Features
Data Encryption And the Law
This article discusses several of the pressing matters within the realm of data encryption, including: the Constitutional concerns that arise when an individual is forced by the government to divulge encrypted data; the recent disclosures in the press of government involvement with encrypted data; and the current global legal climate in which these issues are situated.
Features
<b><i>Online Extra</b></i> Social Media Privacy Laws and the Financial Industry
Many employers use publicly available Facebook pages, Twitter feeds, and other social media outlets as screening tools for job applicants. And they may also use them as a way to monitor employees. After all, a picture is worth a thousand words. A handful of employers, however, have pushed their due diligence even further than standard Internet searches.
Features
It's a Licensee Eats Licensee World. Or Is It?
With the predominance of Internet marketing now continuously eroding what might be considered the traditional geographic "territories" of different licensees, the potential for conflict only becomes more acute.
Features
Third Circuit Keeps Objective Standard to Weigh Facebook Threats
Prompted by a case involving threats made on Facebook, the Third Circuit has ruled the objective-intent standard for assessing threats still stands.
Features
Combating Big Data with a 'Facts First' Approach to e-Discovery
The ability to quickly identify relevant electronically stored information when litigation or regulatory action arises. This challenge has been significantly exacerbated by the arrival of "Big Data." This problem must be addressed holistically and aggressively with a combination of human intelligence, legal process and advanced information retrieval technology. Taken together, this approach represents a "Facts First" intelligence-gathering methodology that allows legal teams to identify, analyze and defensibly reduce ESI volumes.
Features
ICANN's Trademark Clearinghouse Sees Slow Initial Take-up
Later this year, the Internet is set to undergo a series of new and drastic changes with the first rollout of hundreds of new generic Top Level Domains (gTLDs). However, there is still a significant lack of participation from many top businesses that have yet to register and, as a result, are at greater risk of intellectual property infringement and potentially putting consumers at risk as well.
Features
Nine Key Steps In a Proactive Cybersecurity Review
Securing your company's network and protecting your valuable data is difficult enough in today's Internet-driven economy. But to be treated by regulators and courts like an accessory to the crime after you've been hacked is truly adding insult to injury.
Features
Bloggers Want Same Rights as Mass Media
Bloggers, claiming that no distinction exists between blogs and traditional media, are seeking protection afforded by the First Amendment rights previously reserved for traditional media outlets. However, most courts do not afford bloggers the same rights given to traditional media.
Features
Word File Types and Compatibility
This column addresses the new compatibility features of Microsoft Office Word 2013.
Features
e-Discovery Platforms Are Not All the Same
The value of e-discovery technology varies, depending on a number of factors, including the provider that is hosting the data, the quality of technical support and the nature of the matter at hand. For that reason, there is no single one-size-fits-all platform.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Warehouse Liability: Know Before You Stow!As consumers continue to shift purchasing and consumption habits in the aftermath of the pandemic, manufacturers are increasingly reliant on third-party logistics and warehousing to ensure their products timely reach the market.Read More ›
- Major Differences In UK, U.S. Copyright LawsThis article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.Read More ›
- Inferring Dishonesty: The Fifth Amendment and Fidelity CoverageDishonest employees always have posed a problem for businesses. The average business may lose 6% of its annual revenues to employee fraud, and cumulatively the impact of employee theft on the economy is estimated to be $600 billion annually. <i>See</i> Association of Certified Fraud Examiners ("ACFE"), 2002 Report to the Nation on Occupational Fraud & Abuse, at ii, 4 (2002), available at <i>www.cfenet.com/publications/rttn.asp.</i> Although the average loss through employee embezzlement is $25,000, where computerized financial records or transactions are involved, the average loss increases nearly twentyfold. <i>See</i> National White Collar Crime Center, <i>WCC Issue: Embezzlement/Employee Theft,</i> at 2 (2002), available at <i>http://nw3c.org/downloads/Computer_Crime_Weapon.pdf.</i>Read More ›
- When Is a Repair Structural or Nonstructural Under a Commercial Lease?A common question that commercial landlords and tenants face is which of them is responsible for a repair to the subject premises. These disputes often center on whether the repair is "structural" or "nonstructural."Read More ›