Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search

We found 3,892 results for "Internet Law & Strategy"...

Easy-to-Use Collection Technology Leads to Lower e-Discovery Costs
August 02, 2015
Corporate legal departments are all about cost control and efficient processes, yet when hit with a new investigation or lawsuit, legal teams often reflexively fall back on the "collect everything" mentality. The emergence of targeted and remote collection technologies now makes it possible for corporations to collect in a legally defensible way that reduces cost and minimizes business disruption.
Issues in Using Unlicensed Photos On Websites
August 02, 2015
For a long time, people have generally felt it appropriate to go onto various image search engines, find a photo and then cut and paste it into their publication or website. One of the reasons this was so easy to get away with was that there was no effective way for photographers to find unlicensed uses of their work. Of late, however, photographers either have acquired new technology or have engaged search companies that have image-searching technology.
How to Determine a Diligent Job Search
August 02, 2015
If a plaintiff in a discrimination case or a recipient spouse in a divorce action is unemployed or under-employed and seeking compensation or maintenance, that party's employability must be ascertained in order to determine a fair and just award. Frequently, this requires consultation with, or testimony by, a vocational or employability expert.
'Customary Operations' or A Vacant Building?
August 02, 2015
Many times, courts are faced with the question of whether a loss location is 'vacant' under a commercial property policy when trying to determine if the building owner or lessee is conducting customary operations. This article explores various decisions across the United States as to what is considered 'customary operations,' thereby rendering the property 'vacant.'
Using Unlicensed Photos on Websites
August 02, 2015
For a long time, people have generally felt it appropriate to go onto various image search engines, find a photo and then cut and paste it into their publication or website. One of the reasons this was so easy to get away with was that there was no effective way for photographers to find unlicensed uses of their work. Of late, however, photographers either have acquired new technology or have engaged search companies that have image-searching technology.
Using Unlicensed Photos On Websites
August 02, 2015
For a long time, people have generally felt it appropriate to go onto various image search engines, find a photo and then cut and paste it into their publication or website. One of the reasons this was so easy to get away with was that there was no effective way for photographers to find unlicensed uses of their work. Of late, however, photographers either have acquired new technology or have engaged search companies that have image-searching technology.
Broadening the Scope of Privacy Under the Video Protection Statute
August 02, 2015
A recent case from the District of Massachusetts, <i>Yershov v. Gannett Satellite Information Network,</i> suggests a broadening of the view of subscriber privacy in the context of the delivery of video content over online platforms.
Data Sharing in the Cloud
August 02, 2015
Storing and sharing data "in the cloud" has become, in many instances, a business necessity. The practical and economic advantages of cloud computing are clear ' it eliminates the need to send client data via traditional, costly methods, and is significantly less expensive than building and maintaining the same data storage capacity in-house.
<b><i>Media & Communications:</i></b> Five PR Obstacles
August 02, 2015
Whether you are an in-house communications manager or a PR consultant, every day presents new challenges. With experience, how you respond may become automatic, while others require more in-depth thinking for solutions.
The Art of Cyberwarfare
August 02, 2015
Cybersecurity is at a crossroads. No longer resigned to the confines of server rooms overseen by information technology, decisions regarding the protection of data have been forced into the boardroom by events that include breaches at main street businesses and revelations of clandestine government hacking activities.

MOST POPULAR STORIES

  • Private Equity Valuation: A Significant Decision
    Insiders (and others) in the private equity business are accustomed to seeing a good deal of discussion ' academic and trade ' on the question of the appropriate methods of valuing private equity positions and securities which are otherwise illiquid. An interesting recent decision in the Southern District has been brought to our attention. The case is <i>In Re Allied Capital Corp.</i>, CCH Fed. SEC L. Rep. 92411 (US DC, S.D.N.Y., Apr. 25, 2003). Judge Lynch's decision is well written, the Judge reviewing a motion to dismiss by a business development company, Allied Capital, against a strike suit claiming that Allied's method of valuing its portfolio failed adequately to account for i) conditions at the companies themselves and ii) market conditions. The complaint appears to be, as is often the case, slap dash, content to point out that Allied revalued some of its positions, marking them down for a variety of reasons, and the stock price went down - all this, in the view of plaintiff's counsel, amounting to violations of Rule 10b-5.
    Read More ›