Features
Centralizing Stores of Information to Make Retention Policies Possible
Most law firms understand the need to plan for the implementation of records retention policies, but there has been little agreement on how to achieve this goal. Firms are acutely aware of the rising costs associated with storing physical data and the burden surrounding backup, maintenance and migration of electronic content. When faced with the need to produce information, be it at a client request or when compelled by a court, the more control a firm has over its data, the more efficient and cost effective this process will be.
Features
Democratizing the Social Networks
Social networking Web sites are hubs of information. Information about our daily activities, the people we know and the people they know. But as these hubs become more than just a virtual place for the global community to link to friends and post "what you are doing right now," we are confronted with fascinating new questions about how we define personal space, disclosures, and express preferences about our own content.
Features
Rules Governing Fax and E-mail Ads
The importance of having a robust compliance policy to review the content of proposed advertisements is well-known and widely accepted. But what may not be as familiar is the need for a separate policy focused on the means of disseminating such advertising.
Features
Keeping Track of Telecommuters
By restricting telecommuting to the people who really need to work at home and then asking them to sign a form indicating that they know the types of monitoring in use, a company can take reasonable protections without entering an Orwellian environment ' and making life hell for managers.
Features
Cloud Computing
It would be hard to find an IT department of a large business that was not undertaking a "cloud computing" project or at least considering the idea. Here's a look at what it is and how it works.
Features
The Law Enforcement Response to the Financial Crisis
As the financial crisis has deepened, the pressure for prosecutions from politicians, the media and the public has grown. In turn, federal and state law enforcement and regulatory agencies have devoted vast resources to investigating the crisis.
Features
e-Commerce Docket Sheet
QVC to Pay $7.5 Million to Settle Charges That It Aired Deceptive Claims <br>Credit Repair Companies Charged with Deceiving Consumers
Features
e-Commerce Companies v. Hackers
The 21st century is clearly the age of cybercrime, and e-commerce companies of all stripes should be especially concerned because there are only two types of computer systems: those that have been hacked, and those that will be hacked.
Features
Defending Against Trade Secret Misappropriation Lawsuits
There are several often-overlooked strategies for defending against trade-misappropriation claims. The first I call the Trade Secret Per Se Doctrine. The second pertains to open-source software. Both of these strategies need to be fully considered in appropriate trade-secret misappropriation cases, to which e-commerce counsel are no strangers.
Features
Lawful Data-Mining of Social Networks
Blogs simultaneously provide Internet users with social-network prospects and employers with a previously unavailable source of information suitable for employment-assessment decisions. And it's in this intersection on the Information Superhighway where often occurs a collision of worlds, perspectives and direction that frequently cripples or kills prospects, and individuals' aspirations. Employees of e-commerce companies aren't immune to such collisions, nor are agents of the companies who gather data on prospective or current employees, if they go about their work unlawfully, or in other improper ways that could lead to legal or other types of regulatory action.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Removing Restrictive Covenants In New YorkIn Rockwell v. Despart, the New York Supreme Court, Third Department, recently revisited a recurring question: When may a landowner seek judicial removal of a covenant restricting use of her land?Read More ›
- Bankruptcy Sales: Finding a Diamond In the RoughThere is no efficient market for the sale of bankruptcy assets. Inefficient markets yield a transactional drag, potentially dampening the ability of debtors and trustees to maximize value for creditors. This article identifies ways in which investors may more easily discover bankruptcy asset sales.Read More ›
- The Brave New World of Cybersecurity Due Diligence in Mergers and Acquisitions: Pitfalls and OpportunitiesLike poorly-behaved school children, new technologies and intellectual property (IP) are increasingly disrupting the M&A establishment. Cybersecurity has become the latest disruptive newcomer to the M&A party.Read More ›
- A Lawyer's System for Active ReadingActive reading comprises many daily tasks lawyers engage in, including highlighting, annotating, note taking, comparing and searching texts. It demands more than flipping or turning pages.Read More ›
- Digital Dibs: Rival Views of Generative AI CopyrightsGAI platforms like ChatGPT and OpenAI often require very little human input, shattering this legal landscape's framework by posing a simple question: Who authored the material? We'll explore how two countries are answering this question in different ways.Read More ›