Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search

We found 3,889 results for "Internet Law & Strategy"...

WannaCry Attack Is A Wake-Up Call for Cyber Preparedness
The scope of WannaCry changed our perceptions of ransomware attacks. Until then, the more highly publicized ransomware incidents were localized targets impacting only one or a small number of businesses. WannaCry made it clear that ransomware could reach a broad cross-section of computers worldwide, at essentially the same time.
Tweeters Blocked By President Trump File First Amendment Suit
A group of Twitter users blocked by President Donald Trump are suing after a request to be unblocked on First Amendment grounds went unheeded.
<b><i>Online Extra</b></i><br> Google Sues to Block 'Repugnant' Canadian Court Decision
Google Inc. has filed suit in U.S. federal court seeking to block enforcement of a decision by the Supreme Court of Canada that would require the search giant to delist certain search results worldwide.
<b><i>Online Extra</i></b><br> Pokéstop: Judge Calls Timeout in Suit Against Pokémon Go Maker
A federal judge has pressed pause on a group of lawsuits targeting the maker of augmented reality game Pokémon Go with nuisance and trespass claims for placing virtual landmarks on top of real property.
<b><i>Online Extra</i></b><br>Publishers Seek Antitrust Exemption to Better Negotiate With Google, Facebook
U.S. newspaper publishers, who say they are chafing under the market power of Google and Facebook, are calling on Congress to allow them to negotiate collectively with the online giants.
The Role of Encryption in Law Firm Data Security
Encryption can play a vital role in securing data, but it needs to be considered within the context of a firm's overall IT security strategy. Whether, when and how to encrypt requires a careful look at what data the firm keeps, and how much protection it needs. This article explains how encryption can be used to guard against the reputational, financial and legal damage a breach of sensitive data can cause to law firms.
Standing at the Crossroads of Legal Innovation
The law firm business model of the past is under attack. Slowly, private legal is responding with things like developing knowledge management systems, establishing jobs for data analysts who can establish pricing of services and beginning to look at ways to outline workflows and processes. Unfortunately, corporate clients are impatient and are beginning to push harder for improved efficiency and increased speed of service delivery.
Cyber Crime Now Targeting Law Firms
<b><i>Is Your Firm Truly Prepared?</b></i><p>Cyber attacks and theft are on the rise around the country, and law firms are becoming prime targets. Similar to healthcare providers, a law firm's data can be the gold standard. Unlike manufacturers, banks and retailers, law firms are unique organizations that result in them being highly vulnerable.
Social Media Scene: Permission to Post
<b><I>NASA Doesn't Need a Social Media Policy, and Neither Do You</I></b><p>You don't need a separate policy governing how your firm's staff will represent you on social media. You already have one.
China's New Cybersecurity Law
<b><I>The Challenge of Complying</I></b><p>In a bid to assert control over cyberspace, China passed a sweeping cybersecurity law that affects virtually every company doing business in that country. Despite its broad reach and potential for disruption, it appears that very few legal professionals are aware of the law.

MOST POPULAR STORIES

  • Coverage Issues Stemming from Dry Cleaner Contamination Suits
    In recent years, there has been a growing number of dry cleaners claiming to be "organic," "green," or "eco-friendly." While that may be true with respect to some, many dry cleaners continue to use a cleaning method involving the use of a solvent called perchloroethylene, commonly known as perc. And, there seems to be an increasing number of lawsuits stemming from environmental problems associated with historic dry cleaning operations utilizing this chemical.
    Read More ›
  • Strategy vs. Tactics: Two Sides of a Difficult Coin
    With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
    Read More ›
  • Technology in Marketing: Where to Invest Your Marketing Technology Dollars
    Law firms have realized that using technology ' particularly the Internet ' is a powerful tool for creating a more level playing field to enhance their images, expand their visibility in targeted markets and drive business to their firms. However, with so many competing interests for limited marketing dollars, where should you invest your firm's resources to get the most bang for the buck?
    Read More ›