Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search

We found 3,883 results for "Internet Law & Strategy"...

Med Mal News
August 31, 2006
Recent happenings of interest to you and your practice.
Identity Theft
August 30, 2006
What are the legal liabilities a company faces when someone '' an employee or outsider '' breaches the company's security and accesses employee or customer confidential information? More than half the states have legislation addressing this problem. This article focuses on federal statutes that expose companies to potential civil and criminal liability for failing to take adequate steps to prevent the theft.
Thelen Reid to Get Its China License
August 29, 2006
Thelen Reid & Priest will receive its license to practice in China at a ceremony in Beijing on August 30, a sign of thawing in what was seen as a freeze on the government issuing licenses to foreign firms.
<b>Online Exclusive:</b> Survey Finds Data Loss Pervasive, But Companies' Controls Still Weak
August 24, 2006
A new study found that loss of laptops, PDAs, and portable data storage devices is bedeviling corporate America, but few companies are working comprehensively to address the problem.
<b>Online Exclusive:</b> As Use of Social-Network Web Sites from Workplace Computers Grows, So Should Employers' Concerns About Viruses and Spyware
August 22, 2006
Almost one in 600 profile pages on social-networking sites such as Facebook or MySpace are hosting some form of malware, according to a July survey of 5 billion Web requests conducted by computer security firm ScanSafe. Also, though social-networking sites have a reputation as being the exclusive domain of teenagers and college students, ScanSafe has found that they are increasingly common sources of corporate traffic, thus significantly raising the online security issue for employers.
<b>Online Exclusive:</b> AOL Search Data Exposure Renews Interest in Data Warehousing Law
August 17, 2006
One of the U.S. House's leaders on telecommunications issues, Rep. Ed Markey (D-MA), recently renewed his effort to strengthen consumer privacy in the wake of AOL's sharing of customers' online data.
Personal Data Protection Law in China
August 16, 2006
China currently has no single, integrated personal data protection law. Data protection concerns do exist, but are expressed through various unrelated laws that originate in other fields (such as constitutional law or computer law) that contain certain compliance requirements that are, in practice, much like complying with a personal data protection law. For instance, there is a national law protecting the privacy of minors. This law is practically implemented through regulations enacted by each province.'
Privacy and Brazilian Law
August 16, 2006
The need for laws written expressly to protect the privacy of personal consumer data is a growing global phenomenon. It began primarily in more technologically advanced countries, where communication between individuals or companies via electronic means has overtaken more traditional means of communication. In addition, countries that place a high level of importance on democratic values also tend to prioritize protection of privacy, given that individual human rights and individual freedoms are typically important values in such societies. A third relevant factor related to a country's focus on protecting privacy is the level of participation a country's citizens have in the market. A country in which its citizens participate actively in the market has a greater need for the collection, storage, sorting, sharing, and other manipulation of consumer data. Therefore, such countries become a target for individuals or organizations wishing to economically tap such information.
Employers' Duty to Monitor Employees' Internet Activities
August 16, 2006
In a case with potential national implications, a New Jersey court recently held in a case of first impression that employers have a legal obligation to investigate an employee's activities when they know or have reason to know that the employee is using a workplace computer to access child pornography. <i>Doe v. XYC Corporation</i>, 382 NJ Super. 122 (App. Div. 2005). The court also held that an employer is required to report the employee's activities to the proper authorities and to take 'effective internal action' to stop the employee's activities. Based on the facts of the case, the court also ruled that 'no privacy interest of the employee stands in the way of this duty on the part of the employer.' XYC Corporation filed notice that it was petitioning the New Jersey Supreme Court to review the decision. However, the parties settled the matter, and XYC Corporation withdrew its petition.
Disposal of Computer Systems: Removal of Information
August 16, 2006
Your business is in the process of upgrading and replacing its computer assets and deciding what to do with the old servers, computers, and laptops. You might sell them, donate them to charity, or simply toss them in the garbage because they are 5 or more years old. Before you choose any disposal option, however, you should first consider what type of information may be stored on those old computer assets and then determine whether your business has a duty to protect that information as part of the disposal process.

MOST POPULAR STORIES

  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • Legal Possession: What Does It Mean?
    Possession of real property is a matter of physical fact. Having the right or legal entitlement to possession is not "possession," possession is "the fact of having or holding property in one's power." That power means having physical dominion and control over the property.
    Read More ›
  • The Article 8 Opt In
    The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
    Read More ›
  • Cutting Off the Stream: How United States v. Silver Affects "Stream of Benefits" or "Retainer" Bribery
    Although the court stressed that, by vacating certain of former NY State Assembly Speaker Sheldon Silver's counts of conviction, it was clarifying and not altering the "as opportunities arise" theory, it nevertheless emphasized that this theory requires particularity with respect to the "question or matter" that is the subject of the bribe payor and recipient's corrupt agreement.
    Read More ›