Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search

We found 3,899 results for "Internet Law & Strategy"...

<b><i>Online Extra:</b></i> Spotify Faces Copyright Suit From Recording Industry Insider
January 29, 2016
The lead singer of Cracker and Camper Van Beethoven has filed a proposed class action against Spotify that accuses the music streaming service of an 'egregious, continuous and ongoing campaign of deliberate copyright infringement.'
<b><i>Online Extra:</b></i> The Anti-Social Network
January 26, 2016
In 2011, a 23-year-old student of data privacy law wondered how private his data was. Max ?Schrems of the University of Vienna asked Facebook for everything they had on him. Schrems sent two emails and got no response. A letter. No response. A phone call. No response. Then, as his lawyer, Wolfram Proksch of PFR in Austria, tells the story, ?Schrems received a mystery package in the mail with the data he had requested, perhaps from a secret privacy sympathizer at Facebook.
<b><i>Online Extra:</b></i> SEC to Focus on Cybersecurity Compliance in 2016
January 26, 2016
In 2016, the U.S. Securities and Exchange Commission will remain focused on assessing cybersecurity efforts by investment adviseors and broker-dealers.
SEC Sets Limits on Crowdfunding
December 31, 2015
On Oct. 30, 2015, the SEC issued new regulations to complete its work for implementing the sections of the JOBS Act that, for the first time, permit use of the Internet to raise equity financing. These latest regulations are scheduled to go into effect on May 16, 2016.
Standing to Assert Claims for Online Privacy Breaches
December 31, 2015
Many believe that we are on the precipice of a deluge of litigation ' both individual and multiparty/class action ' concerning how an individual's data is handled and the remedy, if any, if that data is misused or wrongfully disclosed. A case recently argued before the U.S. Supreme Court involves the intersection of the Internet and privacy laws and may affect the future of litigation against companies that operate on the Web as well as traditional brick-and-mortar businesses.
Infringement In The Cloud
December 31, 2015
The delivery and discovery of media over the Internet has left the hackers and pirates behind and become part of the licensed distribution chain, just as videotape did. The term "file sharing" is now more likely to describe a multi-billion dollar, cloud-based collaboration platform than a piracy site. And courts are beginning to examine the law of contributory infringement in that complex new context, as U.S. District Judge Andrew Carter did recently in <i>Smith v. BarnesandNoble.com.</i>
Second Circuit Illuminates Google Books Fair Use Issues
December 31, 2015
Based on the defense of fair use, the Second Circuit affirmed summary judgment for Google in the decade-long copyright battle between an authors group and the Internet search giant.
Five Online Business Development Tips for a Prosperous 2016
December 31, 2015
Over the last five years, there's been a sea change caused by cell phones and tablets that affect how clients find lawyers. Today, most clients go online to find a lawyer. In fact, more clients searching for an attorney found one from Internet content than they did from referrals.
New Year's Resolution for GCs in 2016: Establishing a Data Governance Committee
December 31, 2015
Data is an increasingly valuable corporate asset that must be managed competently, efficiently and responsibly in order for a company to be well-positioned to thrive in a connected and data driven economy. Governing of the organization's data must be a priority for 2016. Organizations that don't put proactive systems in place now may find themselves a distant memory from the dawn of the age of the Internet of Things (IoT) for a whole host of reasons.
Mobile Mayhem: Smartphones and Security (Or the Lack Thereof)
December 31, 2015
BYOD implementation can come in a wide variety of different formulations, but it essentially means that employees are choosing their own hardware and, to one degree or another, mixing personal and business use on a device. This means personal devices with no control from employers other than perhaps some unmonitored, unenforced, and mostly unread policy guidance.

MOST POPULAR STORIES

  • Bankruptcy Sales: Finding a Diamond In the Rough
    There is no efficient market for the sale of bankruptcy assets. Inefficient markets yield a transactional drag, potentially dampening the ability of debtors and trustees to maximize value for creditors. This article identifies ways in which investors may more easily discover bankruptcy asset sales.
    Read More ›
  • Restrictive Covenants Meet the Telecommunications Act of 1996
    Congress enacted the Telecommunications Act of 1996 to encourage development of telecommunications technologies, and in particular, to facilitate growth of the wireless telephone industry. The statute's provisions on pre-emption of state and local regulation have been frequently litigated. Last month, however, the Court of Appeals, in <i>Chambers v. Old Stone Hill Road Associates (see infra<i>, p. 7) faced an issue of first impression: Can neighboring landowners invoke private restrictive covenants to prevent construction of a cellular telephone tower? The court upheld the restrictive covenants, recognizing that the federal statute was designed to reduce state and local regulation of cell phone facilities, not to alter rights created by private agreement.
    Read More ›