Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search

We found 3,896 results for "Internet Law & Strategy"...

Law Firms Aren't Immune to Cybersecurity Risks
February 28, 2015
Although law firms have managed to remain off the list of the year's biggest data breach victims, firms watching cybersecurity trends most closely are feeling increasingly uneasy about their own security posture.
Data Security Breaches
February 28, 2015
In April 2014, the U.S. District Court for the District of New Jersey decided that the FTC could pursue a claim that a hotel company's failure to have adequate data security measures is an unfair trade practice. The agency believes that data security is a basic responsibility of any company that accepts consumer personal information.
Cybersecurity Practices Booming In Era of the Breach
February 28, 2015
The cybersecurity woes of companies like Target and Sony in 2014 and Anthem last month have meant a busy start to 2015 for law firm data-privacy and security practices.
<b><i>Sales Speak:</i></b>Lawyers Are in the Relationship-Building Business, But Are They Connecting?
February 28, 2015
Some things appear to be so simple that we assume (dangerously) that everyone "gets it." But a significant number of lawyers either have no system ' formal or otherwise ' for getting and staying in touch with key people, or do a dismal job of staying connected.
After Anthem, Diagnosing the Health of Data Security
February 28, 2015
Companies have begun to experience attempts to breach their databases on a frequent basis, and have had to become hypervigilant about protecting their networks against hackers. But once every couple of months, the bad guys get through the defense systems in a big and highly publicized way, showcasing data disaster for company and customers. This was the case in early February when Anthem Inc., the second-largest health insurance company in the U.S., announced it had been hacked.
Obama Calls for Industry's Cooperation On Cybersecurity
February 28, 2015
President Barack Obama signed an executive order on Feb. 13 promoting information-sharing between the private sector and the government in an effort to combat the rising number of security hacks and data breaches.
Castle Defense
February 28, 2015
The battle over expert testimony on patent damages harkens back to the middle ages when would-be attackers developed new strategies for laying siege to a castle, defensive counter-measures were developed to thwart those siege tactics. As plaintiffs have introduced expert testimony based on novel patent damages theories, defendants have asked courts to fulfill their gatekeeping role by preventing certain types of expert testimony from reaching the jury.
Identity Theft and Your Income Taxes
February 28, 2015
In 2013, 13.1 million people were victims of some sort of identity-theft. Often, you may think of identity theft as being confined to credit card or ATM fraud, yet there is an epidemic of fraudulent electronically filed tax returns. Identity-related tax fraud is the third-largest theft of federal funds after Medicare/Medicaid and unemployment-insurance fraud.
How to Obtain Social Media Data For Defending Lawsuits
February 28, 2015
Obtaining social media user content under most circumstances is extremely difficult ' unless you use the correct strategy. Simply sending discovery requests without a basic understanding of the information available is a fool's errand. It is pivotal that a practitioner who wants to conduct formal discovery of social media user content understand how each site stores and communicates its data.
<b><i>Online Extra</b></i> FTC Cracks Down on Online Reviews
February 27, 2015
A company that touted its online reviews without mentioning that it gave customers who wrote them a discount settled deceptive advertising charges with the Federal Trade Commission on Feb. 27.

MOST POPULAR STORIES