Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

e-Commerce Docket Sheet Image

e-Commerce Docket Sheet

Julian S. Millstein, Edward A. Pisacreta & Jeffrey D. Neuburger

Recent court rulings in e-commerce.

Features

Clause Of The Month Image

Clause Of The Month

John A. Gliedman

In today's economic climate, with large-scale vendors swallowing increasing shares of the customer marketplace, such vendors may be emboldened to push for contractual exclusivity provisions in negotiations with customers; that is, a requirement that in the future, the customer purchase from the vendor exclusively any additional amounts of services of the type being provided by vendor under the current arrangement.

Features

World Internet and Computer Law Congress Coming to D.C. Image

World Internet and Computer Law Congress Coming to D.C.

ALM Staff & Law Journal Newsletters

Legal, IT and business experts will gather in Washington, DC May 1 and 2 for the World Internet and Computer Law Congress.

Features

Spring Cleaning: Cutting Gristle from Spam in E-mail Campaigns Image

Spring Cleaning: Cutting Gristle from Spam in E-mail Campaigns

D. Reed Freeman Jr.

The FTC has repeatedly expressed concern that increased volume of spam affects ISPs, inconveniences consumers and, to the extent that such e-mail is fraudulent, undermines consumer confidence in e-commerce.

Features

Beware Hidden Dangers On Third-Party Services Sites Image

Beware Hidden Dangers On Third-Party Services Sites

Marie Flores

Adding third-party links for tax services to corporate Web sites can be a great way to attract new customers and generate extra income during the tax season. These links often generate income for the company agreeing to host the link to its corporate Web site.

No Electronic Theft Act Is A Partial Success Image

No Electronic Theft Act Is A Partial Success

Eric Goldman & Julia Alpert Gladstone

In 1997, the No Electronic Theft Act radically changed the underpinnings of criminal copyright infringement. Before the act, criminal copyright infringement targeted infringers making profits. The act focuses instead on copyright owners' losses, treating criminal copyright infringement as a type of theft ' like shoplifting.

Features

Developments of Note Image

Developments of Note

Julian S. Millstein, Edward A. Pisacreta & Jeffrey D. Neuburger

Recent developments in e-commerce law and in the e-commerce industry.

Features

e-Commerce Docket Sheet Image

e-Commerce Docket Sheet

Julian S. Millstein, Edward A. Pisacreta & Jeffrey D. Neuburger

Recent court rulings in e-commerce.

Features

E-Commerce Rising Image

E-Commerce Rising

Michael Lear-Olimpi

What does a cash-register ka-ching sound like online? It's the tune of $45.6 billion. That's the estimated e-commerce sales ring-up for 2002, the U.S. Department of Commerce reported in February. The activity represented an estimated increase in total e-commerce revenues from 2001 to 2002 of 3.1%.

Features

European Data Privacy Rights ' Not So Scary After All Image

European Data Privacy Rights ' Not So Scary After All

Simon Smith

Most e-commerce businesses and advisers outside Europe are generally aware that the European Union has what appear to be some strange and intricate laws relating to data privacy.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • Strategy vs. Tactics: Two Sides of a Difficult Coin
    With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
    Read More ›
  • The Article 8 Opt In
    The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
    Read More ›