Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search

We found 3,896 results for "Internet Law & Strategy"...

Broadening the Scope of Privacy Under the Video Protection Statute
August 02, 2015
A recent case from the District of Massachusetts, <i>Yershov v. Gannett Satellite Information Network,</i> suggests a broadening of the view of subscriber privacy in the context of the delivery of video content over online platforms.
Data Sharing in the Cloud
August 02, 2015
Storing and sharing data "in the cloud" has become, in many instances, a business necessity. The practical and economic advantages of cloud computing are clear ' it eliminates the need to send client data via traditional, costly methods, and is significantly less expensive than building and maintaining the same data storage capacity in-house.
<b><i>Media & Communications:</i></b> Five PR Obstacles
August 02, 2015
Whether you are an in-house communications manager or a PR consultant, every day presents new challenges. With experience, how you respond may become automatic, while others require more in-depth thinking for solutions.
The Art of Cyberwarfare
August 02, 2015
Cybersecurity is at a crossroads. No longer resigned to the confines of server rooms overseen by information technology, decisions regarding the protection of data have been forced into the boardroom by events that include breaches at main street businesses and revelations of clandestine government hacking activities.
A Six-Step Data Privacy Program Health Check
August 02, 2015
Data protection is the responsibility of every individual in the company, and the legal and IT departments should only be drafting contractual languages, policies, and guidelines while working in tandem with each other.
Three Lessons for a Proactive Approach To Cybersecurity
August 02, 2015
Do you know where your client's or organization's data is? It's not a rhetorical question ' it's a serious issue that should be at the core of any cybersecurity assessment.
IP News
August 02, 2015
Federal Circuit Affirms '101 Subject Matter Invalidity of Internet-Related Software Patents Under <i>Alice</i><br>Patent Term Adjustments Do Not Apply To Continuing Applications Based On Delays In Application Prosecution<br>Federal Circuit Clarifies Standard of Review and Affirms Denial of Award for '285 Exceptional Case Attorney's Fees
Wave of Privacy Suits Peters Out
July 02, 2015
Michael Rhodes, the charismatic chair of Cooley's privacy and data protection practice, took the stage at an awards dinner in late April with an extra bounce in his step ' and a blunt prediction for his colleagues in the plaintiffs privacy bar.
Sensitive Data Loss is Not Inevitable
July 02, 2015
Global banking institutions are increasingly pressing outside law firms to demonstrate they are employing top-tier technologies to defend against cyber hackers. In some cases, firms are being asked to fill out 60-page questionnaires detailing their cybersecurity measures in minute detail, while others must consent to on-site inspections.
<b><i>Voice of the Client:</i></b> Business Development Program Best Practices: Business Intelligence
July 02, 2015
Law firms are ever-so-slowly starting to incorporate "key account planning," a critical element in any successful strategic go-to-market strategy and/or best-in-class business development program is "business intelligence."

MOST POPULAR STORIES

  • The FTC Gets Into the College Athlete NIL Game
    As national champions are crowned in men's and women's basketball, hundreds of thousands of college athletes are entering the influencer marketplace for the first time and now find themselves attractive candidates in the fast growing influencer marketing arena. With influencer marketing potentially providing a 5x return on investment, many brands are eager to get into the industry, but it doesn't come without risks as the FTC Commissioner is taking a closer look at the use of influencers for marketing.
    Read More ›