent between a website and the web server, thereby creating a safety net against any hackers trying to access private information. In other words, it would create a kind of shield that would conceal the date from nefarious parties trying to seek it out. This allows businesses to protect customer’s personal information and transactions, allowing for the businesses reputation to flourish.

Now back to the Google Update. After events like the European Union’s GDPR, they are taking the necessary steps to enhance their internet security.  This new update will put them one step closer to overall security that they’ve been reaching for since 2014’s HTTPS Everywhere campaign. Google is steadfast in trying to ensure that consumers are as safe as possible on the internet by protecting users of the dangers of websites with personal information.

Read More

018: Why You Need Website Encryption for your Website

Google Chrome will mark all HTTP sites as not secure. If you notice when you go to a Web site that is not secure it says HTTP. This means that the data is unencrypted which also means that any information that you share on the website may also be unencrypted.

The significance is that in July Google will go from version 64 of Chrome to version 68 of Chrome with this new version. Google will mark any unencrypted Web site as not secure and that will show the top bar when you visit the website. I don’t know about you but I don’t like going to Web sites that are marked as not secure because that means to me that the information is not protected as not being encrypted properly.

But because 89 of the top 100 Web sites are using SSL certificates and becoming secure it is now nudged everyone else to get up with the times and actually have their Web site secure. So that means that you have to reach out to your hosting provider or your domain servicer and get an SSL certificate for your web. So that’s something that is very very important that you do if you’re receiving any type of traffic on your website. So, it’s not so much about whether you show up in Google because as of 2015 Google started to rank some of the websites that were not secured anyway. So even if you do show up in a Google search when visitors go to your Web site it may say and it probably will say that it’s not secure if they’re using the Google platform. So, there are other search engines that you can use. But everybody’s inclined to Google something so if you have a website which I suggest that if you’re building any business brand that you do have a website it’s best that you have it secured. You have we’re already in July so you have some time to do that but that’s something that should be high on your priority list. So, I hope you found some information that you can use from this particular episode. And I thank you for listening to the IS MY BRAND PROTECTED? podcast.  Safeguarding your dreams by protecting your brand.

Read More

How Facebook Opened a Door That Was Already Open

The disruptive nature of Facebook’s platform is that for many users it has become a connector; a way to connect with others and feel relevant.  In some respects, the platform appeals to our human insecurities and the need to be seen. We share, post, comment and read posts with very little regard for whether they are fake news or fake posts. Unconscious bias prompts us to believe what we want to believe and call the rest fake. But what is real is that Facebook has not mastered the art of being social and in some ways, has denigrated it.

Read More

Terms of Use And Copyright Infringement

Despite the internet’s universalizing concept, online activities are closely monitored by the law established in each country, and an imbalance in copyright infringement policies, which govern the online activities, can result in misjudging the user’s benign intentions.

Read More


This past week stirred a major storm for Facebook and the lack of trust with their security on the social media platform.  Will businesses start looking away from marketing on Facebook and their associated platforms, to other competing platforms like LinkedIn?  How safe do businesses now feel as a result of knowing that the Cambridge Analytica breach which was discovered in late 2015, but is only now surfacing, three years later?

Read More

Price for Violating Social Media Ban

The serious risk of harm or death to people who are, correctly or incorrectly, identified as the two men was addressed on behalf of the public’s interest.

This decision demonstrates the far-reaching consequences of online actions, especially, for being in contempt of court. And Harkins and Liddle’s case illustrates enforcement of law in the Internet age.

Read More

What is Cyber-Squatting?

During the early years of the Internet, when businesses did not fully understand the marketing value of the Internet, there were some who saw the profit opportunity of claiming ownership of a domain name that they did not intend to use. These individuals would often register the domain name of a successful company in order to sell them back to the business at a significant markup or squat on the domain until it was sought by the successful company.

Read More

Spied on By My Cell

Just when you thought you were unplugged, little do you know you’re being stalked!

Even if you are sure you powered down your phone for the night, Android spyware can use your phone to record your voice, and your camera to take video or pictures without your knowledge.

According to research from AVG a well known app for scanning phones and computers for viruses and malware, uncovered this malware and named it Android/PowerOffHijack.A.

Read More

Google and Policy Violation Checker

Originally posted 2013-05-21 10:55:34. By Sohyeon Lee | amdlawgroup.com On 2 May 2013, Google filed a patent application for Policy Violation Checker— a system that detects problematic phrases in electronic documents. The purpose of this system is to prevent phrases that could potentially violate company policies or cause legal conflicts for businesses and individuals. In […]

Read More

Is ICANN Obligated to Police Piracy?

With ICANN refusing to suspend new gTLD registries with piracy issues in their domain, a fight has broken out between domain companies and intellectual property interests and a solution seems hard to find.

Read More

Why Data Protection is an Important Issue for International Business

With this Internet and digital era, information travels remarkably fast across the globe. In an international business context, the way information travels can be problematic for large or small companies doing business in several geographic areas. The risk for companies of losing information to competitors is high. Now, schools are offering courses for cybersecurity. Companies invest large sum of money in order to preserve their data. Data protection is a critical in the development of a business especially in the pharmaceutical, biologic, defense, digital sectors.

Read More

Domain Names: Registration, Maintain and Monitor

Kathy Stewart | amdlawgroup.com

To introduce one to domain names and domain registration, one must begin with a basic understanding of the World Wide Web, in particular websites. Every computer on the Internet has an Internet protocol or IP address, which is a unique string of four numbers separated by periods, such as Since remembering the IP address of Websites would be nearly impossible, a domain name system was created to replace the length of IP address thereby assigning a unique name to each numeric IP address. A domain name is therefore the unique name given to that particular website or IP address.

Read More