Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search

We found 3,899 results for "Internet Law & Strategy"...

IP News
April 01, 2016
Federal Circuit Holds Two of Apple's Five Asserted Patents Invalid, Three More Not Infringed
Ethics and Criminal Practice
April 01, 2016
You meet with a new client, a finance manager of his church. He is being investigated for embezzlement. As you look at the issue, you become concerned that your client and his supposed cohort, the church treasurer, may have had a meretricious relationship, which might lend credence to the investigation. But your client tells you that is simply not the case. What do you do?
Equity Crowdfunding
April 01, 2016
There has been a great deal of media attention the past several years about the JOBS Act. It has various components that do various things. The aspect of the JOBS Act that has the potential to touch the largest number of Americans is Title III (Crowdfunding).
10 Lessons from FTC Guidance on Data Security
April 01, 2016
Not if, but when." These simple words are enough to keep privacy officers, corporate counsel, compliance officers and IT managers up at night when faced with the reality that their network will at some point be breached. While there are no silver bullets to stop breaches from occurring, understanding and following legal actions brought by regulatory agencies and heeding security guidance they issue can go a long way.
Does Adoption of Cloud Computing Shift Cyber Liability Risk?
April 01, 2016
The rapid adoption of cloud computing has attracted companies that seek to lower their information technology costs. At the same time, it is reported that there has been an increase in data loss and an increase in cyber-liability claims against companies. But the biggest vendors in the cloud computing industry want to push the risk of penetration of their systems onto their customers adopting the technology.
<b><i>Online Extra:</b></i> Malware Increasingly Making Its Way into Organizations Through Social Media
April 01, 2016
To say 'social media is everywhere' these days may be slightly archaic. Of course it's everywhere. Chances are, you're reading this article with at least one social media application running or open in a browser right now. But why, then, aren't these social media platforms as secure as they could be? A new 'Best Practices for Social Media Archiving and Security' survey from Osterman Research found that although enterprise and consumer-focused social platforms abound in modern organizations, social media remains a threat for many companies.
<b><i>Online Extra:</b></i> Separating Truth from Lies: Website Tips for Small and Mid-Sized Firms
April 01, 2016
Experts at the 'Truth and Lies of the Internet for Lawyers' panel at ABA Tech Show 2016 in Chicago conducted the one hour discussion in a way similar to the TV show 'Mythbusters' ' dispelling some of the common myths told to small and mid-sized firms looking to build their own business.
Internet Task Force Examines Copyright In the Digital Age
February 29, 2016
On Jan. 28, the Commerce Department issued a much-anticipated policy statement entitled "White Paper on Remixes, First Sale and Statutory Damages: Copyright Policy, Creativity, and Innovation in the Digital Economy." This article briefly describes the white paper's scope and recommendations, with a focus on the issue of statutory damages, as to which the white paper proposes several amendments to the current Copyright Act.
Development
February 29, 2016
In-depth analysis of two key cases.
Uncertainty Reigns Over Ownership Of Social Media Content
February 29, 2016
When a social media account is created, who owns the resultant content? When a business cultivates Facebook "likes" in order to expand its marketing reach and effectiveness, who controls the outpouring of support for the company?

MOST POPULAR STORIES

  • Bankruptcy Sales: Finding a Diamond In the Rough
    There is no efficient market for the sale of bankruptcy assets. Inefficient markets yield a transactional drag, potentially dampening the ability of debtors and trustees to maximize value for creditors. This article identifies ways in which investors may more easily discover bankruptcy asset sales.
    Read More ›
  • Restrictive Covenants Meet the Telecommunications Act of 1996
    Congress enacted the Telecommunications Act of 1996 to encourage development of telecommunications technologies, and in particular, to facilitate growth of the wireless telephone industry. The statute's provisions on pre-emption of state and local regulation have been frequently litigated. Last month, however, the Court of Appeals, in <i>Chambers v. Old Stone Hill Road Associates (see infra<i>, p. 7) faced an issue of first impression: Can neighboring landowners invoke private restrictive covenants to prevent construction of a cellular telephone tower? The court upheld the restrictive covenants, recognizing that the federal statute was designed to reduce state and local regulation of cell phone facilities, not to alter rights created by private agreement.
    Read More ›