Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search

We found 3,892 results for "Internet Law & Strategy"...

Avoid Drowning in Data
June 02, 2015
Data is a rich source for evidence in litigation and, for many companies, a valuable asset. What is less apparent, however, is exactly how to properly manage information and its privacy and security. However, over the past several decades, best practices have been developed for establishing and managing a comprehensive privacy, data protection and information governance program. This article summarizes those learnings to suggest an approach for how to design and run a program that is right for your company.
<b><i>Online Extra:</b></i> Battle Over .SUCKS Domain Gets Testy
June 02, 2015
The registry that owns the controversial domain name ".sucks" has put the Internet Corporation for Assigned Names and Numbers (ICANN) on notice that its criticisms and actions against the company could lead to legal action.
Browse, Click, Sign, Enforce?
June 02, 2015
Signing, dating and keeping a record of a paper contract are standard practice ' but what about those that are native to websites, mobile apps and other digital platforms, and use such language as "Terms of Use," "Terms of Service," "Privacy Policies" and disclaimers? How do you track who is agreeing to what and when they agreed?
<b><i>Online Extra:</b></i> FTC Sued Over Refusal to Disclose Data Security Policies
May 28, 2015
' The Federal Trade Commission (FTC) was sued last month for refusing to turn over information about how the agency decides to bring data security cases. The Freedom of Information Act suit by Philip Reitinger, a former Department of Homeland Security official who is now president of a cybersecurity company, comes as the FTC'defends its role as data security cop'in two ongoing cases. &#133;
<b><i>Online Extra:</b></i> Data Breaches on Track to Cost Companies $2.1 Trillion
May 28, 2015
As more corporate infrastructure moves online, new research suggests the rising number and impact of data breaches will cost $2.1 trillion globally by 2019, almost four times the estimated cost of breaches in 2015.
Monitoring Employee Social Media Activity
May 02, 2015
Last year, the Pew Center released its demographic data on social media usage. The data revealed that ' regardless of age, race, sex, education or income ' nearly 75% of all adults in the United States who use the Internet use social media. The time is ripe to examine the pros, cons and pitfalls of monitoring employee social media postings from a legal perspective.
The Internet User's Duty of Care
May 02, 2015
The duty one Internet user has to another has changed, particularly with respect to cyber-security and privacy. Negligence by Internet users has enabled hackers and creators of viruses to exploit computer systems and engage in crime and unwanted computer intrusions.
Big Data Rights Protection Found in Internet Copyright Law
May 02, 2015
The Big Data-Internet connection is evidenced by the fact that the Internet is required for most Big Data transactions, including collection, storage and dissemination. Most of Big Data's content consists of uniquely Internet-related elements, namely users' transactions, meta-tag applicators and Internet content providers.
Deritivative Cyber Litigation
May 02, 2015
Potential liability for data breaches has emerged as a major concern for businesses in the past few years as massive cyber-attacks are increasing, with companies that use or store private customer data electronically or use social media as part of their marketing strategy being the prime targets.
The Changing Face of Legal Research
May 02, 2015
Executing a powerful business development plan is a challenge every attorney faces. For attorneys at small firms and with solo practices, doing it without breaking the bank is one of the biggest hurdles to a thriving practice.

MOST POPULAR STORIES

  • Private Equity Valuation: A Significant Decision
    Insiders (and others) in the private equity business are accustomed to seeing a good deal of discussion ' academic and trade ' on the question of the appropriate methods of valuing private equity positions and securities which are otherwise illiquid. An interesting recent decision in the Southern District has been brought to our attention. The case is <i>In Re Allied Capital Corp.</i>, CCH Fed. SEC L. Rep. 92411 (US DC, S.D.N.Y., Apr. 25, 2003). Judge Lynch's decision is well written, the Judge reviewing a motion to dismiss by a business development company, Allied Capital, against a strike suit claiming that Allied's method of valuing its portfolio failed adequately to account for i) conditions at the companies themselves and ii) market conditions. The complaint appears to be, as is often the case, slap dash, content to point out that Allied revalued some of its positions, marking them down for a variety of reasons, and the stock price went down - all this, in the view of plaintiff's counsel, amounting to violations of Rule 10b-5.
    Read More ›