Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search

We found 3,899 results for "Internet Law & Strategy"...

Judicial Trend in Supporting Domain Name Registries' Takedown Policies in Cybersquatting Disputes
November 02, 2015
GoDaddy.com has now prevailed as defendant in two major lawsuits under the Anticybersquatting Consumer Protection Act (ACPA). In both cases, the plaintiffs sought to hold GoDaddy liable for contributory or secondary infringement rather than "direct" cybersquatting under the ACPA. Although the factual circumstances underlying the claims are different, the principal reason for the plaintiffs' lack of success lies in a fundamental misunderstanding of the ACPA.
Fifth Amendment Does Not Extend To 'Digital Person'
November 02, 2015
An acrimonious marital breakup has been known to bring out the worst in some people. Those battles increasingly are fought on the technology field, thereby leaving courts to determine complex personal rights issues in the context of grown-ups 'behaving badly.
<b><i>Marketing Tech:</i></b> The Best Ways to Use Technology to Supplement, Rather Than Replace, Your Networking
November 02, 2015
Technology can sometimes get in the way. While our digital tools have changed our lives, making us more efficient, responsive, and productive, it can confuse our sensibilities.
Dispositive Questions Every Law Firm Should Ask of the Cloud
November 02, 2015
Cloud service providers (CSPs) offer myriad choices to law firms of all sizes who, in return, have become one of the fastest adopters of hosted cloud infrastructure worldwide. Nonetheless, asking the right questions is essential to learning cloud limitations, similarities, differentiators, caveats and benefits. From niche providers to the top five, not everything is as it seems when it comes to what is offered, how it's offered, and the up-front and hidden costs of each.
Second Circuit 'Affirms Fair Use
November 02, 2015
On Oct. 16, in <i>Authors Guild v. Google,</i> the Second Circuit affirmed a U.S. District judge's holding that Google's mass digitization of more than 20 million books from major university libraries in order to enable users of the Google Books website constitutes fair use.
Safe Harbor European Court Data Protection Ruling
November 02, 2015
On Oct. 6, the 'European Court of Justice gave a very important judgment about EU data protection law, where it ruled that the EU Safe Harbor regime is invalid, and National EU Member State data protection regulators have the power to investigate complaints about the adequacy of the level of protection of data transfers to the U.S. All U.S. business transferring personal data from the EU need to take note of this judgment.
Safe Harbor for Service Providers under the Anticybersquatting Act
November 02, 2015
GoDaddy.com has been the prevailing defendant in two major lawsuits under the Anticybersquatting Consumer Protection Act (ACPA). In both cases, plaintiffs sought to hold a defendant liable for contributory or secondary infringement rather than "direct" cybersquatting under the ACPA. The principal reason for plaintiffs' lack of success lies in a fundamental misunderstanding of the ACPA.
Eye on <i>Lenz</i> In Light of NFL Takedown Notices
November 02, 2015
In October, after receiving takedown requests from the National Football League and two college athletic conferences citing the Digital Millennium Copyright Act (DMCA), Twitter suspended two sports news feeds that feature short clips of football highlights.
Protecting Your Company's Data from Security Breaches
November 02, 2015
This article explores some steps counsel can take to protect their organizations from a data breach, and how counsel can proactively help to mitigate any adverse impact in the unfortunate event a data breach occurs.
The Art of Cyberwarfare
November 02, 2015
Cybersecurity is at a crossroads. No longer resigned to the confines of server rooms overseen by information technology, decisions regarding the protection of data have been forced into the boardroom by events that include breaches at main street businesses and revelations of clandestine government hacking activities.

MOST POPULAR STORIES