Cameo Clips
May 27, 2010
COPYRIGHT DAMAGES/STATUTORY 'WORK'<br>COPYRIGHT JURISDICTION/RELATED CONTRACT CLAIMS
e-Tailing Keeps On Sailing
May 27, 2010
e-Commerce sales appear to be continuing their slow upswing, according to statistics from the U.S. Census Bureau. Figures for the first quarter of 2010, released last month, show estimated e-retail spending up 1.5% over the fourth quarter of 2009.
Protecting Domestic e-Commerce
May 27, 2010
As anyone, whether an attorney or not, might guess, the Internet has created in e-commerce more opportunity than ever for counterfeit goods to be displayed, bartered and sold. Human nature being what it is, an unprecedented number of individuals who feel that they are beyond the reach of U.S. law have fueled an historically high level of foreign counterfeit-goods transactions, resulting in many millions of dollars of economic damage to America.
Point and Click
May 27, 2010
Those of us involved in e-commerce pay particular attention when online sellers are involved, such as the report that the same e-seller sold a gun or accessories to two well-publicized killers. This year, however, there is an additional legal twist.
Five Steps to Managing Social Media Risks
May 27, 2010
On the one hand, companies want to capture the attention of potential customers roaming the social media space. On the other hand, conversations in the blogosphere are largely uncontrollable, and raise myriad risks. Social media can cause serious losses if not handled correctly.
Verdicts
May 26, 2010
Recent rulings of interest.
Policing Workplace e-Mail Use
May 25, 2010
A company's decision on where to draw the line on personal use of workplace computers poses a great challenge to employers, and recent court rulings do not make the decision and its enforcement any easier.
Five Steps for Managing the Risks Associated with Sensitive Data
May 25, 2010
The trend toward cloud computing, use of third-party application service providers, and outsourcing functions that can include payroll, benefits, marketing and more, multiply the potential vulnerabilities, and up the ante when it comes to managing data-related risk.