In-House Counsel Guidebook: How to Handle Internet Defamation and Online Reputation Attacks August 2014 | Page 12

10 to that ISP for subscriber information associated with that IP address at the particular time(s) and date(s) of the attack(s). This process is typically effective, but some attackers may use other means to shield their identities. For instance, some attackers use a service to mask their IP address. Alternatively, if someone utilizes a public internet connection to attack your client, such as at a public library or a coffee shop, it can be difficult to identify that customer or the victim patron client. In most cases, ill Furthermore, w of an online attack a client and f who have a good idea o the client’s . is behind the attack attorney e the posts will com can run into Often, dispute with problems shortly after a s identifying the nes an employee, busi anonymous itor. associate or compet attacker if the posts are too old, as many ISPs only keep identifyi