This article discusses several of the pressing matters within the realm of data encryption, including: the Constitutional concerns that arise when an individual is forced by the government to divulge encrypted data; the recent disclosures in the press of government involvement with encrypted data; and the current global legal climate in which these issues are situated.
- November 02, 2013Richard Raysman and Peter Brown
Many employers use publicly available Facebook pages, Twitter feeds, and other social media outlets as screening tools for job applicants. And they may also use them as a way to monitor employees. After all, a picture is worth a thousand words. A handful of employers, however, have pushed their due diligence even further than standard Internet searches.
October 29, 2013Lily M. StrumwasserWith the predominance of Internet marketing now continuously eroding what might be considered the traditional geographic "territories" of different licensees, the potential for conflict only becomes more acute.
October 02, 2013Scott J. SlavickPrompted by a case involving threats made on Facebook, the Third Circuit has ruled the objective-intent standard for assessing threats still stands.
October 02, 2013Saranac Hale SpencerThe ability to quickly identify relevant electronically stored information when litigation or regulatory action arises. This challenge has been significantly exacerbated by the arrival of "Big Data." This problem must be addressed holistically and aggressively with a combination of human intelligence, legal process and advanced information retrieval technology. Taken together, this approach represents a "Facts First" intelligence-gathering methodology that allows legal teams to identify, analyze and defensibly reduce ESI volumes.
October 02, 2013Scott GiordanoLater this year, the Internet is set to undergo a series of new and drastic changes with the first rollout of hundreds of new generic Top Level Domains (gTLDs). However, there is still a significant lack of participation from many top businesses that have yet to register and, as a result, are at greater risk of intellectual property infringement and potentially putting consumers at risk as well.
October 02, 2013Jan CorstensSecuring your company's network and protecting your valuable data is difficult enough in today's Internet-driven economy. But to be treated by regulators and courts like an accessory to the crime after you've been hacked is truly adding insult to injury.
October 02, 2013Jason WeinsteinBloggers, claiming that no distinction exists between blogs and traditional media, are seeking protection afforded by the First Amendment rights previously reserved for traditional media outlets. However, most courts do not afford bloggers the same rights given to traditional media.
October 02, 2013Jonathan BickThis column addresses the new compatibility features of Microsoft Office Word 2013.
October 02, 2013Sue HughesThe value of e-discovery technology varies, depending on a number of factors, including the provider that is hosting the data, the quality of technical support and the nature of the matter at hand. For that reason, there is no single one-size-fits-all platform.
October 02, 2013Steve Hartwig

