Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search

We found 3,878 results for "Internet Law & Strategy"...

SEO for Law Firms: Will It Help You Win More Clients?
February 01, 2022
Search engine optimization (SEO) is a great way to help drive traffic to your website, but is also a very misunderstood term. This article helps clarify what SEO for law firms really is, and if it will help with your business development activities.
How to Protect a Website's Legal Identity
February 01, 2022
Internet site legal identity theft is becoming increasingly more sophisticated and common. If successful, a third party can use the theft of a legal identity to secure confidential information, harm marketing brand value, diminish good will and steal customers. Internet sites may employ legal, business, and technological means to protect their legal identities.
Due Diligence Can Mitigate Trademark Risk
February 01, 2022
How can one launching a new trademark mitigate the risk of rejection or infringement on the basis of likelihood of confusion with an existing mark? The primary strategy is trademark searching.
How to Obtain Subpoenas for Identifying ISP Users
February 01, 2022
This article focuses on a recent federal court decision, to explain how the well-developed law provides plaintiffs asserting a wide range of claims with the ability to proceed while protecting ISPs and, correspondingly, how it ultimately means that defendants who otherwise could remain anonymous may have to defend themselves in court.
Players on the Move
February 01, 2022
A look at moves among attorneys, law firms, companies and other players in entertainment law.
Predicting What 2022 Holds for Cybersecurity
January 01, 2022
Predictions aside, complacency is not an option if you plan to survive and thrive in 2022. Rest assured, the future of cybersecurity is bright, but it will come with its own set of challenges. We look forward into the future because the sooner we can start adapting strategy, policies, and technologies, the better off everyone will be in the long run.
Cybersecurity and Legal Tech In 2022: Predictions from the Field
January 01, 2022
It's still a dangerous cyber world as we enter 2022, but one that today's attorneys and legal technologists are prepared to tackle. Here's what they predict for cybersecurity, remote work, privacy and e-discovery in the new year.
Reckless Disregard for the Truth of a Material Statement Made to the USPTO Is Sufficient for Proving the Intent to Deceive
January 01, 2022
The Trademark Trial and Appeal Board (TTAB) has finally filled a gap left by the U.S. Court of Appeals for the Federal Circuit in the standard for finding deceptive intent when trying to prove fraud on the USPTO.
'Never Trust, Always Verify': Zero Trust Security
January 01, 2022
Recognizing the ever-increasing cyber threats to businesses, government entities, and individuals, the White House announced that Federal Civilian Executive Branch agencies must migrate toward Zero Trust Cybersecurity Architecture by September 2024. Under Zero Trust, trust is the ultimate vulnerability of any system and, therefore, trust has to be eliminated from a business' cybersecurity approach.
Potential Criminal and Civil Penalties of Digital Asset Exchanges
January 01, 2022
This article discusses the potential criminal and civil penalties that companies can face if their employees engage in insider trading in digital assets, and suggests several measures that exchanges can take to reduce their exposure from such risks.

MOST POPULAR STORIES

  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • The Article 8 Opt In
    The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
    Read More ›
  • Strategy vs. Tactics: Two Sides of a Difficult Coin
    With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
    Read More ›