Account

Sign in to access your account and subscription

Technology Media and Telecom

  • This article discusses several of the pressing matters within the realm of data encryption, including: the Constitutional concerns that arise when an individual is forced by the government to divulge encrypted data; the recent disclosures in the press of government involvement with encrypted data; and the current global legal climate in which these issues are situated.

    November 02, 2013Richard Raysman and Peter Brown
  • Many employers use publicly available Facebook pages, Twitter feeds, and other social media outlets as screening tools for job applicants. And they may also use them as a way to monitor employees. After all, a picture is worth a thousand words. A handful of employers, however, have pushed their due diligence even further than standard Internet searches.

    October 29, 2013Lily M. Strumwasser
  • With the predominance of Internet marketing now continuously eroding what might be considered the traditional geographic "territories" of different licensees, the potential for conflict only becomes more acute.

    October 02, 2013Scott J. Slavick
  • The ability to quickly identify relevant electronically stored information when litigation or regulatory action arises. This challenge has been significantly exacerbated by the arrival of "Big Data." This problem must be addressed holistically and aggressively with a combination of human intelligence, legal process and advanced information retrieval technology. Taken together, this approach represents a "Facts First" intelligence-gathering methodology that allows legal teams to identify, analyze and defensibly reduce ESI volumes.

    October 02, 2013Scott Giordano
  • Later this year, the Internet is set to undergo a series of new and drastic changes with the first rollout of hundreds of new generic Top Level Domains (gTLDs). However, there is still a significant lack of participation from many top businesses that have yet to register and, as a result, are at greater risk of intellectual property infringement and potentially putting consumers at risk as well.

    October 02, 2013Jan Corstens
  • Securing your company's network and protecting your valuable data is difficult enough in today's Internet-driven economy. But to be treated by regulators and courts like an accessory to the crime after you've been hacked is truly adding insult to injury.

    October 02, 2013Jason Weinstein
  • Bloggers, claiming that no distinction exists between blogs and traditional media, are seeking protection afforded by the First Amendment rights previously reserved for traditional media outlets. However, most courts do not afford bloggers the same rights given to traditional media.

    October 02, 2013Jonathan Bick
  • The value of e-discovery technology varies, depending on a number of factors, including the provider that is hosting the data, the quality of technical support and the nature of the matter at hand. For that reason, there is no single one-size-fits-all platform.

    October 02, 2013Steve Hartwig