Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Features

Making Your Website ADA Accessible Image

Making Your Website ADA Accessible

By Philip Voluck

As companies across the country rush to embrace the Internet and other electronic technologies, they must be mindful of this very real exposure to liability — website inaccessibility. Web accessibility means that people with disabilities can use the Web. More specifically, it means that people with disabilities cannot only perceive, understand, navigate and interact with the Web, but can also contribute to it.

Features

2016: The Year Everything Changed In Social Media Marketing Image

2016: The Year Everything Changed In Social Media Marketing

By Larry Bodine

Three megatrends culminated in online business development in 2016, requiring attorneys to change their digital marketing tactics and to re-focus on what produces results.

Features

Attorneys Accused of Filing Bogus Suits in Alleged Scheme to Stamp Out Negative Web Reviews Image

Attorneys Accused of Filing Bogus Suits in Alleged Scheme to Stamp Out Negative Web Reviews

By Ross Todd

Two California lawyers have been accused of participating in a scheme that used sham lawsuits to suppress negative online reviews of businesses.

Features

Photo Agency's Suit Against <i>Oh No They Didn't!</i> At Ninth Circuit Image

Photo Agency's Suit Against <i>Oh No They Didn't!</i> At Ninth Circuit

Amanda Bronstad

A photo agency that sued the owner of online tabloid Oh No They Didn't! for copyright infringement is hoping to reverse a ruling that threw out its case, prompting Pinterest and others to weigh in and argue that reviving the case could erode legal protections afforded to Internet service providers.

Features

When Is Employee Hacking a Crime? Image

When Is Employee Hacking a Crime?

Richard Raysman & Peter Brown

Employees have found success in defeating CFAA accusations, often by arguing that they did not access a database or other proprietary information without authorization because their login credentials had yet to be revoked. As surveyed below, results have been mixed for employees accused of hacking into the databases of their own companies, competitors and potential business partners. This article discusses three recent cases in this area of law.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • The Article 8 Opt In
    The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
    Read More ›
  • Strategy vs. Tactics: Two Sides of a Difficult Coin
    With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
    Read More ›