Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search

We found 3,883 results for "Internet Law & Strategy"...

Safeguarding Confidential Employee Records
May 30, 2006
Because information has become increasingly easy to obtain and transfer, employers must take precautionary measures to ensure that confidential data is adequately protected. This applies not just to proprietary business information, but also to confidential employee data. <br>This article provides an overview of statutory, constitutional and common law concerns with res-pect to obtaining and maintaining confidential employee information, and penalties that employers may face for failing to protect the security of confidential employee records.
Insider Fraud: Biting the Hand That Feeds
May 30, 2006
You've read about it, you've heard about it, but let's say it again: Your employees, on their own or in collusion with others, can make your firm a victim of fraud. Understanding how fraud takes place can help you and your clients minimize its possibility; yet statistics show that many businesses do not understand fraud and do not recognize its red flags.
Forensic Collections
May 30, 2006
A forensic collection is the copying of data in a process-driven way that results in an exact 'bit for bit' replication of the source. That's why a forensic collection is so important in electronic discovery ' what you get is what it was when you got it, not some modified version that won't stand up in court.<br>Forensic data collection doesn't necessarily involve more time or complexity than other copying methods. Not only can it help you keep your job, it's a strategic decision. Providing that the old axiomatic question, 'Is it plugged in and is it turned on?' is met, there are a couple of ways it can be done.
What Do You Want To Read?
May 26, 2006
We want to know how we can make this newsletter an even better resource for your professional needs. Are we covering all you want to see? Are there sections you would like to see enhanced or replaced?<br>Your views and opinions are essential in our effort to continue to provide you with the top notch News, Strategy and Analysis you have come to expect from Law Journal Newsletters.<br>Help us help you! Please click <a href="http://www.surveymonkey.com/s.asp?u=604771980045">here</a> to complete a short survey or type the following URL into your browser: http://www.surveymonkey.com/s.asp?u=604771980045.<br>Your answers will assist us in making this an even better newsletter for you! Thank you.<br>Regards,<br>Colin Graf<br>LJN Marketing Director
Greenberg Partners Advise on Company's China Deal
May 16, 2006
HowStuffWorks Inc., a unit of Atlanta-based Convex Group Inc., and INTAC International Inc. agreed to form a new company to develop commercial Web sites targeted to Chinese users. The new company, which will be called HSW International, will pair the content rights owned by HowStuffWorks with the sales channels in China developed by INTAC. HSW will generate revenue through advertising sales.
China Gets Its Own Version of Wikipedia
May 16, 2006
With the real thing banned since late last year, the Chinese search engine Baidu has launched its own version of the popular U.S. Internet encyclopedia Wikipedia.
Data Security Breach Notification
May 15, 2006
Companies that handle personal information are faced with an increasingly complicated compliance task as states continue to enact data security breach notification laws. As of press time, 25 states have enacted such laws. The compliance difficulties arising from these enactments run in several directions.
Online Access to Corporate Information
May 15, 2006
How does a company authenticate customers, employees, and third-party service providers when they seek Internet access to the company's computer networks and systems? For most companies, the standard approach is to use a user ID and password. But that approach may no longer be legally adequate. In the United States, regulators in the financial sector have now become the first to formally state that reliance solely on a user ID and password ' so-called single-factor authentication ' is now considered 'to be inadequate' at least in the case of high-risk transactions.
What Every U.S. Employer Should Know About Workplace Privacy
May 15, 2006
The U.S. privacy arena is a minefield for employers. The United States has no omnibus employee privacy law. Instead, employers are faced with a patchwork of privacy laws that they must piece together to avoid legal liability. This article focuses on the key privacy issues employers in the U.S. must confront.
privacy update
May 09, 2006
FTC Sues Five Companies for Selling Cell Phone Records On May 3, the Federal Trade Commission ('FTC') sued five companies for obtaining cell phone records without permission from cell phone users and then reselling that information to third parties. The Commission's lawsuits are aimed at stopping sales of the cell phone records, and the FTC also is seeking to recover from the companies the revenue they earned from selling the phone logs. &#133;

MOST POPULAR STORIES

  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • Legal Possession: What Does It Mean?
    Possession of real property is a matter of physical fact. Having the right or legal entitlement to possession is not "possession," possession is "the fact of having or holding property in one's power." That power means having physical dominion and control over the property.
    Read More ›
  • The Stranger to the Deed Rule
    In 1987, a unanimous Court of Appeals reaffirmed the vitality of the "stranger to the deed" rule, which holds that if a grantor executes a deed to a grantee purporting to create an easement in a third party, the easement is invalid. Daniello v. Wagner, decided by the Second Department on November 29th, makes it clear that not all grantors (or their lawyers) have received the Court of Appeals' message, suggesting that the rule needs re-examination.
    Read More ›