Estimated reading time (in minutes) The exploitation of personal data on the Internet is a legitimate concern of Internet users. However, the sites must comply with certain regulations, which are sometimes unknown! spam Spam is an advertising e-mail often received...
Estimated reading time (in minutes) Door-to-door canvassing sometimes gives rise to real abuse… So , can we sell everything? What are the limits to be respected by the seller? How to guard against possible abuse? Authorized… but regulated Door-to-door or...
Estimated reading time (in minutes) Am I allowed to bet online? What precautions should be taken to be sure to remain legal? IS IT LEGAL? The law of May 12, 2010 authorizes three new types of games: sports betting, horse betting and poker. Lotteries and virtual...
Estimated reading time (in minutes) Troubleshoot Connectivity! Any operator is required to provide you with the Internet speed listed on your contract. In the event of a breach of this commitment, several remedies exist. Gather the evidence. Troubleshoot...
Estimated reading time (in minutes) Existing rules and differentiation of periods The rules governing the speaking time of presidential candidates have undergone several distinctions and differentiations. The CSA (Higher Audiovisual Council), the French audiovisual...
Estimated reading time (in minutes) Forensic anonymity! Is anonymity in court possible? In which cases? Is there a specific device? The answer is: YES, AS A WITNESS Forensic anonymity! In order for certain investigations to move forward, it is necessary for the...