- Facebook, Inc. v. ConnectU LLC (N.D. Cal. 2007)
- Optima Funding, Inc. v. Strang (Cal. App. 2007)
- Gordon v. Impulse Marketing Group, Inc. (E.D. Wash. 2007)
- United States v. Kelley (9th Cir. 2007)
- Free Speech Coalition, Inc. v. Shurtleff (D. Utah 2007)
- United States v. Cyberheat, Inc. (D. Ariz. 2007)
- MySpace Inc. v. The Globe.com Inc. (C.D. Cal. 2007)
- United States v. Twombly (S.D. Cal. 2007)
- Benson v. Oregon Processing Service, Inc. (Wash. App. 2007)
- Omega World Travel, Inc. v. Mummagraphics, Inc. (4th Cir. 2006)
- e360 Insight, LLC v. Spamhaus Project (N.D. Ill. 2006)
- Jaynes v. Commonwealth (Va. App. 2006)
- Rossario's Fine Jewelry, Inc. v. Paddock Publications, Inc. (N.D. Ill. 2006)
- Asis Internet Services v. Optin Global, Inc. (N.D. Cal. 2006)
- Beyond Systems, Inc. v. Kennedy-Western Univ. (D. Md. 2006)
- Hypertouch, Inc. v. Kennedy-Western Univ. (N.D. Cal. 2006)
- Beyond Systems, Inc. v. Keynetics, Inc. (D. Md. 2006)
- Fenn v. Mleads Enterprises, Inc. (Utah 2006)
- MaryCLE, LLC v. First Choice Internet, Inc. (Md. Spec. App. 2006)
- Beyond Systems, Inc. v. Realtime Gaming Holding Co. (Md. 2005)
- White Buffalo Ventures, LLC v. University of Texas at Austin (5th Cir. 2005)
- Joffe v. Acacia Mortgage Corp. (Ariz. Ct. App. 2005)
- Fenn v. Redmond Venture, Inc. (Utah Ct. App. 2004)
- Optinrealbig.com, LLC v. IronPort Systems, Inc. (N.D. Cal. 2004)
- Gillman v. Sprint Communications Co. (Utah App. 2004)
- Kaufman v. ACS Systems, Inc. (Cal. App. 2d Dist. 2003)
- Intel Corp. v. Hamidi (Cal. 2003)
- Aronson v. Bright-Teeth Now (Pa. Super. 2003)
- Missouri ex rel. Nixon v. American Blast Fax, Inc. (8th Cir. 2003)
- Verizon Online Services, Inc. v. Ralsky (E.D. Va. 2002)
- Ferguson v. Friendfinders (Cal. App. 2002)
- State v. Heckel (Wash. 2001)
- Hotmail v. Van$ Money Pie (N.D. Cal. 1998)
- CompuServe v. Cyber Promotions (S.D. Ohio 1997)
- Destination Ventures, Ltd. v. FCC (9th Cir. 1995)
- Other collections of spam cases: AOL, JMLS, SpamCon, Spam Links, Beyond Systems
Identity theft comes in many forms.
A person\92s identity can be 'borrowed' for the purpose of creating fictional credit cards or a person\92s entire identity can be usurped to the point where they can have difficulty proving that they really are who they claim to be.
Up to 18% of identity theft victims take as long as four years to realize that their identity has been stolen.
There are many ways to protect your personal identity and many steps you can take to prevent your identity from being stolen:
*Never give out unnecessary personal information
*Never provide bank details or social security numbers over the Internet
*Always remain aware of who is standing behind you when you type in your personal credit codes at ATM machines and at supermarket checkout swipe machines.
A person\92s identity can be 'borrowed' for the purpose of creating fictional credit cards or a person\92s entire identity can be usurped to the point where they can have difficulty proving that they really are who they claim to be.
Up to 18% of identity theft victims take as long as four years to realize that their identity has been stolen.
There are many ways to protect your personal identity and many steps you can take to prevent your identity from being stolen:
*Never give out unnecessary personal information
*Never provide bank details or social security numbers over the Internet
*Always remain aware of who is standing behind you when you type in your personal credit codes at ATM machines and at supermarket checkout swipe machines.
Post a comment