Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search

We found 3,899 results for "Internet Law & Strategy"...

'Customary Operations' or A Vacant Building?
August 02, 2015
Many times, courts are faced with the question of whether a loss location is 'vacant' under a commercial property policy when trying to determine if the building owner or lessee is conducting customary operations. This article explores various decisions across the United States as to what is considered 'customary operations,' thereby rendering the property 'vacant.'
Using Unlicensed Photos on Websites
August 02, 2015
For a long time, people have generally felt it appropriate to go onto various image search engines, find a photo and then cut and paste it into their publication or website. One of the reasons this was so easy to get away with was that there was no effective way for photographers to find unlicensed uses of their work. Of late, however, photographers either have acquired new technology or have engaged search companies that have image-searching technology.
Using Unlicensed Photos On Websites
August 02, 2015
For a long time, people have generally felt it appropriate to go onto various image search engines, find a photo and then cut and paste it into their publication or website. One of the reasons this was so easy to get away with was that there was no effective way for photographers to find unlicensed uses of their work. Of late, however, photographers either have acquired new technology or have engaged search companies that have image-searching technology.
Broadening the Scope of Privacy Under the Video Protection Statute
August 02, 2015
A recent case from the District of Massachusetts, <i>Yershov v. Gannett Satellite Information Network,</i> suggests a broadening of the view of subscriber privacy in the context of the delivery of video content over online platforms.
Data Sharing in the Cloud
August 02, 2015
Storing and sharing data "in the cloud" has become, in many instances, a business necessity. The practical and economic advantages of cloud computing are clear ' it eliminates the need to send client data via traditional, costly methods, and is significantly less expensive than building and maintaining the same data storage capacity in-house.
<b><i>Media & Communications:</i></b> Five PR Obstacles
August 02, 2015
Whether you are an in-house communications manager or a PR consultant, every day presents new challenges. With experience, how you respond may become automatic, while others require more in-depth thinking for solutions.
The Art of Cyberwarfare
August 02, 2015
Cybersecurity is at a crossroads. No longer resigned to the confines of server rooms overseen by information technology, decisions regarding the protection of data have been forced into the boardroom by events that include breaches at main street businesses and revelations of clandestine government hacking activities.
A Six-Step Data Privacy Program Health Check
August 02, 2015
Data protection is the responsibility of every individual in the company, and the legal and IT departments should only be drafting contractual languages, policies, and guidelines while working in tandem with each other.
Three Lessons for a Proactive Approach To Cybersecurity
August 02, 2015
Do you know where your client's or organization's data is? It's not a rhetorical question ' it's a serious issue that should be at the core of any cybersecurity assessment.
IP News
August 02, 2015
Federal Circuit Affirms '101 Subject Matter Invalidity of Internet-Related Software Patents Under <i>Alice</i><br>Patent Term Adjustments Do Not Apply To Continuing Applications Based On Delays In Application Prosecution<br>Federal Circuit Clarifies Standard of Review and Affirms Denial of Award for '285 Exceptional Case Attorney's Fees

MOST POPULAR STORIES