{"id":132,"date":"2014-03-30T14:34:31","date_gmt":"2014-03-30T14:34:31","guid":{"rendered":"http:\/\/www.ishmanlaw.com\/blog\/?p=132"},"modified":"2014-03-30T14:34:31","modified_gmt":"2014-03-30T14:34:31","slug":"hacking-law-and-what-to-do-if-your-computeraccount-is-hacked","status":"publish","type":"post","link":"https:\/\/ishmanlaw.com\/blog\/?p=132","title":{"rendered":"Hacking Law and What To Do If Your Computer\/Account Is Hacked"},"content":{"rendered":"<style><!--\n\/* Font Definitions *\/\n@font-face\n\t{font-family:\"\uff2d\uff33 \u660e\u671d\";\n\tpanose-1:0 0 0 0 0 0 0 0 0 0;\n\tmso-font-charset:128;\n\tmso-generic-font-family:roman;\n\tmso-font-format:other;\n\tmso-font-pitch:fixed;\n\tmso-font-signature:1 134676480 16 0 131072 0;}\n@font-face\n\t{font-family:\"\uff2d\uff33 \u660e\u671d\";\n\tpanose-1:0 0 0 0 0 0 0 0 0 0;\n\tmso-font-charset:128;\n\tmso-generic-font-family:roman;\n\tmso-font-format:other;\n\tmso-font-pitch:fixed;\n\tmso-font-signature:1 134676480 16 0 131072 0;}\n@font-face\n\t{font-family:Cambria;\n\tpanose-1:2 4 5 3 5 4 6 3 2 4;\n\tmso-font-charset:0;\n\tmso-generic-font-family:auto;\n\tmso-font-pitch:variable;\n\tmso-font-signature:-536870145 1073743103 0 0 415 0;}\n \/* Style Definitions *\/\np.MsoNormal, li.MsoNormal, div.MsoNormal\n\t{mso-style-unhide:no;\n\tmso-style-qformat:yes;\n\tmso-style-parent:\"\";\n\tmargin:0in;\n\tmargin-bottom:.0001pt;\n\tmso-pagination:widow-orphan;\n\tfont-size:12.0pt;\n\tfont-family:Cambria;\n\tmso-ascii-font-family:Cambria;\n\tmso-ascii-theme-font:minor-latin;\n\tmso-fareast-font-family:\"\uff2d\uff33 \u660e\u671d\";\n\tmso-fareast-theme-font:minor-fareast;\n\tmso-hansi-font-family:Cambria;\n\tmso-hansi-theme-font:minor-latin;\n\tmso-bidi-font-family:\"Times New Roman\";\n\tmso-bidi-theme-font:minor-bidi;}\n.MsoChpDefault\n\t{mso-style-type:export-only;\n\tmso-default-props:yes;\n\tfont-family:Cambria;\n\tmso-ascii-font-family:Cambria;\n\tmso-ascii-theme-font:minor-latin;\n\tmso-fareast-font-family:\"\uff2d\uff33 \u660e\u671d\";\n\tmso-fareast-theme-font:minor-fareast;\n\tmso-hansi-font-family:Cambria;\n\tmso-hansi-theme-font:minor-latin;\n\tmso-bidi-font-family:\"Times New Roman\";\n\tmso-bidi-theme-font:minor-bidi;}\n@page WordSection1\n\t{size:8.5in 11.0in;\n\tmargin:1.0in 1.25in 1.0in 1.25in;\n\tmso-header-margin:.5in;\n\tmso-footer-margin:.5in;\n\tmso-paper-source:0;}\ndiv.WordSection1\n\t{page:WordSection1;}\n--><\/style>\n<p class=\"MsoNormal\" style=\"text-align: justify; text-justify: inter-ideograph;\">Businesses and individuals are affected everyday by unauthorized access to their computers, email and social media accounts (e.g., Facebook<span style=\"color: black;\">\u00ae<\/span>, Instagram<span style=\"color: black;\">\u00ae<\/span>,<b style=\"mso-bidi-font-weight: normal;\"><\/b><span style=\"color: black;\">Yelp\u00ae, Google\u00ae, Yahoo\u00ae, <\/span>LinkedIn<span style=\"color: black;\">\u00ae<\/span>, Tweeter<span style=\"color: black;\">\u00ae<b style=\"mso-bidi-font-weight: normal;\"> <\/b>and other social media forums and blog websites<\/span>). When this occurs, it can result in substantial damage, such as theft of intellectual property, unauthorized communications, damage to goodwill and reputation and theft of personal pictures\/videos.<\/p>\n<p>&nbsp;<\/p>\n<p class=\"MsoNormal\" style=\"text-align: justify; text-justify: inter-ideograph;\">When you are a hacking victim, you need legal assistance from a hacking law attorney.<span style=\"mso-spacerun: yes;\">\u00a0 <\/span>Mark Ishman, of the Ishman Law Firm, is a computer and email hacking lawyer who helps victims in rectifying the injustice committed upon them.<\/p>\n<p>&nbsp;<\/p>\n<p class=\"MsoNormal\" style=\"text-align: justify; text-justify: inter-ideograph;\">There are two important steps that hacking victims must do immediately upon realizing that their computer, email or other accounts have been hacked.<span style=\"mso-spacerun: yes;\">\u00a0 <\/span>First, create a back-up of all evidence of your hacking incident.<span style=\"mso-spacerun: yes;\">\u00a0 <\/span>This would include access logs with date, time and IP addresses of when your computer\/email\/online account was accessed without your consent.<span style=\"mso-spacerun: yes;\">\u00a0 <\/span>Second, a hacking victim needs to retain a hacking lawyer as soon as possible to provide assistance in preserving the data and identifying the hacker. As part of preserving evidence of your unauthorized access of your computer\/email\/online account, a hacking attorney will investigate your hacking incident and contact third parties to preserve evidence.<span style=\"mso-spacerun: yes;\">\u00a0 <\/span>This is very important because many third-parties that could have helpful evidence to identify your hacker will delete such evidence as part of their regular business practices.<span style=\"mso-spacerun: yes;\">\u00a0 <\/span>You must act quickly due to many third-parties practices deleting data every 7 days after your hacking incident.<span style=\"mso-spacerun: yes;\">\u00a0 <\/span><\/p>\n<p>&nbsp;<\/p>\n<p class=\"MsoNormal\" style=\"text-align: justify; text-justify: inter-ideograph;\">This is why it is so important to preserve all evidence of your hacking incident within your control, as well as retaining a hacking lawyer to investigate and assist you.<span style=\"mso-spacerun: yes;\">\u00a0 <\/span>A hacking attorney will collect evidence aimed towards identifying the hacker who accessed your computer, email or other account without your authorization.<\/p>\n<p>&nbsp;<\/p>\n<p class=\"MsoNormal\" style=\"text-align: justify; text-justify: inter-ideograph;\">As you can imagine, hacking law is an emerging area of law, and there always seems to be new court opinions and laws enacted to assist hacking victims.<span style=\"mso-spacerun: yes;\">\u00a0 <\/span>For example, computer-related laws interpreted by the courts allow hacking victims to recover their incurred expenses of <span style=\"color: black; mso-themecolor: text1; background: white;\">\u201ctime, money and resources to investigate and repair\u201d the damages incurred from their hacking incident. <\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-size: 12.0pt; font-family: Cambria; mso-ascii-theme-font: minor-latin; mso-fareast-font-family: '\uff2d\uff33 \u660e\u671d'; mso-fareast-theme-font: minor-fareast; mso-hansi-theme-font: minor-latin; mso-bidi-font-family: 'Times New Roman'; mso-bidi-theme-font: minor-bidi; color: black; mso-themecolor: text1; background: white; mso-ansi-language: EN-US; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;\">If you are a victim of an unauthorized computer hacking, email hacking or other account hacking incident, please contact hacking law attorney Mark Ishman, of the Ishman Law Firm, to assist you in investigating, repairing and recovering from your hacking incident.<span style=\"mso-spacerun: yes;\">\u00a0 <\/span>Hacking law attorney Mark Ishman, of the Ishman Law Firm, can be reached at mishman @ IshmanLaw.com or (919) 468-3266.\u00a0 For more information on hacking law, visit http:\/\/www.ishmanlaw.com\/hacking-unauthorized-access.php.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Mark Ishman is a hacking law attorney at the Ishman Law Firm, and he has provided helpful steps to take if you are a hacking victim from unauthorized access to your computer\/email\/social media\/online account.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[26,27,25],"tags":[28,30,16,12,11,15,32,29,31],"class_list":["post-132","post","type-post","status-publish","format-standard","hentry","category-hacking-law","category-unauthorized-access-law","category-unmasking-anonymous-users","tag-hacking-law-attorney","tag-hacking-law-lawyer","tag-internet-law-attorney","tag-ishman-law-firm","tag-mark-ishman","tag-raleigh-attorney","tag-raleigh-hacking-lawyer","tag-unauthorized-access-law-attorney","tag-unauthorized-access-law-lawyer"],"_links":{"self":[{"href":"https:\/\/ishmanlaw.com\/blog\/index.php?rest_route=\/wp\/v2\/posts\/132","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ishmanlaw.com\/blog\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ishmanlaw.com\/blog\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ishmanlaw.com\/blog\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ishmanlaw.com\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=132"}],"version-history":[{"count":2,"href":"https:\/\/ishmanlaw.com\/blog\/index.php?rest_route=\/wp\/v2\/posts\/132\/revisions"}],"predecessor-version":[{"id":134,"href":"https:\/\/ishmanlaw.com\/blog\/index.php?rest_route=\/wp\/v2\/posts\/132\/revisions\/134"}],"wp:attachment":[{"href":"https:\/\/ishmanlaw.com\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=132"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ishmanlaw.com\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=132"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ishmanlaw.com\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=132"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}