• Reputation Protection Attorneys

    Reputation Protection Attorneys

  • 1

Reputation Management Terms & Definitions

There are 59 entries in this glossary.
Search for glossary terms (regular expression allowed)
Term Definition
2F4U
Too Fast For You
Acronym
An acronym (from Greek: -acro = sharp, pointed; -onym = name) in its pure form denotes a combination of letters (usually from an abbreviation) which can be used and pronounced as a word. For the sake of clarity and readability, this definition is not always followed within the 2 lists on this page.
Adware
A method of displaying unwanted, unsolicited advertising on your computer.  It usually is in the form of malicious code.
Apps
Short for application, an "app" is a program designed to operate within a mobile system. They can be considered "add-ons" for mobile devices like smartphones and tablets. Two of the most popular operating systems, Apple's iOS and Google's Android, have an increasingly sizable roster of free and paid apps available to users.
Blog
Sort for Weblog - A personal journal recorded on a website. Blogs are updated frequently and usually grouped by subject (e.g. politics, computers, religion, news, culture, et.al.).  Often allowing commenting in response to the entries.
BTW
By The Way
CIPA
The Children’s Internet Protection Act (CIPA) of 2000 requires public schools and libraries receiving federal e-rate funds to use a portion of those funds to filter their internet access. They must filter out obscenity on library computer terminals used by adults and both obscenity and harmful-to-minors materials on terminals used by minor children. CIPA was upheld by the u.s. supreme court as constitutional in June 2003.
Communications Decency Act of 1996
This was a part of the Telecommunications Act of 1996.  It was the U.S. Congress' first attempt to protect children on the Internet from pornography.  The act prohibited knowingly sending or displaying “indecent” material to minors through the computer, defined as: “any comment, request, suggestion, proposal, image, or other communication that, in context, depicts or describes, in terms of patently offensive as measured by contemporary community standards, sexual or excretory activities or organs.”

The ACLU immediately challenged the act with a law suit and was blocked by a lower court. A year later the U.S. Supreme Court struck down the indecency provisions in the historical case of Reno v. ACLU (1997). The Supreme Court held that a law that places a “burden on adult speech is unacceptable if less restrictive alternatives would be at least as effective in achieving” the same goal.  The court did, however, reaffirmed the application of obscenity and child pornography laws in cyberspace—an important victory for the protection of children online.
COPA
The Child Online Protection Act (COPA) of 1998 was an effort by the U.S. Congress to modify the CDA in response to the Supreme Court’s decision in Reno v. ACLU. The law sought to make it a crime for commercial websites to make pornographic material that is “harmful to minors” available to juveniles. The purpose of COPA was to protect children from instant access to pornographic “teaser images” on porn syndicate web pages, by requiring pornographers to take credit card numbers, adult verification numbers, or access codes to restrict children’s access to pornographic material and to allow access to this material for consenting adults only. Despite the critical need for measures to protect children from accessing harmful materials, the law was immediately challenged and blocked by lower courts, and has become the subject of an epic legal battle, still raging today. The permanent injunction against the enforcement of COPA remains in effect today. The government has not announced whether it will appeal the case to the U.S. Supreme Court for a third time.
COPPA
The Children’s Online Privacy Protection Act of 1998, which went into effect in April 2000, requires websites that market to children under the age of 13 to get “verifiable parental consent” before allowing children access to their sites.  The Federal Trade commission (FTC), which is responsible for enforcing COPPA, adopted a sliding scale approach to obtaining parental consent. The sliding scale approach allows website operators to use a mix of methods to comply with the law, including print-and-fax forms, follow-up phone calls and e-mails, and credit card authorizations.
Copyright Infringement
is the use of works protected by copyright law without permission, infringing certain exclusive rights granted to the copyright holder, such as the right to reproduce, distribute, display or perform the protected work, or to make derivative works.

Is copyright infringement a federal crime?
Cyberbullying
Willful and repeated harm inflicted through the use of computers,
cell phones, and other electronic devices.
Cybercrime
Any Internet-related illegal activity.
Cyberstalking
the repeated use of electronic communications to harass or frighten someone, for example by sending threatening emails.
defamation
the action of damaging the good reputation of someone through slander or libel.
"she sued him for defamation"
Denial of Service Attacks
A denial-of-service (DoS) is any type of attack where the attackers (hackers) attempt to prevent legitimate users from accessing the service. In a DoS attack, the attacker usually sends excessive messages asking the network or server to authenticate requests that have invalid return addresses.
Digital Footprint
On the Internet a digital footprint is the describes the trail, traces or "footprints" that people leave online on different sites.
Electronic Footprint
computers maintain a record of all website visits and e-mail messages, leaving a trail of the user’s activity in cyberspace. These data can still exist even after the browser history has been cleared and e-mail messages have been deleted.
Encryption
Encryption and authentication helps ensure that data transmitted over the internet remains secure and protected from possible interception. Authentication ensures that both parties are legitimate, while encryption encodes the data in such a way that it can not be decoded by an unauthorized third party.
Firewall
A security system consisting of hardware and software used to block hackers, malware, viruses, and other threats to a computer or computer network.