Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search

We found 3,899 results for "Internet Law & Strategy"...

Marketing Tech: Using Technology to Streamline Content Marketing
February 28, 2014
Google the phrase "content marketing" and the CPU on your notebook or tablet will almost explode with search results. Content marketing is hot, especially if you're trying to market legal services.
Supreme Court Grants <i>Cert</i> in <i>Aereo</i> Case
February 28, 2014
<i>Aereo</i>may turn out to be one of the most important copyright decisions since enactment of the Copyright Act of 1976, with potential wide-ranging ramifications for the television industry and the fast-growing cloud computing industry.
Privacy and Ethics For Social Media In Investigations
February 28, 2014
It begins with a name ' perhaps an employee alleged to have been involved in misconduct or a suspected whistleblower. Regardless of the origin of identity, if the person is relevant to a company's internal investigation, whatever information that can be provided is power for the company, the power to make informed decisions.
Pushing the Technology Envelope in and Out of the Courtroom
February 28, 2014
Technological advancements have dramatically improved the speed, capabilities and, in most cases, the cost-effectiveness in which deposition, discovery and pre-trial services are provided. Companies that have embraced the latest developments in jury research and selection technology ' particularly social media monitoring tools ' are best situated to thrive in the current environment.
Content Owners' Pursuit of Secondary Infringement Claims
February 28, 2014
Secondary liability can be imposed on an ISP or distributor of a product used to commit infringement based upon claims of contributory infringement, inducement infringement or vicarious infringement. The contributory and inducement claims both focus on a defendant's contribution to the infringement and require that the defendant knows that direct infringement is occurring. These related claims, which provide independent ways to attack secondary infringement, differ in important respects.
White House Uploads U.S. Cybersecurity Framework
February 28, 2014
President Barack Obama's administration on Feb. 12 released its much-anticipated voluntary cybersecurity framework, giving U.S. companies a common handbook on how they can try to fend off hackers.
DE Supreme Court Eases Social Media Authentication
February 28, 2014
Social media postings can be submitted as trial evidence as long as the party introducing the evidence can demonstrate to the judge that a jury could reasonably conclude the postings are authentic, the Delaware Supreme Court has ruled.
Dictating or Encouraging Franchisee Pricing
February 28, 2014
A price charged by a franchisee that is too low can adversely affect other franchisees and the franchisor by discouraging the provision of pre- and post-sale services, eroding brand image and jeopardizing the ability to introduce new products by depressing price points. Although relatively rare, a franchisee also may cause marketplace problems by charging too high a price for an attractive, new product in great demand.
Collaborating in The Cloud
February 28, 2014
One of the great advantages of working with files in a cloud drive is sharing documents with other reviewers/authors in real time. Real time is the actual time during which reviewers are making changes to the document. This can be accomplished with all reviewers working in a Web App.
<i>Online Extra</i> Facebook's New Friend Faces Patent Suits
February 27, 2014
Before agreeing to buy mobile messaging startup WhatsApp for an eye-popping $19 billion, Facebook Inc. likely eyed two patent cases pending in Delaware and Bay Area federal courts.

MOST POPULAR STORIES