Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search

We found 3,888 results for "Internet Law & Strategy"...

Railcar Leasing on the Rise
According to a recent analyst report from global market research company, Technavio, the railcar leasing market in North America, is predicted to grow steadily at a Compound Annual Growth Rate of above 9% by 2021. The report, titled Railcar Leasing Market In North America 2017-2021, finds that one of the primary drivers for this market is the rise in the demand for tank cars due to growing crude oil production.
<b><i>Online Extra</b></i><br> What You Need to Know About Emoji Law (Yes, That's a Thing)
How will the courts deal with questions of interpretation raised by emojis?
Hiding Assets in California
Often, asset protection advice is bereft of any discussion of California exemption statutes — which often provide the most efficient and safest asset protection. But to properly protect an asset in California, it's generally best to understand and maximize exemptions.
The State of Data Breach Litigation and How to Avoid It
The number of records compromised in data breaches in 2016 increased an astounding 86% over 2015 breaches. This has led to numerous data breach litigations in the civil and regulatory context. What are the major cases and trends from 2016? And what can organizations do to try to reduce their risks of breaches and litigations?
FTC's Letter to Paid 'Influencers'
In the digital age, the Federal Trade Commission (FTC) has been keeping tabs on the growing trend of brands hiring so-called "influencers" — athletes, celebrities and others with large followings — to promote their products on social media. In April, the FTC turned its attention downstream to the "influencers" themselves, sending 90 letters to influencers and marketers informing them of their responsibility to "clearly and conspicuously" disclose the business relationships behind social media posts.
State of the Industry: E-Discovery and Cybersecurity
<b><i>Part Two of a Three-Part Article</b></i><p>Examining the current similarities between e-discovery and cybersecurity and details how the history of e-discovery mirrors the present of cybersecurity and is a predictor of future patterns in the cybersecurity staffing market.
Using Computer Forensics to Investigate Employee Data Theft
Departing employees have a sense of ownership over the data that they copy. Intellectual property commonly stolen includes customer lists, secret formulas, source code, strategy documents and other trade secrets. The information is often used against the organization when the former employee goes to work for a competitor or decides to start a new company.
The Challenge of Complying with China's New Cybersecurity Law
In a bid to assert control over cyberspace, China passed a sweeping cybersecurity law that affects virtually every company doing business in that country. The law is set to go into effect June 1, 2017. Despite its broad reach and potential for disruption, it appears that very few legal professionals are aware of the law.
The Challenge of Complying with China's New Cybersecurity Law
In a bid to assert control over cyberspace, China passed a sweeping cybersecurity law that affects virtually every company doing business in that country. The law is set to go into effect June 1, 2017. Despite its broad reach and potential for disruption, it appears that very few legal professionals are aware of the law.
Can Instagram Post of Photo Become Transformative?
An enlarged print of an Instagram post containing a copyrighted photo counts as a transformative use, an attorney for "appropriation artist" Richard Prince — whose use of other artists' material in his own works has made him no stranger to the courts — argued before a New York federal judge in April.

MOST POPULAR STORIES