Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search

We found 3,888 results for "Internet Law & Strategy"...

Ransomware: What to Do When It Happens to You
In the event that your company is the victim of a ransomware attack, this article provides steps to be taken as part of its response to such an incident. It is meant to be a helpful guide, but the best response generally will depend on different factors, including the scope and severity of the attack, availability of remediation measures, and business sensitivities.
eSports Raise Labor Law Issues for Teams and Players
The preference of the parties involved, even if reduced to writing, is rarely determinative of employment status. Instead, the specifics of the relationship will govern.
Internet Goods and Product Liability
The Internet's value arises in part from its ability to provide images, data and content quickly and at little cost. This ability results from the fact that Internet products — whether they be images, data or content — are each reduced to a digital format. Sharing products that have been so reduced may result in product liability.
IP News
Federal Circuit Affirms Finding That Rembrandt's Patent Is Not Infringed by Apple's Accused Products<br>District Court Transfers Case after Federal Circuit Ordered It to Reconsider Party's Venue Objections In Light of <i>TC Heartland</i><brPTAB Decision Invalidating AIP Internet Network Patent Affirmed on Appeal
<i>Online Extra:</i><br>Social Media: Questions of Admissibility And Ethics
Social media evidence can be acquired both informally — through an attorney's own investigation or from the client — or more formally through the use of discovery and the rules of discovery. While each gives rise to practical and ethical issues, this section will focus on informal methods of acquisition.
Marketing Tech: How to Attract New Business
Are your lawyers marketing more and receiving less in return? The solution is two-fold: they need to improve their in-person and online marketing.
In an Era of Crises and Controversies, How Ready Is Your Law Firm?
Although the current news cycle is a barrage of negative situations, the silver lining is that they offer law firms a wealth of teachable moments about the importance of preparing for and responding to a crisis situation.
The Cyber Shot Across the Bow: Data Manipulation and GPS Spoofing
In September 2015, then-Director of National Intelligence James Clapper warned that the next "push of the envelope" in cybersecurity might be attacks that change or manipulate electronic information in order to compromise its accuracy or reliability. Two years later, we may now be seeing the beginning of such insidious attacks, in the context of GPS spoofing — a technique that sends false signals to systems that use GPS signals for navigation.
Regulators Are Catching Up to Cryptocurrency and Blockchain Technology within the Financial Services Industry
<b><i>Part One of a Two-Part Article</b></i><p>As we head into 2018, cryptocurrency and blockchain will continue to be a top initiative for pioneers in the financial services industry. As with any innovation within the financial services industry, the regulators are never far behind and are doing their best to keep up. Those that enter this space will find that they also have to pioneer the controls to manage the regulatory risks this technology presents.
Five Smart Steps to Prepare for GDPR Data Subject Rights
Many corporations around the globe are preparing for May 2018, when Europe's General Data Protection Regulation (GDPR) enforcement kicks in. The regulation encompasses a wide range of nuanced privacy requirements that can be challenging to operationalize. In particular, requirements around the rights of European data subjects — which include the right to be forgotten and rights to access, rectification and objection to processing — will be some of the most difficult to address.

MOST POPULAR STORIES