Account

Sign in to access your account and subscription

Technology Media and Telecom

  • Whether or not your clients have suffered a data breach, cybersecurity is undoubtedly a critical concern. Many of your clients are actively searching for and plugging any gaps in their security. And if your clients haven't done so already, they're also going to focus their attention on what could potentially be an Achilles Heel for them ' their law firms.

    April 02, 2015Jason Straight
  • U.S. Magistrate Judge Laurel Beeler said she didn't want February's hearing in a privacy suit against Hulu LLC to feel like 'a wake.' But the Northern District of California judge put the case on life support, at the very least, indicating that she's leaning toward knocking out the remaining claims in a 2011 suit under the Video Privacy Protection Act.

    March 31, 2015Ross Todd
  • A federal judge has ordered a litigious adult website to pay $5.6 million in attorney fees and costs under the Copyright Act, saying its motives for suing Giganews Inc. and Livewire Services Inc. had more to do with creating a tax write-off for its owner than with protecting its copyrights.

    March 31, 2015Vanessa Blum
  • As discussed in Part One of this article, a data breach can jeopardize a company's confidential information such as client records, trade secrets, privileged legal information, or employee records. Although many associate data breaches with hackers or cyberattacks, human error, such as a mistake in computer coding or losing a company laptop, also results in significant breaches.

    February 28, 2015Sherilyn Pastor and Kelly Lloyd
  • In 2012, DISH Network announced two novel product offerings that would result in considerable backlash from the four major broadcast television networks and set in motion a three-year, wide-ranging, multi-front battle with the networks. As the dust now begins to settle, the copyright litigation has resulted in important precedents that will help define the boundaries under the Copyright Act for the multi-channel programming distribution industry.

    February 28, 2015J. Alexander Lawrence
  • An anonymous pro se defendant has beaten copyright infringement claims brought against him in federal court by a maker of pornographic videos. The defendant's victory runs counter to the result in a similar case in front of a different Eastern District judge.

    February 28, 2015Saranac Hale Spencer
  • Obtaining social media user content under most circumstances is extremely difficult ' unless you use the correct strategy. Simply sending discovery requests without a basic understanding of the information available is a fool's errand. It is pivotal that a practitioner who wants to conduct formal discovery of social media user content understand how each site stores and communicates its data.

    February 28, 2015Emily T. Acosta and Eric P. Conn
  • Companies have begun to experience attempts to breach their databases on a frequent basis, and have had to become hypervigilant about protecting their networks against hackers. But once every couple of months, the bad guys get through the defense systems in a big and highly publicized way, showcasing data disaster for company and customers. This was the case in early February when Anthem Inc., the second-largest health insurance company in the U.S., announced it had been hacked.

    February 28, 2015Rebekah Mintzer