Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Home Topics

Regulation

Features

Are Search Engine Results Protected Speech? Image

Are Search Engine Results Protected Speech?

Richard Raysman & Peter Brown

Search-engine results have become the lodestar of the Web for most users. Whether the user constructs a narrowly-tailored query designed to exclude inapplicable results, or a broad search designed as an introduction to a given topic, the algorithmic apparatus fueling search engines will usually produce pertinent information. As a matter of fact, this article on search results was in part fueled by using results acquired from a search engine.

Features

Coping with Evolving Cybersecurity Rules Image

Coping with Evolving Cybersecurity Rules

Jonathan S. Feld, Susan E. Asam & Leyton Nelson

Cybersecurity and data protection, more than ever, are priority items for the government and private sector. The government has reacted by proposing legislative "fixes" that would require organizations to satisfy basic levels of cybersecurity protection and disclose breaches or face fines. Whether a mandatory compliance model will be effective given the rapid pace by which technology advances is unclear. It may be unrealistic to expect the government's legislative pace to keep up with hackers.

Features

IRS Guidance Reveals Federal Bitcoins Strategy Image

IRS Guidance Reveals Federal Bitcoins Strategy

James Ching

The IRS's March 25, 2014 declaration that bitcoins are property, not currency, is the final piece of the carefully-crafted Federal approach to bitcoin regulation which greatly differs from the approach of other sovereign nations.

Features

Reclassification of Obesity and Changes to The Manual of Mental Disorders Image

Reclassification of Obesity and Changes to The Manual of Mental Disorders

Frank Cragle & Jaime Wisegarver

The Patient Protection and Affordable Care Act (ACA) is not the only health care challenge facing employers. Recent medical disease reclassifications are affecting a large portion of America's workforce, and the long-term impact is proving difficult to predict. These changes may result in an increased number of workers' compensation and ADA discrimination claims, but hopefully, they will also result in a greater emphasis placed upon prevention and treatment.

Features

Important Issues and Recent Developments in Wage and Hour Law Image

Important Issues and Recent Developments in Wage and Hour Law

Amy K. Jordan

This article examines important legal and political developments affecting the FLSA and how they develop into the most commonly litigated employment claims in American federal courts.

Features

Maximizing Value Image

Maximizing Value

Michael H. Torkin

Directors of a leveraged company should begin to consider the implications of not being able to access traditional debt markets on appropriate terms. This article highlights the initial steps, questions and concerns typically facing a director in this new environment.

Features

Consumer Groups Decry FCC's Net Neutrality Proposal Image

Consumer Groups Decry FCC's Net Neutrality Proposal

Jenna Greene

Consumer advocates reacted with dismay to reports that the FCC plans to allow Internet service providers to charge companies a toll for faster access, while FCC Chairman Tom Wheeler defended the proposed rules as consistent with the underlying goals of net neutrality.

Features

S. Ct. Limits Restitution for Child Pornography Victims Image

S. Ct. Limits Restitution for Child Pornography Victims

Marcia Coyle

A divided U.S. Supreme Court on April 23 limited the amount of restitution due to child pornography victims whose images are viewed by thousands over the Internet.

Features

How to Reduce Litigation Costs In the EDRM Continuum Image

How to Reduce Litigation Costs In the EDRM Continuum

Ann Grayson & Jim Norman

The amount of data a company generates grows with each passing day. It is important to develop strategies to reduce the amount of data subject to discovery obligations while staying current with legal and technology trends. A strong partnership with a vendor and law firm using sophisticated data review and collection techniques is essential to navigating the discovery minefield in a cost-effective way that is also defensible and fully documented.

Features

Consumer Groups Decry FCC's Net Neutrality Proposal Image

Consumer Groups Decry FCC's Net Neutrality Proposal

Jenna Greene

Consumer advocates reacted with dismay to reports that the FCC plans to allow Internet service providers to charge companies a toll for faster access, while FCC Chairman Tom Wheeler defended the proposed rules as consistent with the underlying goals of net neutrality.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • Inferring Dishonesty: The Fifth Amendment and Fidelity Coverage
    Dishonest employees always have posed a problem for businesses. The average business may lose 6% of its annual revenues to employee fraud, and cumulatively the impact of employee theft on the economy is estimated to be $600 billion annually. <i>See</i> Association of Certified Fraud Examiners ("ACFE"), 2002 Report to the Nation on Occupational Fraud &amp; Abuse, at ii, 4 (2002), available at <i>www.cfenet.com/publications/rttn.asp.</i> Although the average loss through employee embezzlement is $25,000, where computerized financial records or transactions are involved, the average loss increases nearly twentyfold. <i>See</i> National White Collar Crime Center, <i>WCC Issue: Embezzlement/Employee Theft,</i> at 2 (2002), available at <i>http://nw3c.org/downloads/Computer_Crime_Weapon.pdf.</i>
    Read More ›