In-House Counsel Guidebook: How to Handle Internet Defamation and Online Reputation Attacks August 2014 | Page 12
10
to that ISP for subscriber information associated with that IP
address at the particular time(s) and date(s) of the attack(s).
This process is typically effective, but some attackers may
use other means to shield their identities. For instance, some
attackers use a service to mask their IP address. Alternatively,
if someone utilizes a public internet connection to attack
your client, such as at a public library or a coffee shop, it can
be difficult to
identify that
customer or
the victim
patron client.
In most cases,
ill
Furthermore,
w
of an online attack
a client and
f who
have a good idea o
the
client’s
.
is behind the attack
attorney
e
the posts will com
can run into
Often,
dispute with
problems
shortly after a
s
identifying the
nes
an employee, busi
anonymous
itor.
associate or compet
attacker if the
posts are too
old, as many
ISPs only keep identifyi