Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search

We found 3,883 results for "Internet Law & Strategy"...

A Sample of Effective <i>Voir Dire</i>
March 31, 2004
In Parts One and Two of this article, we discussed the strategies involved in deciding when to question the opposing party's expert; during preliminary <i>voir dire</i> or during cross examination. We noted that, in a jury trial, it is usually prudent to wait until cross-examination to attack the expert, so that the jury can see where the holes in the witness's qualifications and conclusions are. But sometimes, questioning during <i>voir dire</i> is preferable, especially when the result is likely to be the witness disqualification to testify as an expert.
Best Practices for E-Mail Filtering
March 30, 2004
Particularly during the past 2 years, the onerous task of filtering e-mail messages has grown to become a business and operational necessity - largely because of the influx of spam, as well as regulations and legislation that mandate the retention of e-communications such as e-mail and, increasingly, instant messages. Coupled with the traditional reasons for filtering ' malicious code attached to or embedded within the message, and inappropriate or sensitive message content ' filtering technologies and the market are undergoing radical change. This makes purchasing and implementation decisions difficult. Best practices for effective e-mail filtering can ease the decision-making process.
Practice Tip: <B>Protecting Against Digital Spies</b>
March 30, 2004
As the legal industry leverages IT to deliver enhanced services and improve overall business operations, Internet threats are increasing. According to the latest Symantec Internet Security Threat Report, one of the most significant threats today is malicious code that exposes confidential data such as passwords, decryption keys, keystrokes and more. Moreover, this malicious code is entering businesses from a widening array of sources. One of the most common delivery vehicles is spyware. According to security experts, millions of PCs in homes and businesses across the world are already infested with spyware. Yet, for all its ubiquity, it remains a relatively misunderstood threat.
The Era of Mega-Case Litigation
March 30, 2004
The era of mega-case litigation has arrived. In the last 2 years, mega-cases ' those with more than 500,000 pages for review ' have become commonplace according to leading law firms and litigation support vendors. Indeed, in high profile cases today, document collections can easily run over 50 million pages ' roughly a terabyte of data, or the equivalent of about 20,000 Banker boxes. The rapid growth of electronic documents presents significant challenges for corporations and law firms involved in litigation. Dealing with the challenges of document reviews across multiple, related cases is also becoming increasingly important for many corporations.
INNOVA: An Innovation in the Document Creation Process
March 30, 2004
Like it or not, in order to produce and collaborate on documents, the legal community is dependent on more and more software products which are increasingly sophisticated and interdependent. To maximize the financial investment in these products, it's optimal to leverage the integration opportunities that they offer. Firms have the option to take on custom development to achieve this goal, or to invest in a third-party product where the software vendor is responsible for keeping their product updated to integrate with new versions of other programs on the desktop. Innova, developed by SoftWise Corporation, is an example of a comprehensive, feature-rich, template program that standardizes and simplifies the document creation process. It integrates with a variety of contact management, document management and fax server programs typically found on a legal desktop.
Designing a Medical Device Surveillance Network
March 03, 2004
In last month's newsletter, we looked at some helpful Web sites for those who need to track the efficacy and safety of medical devices. Following are more useful Web sites for these purposes.
Digital Stealth Secrets and the Act
March 02, 2004
Corporate accountability (Section 302, 404 and 409 of SOA) has moved to priority status for most businesses. This article has as its core just one premise: understanding the risks associated with digital stealth fraud in the workplace, and what it can do to your company.
Audit Committee Members: the Act Affects You!
March 02, 2004
Last month, we discussed the provisions of the Sarbanes-Oxley Act (the Act) that directly affect audit committees. These included Title II: auditor indpendence.…
The Keys to Keyword Advertising
March 01, 2004
Until recently, courts have had relatively little to say about the practice of keyword advertising &mdash; <i>ie</i>, triggering Internet advertisements to appear when users search for a keyword identical to a competitor's trademark. Practitioners could look only to a single decision denying Playboy Enterprises, Inc.'s ("PEI") motion for a preliminary injunction against Netscape Communications Corp. ("Netscape") and Excite, Inc. ("Excite"). Now, four courts have recently issued decisions reaching starkly different results on keyword advertising practices, including a Ninth Circuit decision reversing summary judgment that had been entered against PEI in its litigation with Netscape and Excite. While much remains to be resolved, certain factors have been particularly influential.
Federal Circuit Looks Back to the Future to Construe Terms
March 01, 2004
A standard plot element of time-travel science fiction is that those journeying to the past must first be sternly warned that anything they do to change the past &mdash; stop the car before it plunges over the cliff, warn the wagon train of the bandits lurking ahead, select paper instead of plastic at the checkout line &mdash; has unforeseeable consequences that could render the future (and hence, the present) completely unrecognizable. The idea, of course, is that what happens in the past affects the future.

MOST POPULAR STORIES

  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • Strategy vs. Tactics: Two Sides of a Difficult Coin
    With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
    Read More ›
  • The Article 8 Opt In
    The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
    Read More ›
  • The Stranger to the Deed Rule
    In 1987, a unanimous Court of Appeals reaffirmed the vitality of the "stranger to the deed" rule, which holds that if a grantor executes a deed to a grantee purporting to create an easement in a third party, the easement is invalid. Daniello v. Wagner, decided by the Second Department on November 29th, makes it clear that not all grantors (or their lawyers) have received the Court of Appeals' message, suggesting that the rule needs re-examination.
    Read More ›