Law Journal Newsletters

An ALM Website

INTERNET LAW & STRATEGY

January 2011

So Much Social Media Data, So Little Guidance

By Stephen M. Prignano and Andrew P. Fishkin

All of our online social interaction has created mountains of personal information about users that, prior to the advent of social networking, would have been regarded as private and difficult to obtain. The potential usefulness of that data in litigation is obvious. With just a few mouse clicks, litigators can investigate the background and views of opposing parties and key witnesses as well as potential jurors. The prevalence of social networking data raises novel issues with respect to the use of this information in litigation.

Log In

Subscribers: Log in below to read the full story

Already subscribe but haven't registered for all the benefits of the website?

Subscribe

Click below to subscribe to
INTERNET LAW & STRATEGY

Subscribe

Pay-Per-View

You can purchase this article for $20.00
Click below

Purchase Article

ARTICLES FROM RELATED NEWSLETTERS

THE CORPORATE COUNSELOR

Beware 'Spoofed' E-Mails

Law firms, companies and other entities need to be on guard for an increasingly frequent, sophisticated online fraud that uses "spoofed" e-mails.

e-COMMERCE LAW & STRATEGY

Law Firms Grapple With Cybersecurity Issues and Regulatory Risks

Security is always a concern for law firms, and the risks have only grown in recent years. Increasingly, attorneys, staff and clients have become more mobile and rely on an array of laptops, smartphones and tablets to stay connected 24/7. As more data is created and resides in more places, it becomes more vulnerable.

e-COMMERCE LAW & STRATEGY

Does Adoption of Cloud Computing Shift Cyber Liability Risk?

The rapid adoption of cloud computing has attracted companies that seek to lower their information technology costs. At the same time, it is reported that there has been an increase in data loss and an increase in cyber-liability claims against companies. But the biggest vendors in the cloud computing industry want to push the risk of penetration of their systems onto their customers adopting the technology.