Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search

We found 3,883 results for "Internet Law & Strategy"...

Shareholder Proxy Access
October 30, 2006
On Sept. 5, 2006, the United States Court of Appeals for the Second Circuit stated: 'In deeming proxy access bylaw proposals non-excludable under Rule 14a-8(i)(8), we take no side in the policy debate regarding shareholder access to the corporate ballot.' <i>American Federation of State, County &amp; Municipal Employees v. American International Group, Inc., 2006 WL 2557941 (2d Cir. Sept. 5, 2006) ('AFSCME')</i>. Despite the Second Circuit's neutral intent, <i>AFSCME</i> has generated a surge of renewed interest in the legal and policy implications of shareholder proxy access, and specifically shareholders' expanding power to influence director elections.
New Chief At the CEO's Roundtable
October 30, 2006
Recent reports of criminal investigations, indictments and resignations of high-ranking company personnel coming out of the Hewlett-Packard boardroom remind us that, even after the scandals of the 1990s and the host of new laws, regulations and internal corporate practices that followed, bad things can happen at good companies. Among other things, the saga at HP reinforces the need for an independent compliance and ethics function at all publicly traded corporations. What follows is a proposal to create such a function by improving on the considerable advances in this area made by U.S. companies over the past several years. The foundation for this proposal is this: Ethical and compliance issues are best addressed by corporate officers who are organizationally, physically and financially independent from those of their colleagues who might be subject of their investigatory and reporting work.
Real-Time Collaboration Solutions Yield Major Efficiencies
October 30, 2006
Real-time collaboration (RTC) has advanced to a point where its advantages bring benefits to almost every aspect of organizational communications. For law firms, RTC makes possible new ways of working that are simple to adopt, easy to afford, require little or no CapEx and, in most cases, utilize existing computer and peripheral equipment. RTC can bring together employees, clients, trainers and others in ways that save time and overcome distance, thereby delivering measurable competitive advantage.
Drug & Device News
October 30, 2006
The latest news.
Kumho for Clinicians in the Courtroom
October 30, 2006
Two Supreme Court rulings, <i>Daubert v. Merrill Dow Pharmaceuticals Inc.</i> and <i>Kumho Tire v. Carmichael</i>, have had a profound effect on the treatment of expert testimony in the courts. In 1993, the Supreme Court, in Daubert, articulated guidelines for admissibility of scientific expertise as testimony. Later, in 1999, in <i>Kumho</i>, the Court focused on the admissibility of clinical expertise as testimony. More recently there has been increasing recognition of the inconsistency of trial courts in their construction and articulation of evidentiary standards to medical testimony. One proposed remedy is that 'Physicians should respond by correcting courts' misinterpretations of medical practice and assisting in the development of legal standards that encourage thoughtful and informed consideration of medical testimony by judges and juries.'
<b>Online Exclusive:</b> Cost of Privacy Breaches Rises in 2006
October 24, 2006
Analysis of 31 major corporate privacy breaches this year finds that the average cost to a company has surged to $182 per compromised record, an increase of 31% over 2005.
Security Breaches: What You Need to Know About European Legislation
October 19, 2006
Last month's installment discussed corporate security practices, the legislative background in Europe, and mandatory reporting provisions. Part Two addresses additional reporting obligations, prior registration, the possibility of civil actions, and manually held data.
The Human Side of Data Security: The Critical Role of Employee Controls
October 19, 2006
As headlines continue to report data security breaches at an alarming rate, discussion often focuses on the need for enhanced technical controls, such as two-factor authentication and encryption, to protect sensitive, personally identifiable information. The role of the company employee, both as the cause of, and the first line of defense against, security breaches is often lost in the analysis. Yet developing law is increasingly requiring administrative or procedural controls, particularly those directed at employees, as a component of a legally compliant security program.
Consumer Data Privacy in the Merger/Acquisition Context: What's an Acquiring Mind to Do?
October 19, 2006
Current wisdom favors non-disclosure of the private data related to consumers held by companies that obtain such data in the course of doing business. This sentiment is in full blossom in a wide variety of contexts, not the least of which are the provision of medical services and of financial services. In these heavily regulated industries, protection of consumer data is the subject of complex regulatory schemes aimed at ensuring data privacy and security while, nonetheless, allowing business to be conducted in its ordinary course.
Lessons Learned: Issues Exposed in the Aftermath of the Hewlett-Packard Debacle
October 19, 2006
On Sept. 5, 2006, <i>Newsweek</i> published a story about Hewlett-Packard's Chairman Patricia Dunn's use of a private investigation firm to locate the source of leaks of confidential corporate information. As the story unfolded, the public learned the following: After confidential information appeared in news publications in 2005, certain officers and certain members of the board of directors of Hewlett-Packard ('HP') authorized the launch of two investigations, the first in 2005, and the next in 2006, to locate the source of the information leaks. The basis for the investigations was that the information leaked to the press was known only to board members. Certain officers and directors collectively comprised the 'HP investigation team' in the secret investigation of the leaks to the media. In devising its plan, the HP investigation team sought the assistance of a top investigator, Ron DeLia, head of Security OutSourcing Solutions, Inc. ('SOS'), with whom Hewlett-Packard previously had worked on unrelated matters. DeLia allegedly encouraged the HP investigation team to use pretexting or 'social engineering' to obtain private cell phone and phone records of certain targeted individuals, among other things.

MOST POPULAR STORIES

  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • Legal Possession: What Does It Mean?
    Possession of real property is a matter of physical fact. Having the right or legal entitlement to possession is not "possession," possession is "the fact of having or holding property in one's power." That power means having physical dominion and control over the property.
    Read More ›
  • "Holy Fair Use, Batman": Copyright, Fair Use and the Dark Knight
    The copyright for the original versions of Winnie the Pooh and Mickey Mouse have expired. Now, members of the public can create — and are busy creating — their own works based on these beloved characters. Suppose, though, we want to tell stories using Batman for which the copyright does not expire until 2035. We'll review five hypothetical works inspired by the original Batman comic and analyze them under fair use.
    Read More ›
  • Cutting Off the Stream: How United States v. Silver Affects "Stream of Benefits" or "Retainer" Bribery
    Although the court stressed that, by vacating certain of former NY State Assembly Speaker Sheldon Silver's counts of conviction, it was clarifying and not altering the "as opportunities arise" theory, it nevertheless emphasized that this theory requires particularity with respect to the "question or matter" that is the subject of the bribe payor and recipient's corrupt agreement.
    Read More ›